assetnote Profile Banner
Assetnote Profile
Assetnote

@assetnote

Followers
10K
Following
34
Media
89
Statuses
169

Assetnote combines advanced reconnaissance and high-signal continuous security analysis to help enterprises gain insight and control of their evolving exposure.

Joined July 2017
Don't wanna be here? Send us removal request.
@assetnote
Assetnote
8 days
Our security research team created a high fidelity check for the Next.js/RSC RCE (CVE-2025-55182 & CVE-2025-66478). Read more on our blog here:
Tweet card summary image
slcyber.io
This morning, an advisory was released for Next.js about a vulnerability that leads to RCE in default configurations, with no prerequisites. The root cause of this issue lies in React Server Compon...
2
49
226
@assetnote
Assetnote
23 days
Our Security Research team discovered a critical vulnerability in Oracle Identity Manager, that leads to RCE without authentication. A patch was released 30 days ago by Oracle (CVE-2025-61757), and we highly recommend applying it. Our research post here: https://t.co/vu47rCY5Bw
1
51
161
@assetnote
Assetnote
2 months
Our Security Researcher @softpoison_ published his first research post, reverse engineering CVE-2025-54236 (SessionReaper) - a critical unauthenticated RCE in Magento. From understanding @Blaklis_'s original discovery, we wrote up our analysis here:
Tweet card summary image
slcyber.io
Magento is still one of the most popular e-commerce solutions in use on the internet, estimated to be running on more than 130,000 websites. It is also offered as an enterprise offering by Adobe...
0
26
108
@assetnote
Assetnote
2 months
Our Security Research team presented on Finding Critical Vulnerabilities in Adobe Experience Manager at @BSidesCbr late last month. We’ve published our research detailing the internals of AEM and how we discovered seven CVEs ranging in criticality here: https://t.co/sNmbrYZjiN.
Tweet card summary image
slcyber.io
Adobe Experience Manager is one of the most popular CMSes around. Given its widespread use throughout the enterprise, you likely interact with AEM-based sites almost every day. From a security...
0
19
95
@assetnote
Assetnote
3 months
Earlier this year, our Security Research team discovered a high-risk secondary context path traversal issue in Omnissa Workspace One UEM (CVE-2025-25231). We also developed a chain to RCE on instances in the wild. You can read our detailed research here:
Tweet card summary image
slcyber.io
Secondary Context Path Traversal vulnerability in Omnissa Workspace One UEM (CVE-2025-25231) that leads to pre-auth API access as a super admin.
1
14
56
@prageru
PragerU
13 hours
Spanish explorers arrived first. The French built massive forts. Native Americans lived here for millennia. So why did the English shape America’s destiny? Because they brought the seeds of liberty and settlers willing to defend it. Watch this 5-Minute Video to learn how.
1
11
44
@assetnote
Assetnote
5 months
The final research blog from @SLCyberSec's Christmas in July concerns three more critical vulnerabilities that our security researchers have uncovered in Adobe Experience Manager Forms: two paths to RCE and a pre-authentication XXE
Tweet card summary image
slcyber.io
Vulnerabilities in AEM Forms The Searchlight Cyber Research Team discovered and disclosed three critical vulnerabilities in Adobe Experience Manager Forms to Adobe in late April 2025. As of writing...
0
17
69
@assetnote
Assetnote
5 months
Our Security Research team at @SLCyberSec found four vulnerabilities in the quality management platform ETQ Reliance, including a critical Remote Command Execution:
Tweet card summary image
slcyber.io
Note: In correspondence with Hexagon while disclosing the bugs below, they informed us that any sharing of source code would be considered a violation of their terms and license. The Java code has...
1
16
46
@assetnote
Assetnote
5 months
Sometimes, SQL injection is still possible, even when prepared statements are being used. Our researcher @hash_kitten has written up a blog post about a novel technique for SQL Injection in PDO’s prepared statements:
slcyber.io
