Explore tweets tagged as #Exploits
@cyber_advising
Cyber Advising
7 days
CVE-2025-49113 – Roundcube Webmail RCE Exploit .
Tweet media one
2
63
247
@ConcernedMGTOW
🌟 CONCERNED MGTOW 🌟
2 hours
Men are now quietly quitting and completely withdrawing themselves from society . Men are refusing to participate in a society that is designed to exploit them . Men are now Going Their Own Way .
Tweet media one
3
3
15
@Jukanlosreve
Jukan
18 hours
Report: BOE Goes All Out to Supply Apple's 'iPad,' Aiming to Exploit Gap from Samsung Display's 'MacBook' Supply. Chinese display maker BOE, having fully entered the organic light-emitting diode (OLED) competition, is expected to aim for panel supply to iPads by exploiting the
Tweet media one
2
1
18
@yondaspace
Yonda
9 days
🛡Your Data, Your Rules: Yonda's Commitment to Privacy At NexVoo, we respect your personal data. We do not exploit user data for our purposes, nor do we maintain a user database. Enjoy a communication platform where your privacy is the priority.
Tweet media one
1
86
533
@PinguinoDeMario
El Pingüino De Mario
2 days
Cómo usar exploitdb para encontrar exploits y explotar vulnerabilidades de forma sencilla y directa. #ciberseguridad #exploit #ciberseguridadespaña #pentesting #hackingetico #kalilinux #informatica #scripting #exploitdb #hackingweb
1
32
270
@sans_isc
SANS.edu Internet Storm Center
2 hours
Parasitic Sharepoint Exploits
Tweet media one
0
2
2
@SuplabsYi
Yi
6 hours
.@SuperRare was hacked for $710,000. The root cause of this SuperRare staking exploit? A brain-dead permission check that only lets non-owners and non-specific accounts update the Merkle Root. Seriously, who wrote this? Should’ve been a tight require(msg.sender == owner() ||
Tweet media one
17
6
85
@TodayCyberNews
Today Cyber News
8 days
CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣. 🔴 TIPO: SQLI + RCE.🔍 DORK (Zoomeye):. app="FortiWeb WAF". 💣 EXPLOIT:. #rce #github #exploit #sqli
Tweet media one
1
66
299
@stephenfewer
Stephen Fewer
5 days
We now have a (draft) @metasploit exploit module in the pull queue for the recent Microsoft SharePoint Server unauthenticated RCE zero-day (CVE-2025-53770), based on the in-the-wild exploit published a few days ago. Check it out here:
Tweet media one
8
145
492
@theXSSrat
HackerRats - Uncle Rat ❤️ (XSS Rat)
2 days
🚨 GIVEAWAY: Bug Bounty Course 003 🚨.Win free access to my Main App Bug Bounty Guide — one of my most in-depth courses:.🔥 260+ lessons.🎥 18+ hours of video.🧠 Constant updates.⚔️ Real-world exploits for bounty hunters. 📅 Ends: July 31 @ 9PM CEST.🎯 Winners announced: Aug 1
Tweet media one
77
85
185
@Martha99198913
Martha
5 days
The devil will exploit our mental health, which is why we need God’s Word and to stay close to Christ; otherwise, we risk becoming mentally lost.
37
42
321
@exploitxbt
exploit
1 day
oh yah ez 100x my $POCHI this week.
Tweet media one
4
2
13
@JamesTate121
James Tate
3 hours
Yup pretty much. Capitalism exploits resources and people.
Tweet media one
6
28
66
@Sana10Meitei
sanajaoba
1 day
As shown in this footage, illegal immigrants from Myanmar continue to target our forest areas, ruthlessly cutting down trees to exploit resources and encroach on land. These pristine ecosystems, vital for biodiversity and climate regulation, face relentless destruction as
0
33
36
@R4ZN1V
razniv.eth
8 hours
This is the vulnerable function that enabled this exploit - the check in the first line should actually be:. require(msg.sender == owner() || msg.sender == address(. )). Instead, the current version makes it possible for anyone to pass the verification and claim ownership.
Tweet media one
@blockaid_
Blockaid
8 hours
🚨 Our real-time exploit detection systems had identified malicious transactions targeting one of the staking contracts used by @SuperRare . The attacker had deployed an exploit contract - but the actual attack was performed by a frontrunner one block later. Updates in 🧵
Tweet media one
3
5
29
@cedranetwork
Cedra
4 hours
Most Web3 languages weren’t designed for digital assets — they were adapted from those built for other purposes. Move is different. Designed with security at its core, Move prevents entire categories of exploits and ensures: .– No reentrancy attacks .– No double-spending .– No
Tweet media one
0
1
13
@HackingLZ
Justin Elze
7 days
"⚠️ Educational use only. Do not use against unauthorized systems.".
11
93
394
@Xbow
XBOW
2 hours
False positives waste your time. False negatives cost you breaches. At @BlackHatEvents , @moyix shows how XBOW agents fight false positives — validating real exploits at scale, in hours. 📍Aug 7 | 11:20am
Tweet media one
2
2
27
@thebsot
theb
7 hours
the face of a man who paid a cheater to farm pve exploits for him and just had hundreds of kingly skulls despawned in front of him #SeaOfThieves
Tweet media one
11
2
166