Sam Stepanyan

5.4K posts

Sam Stepanyan banner
Sam Stepanyan

Sam Stepanyan

@securestep9

@OWASPLondon Chapter Leader (#OWASP #OWASPLondon). OWASP Board Member. Application Security (#AppSec) Consultant. OWASP #Nettacker Project leader. #CISSP

London, UK Katılım Eylül 2013
3.7K Takip Edilen7.4K Takipçiler
Sam Stepanyan retweetledi
sui ☄️
sui ☄️@birdabo·
never deleting this app 💀 bro is gonna wake up with -$300k
sui ☄️ tweet media
English
219
962
34.2K
3.1M
Sam Stepanyan retweetledi
TryHackMe
TryHackMe@tryhackme·
Meet the speakers 🤝 Builders, creators & cyber leaders all joining us live in London 🇬🇧 Can’t make it in person? We’re streaming everything until 12PM: 🎤 Talks, 🛰️ panel & the ⚔️ live challenge. Livestream link will drop on the landing page👇 ▶️ tryhackme.com/ai-odyssey?utm…
TryHackMe tweet media
English
1
4
49
6.8K
Sam Stepanyan retweetledi
Microsoft Threat Intelligence
Microsoft is investigating mistralai PyPI package v2.4.6 compromise. Attackers injected code in mistralai/client/__init__.py that executes on import, downloads hxxps://83[.]142[.]209[.]194/transformers.pyz to /tmp/transformers.pyz, and launches a second-stage payload on Linux. The file name transformers.pyz appears deliberately chosen to mimic the widely used Hugging Face Transformers library and blend into ML/dev environments. The main payload is a credential stealer, but it also includes country-aware logic; it avoids Russian-language environments and contains a geo fenced destructive branch that has 1-in-6 chance of executing rm -rf / when the system appears to be in Israel or Iran. To mitigate this threat: isolate affected Linux hosts, block 83[.]142[.]209[.]194, hunt for /tmp/transformers.pyz, pgmonitor[.]py, and pgsql-monitor.service, and rotate exposed credentials.
Microsoft Threat Intelligence tweet media
English
117
699
4.9K
4.1M
Sam Stepanyan
Sam Stepanyan@securestep9·
The video recording of my talk: “Automated Security Testing with OWASP Nettacker” from NDC Security 2026 Conference in Oslo is now available on YouTube: 🎥 #Nettacker 👇 youtube.com/watch?v=pGkagJ…
YouTube video
YouTube
English
0
9
19
1.7K
Sam Stepanyan
Sam Stepanyan@securestep9·
#Nuget: Malicious NuGet packages mimicked trusted .NET libraries to steal credentials, key crypto wallets. Packages: IR.DantUI, IR.OscarUI, IR.Infrastructure.Core, IR.Infrastructure.DataService.Core, IR.iplus32 included an infostealer #malware: 👇 gbhackers.com/malicious-nuge…
English
0
9
8
528
Sam Stepanyan retweetledi
Rachel Tobac
Rachel Tobac@RachelTobac·
Canvas, the tool teachers and students are using for finals right now, was hit w/ ransomware by (folks who claim to be) ShinyHunters. Lots of students/educators saying this is making finals studying/tests v hard (not even considering the amount of data likely to be leaked here)!
Rachel Tobac tweet media
English
19
64
252
33.4K
Sam Stepanyan
Sam Stepanyan@securestep9·
#NextJS and #React Server Components hit with 12 vulnerabilities with 3 high-severity vulns (CVE-2026-44574, CVE-2026-44578, CVE-2026-44581) requiring the most urgent attention and impacting virtually every production NextJS deployment - patch now! cyberkendra.com/2026/05/react-…
English
0
18
43
3.6K
Sam Stepanyan
Sam Stepanyan@securestep9·
#Apache HTTP Server Vulnerability CVE-2026-23918 Exposes Millions of Servers to Remote Code Execution Attacks. Anyone running Apache httpd version 2.4.66 or earlier are strongly urged to upgrade immediately! 👇 gbhackers.com/apache-http-se…
English
0
1
2
406