Raj_Samani Profile Banner
Raj Samani Profile
Raj Samani

@Raj_Samani

Followers
14K
Following
8K
Media
1K
Statuses
10K

Chief Scientist @Rapid7 | @cloudsa | Co-author of @CyberGridBook & CSA Guide to Cloud | Advisor @EC3Europol https://t.co/YpisLrWlVR

Joined January 2010
Don't wanna be here? Send us removal request.
@Raj_Samani
Raj Samani
11 months
All good things must come to an end - will now be at
1
1
1
@Raj_Samani
Raj Samani
1 year
Our latest @metasploit weekly wrap up details a new module for an unauthenticated remote code execution bug in NetAlertX (CVE-2024-46506 plus more... https://t.co/yAdr37ONSp #infosec #cybersecurity
Tweet card summary image
rapid7.com
Metasploit Weekly Wrap-Up: 02/14/2025 | Rapid7 Blog
2
3
9
@Raj_Samani
Raj Samani
1 year
Our latest @rapid7 analysis details the discovery of a high-severity SQL injection vulnerability, CVE-2025-1094, affecting the PostgreSQL interactive tool psql. More details available in our write-up here: https://t.co/o79UJIkCRM #infosec #cybersecurity H/T @stephenfewer
Tweet card summary image
rapid7.com
CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog
0
0
5
@stephenfewer
Stephen Fewer
1 year
Today @rapid7 has disclosed CVE-2025-1094, a new PostgreSQL SQLi vuln we discovered while researching CVE-2024-12356 in BeyondTrust Remote Support. Untrusted inputs that have been safely character escaped could still generate SQLi under certain conditions:
Tweet card summary image
rapid7.com
CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog
3
41
90
@Raj_Samani
Raj Samani
1 year
Our weekly @metasploit wrap-up details a module which exploits CVE-2018-15745, an unauthenticated directory traversal leading to file disclosure in Argus Surveillance DVR 4.0.0.0. https://t.co/bGM1DRhJ5A #infosec #cybersecurity
Tweet card summary image
rapid7.com
Metasploit Weekly Wrap-Up: 02/07/2025 | Rapid7 Blog
0
3
1
@Raj_Samani
Raj Samani
1 year
Our latest @metasploit weekly wrap up details a new exploit module for Craft CMS, when the attacker can use malicious FTP server to gain remote code execution https://t.co/Ts2ThXvvFy #infosec #cybersecurity
Tweet card summary image
rapid7.com
Metasploit Weekly Wrap-Up: 01/31/25 | Rapid7 Blog
0
6
8
@Raj_Samani
Raj Samani
1 year
Our latest @Rapid7 analysis details the 2024 #ransomware landscape. Included are the 10 most prolific ransomware groups in 2024, ranked by the number of posts on leak sites. https://t.co/W3wWKHHr35 #infosec #cybersecurity H/T @ChristiaanBeek
Tweet card summary image
rapid7.com
The 2024 Ransomware Landscape: Looking back on another painful year | Rapid7 Blog
1
1
7
@Raj_Samani
Raj Samani
1 year
Our latest @metasploit weekly wrap-up includes a new module for exploiting CVE-2024-51092, an authenticated command injection in LibreNMS. It allows the attacker to run system commands and gain remote code execution (RCE) https://t.co/8v3SWJjMgx #infosec #cybersecurity
Tweet card summary image
rapid7.com
Metasploit Weekly Wrap-Up: 01/24/2025 | Rapid7 Blog
0
2
6
@Raj_Samani
Raj Samani
1 year
Our latest @metasploit weekly wrap-up includes an exploit module for CVE-2024-55956, an unauthenticated file write vulnerability affecting Cleo LexiCom, VLTrader, and Harmony versions 5.8.0.23 and below. https://t.co/3uF4gu3EhW #infosec #cybersecurity
Tweet card summary image
rapid7.com
Metasploit Wrap Up: 01/17/2025 | Rapid7 Blog
0
2
2
