luipo_ Profile Banner
Luis Jose Polanco Profile
Luis Jose Polanco

@luipo_

Followers
546
Following
986
Media
491
Statuses
5K

Apasionado de las Redes, Diplomático,Tecnómano de Profesión, creyente por convicción

ÜT: 18.444808,-69.966044
Joined May 2009
Don't wanna be here? Send us removal request.
@luipo_
Luis Jose Polanco
2 days
SoupDealer Malware slipped past every public sandbox, antivirus solution, and even enterprise EDR/XDR platforms. Next headache!
Tweet card summary image
cybersecuritynews.com
SoupDealer Java loader evades all defenses, targeting Windows users in Türkiye via phishing, loading payloads in memory over Tor.
0
0
0
@luipo_
Luis Jose Polanco
24 days
SharePoint Corporate users:
0
0
0
@luipo_
Luis Jose Polanco
24 days
SharePoint Corporate users:
0
0
0
@luipo_
Luis Jose Polanco
1 month
Tactic:. The attackers sent sophisticated phishing emails impersonating U.S. State Department officials, encouraging victims to generate and share app-specific passwords-a lesser-known security loophole in Gmail.
Tweet card summary image
instagram.com
0
0
0
@luipo_
Luis Jose Polanco
3 months
Exposed Data breach includes Amazon, Apple, Nintendo, Snapchat, Spotify, X, WordPress, Yahoo, and many other types of login info.
Tweet card summary image
dailyhodl.com
A veteran cybersecurity researcher says he's discovered a secret database containing the login credentials for over 184 million accounts across numerous platforms.
0
0
0
@luipo_
Luis Jose Polanco
3 months
Microsoft identified over 394 000 Windows computers globally infected by Lumma malware. Microsoft, Europol, and international partners have disrupted Lumma’s infrastructure, cutting off communications between the malicious tool and victims #maas
Tweet card summary image
europol.europa.eu
Europol’s European Cybercrime Centre has worked with Microsoft to disrupt Lumma Stealer (“Lumma”), the world’s most significant infostealer threat.
0
0
0
@luipo_
Luis Jose Polanco
3 months
Genius!!! (unless the super computer lifespan is only a few years and the cost to put in orbit is greater to the resources needed on earth)
Tweet card summary image
scmp.com
Once complete, the space-based Three-Body Computing Constellation will support real-time, in-orbit data processing.
0
0
0
@luipo_
Luis Jose Polanco
3 months
Attackers with knowledge of existing admin accounts can access devices as legitimate administrators, completely bypassing the authentication process. #cybersecurity
Tweet card summary image
cybersecuritynews.com
Fortinet has disclosed a significant security vulnerability affecting multiple Fortinet products, allowing attackers to bypass authentication and gain administrative access to affected systems.
0
0
0
@luipo_
Luis Jose Polanco
3 months
Fortinet has observed the threat actors deploying malware on hacked devices, adding cron jobs designed to harvest credentials, and dropping scripts to scan the victims' networks. #cybersecurity #fortinet
Tweet card summary image
bleepingcomputer.com
Fortinet released security updates to patch a critical remote code execution vulnerability exploited as a zero-day in attacks targeting FortiVoice enterprise phone systems.
0
0
0
@luipo_
Luis Jose Polanco
3 months
Las funciones de acceso remoto de los routers afectados han permitido a los delincuentes hacer que los dispositivos acaben formando parte de una botnet (red de equipos infectados). #cybersecurity
Tweet card summary image
xatakamovil.com
Al igual que el móvil, el router también se actualiza. Es algo que no deberíamos descuidar, ya que haciéndolo nos aseguramos de que el dispositivo tiene los...
0
0
0
@luipo_
Luis Jose Polanco
3 months
The vulnerability, tracked as CVE-2025-29824, was tagged by Microsoft as exploited in a limited number of attacks and patched during last month's Patch Tuesday.
bleepingcomputer.com
The Play ransomware gang has exploited a high-severity Windows Common Log File System flaw in zero-day attacks to gain SYSTEM privileges and deploy malware on compromised systems.
0
0
0
@luipo_
Luis Jose Polanco
3 months
Attackers can deploy a multi-stage attack chain consisting of a .NET loader malware functioning as a WebShell, followed by a malicious IIS native module that provides persistent control over the compromised server
Tweet card summary image
cybersecuritynews.com
Threat actors deploying advanced IIS malware against South Korean web servers, allowing attackers to intercept and manipulate all incoming web traffic while remaining hidden from security solutions.
0
0
0
@luipo_
Luis Jose Polanco
3 months
These devices, which were released many years back and no longer receive security updates from their vendors, are vulnerable to external attacks leveraging publicly available exploits to inject persistent malware.
Tweet card summary image
bleepingcomputer.com
The FBI warns that threat actors are deploying malware on end-of-life (EoL) routers to convert them into proxies sold on the 5Socks and Anyproxy networks.
0
0
0
@luipo_
Luis Jose Polanco
3 months
An attacker can chain these vulnerabilities to make a sensitive system directory writable, elevate their privileges to SMA administrator, and write an executable file to a system directory. This chain results in root-level RCE
Tweet card summary image
bleepingcomputer.com
SonicWall has urged its customers to patch three security vulnerabilities affecting its Secure Mobile Access (SMA) appliances, one of them tagged as exploited in attacks
0
0
0
@luipo_
Luis Jose Polanco
3 months
A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.
Tweet card summary image
thehackernews.com
Cisco fixes CVE-2025-20188, a 10.0 CVSS flaw tied to hardcoded JWT in wireless controllers, preventing root-level remote exploits.
0
0
0
@luipo_
Luis Jose Polanco
3 months
This vulnerability allows attackers to map URLs to unintended filesystem locations, potentially leading to code execution or source code disclosure.
Tweet card summary image
cybersecuritynews.com
The CISA has added CVE-2024-38475, a critical vulnerability affecting Apache HTTP Server, to its KEV catalog. 
0
0
0