Danielle Aminov
@AminovDanielle
Followers
2K
Following
637
Media
17
Statuses
112
We have been reverse engineering the XZ Utils backdoor and are sharing some initial findings: we've identified multiple hooking options to adapt to different environments, and a hardcoded fake public key that can appear in verbose SSH logs depending on attacker-controlled flags.
9
279
2K
Here's our new blogpost with a technical deepdive into exploitation we're observing in the wild of CVE-2025-55182 (aka react2shell): https://t.co/jBvMgTqjEO
0
23
62
🚨 React2Shell (CVE‑2025‑55182) in‑the‑wild exploitation & deep‑dive analysis. Critical RCE across React 19, Next.js & all RSC frameworks. Patch now. https://t.co/SRS7e2PRZ4
0
6
14
For the latest developments on React2Shell 👉 https://t.co/cMvEbTeWLq
wiz.io
React and Next.js are exposed to critical unauthenticated RCE via CVE-2025-55182 and CVE-2025-66478. Learn which versions are impacted and how to mitigate.
0
0
12
With all the talk about the Next.js PoC, many people missed that the React2Shell vulnerability (CVE-2025-55182) affects the underlying RSC implementation itself. This means other popular frameworks that rely on RSC are also vulnerable. We are still analyzing the impact and ease
6
58
363
We were analyzing the new RSC vulnerability and its impact. RSC is a React feature, but most apps use it through Next.js, which bundles RSC widely. So it will likely surface most often as Next.js CVE-2025-66478. Patch snippet below 🧐 Initial analysis: https://t.co/cMvEbTeWLq
1
23
117
🪱sharing more on sha1-hulud w/@sshaybbc * 2 packages == ~60% of infections * 400k unique secrets in truffleSecrets.jsons, only 2.5% verified, & the majority of those short lived JWTs for GitHub Actions! * 3/4 of impacted workloads were CI/CD, 1/4 were users 🔗below
1
4
11
WIZ ASM IS HERE!💥 Discover, validate & prioritize all your exposures cloud, AI, SaaS & on-prem. Context-driven ASM powered by Wiz Security Graph. Eliminate exploitable risk everywhere! Ready to see Wiz ASM in action? 🥳 https://t.co/m6htGHYo3P
0
5
17
I put together a service dependency diagram based on what has been mentioned in today's AWS outage, along with Monday's, and one from Nov 25, 2020 with color coding based on which outage mentioned the dependency.
8
44
179
Finally disclosing the critical supply chain attack I've spent the last 6 months preventing: 🧵
2
12
48
🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell
@hexacon_fr
2
14
103
We share data, attack paths, and IOCs. Full write-up →
wiz.io
Attackers are skipping malware and extorting orgs through exposed databases. Learn how these attacks work, who’s affected, and how to defend your environment.
0
0
2
And who gets hit the most? Our analysis shows: MongoDB is still the top target PostgreSQL has surged into second place MySQL & MariaDB remain significant
1
1
3
Exposure is only half the story - config is the kicker. In cloud environments, % of exposed servers with no/weak auth: 📊 Redis 72% 📊 MongoDB 8% 📊 PostgreSQL 3% 📊 MySQL/MariaDB ~2.2%
1
1
2
No exotic CVEs here... just misconfigurations like open ports and weak creds. Attackers use the DB’s own commands (DROP, DELETE, backups) to wipe or steal data and leave a ransom note behind. The danger isn’t only lost data - it’s a potential foothold into your network.
1
0
2
Our recent research reveals how malware-less database ransomware actually scales ⚡️ Finding: MongoDB is the most dominant target, and a newly exposed DB can be discovered and hijacked within minutes - without dropping a single binary. 👾 (1/5)🧵
1
7
19
💥 Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible. The vulnerability lets
7
170
525
I spent the last few weeks digging into hundreds of enterprise-built Vibe Coded applications. When I found a security flaw, it was almost always one of the same 4 simple mistakes. Here they are 🧵
5
56
321
We started this research to connect the dots between malware campaigns and the misconfigurations that enable them 👾 Our biggest takeaway? While you can patch a CVE, you can't patch a human error. Our blog post dives into this critical gap >
wiz.io
Simple setup flaws. Serious breaches. See how attackers exploited misconfigurations in Selenium Grid, Spring Boot, and PostgreSQL to gain full access.
1
3
13
🚨 Shai-Hulud: Major npm supply chain attack. 100+ packages weaponized with stolen GitHub tokens, stealing secrets, hijacking repos, and auto-propagating like a worm. Guidance + detections inside:
wiz.io
Learn how the Shai-Hulud npm worm compromised 100+ packages with data-stealing malware. See how it spreads, the risks, and steps to detect and mitigate.
0
14
29
🚨 Major npm hijack: Attackers took over Qix's account (chalk, debug & more). Malicious versions briefly hit npm, injecting browser code to hijack crypto transactions. DuckDB ecosystem is also affected.
1
7
18