Tom Moore

9.8K posts

Tom Moore banner
Tom Moore

Tom Moore

@c0ncealed

Whitehat infosec apprentice... Red team menace... Christian, Husband, Father & unrelenting geek!🧐

Katılım Ekim 2011
3.4K Takip Edilen3.7K Takipçiler
Tom Moore retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🔥 OpenAI launched GPT-5.4-Cyber, a model built for security teams to find and fix bugs faster. 3,000+ vulnerabilities already fixed using its Codex Security tools, with access expanding to thousands of defenders. But the same AI can be misused to find exploits. 🔗 Read → thehackernews.com/2026/04/openai…
The Hacker News tweet media
English
8
61
205
26.2K
Tom Moore retweetledi
vxdb
vxdb@vxdb·
Veritasium Exposes a Tap To Pay Flaw That Lets a Payment Terminal Steal $10,000 From a Locked iPhone
English
374
1.9K
28.1K
1.6M
Tom Moore
Tom Moore@c0ncealed·
Great work and congratulations on another amazing conference @BsidesCLT team! Looking forward to next year!
Tom Moore tweet mediaTom Moore tweet mediaTom Moore tweet mediaTom Moore tweet media
English
0
2
3
91
Tom Moore retweetledi
SC Media
SC Media@SCMagazine·
Medical device maker Stryker says it has no timeline for full recovery after a cyberattack by an Iran-linked group disrupted 200K-plus systems. The impact now extends beyond IT to manufacturing, supply chains and hospitals. #cybersecurity #infosec #CISO bit.ly/4s4iyzW
English
0
4
5
675
Tom Moore
Tom Moore@c0ncealed·
Thank you to each of the volunteers that put on @BsidesCLT this year! Great venue, talks, and conversations, and it's great to see the conference still bringing people together to learn from one another in the security industry.
English
0
0
1
108
Tom Moore retweetledi
nyxgeek
nyxgeek@nyxgeek·
I think most pentesters have used the classic OWA time-based user enum at some point. Or time-based enum in Lync. What if I told you that time-based user enum lives on in Azure? And it's tied to Basic Auth. Basic Auth is dead. Long live Basic Auth! trustedsec.com/blog/kicking-i…
English
5
72
212
17.4K
Tom Moore retweetledi
ii4gsp
ii4gsp@ii4gsp·
CVE-2020-27786 Linux kernel exploit covering msg_msg + timerfd_ctx + tty_struct and finishing with ROP. ii4gsp.github.io/cve-2020-27786/
English
1
39
135
12K
Tom Moore retweetledi
cackalackycon
cackalackycon@cackalackycon·
Today is the day!! Registration opens at noon. Talks and workshops start at 1300 Opening Ceremony 1800
English
0
3
5
698
Tom Moore retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 Alert - Popular #Android apps like Xiaomi File Manager and WPS Office are vulnerable to a path traversal flaw that could let hackers overwrite files and execute malicious code, leaving over 1.5 billion users exposed. Details here: thehackernews.com/2024/05/popula… #infosecurity
English
6
112
175
37.3K
Tom Moore retweetledi
cackalackycon
cackalackycon@cackalackycon·
Did you know we will have an electronic badge at the con this year? Our hardware village will give you the chance to build and hack your badge. Newbies always welcome! Join the Discord for more info discord.gg/KFnuZyGw What will you do with your badge?
English
0
1
3
337
Tom Moore retweetledi
nixCraft 🐧
nixCraft 🐧@nixcraft·
I can't believe a paid OS needs a tool like this. Here's a GUI tool called OFGB (Oh Frick Go Back) to remove all the ads in Windows 11. It's understandable if a free OS or app needs ad support, but this is just crazy.
nixCraft 🐧 tweet media
English
122
1.1K
7K
515.2K
sudox
sudox@kmcnam1·
sudox tweet media
ZXX
183
213
1.8K
198.4K
Tom Moore retweetledi
Mike Felch (Stay Ready)
Mike Felch (Stay Ready)@ustayready·
Dropping a new initial access technique via RDP that I dubbed "Rogue RDP". Use malicious .RDP files to bypass email/servers/security gateways and then run code to binary plant/exfil from your own RDP server, blinding EDR. Bonus: Target runs HyperV? RCE! blackhillsinfosec.com/rogue-rdp-revi…
English
9
316
716
0
Tom Moore retweetledi
vx-underground
vx-underground@vxunderground·
The most sophisticated exploit we've ever seen. Thank you to @wdormann for bringing this to our attention. This is basically Stuxnet. 2.0
vx-underground tweet media
English
54
187
2.2K
338.3K
Tom Moore retweetledi
moo
moo@moo_hax·
Is this in a lab, yes. Is this also what operators would run not in a lab, also yes. Everything in memory, done with off-the-shelf malware with a Rigging integration from run in an "agentic" loop. Sometimes the models do well, sometimes they do poorly, but progress is up and to the right...and the data we get is 🔥 For defenders, it does you no good to see an AI thing and immediately say "that's not possible". It's exactly what Proofpoint said when we reported Proofpudding...It's just here now. GPUs are about speed and scale, that's what you'll get with AI driven ops, speed and scale. It doesn't undo all the defenses built up in networks.
moo tweet media
English
3
12
29
8.6K