Javier Avila
@Javilamena
Followers
6
Following
185
Media
5
Statuses
191
Comparto información de interes acerca de amenazas, vulnerabilidades y reportes.
Joined October 2017
Positive Technologies discovered and disclosed a critical vulnerability—CVE-2024-31215—in the popular mobile application analysis tool MobSF. National Vulnerability Database case page: https://t.co/qOgpOMI4CG
0
1
1
🇲🇽 Positive Technologies has landed at #FAMEX2025 in Mexico! Four days of new connections, great talks, and showcasing our top cybersecurity solutions — with legend Alexey Lukatsky on stage daily. Next stop: #GISEC2025 in Dubai. See you at stand D90!
0
1
3
Love is in the air, and we’re excited to showcase what love means for Positive Technologies! ❤️
0
1
1
🏁 #Standoff16 is over! 💥 92 critical events in 3 days — most hit sector: banking 🏦 🔥 Top 3 Red Teams: 1️⃣ r3kpig 🇨🇳 124,900 pts 2️⃣ Siton 🇻🇳 112,500 pts 3️⃣ HUST RED 🇻🇳 52,100 pts 🛡 Blue teams stopped 93 incidents and kept the State of F safe 😎 ➡️ https://t.co/eRCGdg0mRh
0
1
2
🇷🇺🇬🇶| Cooperation between Russia and Equatorial Guinea continues to develop, not only in the defense sphere. This time, representatives of the Russian cyber security company Positive Technologies met with VP Obiang Mangue.
3
6
10
At the world’s largest cybersecurity event — Positive Hack Days Fest — Russia welcomes 40+ countries 'We are the best in cybersecurity' — Yuliya Danchina, Positive Technologies BRICS nations turn to Russian expertise in cyber defense and education
1
18
61
Day 1 of #Standoff16 cyberbattle is over! 💻 33 teams 🌍 14 countries 🔥 3 days of live-fire action Teams attack & defend the virtual State F across 4 sectors — urban, logistics, metallurgy, and banking. Who’ll lead the scoreboard? Check it live 👇 https://t.co/OCvE1PLQhQ
0
1
2
An unpatched FreeIPA vulnerability left entire Linux domains open to complete takeover. Positive Technologies researcher uncovered the exploit and filed an urgent disclosure with Red Hat. What you need to know 👉
0
1
3
3/5 The future looks even tougher! Between 2025–26 expect the heaviest hits from: 💥API exploitation 🔗Supply chain compromises 🤖Poorly governed AI Even blockchain, once treated as untouchable, is already under siege through infrastructure breaches and smart-contract exploits.
1
1
1
1/5 🏦 Finance is a top target for #cybercrime — and for good reason. It runs nonstop, underpins economies, and links banks, clients, partners, and suppliers in real time. With every new platform and API, the attack surface only keeps on growing.
1
1
1
2/5 Looking back at the period starting in 2024 through to early 2025, #phishing, #ransomware, and #DDoS drove data breaches and forced outages. The road ahead gets steeper from here!
1
1
1
👾 Got malware? Feed the beast. PT ESC Antivirus Lab is hungry for fresh samples! ⚡ Zip it (pwd: INFECTED) ➡️ Send to avlab@ptsecurity.com We’ll rip it apart, boost defenses & shout out where it got crushed. 🕵️♂️ #CyberSecurity #Malware
0
1
1
4/5 𝗞𝗲𝘆 𝘁𝗮𝗸𝗲𝗮𝘄𝗮𝘆 Financial organizations can’t afford complacency. Cybersecurity must be proactive, results-driven, and embedded at every level across employees, infrastructure, and third-party relationships.
1
1
1
IDC 2024 ranks Positive Technologies top six in vulnerability management. MaxPatrol VM moves beyond scanning and highlights trending vulnerabilities in just 12h, giving defenders a critical edge: https://t.co/jwaF4Wf5D9
0
1
2
#PHTALKS is back — in São Paulo! 🇧🇷 A free, community-driven meetup where real hackers share what they’ve built, broken & learned. First up: Daher Mohamed (@m0m0x01d) from Web Immunify — Chaining Low-Hanging Vulns into a Critical Exploit. More details 👉 https://t.co/KEzuPzp3s9
1
7
29
🚨 We've launched https://t.co/o25eURJLtS, a new home for vulnerabilities. More than CVEs. More than MITRE. ✅ Trends & Insights ✅ AI-generated, multi-source vulnerability descriptions ✅ Researcher credits ✅ [drop your own tip in the comments] Follow the project: @ptdbugs
0
10
26
🫣Investigadores de Ethiack durante pruebas autónomas de protección encontraron un método para evadir Web Application Firewalls (WAF) más estrictos mediante una técnica inusual: la inyección de JavaScript a través de la contaminación de parámetros HTTP. https://t.co/XfQFqSI3Ie
0
0
0
¿Usas iPhone o Mac? Actualiza Whats APP. La vulnerabilidad CVE-2025-55177 se encuentra muy activa; esta permite a los usuarios ejecutar el procesamiento de contenido de forma arbitraria por medio de una URL sin interacción. https://t.co/wq3Qaz2TXW
0
0
0
3/3 The skills gained, the friendships forged, and the cultural connections made will strengthen cybersecurity and mutual understanding across borders. We believe the real impact of this #PHCamp is just beginning. 📈 @ramseyibe @amoshkov @nshutimartin15 @_ass4s1n_ @Z3roxTw0
0
2
6