SecureLayer7
@SecureLayer7
Followers
3K
Following
754
Media
588
Statuses
2K
Quick, reliable Pentest as a Service, API Security Scanning, and Offensive Security to uncover vulnerabilities and strengthen security posture
Austin, Tx
Joined September 2014
We are going to discuss with Security Leader Shobit and @cure53berlin about the these issue: https://t.co/KCD2baE7Rb
0
0
1
As a pentest engagement leader, how do you usually react when you get a bloated, noisy pentest report?
1
0
1
Here are the TOP misreported findings you should never accept in a pentest report. With us @cure53berlin, @SandeepL337, and Shobhit Mehta — let’s unpack such vulnerability which is not real. Join this interesting firechat: https://t.co/KCD2baE7Rb
0
1
1
Join cybersecurity leaders for a fireside chat on spotting false positives in pentest reports, prioritizing real risks, and improving remediation workflows. Who Should Attend: CISOs, Security leaders, pentesters, and security teams. Register here -
0
0
0
CVE-2025-25364: Speedify VPN MacOS privilege Escalation https://t.co/chwdSTZMAp
blog.securelayer7.net
SecureLayer7 discovered CVE-2025-25364, which is a critical command injection vulnerability discovered in the me.connectify.SMJobBlessHelper XPC service, a privileged helper tool...
1
0
0
Windows Telephony Services: 2025 Patch Diffing & Analysis https://t.co/CVxklvmLbk
blog.securelayer7.net
Introduction At the start of 2025, on January 14th, Microsoft released over 20+ CVEs addressing Remote Code Execution (RCE) vulnerabilities in Microsoft Telephony Services,...
0
0
1
We will continue expanding this list based on our experiences at SL7 and contributions from others until January 31, 2025, after which the list will be finalized. Feel free to submit pull requests!
0
0
1
Updated: Top 2025 vulnerabilities you shouldn’t accept in a pentest report [DRAFT] Introducing three different sections: 1. Minor Infrastructure Information Exposure 2. Reporting Unexploitable Vulnerabilities 3. Problems Without Security-Related Impact https://t.co/nwuz0YUWQb
github.com
Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report - securelayer7/not-a-vuln-list
1
0
1
We’d love to hear additional contexts that don’t make sense in pentest report. Submit your pull requests or issues. We aim to finalize this draft by the 31st for practitioners and pentesters. https://t.co/nwuz0YUWQb
github.com
Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report - securelayer7/not-a-vuln-list
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. https://t.co/nwuz0YUWQb
0
2
4
We extend our heartfelt gratitude to SecureLayer7 for being a Gold Sponsor of the Seasides Conference! Your invaluable support plays a vital role in fostering knowledge-sharing within the security community. Thank you, SecureLayer7 Sandeep Kamble , for championing this mission
3
15
21
Metasploitable3 takes pentesting to the next level with new vulnerabilities and challenges. https://t.co/9MDkXcgiZU
blog.securelayer7.net
Metasploitable3 is an updated version of Metasploitable2, developed to provide a more realistic environment for practicing advanced penetration testing techniques. This version introduces new...
0
0
3
The list is designed to be educational. We’ll update each point with detailed explanations of why it doesn’t matter and provide the context to support it.
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. https://t.co/nwuz0YUWQb
0
0
1
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. https://t.co/nwuz0YUWQb
github.com
Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report - securelayer7/not-a-vuln-list
4
6
42
Top 2025 vulnerabilities you shouldn’t accept in a pentest report. Here is list! Looking for more such scenarios. https://t.co/nwuz0YUWQb
github.com
Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report - securelayer7/not-a-vuln-list
4
6
42
We are expanding out project management team, adding more folks to manage the North American and Indian customer. Interested? Send us CV at job@securelayer7.net
0
0
0
PHP symlink exploit, anyone? 😅 Was checking PTaaS platform & saw one of our pentesters found an exploit allowing access to other tenants sensitive data on cloud hosting! https://t.co/6wkptLlfOu
linkedin.com
PHP symlink exploit, anyone? So, I usually routinely check BugDazz PTaaS platform, and one of our pentesters found a vulnerability allowing access to other tenant’s sensitive data in cloud hosting....
0
2
3
Day #1 at SL7, Austin Office. It evoked the same feeling as the first day at SecureLayer7 India Office.
linkedin.com
Day #1 at SL7, Austin Office. It evoked the same feeling as the first day at SecureLayer7 India Office. | 14 comments on LinkedIn
0
2
13
0
0
1
Code correction! Hello, pen-testers. The image is a simple code framework for smartphone penetration testing. Can you spot the error in the given code? Is there any at all? Comment your responses. #pentest #Pentestasaservice #PTaaS #SecureLayer7
0
0
3
Team @securelayer7 has picked an astounding read on why you should care about the shadow of data you leave behind. Cyber Privacy: Who Has Your Data and Why You Should Care by @April Falcon Doss #Cyberprivacy #datasecurity
0
0
1