Hadrian
@hadriansecurity
Followers
2K
Following
56
Media
43
Statuses
329
Digital security insights from a hacker’s perspective
Amsterdam / London
Joined August 2021
👉 Visit our blog to get the complete:
hadrian.io
A bug in Exim MTA (CVE-2024-39929) allows remote attackers to bypass file blocking, posing severe risks. Patch and protect your organization now.
0
0
0
🔍 A serious vulnerability (CVE-2024-39929) has been discovered in the Exim mail transfer agent, which could enable attackers to send harmful attachments straight to users' mailboxes. With a CVSS score of 9.1 out of 10, this flaw is notably dangerous.
1
0
0
🤔 Exim-tremely Critical? Do you need to worry about CVE-2024-39929?
1
0
1
Additionally, many more vulnerabilities pose an immediate risk to systems. Click the link to read the full list:
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
0
0
🚨 Microsoft has updated its July Patch Tuesday, and among these is the zero-day vulnerability CVE-2024-38112, which enables attackers to spoof web content, deceiving users into interacting with malicious resources.
1
0
0
📈 July sets a record for the highest number of vulnerabilities reported in 2024!
1
0
0
👉 Learn how to mitigate this vulnerability in our latest blog: https://t.co/ACmLr1wKlz
#CyberSecurity #Vulnerability #PatchNow
hadrian.io
OpenSSH vulnerability CVE-2024-6387 poses a critical risk, allowing remote code execution on Linux systems. Patch and protect your organization now.
0
0
0
💡 Although there's no proof of concept for this vulnerability and it's only been exploited in lab conditions, a public exploit could emerge soon. It's advised to patch this vulnerability promptly.
1
0
0
🛡️ What You Need to Know: Scope: Affects 14 million internet-facing OpenSSH instances. Impact: Full system takeover, arbitrary code execution, data theft, and persistent access.
1
0
0
🔍A critical vulnerability affecting OpenSSH versions 8.5p1 to 9.7p1 has been discovered. This flaw, a regression of an 18-year-old issue, allows hackers to take control of systems with root access on Linux. The risk? Total system compromise.
1
0
0
🎊 Celebrating one year of the National Anti-Scam Centre! Let's continue protecting ourselves from scams by staying informed and vigilant. 🔒 Stay safe and scam-free! #CyberSecurity #AntiScam #DigitalSafety
0
0
0
🔥 Fireside Chat: The State of Retail Security Webinar is NOW LIVE! #HadrianSecurity #CyberSecurity #Retail
0
0
1
💡 The qTox vulnerability saga sheds light on the evolving landscape of cyber warfare and the critical role of RCE in cyber attacks. RCE vulnerabilities allow attackers to gain unauthorized access to systems, leading to data breaches, ransomware attacks, and other cyber threats.
0
0
0
🔒 Ethical hackers, armed with newfound knowledge, have seized the opportunity to disrupt cybercrime networks. By leveraging their understanding of RCE, they've dealt a significant blow to malicious actors, hindering their operations.
1
0
0
🛡️ qTox, praised for its end-to-end encryption and anonymity, has inadvertently become a haven for organized cybercriminal gangs, including ransomware groups, seeking a secure channel for their nefarious activities. However, the discovery of a vulnerability has turned the tide.
1
0
0
🚨Must Know: qTox’s RCE Vulnerability🚨 A critical vulnerability has been unearthed in qTox's latest version 1.17.6, a favored communication platform among malicious hackers due to its anonymity features. But who's gaining the upper hand? 👇 Read Below
1
0
0
📈 🎉 As 2024 kicks into high gear, we took some time to reflect on the amazing achievements of 2023. Thank you to our team, our clients, our investors and advisors. Here's to surpassing last year's excellence! 🚀
1
0
2
5️⃣ Accelerating Momentum of Supply Chain Attacks Software #supplychain attacks rising; diverse methods include typosquatting, targeting open source components and more. ⚠️Software Bill of Materials (SBOM) crucial for transparency and vulnerability checks.
0
0
1
4️⃣ Mass Attacks Targeting Network Zero-Days 🕑56 #zerodays exploited in the wild in 2023; a notable increase. Chinese hackers identified as top state-sponsored actors in 0-day usage. Mitigate risks by promptly patching, monitoring relevant CVE feeds, and optimizing #firewalls.
1
0
0