h1lt3k

6.7K posts

h1lt3k banner
h1lt3k

h1lt3k

@h1lt3k

A Leader || Pentester || BlueTeam || Digital-Forensic || #BetterTogether

KE🌍 Katılım Şubat 2021
10.8K Takip Edilen10.8K Takipçiler
h1lt3k retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️ Critical Fortinet FortiSandbox Vulnerability Enables Code Execution Attacks Source: cybersecuritynews.com/fortinet-forti… A critical security flaw in Fortinet’s FortiSandbox platform is putting enterprise networks at serious risk, allowing unauthenticated attackers to execute arbitrary code or commands remotely, with no credentials required. The flaw stems from a missing authorization vulnerability in the FortiSandbox Web UI, affecting the on-premises, cloud, and Platform-as-a-Service (PaaS) variants of the product. The vulnerability exists in the GUI component of FortiSandbox’s web interface. The vulnerability impacts a wide range of FortiSandbox deployments #cybersecuritynews
Cyber Security News tweet media
English
3
53
152
11K
h1lt3k retweetledi
D4rk_Intel
D4rk_Intel@d4rk_intel·
How to Investigate A Person Of Interest In 2026 In this article, I will share my personal methodology, techniques, and tools for mapping out the digital footprints of a person of interest - ethically. #OSINT #Cybersecurity #ThreatIntelligence
D4rk_Intel tweet media
English
15
160
999
43.8K
h1lt3k retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Google Warns of Hackers Using AI to Create Working Zero-Day Exploit Source: cybersecuritynews.com/ai-zero-day-ex… A working zero-day exploit entirely through artificial intelligence assistance. The Python-based exploit was designed to bypass two-factor authentication in a popular open-source web administration tool. Cybercrime threat actors collaborated to plan a mass exploitation campaign targeting a popular open-source web-based system administration tool. The exploit discovered was a Python script that enabled 2FA bypass on the platform, and analysis of the code strongly suggests it was AI-generated. #cybersecuritynews
Cyber Security News tweet media
English
8
75
235
16.4K
h1lt3k retweetledi
Tom Dörr
Tom Dörr@tom_doerr·
Automates Wi-Fi vulnerability detection and exploitation github.com/D3Ext/WEF
Tom Dörr tweet media
Français
3
108
523
17.9K
h1lt3k retweetledi
Cybersecurity by Cyberkid
Cybersecurity by Cyberkid@Anastasis_King·
Official NetHunter Support: #kali-mobile" target="_blank" rel="nofollow noopener">kali.org/get-kali/#kali
Cybersecurity by Cyberkid tweet media
English
2
11
95
3.4K
h1lt3k retweetledi
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
1. Web Application Hacker’s Handbook 2. The Hackers Playbook 2 3. Hacking: The Art of Exploitation 4. Ghost in the Wires 5. Social Engineering: The Art of Human Hacking 6. Computer Hacking Beginners Guide 7. Kali Linux Revealed : Mastering Pen Testing Distribution 8. The Basics of Hacking and Penetration Testing 9. Nmap Network Scanning 10. Practical Malware Analysis: The Hands-on Guide 11. RTFM: Red Team Field Manual 12. Hash Crack: Password Cracking 13. Mastering Metaspoilt 14. Advanced Penetration Testing 15. Hacking: A Beginners Guide to Your First Computer Hack 16. CISSP All in One Exam Guide 17. Web Hacking 101 18. Blue Team Handbook: Incident Response Edition 19. Black Hat Python: Python 20. Gray Hat Hacking: The Ethical Hacker’s Handbook
iShowCybersecurity tweet media
English
10
134
825
17.1K
h1lt3k retweetledi
Cybersecurity by Cyberkid
Cybersecurity by Cyberkid@Anastasis_King·
🐉 Kali NetHunter Setup — Portable Cybersecurity Lab 📱 Modern mobile devices are powerful enough to become portable Linux & cybersecurity workstations. ⚡ #KaliLinux #NetHunter
Cybersecurity by Cyberkid tweet media
English
3
10
83
2.5K
h1lt3k retweetledi
h1lt3k retweetledi
Anonymous
Anonymous@YourAnonNews·
If you go to myactivity.google.com (must be logged into google) you can see literally all of your activities online since 2009 that google has stored on you. They are holding an enormous amount of information about you. Use alternatives other than Google, Chrome, and Gmail.
English
82
755
7K
890.4K
h1lt3k retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️Hackers Used Claude AI to Attack on Water and Drainage Utility Systems Source: cybersecuritynews.com/hackers-used-c… Hackers used a commercial AI tool to target the systems of a municipal water and drainage utility. The attack marks one of the earliest known real-world cases where an adversary used AI to identify and attempt to access industrial control systems tied to critical infrastructure. The adversary used Anthropic’s Claude as the primary tool for planning the intrusion, writing malicious code, mapping internal systems, and adapting in real time. OpenAI’s GPT models were also used in a supporting role to process collected data and produce structured intelligence reports. #cybersecuritynews #Calude
Cyber Security News tweet media
English
12
62
193
10.1K
