
Sam Stepanyan
@securestep9
Followers
7K
Following
11K
Media
1K
Statuses
5K
@OWASPLondon Chapter Leader (#OWASP #OWASPLondon). OWASP Board Member. Application Security (#AppSec) Consultant. OWASP Nettacker Project co-leader. #CISSP
London, UK
Joined September 2013
#ScatteredSpider: 3 teenagers aged 17-19 and a 20-year-old woman arrested in the UK this morning in connection with cyber attacks on Marks & Spencer (M&S) and Co-op retail chains in April-May this year (luxury store Harrods was also affected):.๐.
0
2
5
RT @Hesamation: some guy at Mastercard prompt injected a job posting and just days later it tricked somebodyโs ai ๐
0
1K
0
#WhatsApp: Google Gemini can now read your WhatsApp chats without you knowing (and how to disable it):.
0
0
0
#Azure: Security researchers have identified a combination of over-privileged built-in roles and API implementation flaws in Microsoft Azure that create dangerous attack vectors:.#CloudSecurity.๐.
0
1
3
#Linux: #DjVuLibre vulnerability CVE-2025-53367 could be exploited to gain code execution on a Linux Desktop system when the user tries to open a crafted PDF document. The POC works on a fully up-to-date Ubuntu 25.04 (x86_64):.๐.
0
1
2
RT @OWASPLondon: The next OWASP London Chapter in-person Meetup will take place on Thursday 17th July 2025 kindly hosted by Civo Tech Junctโฆ.
0
4
0
#Cisco: Unified Communications Manager systems could allow remote attackers to gain root-level access The vulnerability CVE-2025-20309 with a maximum CVSS 10.0, stems from hardcoded SSH root credentials that cannot be modified or removed .๐.
0
1
4
Goodbye @contrastsec Community Edition! Very sad to see yet another #AppSec vendorโs promise to support their community version โforeverโ abruptly end with the users having the rug pulled out from under them. ๐ข.Hoping other vendors will continue to invest in the community!
0
0
7
#CISCO: Critical severity CVSS 10 CVE-2025-20281 and CVE-2025-20282 vulnerabilities allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root! Updates released - patched now:.๐.
0
0
0
RT @OWASPLondon: Our meetup has started! We have @anantshri on stage right now speaking about: "You secured your code dependencies, is thaโฆ.
0
4
0
#Citrix Critical Netscaler #vulnerability CVE-2025-5777 patch released!.Like CtirixBleed this vulnerability allows attackers to grab valid session tokens from the memory of internet-facing #Netscaler devices by sending malformed request:.
0
1
9
#JWT: 'Attacking JWT using X509 Certificates': how an attacker could sign the JWT token with their own private key and modify the header value to specify their public key for signature verification:.#AppSec.#APIsecurity.
0
1
7
RT @OWASPLondon: The next OWASP London Chapter in-person Meetup will take place on Thursday 26th June 2025 kindly hosted by @thoughtmachineโฆ.
0
2
0
#Nettacker: very pleased to see @helpnetsecurity publishing an article about our #OWASP Nettacker project!.๐.
0
0
3
RT @helpnetsecurity: OWASP Nettacker: Open-source scanner for recon and vulnerability assessment - - @owasp #OpenSoโฆ.
0
2
0
#NPM: New Supply Chain #Malware Hits NPM and #PyPI Package Ecosystems. #ReactNative-Aria & #GlueStack packages with cumulative 1mln+ weekly downloads backdoored overnight - check your dependencies!.#SoftwareSupplyChainSecurity.๐.
1
5
10