Rapid Risk Radar
@rapidriskradar
Followers
13
Following
10
Media
29
Statuses
31
🌐 Rapid Risk Radar (RRR) | Customizable vulnerability intelligence to prioritize threats and manage risk 🌟 Empowering proactive cyber defense 🚀 #ThreatIntel
Joined March 2024
🚨Critical Fortinet FortiWeb Zero-Day (CVE-2025-64446) exploited in the wild! Remote command execution through path traversal attacks. No patch yet — lock down your FortiWeb devices NOW. Monitor updates! 🔗 https://t.co/brvzTj2JO6
#Fortinet #Cybersecurity
0
0
0
🚨CVE-2025-11953: Command Injection in React Native Metro Server allows unauthenticated remote attacks. Lock down your dev environment & watch for updates! More: https://t.co/BIfChq6tEr
#DevSecOps #CyberRisk
0
0
0
🚨Critical Alert: CVE-2025-12422 allows arbitrary file write in Azure Access BLU-IC devices → full root takeover risk. No patch yet - restrict access & monitor closely! Learn more: https://t.co/fpvwelkRfs
#infosec #cybersecurity
0
0
0
🚨Critical Oracle Identity Manager vulnerability CVE-2025-61757 allows full takeover via unauth HTTP access. Oracle users must act fast! Monitor updates, restrict access & leverage WAFs. Details → https://t.co/cK6OIvBJX7
#Oracle #CyberSecurity
0
0
0
⚠️Active exploitation: Windows Remote Access Privilege Escalation (CVE-2025-59230). Patch immediately to prevent attackers gaining elevated privileges → https://t.co/cPeiikRvZO
#WindowsSecurity #PatchTuesday #cybersecurity
0
1
1
🚨Oracle EBS Zero-Day CVE-2025-61882 exploited in the wild! Unauth remote takeover via HTTP in Oracle Concurrent Processing (CVSS 9.8). No patch yet – restrict access & monitor closely NOW! More info → https://t.co/aAAcNTGzl5
#Oracle #ZeroDay #Cybersecurity
0
0
0
⚠️#Cisco SNMP Zero-Day CVE-2025-20352 exploited in the wild! Stack overflow leads to DoS or root code exec on IOS & IOS XE. Patch now & secure SNMP access! 🔗 https://t.co/pqtTuXXPcD
0
0
1
X Post: 🚨Fortra GoAnywhere MFT faces 10.0 RCE via License Servlet deserialization flaw. Proof-of-concept exists, no patch yet. Harden access & monitor now! More: https://t.co/ZeidvWwusK
#GoAnywhere #Cybersecurity #CVE #ZeroDay
0
0
0
🚨Critical SQL Injection in BGS Interactive https://t.co/uUFtVooTGO Exam Module (before v1.2) - CVE-2025-4688. Attackers could access or modify sensitive exam data! Limit access and sanitize inputs ASAP! Details → https://t.co/AuwZzjKXZq
0
0
0
🚨Critical Azure Vulnerability CVE-2025-54914 allows full privilege escalation remotely with no user interaction. Patch now! Details → https://t.co/2ubFPmNw5e
0
0
0
🚨Critical FreePBX zero-day (CVE-2025-57819) with CVSS 10 allows unauthenticated remote code execution & DB manipulation. Exploited in the wild! Patch now: 15.0.66, 16.0.89, 17.0.3 👉Details & mitigation → https://t.co/5OcbsUvr4F
0
0
0
🚨Critical RCE in #NetScaler ADC/Gateway (CVE-2025-7775) exploited in the wild! Memory overflow vulnerability impacts VPN & LB servers. No patch yet – urgent risk review & mitigation needed! 🔗 https://t.co/fFnIFbwcAP
0
0
0
🚨CVE-2025-8875: Critical deserialization bug in N-able N-central exploited in the wild! Local code execution possible with no patch yet. Restrict access & monitor for attacks! 🔗 https://t.co/qkAFnBd7Z9
0
0
1
🚨WinRAR Zero-Day: CVE-2025-8088 allows code execution via crafted archives & is actively exploited! Avoid suspicious RAR files & watch for patches. Details → https://t.co/TKj84lgaws
#Cybersecurity #ZeroDay #WinRAR
0
0
1
🎯 Live from @defcon: Take on the exclusive Rapid Risk Radar CTF Challenge! 🏆 Solve it & win 1 month free of our Researcher Access 🕵️♂️ You’ll need RRR to crack it... 👉 https://t.co/RtoXNBm9ve
#CTF #CyberSecurity #defcon33 #ThreatIntel #VulnResearch #RapidRiskRadar
0
1
0
🚨Adobe AEM RCE (CVE-2025-54253)! Zero interaction, full system code exec. Affects ≤6.5.23. Patch ASAP & monitor closely! 🔗 https://t.co/es4cErUOkk
0
0
0
🚨BentoML SSRF (CVE-2025-54381) lets attackers force servers to make arbitrary HTTP requests, exposing internal networks! Upgrade to v1.4.19 NOW. Protect your AI apps. 🔒 More info: https://t.co/BJ6cNeIioM
0
0
1
🚨Critical Alert: CVE-2025-53770 lets attackers run code remotely on Microsoft SharePoint (CVSS 9.8) and is exploited in the wild! Patch NOW! 🔗 https://t.co/HnzlwNKFna
#infosec #cybersecurity #SharePoint
0
0
1
🚨 CVE-2025-47812: RCE in Wing FTP Server (<7.4.4) lets attackers inject Lua code via null byte handling in session files—leads to root/SYSTEM takeover, even via anonymous FTP. ⚠️ In the wild | PoC on GitHub | EPSS: 83% ➡️ https://t.co/RUWxS4gco1
0
0
1
🚨 CVE-2025-20309 CVSS 10.0 – Cisco Unified CM flaw allows unauthenticated root SSH access via hardcoded creds. RCE confirmed. 🛑 🛠️ Patch immediately 🔍 Audit for root SSH logins 🔗 https://t.co/wVeSBU4b9z
#Cisco #CyberSecurity #RapidRiskRadar #SSH #PatchNow
0
0
0