
Alejandro Hernández
@nitr0usmx
Followers
5K
Following
34K
Media
6K
Statuses
39K
✇ Cybersecurity ✧ Director of Services at @IOActive ✎ Stock Trading ◮ Spanglish
San Cristóbal, Chiapas, México
Joined February 2011
📡⚡️ Rethinking Network Trust Why #5G Is Ideal in Enterprise Security https://t.co/KWN4OkFvu7
brighttalk.com
While 5G's impact is often more foundational than flashy, it is quietly redefining how your business approaches AI PC connectivity - combining always-on with security. Secure connectivity is impera...
0
0
1
This is wild: A map of OpenAI's recent partnerships. Now one of the largest companies in the world, worth over $500B, still owned by a non-profit parent. What's next?
258
1K
5K
Thanks to this sublime machines we have shaped the digital world to this day 🤖 Unveiling High NA EUV | ASML
0
0
0
📋 A Guide to Directory Traversal Vulnerability in 2024 by @Certcube Labs
0
0
2
🔒 DotDotPwn - Directory Traversal Fuzzer Tool in Linux https://t.co/Cfdwg6x2yU
geeksforgeeks.org
Your All-in-One Learning Portal: GeeksforGeeks is a comprehensive educational platform that empowers learners across domains-spanning computer science and programming, school education, upskilling,...
0
0
2
"With the advent of electronic trading platforms and networks, the exchange of financial securities now is easier and faster than ever; but this comes with inherent risks." Check out the research Alejandro Hernández (@nitr0usmx). https://t.co/gllVrwAITH
0
1
2
I found a rootkit hiding in https://t.co/G8VK6WQTYp.0, silently connecting to a command-and-control. The malware used a reverse SSH tunnel to exfiltrate browser credentials, logins, and screenshots, while quietly pinging a Telegram bot channel.
17
94
526
new backdoor method that leverages nmap with setuid permissions to execute commands as root through a Lua-loaded C library, I hope you enjoy it! here is the url: https://t.co/QjWPWT6PNw special thanks to @hackerfantastic for giving me some pointers to make this work
11
89
488
If you place a dll in a protected folder it will get executed? *mild shock* ... How can this get a CVE? This is a Proxy dll.
🚨 Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Read more: https://t.co/66WEsWKeG1 A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code on a victim's machine.
19
69
633
how software looks when electrical engineers think they can do what we do
675
568
13K
vibe coders, secure your systems with this tool in 1 easy step
216
443
9K