Peer Richelsen

52.2K posts

Peer Richelsen banner
Peer Richelsen

Peer Richelsen

@peer_rich

i make time @calcom https://t.co/svpVpBOIvu

Katılım Aralık 2012
4.1K Takip Edilen37.5K Takipçiler
Peer Richelsen retweetledi
BugBunny.ai - Continuous AI Pentesting System
66 CVE-2025-58434 CVE-2025-59057 CVE-2025-59790 CVE-2025-59792 CVE-2025-61622 CVE-2025-61686 CVE-2025-64756 CVE-2026-21884 CVE-2026-22807 CVE-2026-23630 CVE-2026-27471 CVE-2026-27806 CVE-2026-27955 CVE-2026-28215 CVE-2026-28217 CVE-2026-28351 CVE-2026-28361 CVE-2026-28384 CVE-2026-28396 CVE-2026-28398 CVE-2026-28444 CVE-2026-28445 CVE-2026-29093 CVE-2026-30973 CVE-2026-31888 CVE-2026-33016 CVE-2026-33037 CVE-2026-33038 CVE-2026-33039 CVE-2026-3351 CVE-2026-34037 CVE-2026-34158 CVE-2026-34167 CVE-2026-34170 CVE-2026-34171 CVE-2026-34198 CVE-2026-34532 CVE-2026-34573 CVE-2026-34574 CVE-2026-34595 CVE-2026-34746 CVE-2026-34748 CVE-2026-34749 CVE-2026-34750 CVE-2026-34972 CVE-2026-35214 CVE-2026-35412 CVE-2026-35413 CVE-2026-35441 CVE-2026-40165 CVE-2026-40293 CVE-2026-40302 CVE-2026-40304 CVE-2026-40454 CVE-2026-40914 CVE-2026-41131 CVE-2026-41590 CVE-2026-42883 CVE-2026-42884 CVE-2026-42885 CVE-2026-42886 CVE-2026-43888 CVE-2026-43889 CVE-2026-43998 CVE-2026-43999 CVE-2026-4800
Slovenščina
16
62
470
49.9K
Arminius
Arminius@arminiusdd·
Eva WER???
Arminius tweet media
English
143
56
2.5K
220K
Peer Richelsen
Peer Richelsen@peer_rich·
the decisions that become part of your culture arent usually the big strategic ones rather the small repeated behaviors how you respond to a bug report how you treat a power users feedback how honest you are internally when something ships badly those behaviors calcify into culture
English
0
0
5
371
Peer Richelsen retweetledi
Paul Yacoubian
Paul Yacoubian@PaulYacoubian·
never met a founder that wanted to build in the same category as their first startup, almost always like, "man, i fucking hate that market"
English
84
21
795
70.5K
Peer Richelsen retweetledi
Teslimat
Teslimat@Teslimatttt·
The "ruined legacy" roundtable.
Teslimat tweet media
English
95
419
4.5K
66.1K
Peer Richelsen
Peer Richelsen@peer_rich·
two of my most favourite orgs combined?!! whoaa
Alex Bouaziz@Bouazizalex

Next season, @deel will become the official sleeve partner of @Arsenal 🔴⚪ When we partnered with @Arsenal last year, we set out to build something lasting, starting with rolling out Deel across their workforce and HR operations. Having our name on one of the most iconic shirts in world football is the next step in that relationship. We made ‘Patchmaker’ with the club, a film featuring Viktor Gyökeres and Patrick Vieira. Worth watching 📷 Yes, I'm a PSG fan. But like every French kid, I grew up dreaming in front of Arsène, Titi and the Invincibles! #COYG

English
2
0
5
992
Peer Richelsen retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️🇺🇸 CoreWeave allegedly breached: full infrastructure access claimed against the US GPU cloud provider that powers OpenAI workloads A threat actor claims to have pulled full infrastructure access from CoreWeave, the US-based GPU cloud provider that went public in 2025 with revenue exceeding $500 million and is one of the primary compute providers for OpenAI workloads. The actor describes the access as wide open with zero authentication required, stating they cannot determine whether the exposure represents gross negligence or a honeypot. The claimed access spans multiple internal notebook servers with root shells across regions, full cloud account credentials, the central monitoring stack, customer data storage, internal infrastructure topology, and long-term persistence mechanisms. The post is currently unverified. ▸ Actor: macaroni ▸ Sector: Cloud Computing / GPU Infrastructure / AI Compute ▸ Type: Infrastructure Access Claim (unverified) ▸ Records: Full infrastructure access claim, no record count specified ▸ Country: United States ▸ Date: 13/05/2026 Compromised data: ▪ Multiple internal notebook servers with root shells across multiple regions ▪ Cloud account credentials and data access roles, including permanent IAM keys with sts:AssumeRole and temporary keys from 4 accounts ▪ Central monitoring dashboard with full Grafana admin access, every dashboard, Loki logs, Prometheus metrics, and live GPU telemetry ▪ Customer data storage including S3 buckets, EBS snapshots, and workload logs reportedly containing personal and financial records ▪ Internal infrastructure topology including Kubernetes API, Docker registry, Jenkins, ArgoCD, PostgreSQL, and Redis (no authentication), with a full network map ▪ Long-term persistence including deployed SSH keys, backdoor user accounts, and identified IAM persistence paths Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
Dark Web Informer tweet mediaDark Web Informer tweet media
English
2
23
121
215.1K
Peer Richelsen retweetledi
Andrew Curran
Andrew Curran@AndrewCurran_·
Mythos has cracked MacOS. It took five days.
Andrew Curran tweet media
English
81
332
3.4K
494K
Peer Richelsen
Peer Richelsen@peer_rich·
building a globally distributed team sounds exotic until you realize it means most of your async comms have to be excellent you cant fix a bad message with a physical shoulder tap writing clearly is necessary infrastructure too
English
1
2
25
1.4K
Peer Richelsen retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 UPDATE: 19 MILLION exposed NGINX instances hit by the 18-year-old NGINX RCE found by AI. Top exposure by country: - United States: 5,340,011 - China: 2,540,008 - Germany: 1,871,780 Note on ASLR as added security: not all of these instances will have ASLR disabled, but every one of them is running a version inside the vulnerable band. The vulnerability is a heap buffer overflow. ASLR randomizes memory layout, which makes reliable RCE much harder because the attacker cannot predict where their payload or useful gadgets land. But the overflow itself still happens. The corrupted memory still causes the NGINX worker process to crash. ASLR-enabled hosts are still trivially DoS-able. ASLR-disabled or non-PIE builds are RCE-able. Either way, patch ASAP!
International Cyber Digest tweet media
International Cyber Digest@IntCyberDigest

‼️🚨 MAJOR IMPACT: AI just found an 18-year-old NGINX critical remote code execution vulnerability. It has been disclosed on GitHub including PoC code. - Affects NGINX 0.6.27 through 1.30.0 - Triggered via the rewrite and set directives in config - Update NGINX ASAP - NGINX is a widely used HTTP web server, be sure to check its prevalence in other products

English
32
307
1.8K
639K
Peer Richelsen retweetledi
Tech Bro Memes
Tech Bro Memes@techbromemes·
Tech Bro Memes tweet media
ZXX
30
816
34.8K
481.3K
kache
kache@yacineMTB·
does anyone know the CEO of tailscale? Can I get an intro?
English
27
2
417
76.8K