axcheron Profile Banner
Alexandre Cheron Profile
Alexandre Cheron

@axcheron

Followers
2K
Following
1
Media
241
Statuses
13K

Hacker. Security Researcher. Bytes Addict. Became self-aware at 5:32 a.m. Almost Human. Shall we play a game?

Montréal
Joined February 2011
Don't wanna be here? Send us removal request.
@axcheron
Alexandre Cheron
4 days
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access #0day
thehackernews.com
Active SharePoint exploits since July 7 target governments and tech firms globally, risking key theft and persistent access.
0
0
0
@axcheron
Alexandre Cheron
17 days
CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe
trustedsec.com
0
0
0
@axcheron
Alexandre Cheron
17 days
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
arstechnica.com
Exploits allow hackers to bypass 2FA and commandeer vulnerable devices.
0
0
0
@axcheron
Alexandre Cheron
23 days
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms #Ivanti #0day.
thehackernews.com
Chinese hackers exploited Ivanti CSA zero-days, targeting French government, media, and telecom sectors in September 2024.
0
0
0
@axcheron
Alexandre Cheron
1 month
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability #Linux.
thehackernews.com
CISA warns CVE-2023-0386 is being actively exploited, impacting Linux systems via OverlayFS. Patching is urgent.
0
0
0
@axcheron
Alexandre Cheron
1 month
Streaming Zero-Fi Shells to Your Smart Speaker |.Exploiting the Sonos Era 300 with a Malicious HLS Playlist
blog.ret2.io
In October 2024, RET2 participated in the “Small Office / Home Office” (SOHO) flavor of Pwn2Own, a competition which challenges top security researchers to c...
0
0
2
@axcheron
Alexandre Cheron
2 months
Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them
arstechnica.com
The publicly available exploits provide a near-universal way to bypass key protections.
0
0
0
@axcheron
Alexandre Cheron
3 months
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages
0
0
0
@axcheron
Alexandre Cheron
3 months
Supercharging Ghidra: Using Local LLMs with GhidraMCP via Ollama and OpenWeb-UI
Tweet card summary image
medium.com
Reverse engineering binaries often resembles digital archaeology: excavating layers of compiled code, interpreting obscured logic, and…
0
0
0
@axcheron
Alexandre Cheron
3 months
iOS and Android juice jacking defenses have been trivial to bypass for years
arstechnica.com
New ChoiceJacking attack allows malicious chargers to steal data from phones.
0
0
0
@axcheron
Alexandre Cheron
3 months
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
thehackernews.com
ARMO shows io_uring-based rootkits evade Falco, Tetragon, and Defender, risking Linux runtime security.
0
0
0