@Raj_Samani
Raj Samani
1 year
Our latest @rapid7 analysis details CVE-2024-55591, an authentication bypass vulnerability in FortiOS and FortiProxy https://t.co/zHRVNGeqaP #infosec #0day
Tweet card summary image
rapid7.com
Fortinet Firewalls Hit with New Zero-Day Attack, Older Data Leak | Rapid7 Blog
0
1
0
@Raj_Samani
Raj Samani
1 year
Our latest @metasploit weekly wrap up includes multiple new modules including an exploit module for an unauthenticated arbitrary file read vulnerability, tracked as CVE-2024-45309, which affects OneDev versions <= 11.0.8. https://t.co/1LoeFg7HJN #infosec #cybersecurity
Tweet card summary image
rapid7.com
Metasploit Wrap-Up: 1/10/2025 | Rapid7 Blog
0
2
3
@Raj_Samani
Raj Samani
1 year
Our latest @rapid7 advisory details CVE-2025-0282: Ivanti Connect Secure zero-day which has been exploited in the wild. More details here: https://t.co/iPzl9523TS #infosec #cybersecurity
Tweet card summary image
rapid7.com
CVE-2025-0282: Ivanti Connect Secure Zero-Day Exploited in the Wild | Rapid7 Blog
0
3
3
@Raj_Samani
Raj Samani
1 year
Our @metasploit 2024 wrap-up details the most notable improvements and modules including expanded support for Active Directory Certificate Services AD CS attacks. More details here: https://t.co/GQaxb3Wr98 #infosec
Tweet card summary image
rapid7.com
Metasploit 2024 Annual Wrap-Up | Rapid7 Blog
0
2
5
@Raj_Samani
Raj Samani
1 year
My latest article is now published on @SCmagazineUK detailing the challenges in dealing with a #ransomware attack, and technical and ethical challenges this poses: https://t.co/nZefqTFiOW #malware #cybersecurity
Tweet card summary image
insight.scmagazineuk.com
0
2
5
@BrianHonan
Briain Ó hEoghanáin (Brian Honan) #BLM He/Him
1 year
I enjoyed taking part in this webinar with @Raj_Samani and Sabeen Malik from @rapid7 to discuss our #cybersecurity predictions for 2025. What trends you see happening next year in #cybersecurity ? https://t.co/rxEns7qrqq
0
3
6
@Raj_Samani
Raj Samani
1 year
Our technical analysis now available @AttackerKb on CVE-2024-53677, a flawed upload logic vuln in Apache Struts 2 which permits an attacker to override internal file upload variables in apps using Apache Struts 2 File Upload Interceptor. https://t.co/ReJPPd3uNV H/T @the_emmons
Tweet card summary image
attackerkb.com
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lea…
0
2
6
@Raj_Samani
Raj Samani
1 year
Our latest @metasploit weekly wrap-up details RCEs for Moodle e-Learning platform, Primefaces, WordPress Really Simple SSL and CyberPanel along with two modules to change password through LDAP and SMB. https://t.co/R8K2VZuWIM #infosec
Tweet card summary image
rapid7.com
Metasploit Weekly Wrap-Up: 12/13/2024 | Rapid7 Blog
0
4
3
@Raj_Samani
Raj Samani
1 year
Our latest @rapid7 analysis into a payload from the recent Cleo file transfer vuln reveals an encoded Java Archive payload. Note that this isn’t necessarily the only payload that has or will be deployed https://t.co/z5HfRRQ1b6 H/T @ChristiaanBeek #cybersecurity
0
3
4
@Raj_Samani
Raj Samani
1 year
Our latest Rapid7 analysis details Widespread exploitation of Cleo file transfer software (CVE-2024-50623) - with links to detection/mitigation guidance included: https://t.co/cIv7axjCNU #infosec #cybersecurity
Tweet card summary image
rapid7.com
Widespread Exploitation of Cleo File Transfer Software | Rapid7 Blog
1
3
8