Searchlight Cyber's Security Research team details a Novel Technique for SQL Injection in PDO's Prepared Statements.
1
79
291
@assetnote
Assetnote
5 months
Our Security Research team at @SLCyberSec discovered a pre-authentication RCE vulnerability in Sawtooth Lighthouse Studio (CVE-2025-34300). It affects all versions up to 9.16.14. Read more here:
Tweet card summary image
slcyber.io
Searchlight Cyber uncovers remote code execution (RCE) vulnerability in survey software Lighthouse Studio, from Sawtooth Software
1
8
57
@denofwolvesgame
Den of Wolves
7 days
The plan was clean. The escape? Not so much. Midway City doesn’t play fair. Wishlist this 4-player coop heist FPS on Steam today.
8
12
235
@assetnote
Assetnote
5 months
Continuing @SLCyber’s Christmas in July posts, our Security Research team discovered a pre-authentication NTLM hash disclosure vulnerability in DNN (formerly DotNetNuke), assigned CVE-2025-52488. Read more on our blog here: https://t.co/0swNJ9Zca9
0
8
50
@assetnote
Assetnote
5 months
For our first Christmas in July research post: How we managed to get persistent XSS on every Adobe Experience Manager Cloud instance three times! https://t.co/BbwEcXmF4S
2
11
92
@assetnote
Assetnote
6 months
We’re trying to buck the trend of critical vulnerabilities all landing at the end of the year, much to the despair of security professionals! This July, we’ll be publishing a series of vulnerabilities across the month. Stay tuned: https://t.co/XHPN4R96Nr
0
2
25
@assetnote
Assetnote
6 months
Our team recently used a novel technique to increase the impact of what seemed to be only a blind SSRF. This novel technique involving HTTP redirect loops and incremental status codes led to full HTTP response leakage. Read more on @SLCyberSec blog here:
Tweet card summary image
slcyber.io
It's difficult to show impact for Server-Side Request Forgery (SSRF) vulnerabilities when you cannot see the full HTTP response. Our research team details a novel technique that allowed for us to...
0
29
164
@arkanalabs
Arkana Laboratories
5 months
APOL1 Genetic Testing at No Cost to Patients! Are you incorporating APOL1 genetic testing into your workflow? Discover No-Cost APOL1 Genotyping Program for eligible patients sponsored by Vertex Pharmaceuticals. Learn more today!
18
36
212
@assetnote
Assetnote
8 months
Our security research team discovered a critical pre-authentication SQL injection vulnerability in Halo ITSM, a popular IT support software, often externally exposed and sensitive: Read more here:
0
11
55
@assetnote
Assetnote
9 months
Our security research team recently analyzed the authentication bypass vulnerability in Next.js (CVE-2025-29927). Our blog post details how to detect this vulnerability with more reliability. Read more here: https://t.co/jvaGXb2Q7b
0
30
152
@assetnote
Assetnote
9 months
Our security research team discovered a pre-auth RCE (CVE-2025-27218) in Sitecore XP 10.4. You can read our research here:
0
13
116
@assetnote
Assetnote
10 months
Our security research team discovered an authentication bypass in Palo Alto's PAN-OS management interface. Our discoveries come shortly after exploit chains were released at the end of 2024 after a deeper investigation. You can read our research here: https://t.co/qtFIuvSR46
1
40
113
@assetnote
Assetnote
11 months
We are thrilled to announce that Assetnote has been acquired by Searchlight Cyber! This is an exciting new chapter for our team as we continue our mission of providing our customers with a market-leading ASM solution. Joining forces with Searchlight Cyber means that we will be
1
5
94
@assetnote
Assetnote
11 months
🛠️ Building attack surface visibility from scratch taught us a crucial lesson: DNS wildcard detection requires more than open-source tools. Dive into our engineering journey: Spotify: https://t.co/Q0gpoAXh44 Apple Podcasts: https://t.co/zXKljMryx5 YouTube:
0
1
17
@assetnote
Assetnote
11 months
Modern enterprise infrastructure isn't just cloud-centric - it's protected by WAFs and CDNs. This architectural shift creates new challenges for traditional asset discovery approaches. Understanding your entire attack surface requires adapting to these architectural realities.
0
3
30