Mitja Kolsek Profile
Mitja Kolsek

@mkolsek

Followers
4K
Following
33K
Media
287
Statuses
23K

CEO of ACROS Security; Co-founder of 0patch (https://t.co/XQ9EYMnQYX) Bluesky: https://t.co/HhsFBafHK0 Mastodon: @[email protected]

Joined January 2012
Don't wanna be here? Send us removal request.
@mkolsek
Mitja Kolsek
2 days
RT @Bandrel: Please read this. As a survivor of suicide this hit hard.
0
1
0
@mkolsek
Mitja Kolsek
4 days
RT @YuG0rd: BadSuccessor is dead… or is it?. The patch for CVE-2025-53779 fixed the priv-esc. While no longer a vulnerability, the tactic s….
Tweet card summary image
akamai.com
Read about Microsoft’s patch for BadSuccessor — a vulnerability in Windows Server Active Directory — and learn why its underlying mechanics still matter.
0
32
0
@grok
Grok
4 days
Join millions who have switched to Grok.
183
388
3K
@mkolsek
Mitja Kolsek
4 days
RT @DrCatharineY: Before we mock “shrimp on treadmills” or “marbles in cats,” remember: we once studied Gila monster spit and it led a drug….
0
130
0
@mkolsek
Mitja Kolsek
5 days
Is your org using Microsoft Office that will stop receiving security fixes in two months?.
@0patch
0patch
5 days
End Of Security For Microsoft Office 2016 and 2019? Not With 0patch!
Tweet media one
0
3
17
@mkolsek
Mitja Kolsek
5 days
RT @0patch: If your organization is using Office 2016 or 2019 and isn’t ready for Microsoft’s end of support this October, we have a quick,….
0
3
0
@mkolsek
Mitja Kolsek
5 days
RT @0patch: End Of Security For Microsoft Office 2016 and 2019? Not With 0patch!
Tweet media one
0
4
0
@mkolsek
Mitja Kolsek
7 days
RT @FLI_org: "Do [AI companies] have a plan to control the unimaginably powerful superintelligent AI that they themselves claim they are on….
0
19
0
@mkolsek
Mitja Kolsek
8 days
RT @buffaloverflow: What comes after the patch? Bypass of course! 😜. Delinea Protocol Handler RCE - Return of the MSI. By my colleague @joh….
0
19
0
@mkolsek
Mitja Kolsek
9 days
RT @haider_kabibo: I found that using RegQueryMultipleValuesW to read sensitive registry values bypasses nearly all the EDRs I tested. Alon….
0
52
0
@mkolsek
Mitja Kolsek
11 days
RT @techspence: Are you an IT admin whose responsible for dealing with AppLocker? . Do you struggle to wrangle all your policies? . Are you….
0
22
0
@mkolsek
Mitja Kolsek
11 days
RT @RedTeamPT: By intentionally coercing a host to open a share with a virus (or an EICAR test file), Windows Defender re-connects with com….
0
11
0
@mkolsek
Mitja Kolsek
11 days
RT @SpecterOps: Hosts running the WebClient service are prime targets for NTLM relay attacks, and it may be possible to start the service r….
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
59
0
@mkolsek
Mitja Kolsek
11 days
RT @joernchen: Today I have a more serious topic than usual, please consider reposting for reach:. My wife and I are urgently looking for a….
0
111
0
@mkolsek
Mitja Kolsek
11 days
RT @PyroTek3: A critical part of Active Directory security is regularly reviewing your AD admins. The simplest way to do this is to recursi….
0
100
0
@mkolsek
Mitja Kolsek
12 days
RT @wesbos: we are in for a few years of security nightmares
Tweet media one
0
390
0
@mkolsek
Mitja Kolsek
17 days
RT @KeyZ3r0: Our slide is online: Glad to share our pre-auth DoS & RCE bug hunting research at #BHUSA! Thanks @Bla….
0
55
0
@mkolsek
Mitja Kolsek
18 days
RT @RubenLabs: You didn’t click, but your password challenge is leaked. I’m excited to share my latest research: CVE-2025-50154, a high se….
Tweet card summary image
cymulate.com
Learn about CVE-2025-50154 and its risk of NTLM attacks and RCE even after Microsoft’s fix for CVE-2025-24054.
0
34
0
@mkolsek
Mitja Kolsek
18 days
RT @RubenLabs: Find the POC for my new finding, CVE-2025-50154, a zero day vulnerability on windows file explorer disclosing NTLMv2-SSP wit….
Tweet card summary image
github.com
POC for CVE-2025-50154, a zero day vulnerability on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch - rubenformation/CVE-2...
0
18
0
@mkolsek
Mitja Kolsek
19 days
RT @0patch: We'd like to thank Filip Dragović (@filip_dragovic). for sharing their finding and their POC, which allowed us to reproduce the….
0
6
0
@mkolsek
Mitja Kolsek
19 days
RT @0patch: Micropatches Released for Windows Update Service Elevation of Privilege Vulnerability (CVE-2025-48799) .
0
6
0