secdude

193 posts

secdude

secdude

@secdu_de

Red Team Manager and TIBER Lead @NVISOsecurity. Red-Team enthusiast and author of https://t.co/vmxALQs24q. Playing with the CTF-Teams @sqrts @sauercloud

Katılım Ağustos 2015
162 Takip Edilen127 Takipçiler
Tim
Tim@__invictus_·
All Red Teamers should be aware of post beacon loss syndrome, and the stages that you go through. Denial - "the user has probably just gone offline for the day", "maybe my redirector is fucked", "did I crash the process".
English
19
67
418
28.1K
NVIDIA GeForce
NVIDIA GeForce@NVIDIAGeForce·
5 days to CES. 5 classic cards up for grabs. ALL signed by NVIDIA CEO Jensen Huang 👀 Up first: GeForce 256, the world's 1st GPU Want it? Comment #GeForceGreats for a chance to win...
NVIDIA GeForce tweet media
English
7.9K
840
7.2K
503.7K
Assassin's Creed
Assassin's Creed@assassinscreed·
To celebrate the one year anniversary of the launch of Assassin's Creed Mirage, we're giving away free keys every week this month. To have a chance to win - all you need to do is like this post and comment with an 🦅 What platform are you ready to play on? #AssassinsCreed
Assassin's Creed tweet media
English
35.1K
2.8K
41.5K
2.4M
secdude retweetledi
BSidesFrankfurt
BSidesFrankfurt@BSidesFRA·
We are thrilled to announce that the schedule for the event is now available online! Make sure you don't miss any of the amazing sessions. We can't wait to see you there! bsidesfrankfurt.org/2024/schedule/…
English
0
4
5
342
secdude
secdude@secdu_de·
Let us know if you know how to get into the @RedTeamVillage_ party tonight :)
English
0
0
0
98
secdude retweetledi
Hunter
Hunter@HunterMapping·
🚨Alert🚨CVE-2024-5655(CVSS 9.6): Run pipelines as any user 🔗Hunter Link: hunter.how/list?searchVal… ⚠This flaw allows attackers to trigger pipelines as another user under specific conditions, posing a significant security risk. 📊2.3M+ Services are found on hunter.how 📰Refer:securityonline.info/cve-2024-5655-… 👇Query Hunter: /product.name="GitLab" FOFA: app="GitLab" SHODAN: http.component:"GitLab" #GitLab #hunterhow #infosec #infosecurity #Infosys #Vulnerability
Hunter tweet media
English
5
45
120
10.8K
secdude retweetledi
Gi7w0rm
Gi7w0rm@Gi7w0rm·
⚠️0-click #RCE in Outlook⚠️ The #CVE-2024-30103 vulnerability leverages a flaw in how Microsoft Outlook handles specific types of email content. An attacker can embed malicious code within the body of an email, which gets executed as soon as the email is opened.
GIF
Dark Web Informer@DarkWebInformer

🚨Outlook Zero-Click🚨TLDR; Recommended Steps for Microsoft 365 Admins can be seen in this blog post. ironscales.com/blog/zero-clic… The CVE-2024-30103 vulnerability leverages a flaw in how Microsoft Outlook handles specific types of email content. An attacker can embed malicious code within the body of an email, which gets executed as soon as the email is opened. This can lead to unauthorized access, data breaches, and further network compromise.

English
13
128
384
103.5K
secdude retweetledi
Hunter
Hunter@HunterMapping·
🚨Alert🚨CVE-2024-30103: Microsoft Outlook Remote Code Execution Vulnerability ⚠This Microsoft Outlook vulnerability can be circulated from user to user and doesn’t require a click to execute. Rather, execution initiates when an affected email is opened.This is notably dangerous for accounts using Microsoft Outlook’s auto-open email feature. 📰Refer: blog.morphisec.com/cve-2024-30103… #Outlook #Microsoft #hunterhow #infosec #infosecurity #Infosys #Vulnerability
Hunter tweet media
English
6
174
408
59.5K
secdude
secdude@secdu_de·
@ChiknLiverPizza Looking forward to seeing you again in a few days. It's going to be a blast! 🔥
English
0
0
0
28
secdude retweetledi
BSidesFrankfurt
BSidesFrankfurt@BSidesFRA·
We are currently seeking sponsors for our event. If you or your organization are interested in supporting us, please help us spread the word by sharing this message. Your support will be greatly appreciated. Thank you!
English
0
9
5
1.1K