Marius Avram

16.8K posts

Marius Avram banner
Marius Avram

Marius Avram

@securityshell

Web Application Security Consultant. Two sons' proud dad! https://t.co/uEjJ0UQkhV

Online Entrou em Mayıs 2009
1.3K Seguindo16.2K Seguidores
Nicușor Dan
Nicușor Dan@NicusorDanRO·
Am decis să ne alăturăm declarației Regatului Unit, Franței, Germaniei, Italiei, Olandei și Japoniei privind asigurarea în Strâmtoarea Ormuz a libertǎții de navigație, principiu fundamental al dreptului internațional. Alăturarea României la acest demers are loc pe fondul implicațiilor grave pe care închiderea Strâmtorii le are asupra piețelor energetice globale, precum și asupra economiei mondiale. Efectele sunt resimțite și în Romania, în special în ceea ce privește prețul combustibililor. În acest sens, suntem pregătiți să participăm la eforturile comunității internaționale care vor conduce la menținerea preturilor la un nivel suportabil pentru populație. România își păstrează decizia clară de a nu se implica în conflictul din Orientul Mijlociu și lucrăm alături de partenerii internaționali pentru dezescaladare. Textul integral al declaratiei: presidency.ro/ro/media/comun…
Română
340
102
1.1K
46.8K
Marius Avram retweetou
brmk
brmk@_brmkit·
During some free time I ended up doing some research on something I never really thought about before: using Windows toast notifications for user manipulation. I ended up writing a BOF and a blog post about it, hope it's useful! brmk.me/2026/03/18/toa…
English
0
6
12
712
Marius Avram
Marius Avram@securityshell·
He’s gone, but rumor has it, Chuck Norris is training in the afterlife, so death better behave.
English
0
0
0
158
Marius Avram
Marius Avram@securityshell·
RIP Chuck Norris: the man, the myth, the eternal legend!
English
0
0
2
141
Marius Avram retweetou
Mandiant (part of Google Cloud)
Google Threat Intelligence Group has identified DarkSword, a new iOS exploit chain leveraging six zero-day vulnerabilities. Multiple threat actors are actively using it to deploy malware payloads. Update your devices or enable Lockdown Mode. 👉 bit.ly/4bRveEz
Mandiant (part of Google Cloud) tweet media
English
3
68
206
19.3K
Marius Avram retweetou
The Citizen Lab
The Citizen Lab@citizenlab·
A journalist being hacked with Paragon’s ‘ethical’ spyware has “been massively inconvenient both to the Italian government and to Paragon Solutions,” @jsrailton told the Guardian: theguardian.com/world/2026/mar…
English
1
9
20
2.9K
Marius Avram retweetou
Gridline
Gridline@GridlineIntel·
Your broker shows you charts. Gridline shows you why the charts are moving. 🌍 → 💥 Live conflicts, sanctions, and trade disruptions → 📡 GPS jamming and maritime vessel movements → 🔥 Wildfires, earthquakes, and weather events in real-time → 📊 Polymarket odds next to breaking news → 🛢️ Commodity markets, housing data, macro indicators → 🗺️ 22+ OSINT layers on a single dashboard One map. Every signal that moves markets. Free to use. Link in comments.
English
1
3
3
155
Marius Avram retweetou
Polymarket
Polymarket@Polymarket·
BREAKING: The U.S. Government secretly registers the aliens​.gov domain name.
Polymarket tweet mediaPolymarket tweet media
English
778
1.4K
7.6K
11.1M
Marius Avram retweetou
Bitrefill
Bitrefill@bitrefill·
March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!
English
114
138
964
164.5K
Marius Avram retweetou
Xclow3n
Xclow3n@xclow3n·
Spent a week testing AI for vulnerability research. 14 confirmed bugs in 20 min on one target. 5% hit rate on a hardened one. Same AI, same setup. 4 approaches, what worked, what failed, why target selection matters more than model sophistication. xclow3n.github.io/post/7
Xclow3n tweet media
English
4
82
425
30K
Marius Avram retweetou
Het Mehta
Het Mehta@hetmehtaa·
Tool that uses AI to hack AI. Think sqlmap, but for prompt injection. You write your goal in plain English. "reveal the system prompt." "extract the hidden password." "bypass the content filter." One command does the rest. llmmap -r request --goal "reveal the hidden password" It finds injection points in your HTTP request automatically. A Generator LLM reads your goal and crafts targeted attack prompts using instruction manipulation, context poisoning, delimiter injection, guardrail probing, and dozens more techniques. Two AIs. One attacks. One judges. Neither sees the other's work. 227 techniques across 18 attack families. Four obfuscation methods that repackage the same attack as base64, homoglyphs, leet speak, or a different language. Five intensity levels from a quick scan to throwing everything at the wall. Statistical retesting on every finding so nothing in your report is a false positive. Runs fully local with Ollama. No API keys. Also supports OpenAI, Anthropic, and Google.
Het Mehta tweet media
English
4
67
374
18.8K
Marius Avram retweetou
Pavol Lupták
Pavol Lupták@wilderko·
HorusEye: I Built an AI-Assisted Active Directory Attack Platform After 1000+ CTF Rooms @OmarTamer0/horuseye-i-built-an-ai-assisted-active-directory-attack-platform-after-1000-ctf-rooms-7f0ace21895c" target="_blank" rel="nofollow noopener">medium.com/@OmarTamer0/ho…
English
2
25
136
13K
Marius Avram retweetou
Polymarket
Polymarket@Polymarket·
JUST IN: Australian man cures his dog’s cancer by uploading its DNA to ChatGPT to design a custom vaccine from scratch.
English
538
1.7K
17.9K
2.4M
Marius Avram retweetou
Praetorian
Praetorian@praetorianlabs·
Can't secure what you can't see. 👁️ Introducing Pius — our open-source Go binary for external attack surface mapping. Queries all 5 Regional Internet Registries, CT logs, and 20+ intel sources in parallel. Confidence scoring, no noise. 🛡️ 🔗 buff.ly/2eDGcGb #OffensiveSecurity #OpenSource #Recon
Praetorian tweet media
English
1
11
45
4K
Marius Avram retweetou
Palantir
Palantir@PalantirTech·
"This is Maven Smart System—Palantir’s software as a service product that we are deploying across the entire department."
English
445
1.6K
10.9K
5.4M
UK in UAE 🇬🇧🇦🇪
UAE authorities warn against photographing, posting, or sharing images of incident sites or projectile damage as well as government buildings and diplomatic missions. British nationals are subject to UAE laws, violations may lead to fines, imprisonment, or deportation. #UKUAECR26
English
234
443
2.3K
594.9K
Marius Avram retweetou