sec_leabhart

10 posts

sec_leabhart

sec_leabhart

@sec_leabhart

I do cybersecurity or something like that sometimes. Main acct is @leabhart.

Katılım Temmuz 2024
209 Takip Edilen5 Takipçiler
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
🚨 BREAKING ShinyHunters claims to have accessed internal systems linked to Anthropic’s Mythos model — sharing screenshots of: User management panels AI experiment dashboards Model performance & cost analytics ⚠️ At this stage, authenticity is unverified — but if confirmed, this would be a major escalation: AI models designed to find vulnerabilities… becoming targets themselves. This isn’t just a breach story. It’s a preview of the next cyber battleground: AI infrastructure. More to come. #CyberSecurity #AI #DataBreach #ShinyHunters #Infosec #DDW
Dark Web Intelligence tweet mediaDark Web Intelligence tweet mediaDark Web Intelligence tweet mediaDark Web Intelligence tweet media
English
57
194
880
129.7K
Ing:\Juanita\
Ing:\Juanita\@ing_juani7a·
El cuento fue este: -Un usuario estaba analizando (reverse-engineering) su propia aspiradora Roborock con ayuda de Claude AI y descubrió una API no documentada en la nube de la marca. -Por un fallo de diseño en esa API, podía interactuar con prácticamente cualquier otra #Roborock conectada a la misma plataforma en todo el mundo, entonces logró acceso remoto a: --Planos/mapa completos del suelo de las casas --Imágenes y vídeo en directo de las cámaras (de los modelos que las tienen) --Posibilidad de moverlas, encenderlas, etc. -En pocas palabras, consiguió controlar accidentalmente más de 6.700 aspiradoras de todo el mundo mientras investigaba su propio dispositivo. El usuario lo reportó a Roborock el 24/02/2026, y la empresa corrió a parchar el fallo para cerrar el acceso cruzado no autorizado. Como debe ser! Es un caso de vulnerabilidad en dispositivos IoT. Eso me recuerda q el otro día vi una wifi de una lavadora...🤔
elhacker.NET@elhackernet

Usuario toma el control accidental de más de 6.700 robots aspiradores blog.elhacker.net/2026/02/usuari…

Español
29
301
2.2K
118.3K
sec_leabhart
sec_leabhart@sec_leabhart·
@vxunderground FWIW CrowdStrike had csa-251248 on October 30 with same IOCs as in that blog.
English
1
1
10
1.8K
vx-underground
vx-underground@vxunderground·
Rapid7 did a write-up on the Notepad++ compromise. Rapid7 released the paper fast af boi How? 1. They sat on it or... 2. Called in all the malware analysis schizos for lock the fuck in time tldr ya prolly China lol rapid7.com/blog/post/tr-c…
English
15
61
700
52.7K
sec_leabhart
sec_leabhart@sec_leabhart·
@jamieantisocial i really appreciate when you annotate articles like this. i can't even count how many times i skipped reading an article because i didn't think i'd find it interesting/relevant but then i see your tweet and realize i'm missing out and should read it after all. :-)
English
1
0
4
234
sec_leabhart retweetledi
SecDSM
SecDSM@SecDSM·
Tired of "reacting" to CVE-2025-55182? Come to SecDSM tonight! Doors open at 18:00 with free pizza and drinks. There will be a talk on monitoring networks for malicious traffic followed by "show & tell." Deets at secdsm.org.
English
0
2
0
139
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Jambu leaf drink! In Peru we had coca leaves and drinks made from them.
English
2
0
6
678
mRr3b00t
mRr3b00t@UK_Daniel_Card·
I’m told this is like legal Brazilian liquid drugs
mRr3b00t tweet media
English
4
0
12
1.5K
sec_leabhart
sec_leabhart@sec_leabhart·
FYSA it's not Monday
English
0
0
0
22
sec_leabhart retweetledi
vx-underground
vx-underground@vxunderground·
Oh my God. It actually worked. Someone learned the password. It's a Christmas miracle.
vx-underground tweet media
English
14
20
899
41.3K