Michaela Stranovská

169 posts

Michaela Stranovská banner
Michaela Stranovská

Michaela Stranovská

@Michelle_Stran

Posts and views are my own

Sumali Ekim 2011
759 Sinusundan114 Mga Tagasunod
Michaela Stranovská nag-retweet
BleepingComputer
BleepingComputer@BleepinComputer·
🚨 BREAKING: Hackers are now exploiting the cPanel authentication bypass flaw (CVE-2026-41940) to deploy "Sorry" ransomware on compromised websites. Numerous sources say attacks began Thursday, with threat actors breaching servers and deploying a Go-based Linux encryptor that appends the .sorry extension to files. What the ransomware does: 🔴 Encrypts files and appends the ".sorry" extension. 🔴 Protects the encryption key with an embedded RSA-2048 public key 🔴 Drops a README.md ransom note in every folder 🔴 Uses a fixed Tox ID for ransom negotiations Victims are being instructed to contact the attacker via Tox to pay for decryption. This is not related to the older 2018 HiddenTear ".sorry" ransomware. This is a new, Linux-targeting encryptor tied directly to active cPanel exploitation. If you're running cPanel or WHM, patch immediately.
BleepingComputer tweet mediaBleepingComputer tweet media
English
19
236
856
108.4K
Michaela Stranovská nag-retweet
IT Guy
IT Guy@T3chFalcon·
Let me blow your mind real quick: When you use Remote Desktop (RDP), Windows secretly takes screenshots of what you are doing. It’s called the RDP Bitmap Cache. To make the connection faster, Windows saves small tiles (images) of the remote screen to your hard drive in a bin file. Even if the session is over and the remote server is destroyed... your laptop still holds the cache files. Forensics teams use tools like BMCViewer to stitch those tiles back together. They won't just see logs but the literal email, document, or picture you were looking at. 💀
IT Guy tweet mediaIT Guy tweet media
IT Guy@T3chFalcon

RDP Bitmap Cache.

English
174
1.6K
13.7K
846.6K
Michaela Stranovská
Michaela Stranovská@Michelle_Stran·
@d0nutptr This would give me anxiety AF, I remove notification s if it is an option and for email, periodically make rules to Archive or skip inbox XD It is still there, unread, but no pop up about it.
English
0
0
0
57
bugcrowd
bugcrowd@Bugcrowd·
🚨 Slam dunk your memes into the best competition of the year! Score big laughs and swag during #MemeMadness! ⛹️ Create the best #cybersecurity meme and add it to the thread below to be entered 👇 Rules, details, and previous meme challenges here: bgcd.co/3PF2dR7
bugcrowd tweet media
English
45
3
37
14.1K
Michaela Stranovská nag-retweet
Intigriti
Intigriti@intigriti·
You've probably seen this SQL Injection payload before... 🧐 But how does it exactly work? Let's break it down and also craft a few variants for bypassing WAFs! 🤑👇
Intigriti tweet media
English
3
109
474
39.2K
Michaela Stranovská nag-retweet
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
If you're looking to take your @pdnuclei skills to the next level, we have the ultimate guide for you! Level up: buff.ly/4a92Eep
ProjectDiscovery tweet media
English
0
14
45
6.2K
The1-CISSP/CISM/CEH/CDPSE/Security+ Cyber Security
@JezCorden This is completely bogus to me. I do not see why MS has to uncouple OneDrive or Edge/Bing (especially when they are not dominant). The EU should have had more stringent controls over mobile than PC/Windows.
English
1
0
4
1.8K
Michaela Stranovská nag-retweet
@ddǝɐuɐp
@ddǝɐuɐp@DanaEpp·
Let me show you how to leverage curlconverter to write API exploits in Python using payloads generated in Burp Suite. danaepp.com/writing-api-ex…
English
0
1
7
400
Michaela Stranovská nag-retweet
JS0N Haddix
JS0N Haddix@Jhaddix·
New issue of Executive Offense! "Mobile Hacking Part 2" in which I have an exclusive interview with @0xteknogeek on methodology++ This one is JAM PACKED. imo a must read. (subscribe to see the video, otherwise it doesnt show up) executiveoffense.beehiiv.com/p/executive-of…
JS0N Haddix tweet media
English
1
27
143
13.7K
Michaela Stranovská nag-retweet
Linus ✦ Ekenstam
Linus ✦ Ekenstam@LinusEkenstam·
Woah. Wtf. All anchors in this 21min news clip and numerous other things are AI powered. Holy smokes, things are going to get wild
English
537
2K
7.4K
3.1M
Michaela Stranovská nag-retweet
Intigriti
Intigriti@intigriti·
A few tests later and you've noticed that the following bypasses all worked as well: You were surprised because you thought it validated your input by parsing the domain Instead, it was just a loosely-scoped regex that allowed you to get the SSO token
Intigriti tweet media
English
1
4
23
1.7K
Michaela Stranovská nag-retweet
Rebane
Rebane@rebane2001·
👀
Rebane tweet media
QME
9
19
301
59.7K
Michaela Stranovská nag-retweet
Tib3rius
Tib3rius@0xTib3rius·
OR 1=1 should not be the go-to example for SQL injection. I understand why it is, but using it without mentioning the risks is teaching bad practice. OWASP, Portswigger, Wikipedia, Rapid7, Snyk etc. are all doing it. I'm gonna die on this hill. 🤬
English
35
115
687
290.5K
Michaela Stranovská nag-retweet
Nagli
Nagli@galnagli·
AI helps greatly translating JavaScript to "Human Readable Language", here's how I found a very straight forward DOM Based XSS in 2 minutes. #BugBounty
Nagli tweet media
English
13
88
575
101.6K