@TheHackerWire Profile picture

The Hacker Wire

@TheHackerWire

Cybersecurity Chronicles 🌐 | Breaking down the latest in security news, #hacking #darkweb #Cybersecurity #InfoSec #HackingNews

Joined January 2024

Multiple #SQLInjection vulnerabilities discovered in #ManageEngine's ADAudit Plus and OpManager products! CVE-2024-36514, CVE-2024-36515, CVE-2024-36516, CVE-2024-36517, CVE-2024-5466, CVE-2024-5467, CVE-2024-5490, CVE-2024-5556, CVE-2024-5586. #Cybersecurity


The Hacker Wire Reposted

open-source-web-scanners A list of open source web security scanners on GitHub and GitLab, ordered by Stars. It does not provide in-depth analysis - for more analysis or a wider range of tools. github.com/psiinon/open-s… #cybersecurity #pentesting #bugbounty

Tweet Image 1

Critical security flaw patched in the popular WordPress WPML Multilingual Plugin thehackerwire.com/wpml-wp-plugin… #WPML #Security #WordPress #Cybersecurity

Tweet Image 1

🚨 SolarWinds patches 2 critical Web Help Desk flaws: RCE (CVE-2024-28986) & hardcoded creds (CVE-2024-28987). thehackerwire.com/solarwinds-web… #Cybersecurity #InfoSec #SolarWinds #PatchNow

Tweet Image 1

The Hacker Wire Reposted

Here's my writeup on auth bypass due to cache misconfig severity: critical bounty: 2000$ #BugBounty #bugbountytips #hackerone link.medium.com/H1VkGzJlfMb


GitHub Enterprise Server Fixes Multiple Security Vulnerabilities Incorrect Authorization Vulnerability (CVE-2024-6337), XML Signature Wrapping Vulnerability (CVE-2024-6800) and Incorrect Authorization Vulnerability (CVE-2024-7711) #GitHub #Cybersecurity thehackerwire.com/github-enterpr…

Tweet Image 1

Cryptocurrency trader loses $55.43M in DAI after falling victim to sophisticated phishing scam! thehackerwire.com/cryptocurrency… #cryptocurrency #phishing #scam #DAI #hackers #security

Tweet Image 1

The Hacker Wire Reposted

POC for CVE-2024-7928: This exploit will attempt to retrieve DB details for FastAdmin instances. github.com/bigb0x/CVE-202… #exploit #pentest #CyberSecurity

Tweet Image 1

The Hacker Wire Reposted

So after reading docs and RFCs. I think this is how the CVE-2024-38063 exploit works. But it wont bluescreen my system. Feel free to play around with this. (I may be way off the mark) gist.github.com/nullenc0de/2fd…


🔐 Defensive Security Mindmap! 🌐 Network Security, Endpoint Security, Application Security, Cloud Security, Incident Response, and Vulnerability Management. Strengthen your defense strategies today! 🛡️💻 #CyberSecurity #DefensiveSecurity #InfoSec #NetworkSecurity #Pentest

Tweet Image 1

Cybersecurity Career Paths: * Penetration Tester * Security Analyst * Incident Responder * Malware Analyst * Security Engineer * Chief Information Security Officer (CISO) #InfoSec #CyberSecurity

Tweet Image 1

🚀 The ultimate Cyber Kill Chain Mindmap! 🌐🔒 Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, Actions on Objectives, and Exfiltration. 🛡️💻 #CyberSecurity #RedTeam #InfoSec #PenTesting #Hacking #CyberKillChain

Tweet Image 1

The Hacker Wire Reposted

🚨Beware of Fake PoCs As part of an ongoing personal project, I have been automatically monitoring GitHub for new repositories containing proof-of-concepts (PoCs) or exploits for recently disclosed CVEs. This effort has led me to uncover several malicious GitHub repositories.👇

Tweet Image 1

🚨 Over 2,000 Australian crypto wallets hacked! Operation Spincaster uncovers $162M in losses. thehackerwire.com/2000-australia… #Crypto #InfoSec #CyberSecurity

Tweet Image 1

Think twice before running that CVE exploit! We uncovered malicious GitHub PoCs turning systems into secret Monero miners. #InfoSec #CyberSecurity #CryptoMining thehackerwire.com/beware-of-fake…


🔐 8 #CyberSecurity key domains: Network, Application, Cloud, IoT, Mobile, Operational, Incident Response, and Data Security. Explore the interconnected landscape of digital protection. #InfoSec #CyberAwareness

Tweet Image 1

🔒 Cybersecurity compliance roadmap: 1- ISO 27001 2- NIST CSF 3- GDPR 4- PCI DSS 5- HIPAA 6- SOC 2 7- COBIT #InfoSec #Compliance #CyberSecurity

Tweet Image 1

Top tools for Reconnaissance, Initial Access, Execution, Persistence, Privilege Escalation, and Lateral Movement. Perfect for cybersecurity professionals! 🛡️💻 #Cybersecurity #RedTeam #InfoSec #EthicalHacking #PenTesting #CyberTools #HackerMindmap

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.