h1lt3k retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Palo Alto Networks Firewall 0-Day RCE Vulnerability Exploited in the Wild Since April Source: cybersecuritynews.com/palo-alto-fire… A critical zero-day vulnerability in Palo Alto Networks PAN-OS software has been actively exploited by a likely state-sponsored threat actor since at least April 2026, the company revealed in a security advisory published on May 6, 2026. The vulnerability enables unauthenticated remote code execution (RCE) against internet-facing PAN-OS deployments where the User-ID Authentication Portal is exposed to untrusted networks. Upon successful exploitation, attackers can inject shellcode directly into an nginx worker process, granting them deep, persistent access to the underlying system. #cybersecuritynews
Cyber Security News tweet media
English
1
25
114
5.7K
h1lt3k retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
𝗪𝗲𝗯 𝗣𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴 𝗧𝗼𝗼𝗹𝘀 𝗬𝗼𝘂 𝗦𝗵𝗼𝘂𝗹𝗱 𝗔𝗰𝘁𝘂𝗮𝗹𝗹𝘆 𝗞𝗻𝗼𝘄 💀🔥 1.🛠️ Burp Suite — Web pentesting framework 2.🛡️ OWASP ZAP — Web security testing framework 3.📂 Dirsearch — Directory brute forcing 4.🌐 Nmap — Port scanning & service discovery 5.🔎 Sublist3r — Subdomain discovery 6.🧠 Amass — Advanced attack surface mapping 7.💉 SQLMap — SQL injection automation 8.⚔️ Metasploit — Exploitation framework 9.📝 WPScan — WordPress security scanning 10.🖥️ Nikto — Web server vulnerability scanning ━━━━━━━━━━━━━━━━━━ 11.📡 HTTPX — HTTP probing & alive host detection 12.⚡ Nuclei — Template-based vulnerability scanning 13.🚀 FFUF — Fast web fuzzing & content discovery 14.🔍 Subfinder — Passive subdomain enumeration 15.🌎 Masscan — High-speed port scanner 16.🛰️ LazyRecon — Automated reconnaissance workflow 17.🎯 XSSHunter — Blind XSS detection platform 18.🌐 Aquatone — Visual HTTP reconnaissance 19.🔗 LinkFinder — Extract endpoints from JavaScript 20.📜 JS-Scan — JavaScript endpoint discovery 21.🕰️ GAU — Historical URL collection & attack surface mapping ━━━━━━━━━━━━━━━━━━ Recon finds targets Enumeration finds weaknesses Exploitation proves impact Tools don’t make you skilled. Understanding attack flow does. #CyberSecurity #Pentesting #BugBounty #RedTeam
English
1
10
67
2.2K
h1lt3k retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 One of the world's largest Certificate Authorities, DigiCert, was compromised by a malicious screensaver file sent through a customer support chat. Their antivirus blocked the malware four times. The agent kept clicking. The fifth try got through. 27 code signing certificates were stolen and used to sign malware. DigiCert ultimately revoked 60 certificates. Per DigiCert's incident report, filed in Mozilla's CA compliance tracker as Bug 2033170, here is how it unfolded: April 2: an attacker contacted a DigiCert helpdesk agent through the company's customer support chat channel, posing as a customer. The lure was a zip file pitched as a screenshot. Inside the zip was a .scr file. On Windows, .scr files are executables, and this one carried a malicious payload. Opening a file a customer sent through the official support channel is what an agent is supposed to do. Support staff are the one role designed to accept files from strangers. DigiCert's endpoint security blocked four infection attempts. On the fifth, the support analyst's machine was infected. DigiCert detected the infection, ran an investigation, and concluded the incident was contained. Eleven days later, an external researcher tipped DigiCert off about misuse of DigiCert-issued code signing certificates in the wild. That tip led to the discovery of a second compromised machine, belonging to a different support analyst, infected through the same vector. The EDR on that machine had not been functioning correctly, so the original investigation missed it. The second machine gave the attacker access to DigiCert's internal support portal. That portal lets support staff reach limited views of customer accounts, including initialization codes for ordered but not-yet-issued code signing certificates. Combining a stolen initialization code with an approved order let the attacker pull a real, validly issued code signing certificate. They did this 27 times. DigiCert's own list of what went wrong: - File-type filtering on the customer support chat channel did not catch the .scr - EDR coverage was inconsistent and incomplete, creating a blind spot - Initialization codes for code signing certificates were not adequately protected DigiCert says it got lucky. An outside researcher found the malware abuse before DigiCert did. Without that tip, the second machine and the active certificate theft might still be running today.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
65
562
2.6K
232.2K
h1lt3k retweetledi
sysxplore
sysxplore@sysxplore·
SSH Server hardening checklist
sysxplore tweet media
English
7
98
574
18.2K
h1lt3k retweetledi
rtl-sdr.com
rtl-sdr.com@rtlsdrblog·
Student Arrested in Taiwan for using SDR and Handheld Radios to Halt Four High Speed Trains with TETRA Hack rtl-sdr.com/student-arrest…
rtl-sdr.com tweet media
English
12
99
671
49K