rapidriskradar Profile Banner
Rapid Risk Radar Profile
Rapid Risk Radar

@rapidriskradar

Followers
13
Following
10
Media
29
Statuses
31

🌐 Rapid Risk Radar (RRR) | Customizable vulnerability intelligence to prioritize threats and manage risk 🌟 Empowering proactive cyber defense 🚀 #ThreatIntel

Joined March 2024
Don't wanna be here? Send us removal request.
@rapidriskradar
Rapid Risk Radar
4 days
🚨Critical Fortinet FortiWeb Zero-Day (CVE-2025-64446) exploited in the wild! Remote command execution through path traversal attacks. No patch yet — lock down your FortiWeb devices NOW. Monitor updates! 🔗 https://t.co/brvzTj2JO6 #Fortinet #Cybersecurity
0
0
0
@rapidriskradar
Rapid Risk Radar
19 days
🚨CVE-2025-11953: Command Injection in React Native Metro Server allows unauthenticated remote attacks. Lock down your dev environment & watch for updates! More: https://t.co/BIfChq6tEr #DevSecOps #CyberRisk
0
0
0
@rapidriskradar
Rapid Risk Radar
26 days
🚨Critical Alert: CVE-2025-12422 allows arbitrary file write in Azure Access BLU-IC devices → full root takeover risk. No patch yet - restrict access & monitor closely! Learn more: https://t.co/fpvwelkRfs #infosec #cybersecurity
0
0
0
@rapidriskradar
Rapid Risk Radar
1 month
🚨Critical Oracle Identity Manager vulnerability CVE-2025-61757 allows full takeover via unauth HTTP access. Oracle users must act fast! Monitor updates, restrict access & leverage WAFs. Details → https://t.co/cK6OIvBJX7 #Oracle #CyberSecurity
0
0
0
@rapidriskradar
Rapid Risk Radar
1 month
⚠️Active exploitation: Windows Remote Access Privilege Escalation (CVE-2025-59230). Patch immediately to prevent attackers gaining elevated privileges → https://t.co/cPeiikRvZO #WindowsSecurity #PatchTuesday #cybersecurity
0
1
1
@rapidriskradar
Rapid Risk Radar
2 months
🚨Oracle EBS Zero-Day CVE-2025-61882 exploited in the wild! Unauth remote takeover via HTTP in Oracle Concurrent Processing (CVSS 9.8). No patch yet – restrict access & monitor closely NOW! More info → https://t.co/aAAcNTGzl5 #Oracle #ZeroDay #Cybersecurity
0
0
0
@rapidriskradar
Rapid Risk Radar
2 months
⚠️#Cisco SNMP Zero-Day CVE-2025-20352 exploited in the wild! Stack overflow leads to DoS or root code exec on IOS & IOS XE. Patch now & secure SNMP access! 🔗 https://t.co/pqtTuXXPcD
0
0
1
@rapidriskradar
Rapid Risk Radar
2 months
X Post: 🚨Fortra GoAnywhere MFT faces 10.0 RCE via License Servlet deserialization flaw. Proof-of-concept exists, no patch yet. Harden access & monitor now! More: https://t.co/ZeidvWwusK #GoAnywhere #Cybersecurity #CVE #ZeroDay
0
0
0
@rapidriskradar
Rapid Risk Radar
2 months
🚨Critical SQL Injection in BGS Interactive https://t.co/uUFtVooTGO Exam Module (before v1.2) - CVE-2025-4688. Attackers could access or modify sensitive exam data! Limit access and sanitize inputs ASAP! Details → https://t.co/AuwZzjKXZq
0
0
0
@rapidriskradar
Rapid Risk Radar
2 months
🚨Critical Azure Vulnerability CVE-2025-54914 allows full privilege escalation remotely with no user interaction. Patch now! Details → https://t.co/2ubFPmNw5e
0
0
0
@rapidriskradar
Rapid Risk Radar
3 months
🚨Critical FreePBX zero-day (CVE-2025-57819) with CVSS 10 allows unauthenticated remote code execution & DB manipulation. Exploited in the wild! Patch now: 15.0.66, 16.0.89, 17.0.3 👉Details & mitigation → https://t.co/5OcbsUvr4F
0
0
0
@rapidriskradar
Rapid Risk Radar
3 months
🚨Critical RCE in #NetScaler ADC/Gateway (CVE-2025-7775) exploited in the wild! Memory overflow vulnerability impacts VPN & LB servers. No patch yet – urgent risk review & mitigation needed! 🔗 https://t.co/fFnIFbwcAP
0
0
0
@rapidriskradar
Rapid Risk Radar
3 months
🚨CVE-2025-8875: Critical deserialization bug in N-able N-central exploited in the wild! Local code execution possible with no patch yet. Restrict access & monitor for attacks! 🔗 https://t.co/qkAFnBd7Z9
0
0
1
@rapidriskradar
Rapid Risk Radar
3 months
🚨WinRAR Zero-Day: CVE-2025-8088 allows code execution via crafted archives & is actively exploited! Avoid suspicious RAR files & watch for patches. Details → https://t.co/TKj84lgaws #Cybersecurity #ZeroDay #WinRAR
0
0
1
@rapidriskradar
Rapid Risk Radar
4 months
🎯 Live from @defcon: Take on the exclusive Rapid Risk Radar CTF Challenge! 🏆 Solve it & win 1 month free of our Researcher Access 🕵️‍♂️ You’ll need RRR to crack it... 👉 https://t.co/RtoXNBm9ve #CTF #CyberSecurity #defcon33 #ThreatIntel #VulnResearch #RapidRiskRadar
0
1
0
@rapidriskradar
Rapid Risk Radar
4 months
🚨Adobe AEM RCE (CVE-2025-54253)! Zero interaction, full system code exec. Affects ≤6.5.23. Patch ASAP & monitor closely! 🔗 https://t.co/es4cErUOkk
0
0
0
@rapidriskradar
Rapid Risk Radar
4 months
🚨BentoML SSRF (CVE-2025-54381) lets attackers force servers to make arbitrary HTTP requests, exposing internal networks! Upgrade to v1.4.19 NOW. Protect your AI apps. 🔒 More info: https://t.co/BJ6cNeIioM
0
0
1
@rapidriskradar
Rapid Risk Radar
4 months
🚨Critical Alert: CVE-2025-53770 lets attackers run code remotely on Microsoft SharePoint (CVSS 9.8) and is exploited in the wild! Patch NOW! 🔗 https://t.co/HnzlwNKFna #infosec #cybersecurity #SharePoint
0
0
1
@rapidriskradar
Rapid Risk Radar
4 months
🚨 CVE-2025-47812: RCE in Wing FTP Server (<7.4.4) lets attackers inject Lua code via null byte handling in session files—leads to root/SYSTEM takeover, even via anonymous FTP. ⚠️ In the wild | PoC on GitHub | EPSS: 83% ➡️ https://t.co/RUWxS4gco1
0
0
1
@rapidriskradar
Rapid Risk Radar
5 months
🚨 CVE-2025-20309 CVSS 10.0 – Cisco Unified CM flaw allows unauthenticated root SSH access via hardcoded creds. RCE confirmed. 🛑 🛠️ Patch immediately 🔍 Audit for root SSH logins 🔗 https://t.co/wVeSBU4b9z #Cisco #CyberSecurity #RapidRiskRadar #SSH #PatchNow
0
0
0