Tomer Peled (@tomerpeled92) 's Twitter Profile
Tomer Peled

@tomerpeled92

Security Researcher at @Akamai
Checkout my CVE repository github.com/tomerpeled92/C…

ID: 1335555601120829442

linkhttps://medium.com/@tomerp_77017 calendar_today06-12-2020 12:04:30

54 Tweet

229 Followers

17 Following

Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Did you hear that? Akamai researcher Ben Barnea has discovered two vulnerabilities within Windows. Leveraging the infamous custom reminder sound feature, these can be chained together to achieve full 0-click RCE against Outlook. Full write-up: akamai.com/blog/security-…

Did you hear that?  

Akamai researcher <a href="/nachoskrnl/">Ben Barnea</a> has discovered two vulnerabilities within Windows.   

Leveraging the infamous custom reminder sound feature, these can be chained together to achieve full 0-click RCE against Outlook.  

Full write-up:
akamai.com/blog/security-…
Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

A new year but the same old Patch Tuesday. As always, we're sharing our thoughts about the most critical CVEs patched. Overview: 🟠48 total CVEs 🔵34 different components patched 🟠Max CVSS score 9.1 🔵2 critical 🟠2 found by Akamai researchers

Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Today’s Theme is vulnerability 👀 Akamai researchers have discovered a vuln in Windows Themes that can trigger an authentication coercion - with almost zero user interaction. User views the file, Explorer sends SMB packets with credentials. Full post: akamai.com/blog/security-…

payloadartist (@payloadartist) 's Twitter Profile Photo

Command Injection in Kubernetes (<1.28.4) leading to RCE with SYSTEM privileges on all Windows endpoints within a Kubernetes cluster by applying a malicious YAML file (CVE-2023-5528) akamai.com/blog/security-… By Tomer Peled #kubernetest #azure #cybersecurity

Command Injection in Kubernetes (&lt;1.28.4) leading to RCE with SYSTEM privileges on all Windows endpoints within a Kubernetes cluster by applying a malicious YAML file (CVE-2023-5528)

akamai.com/blog/security-…

By <a href="/TomerPeled92/">Tomer Peled</a>

#kubernetest #azure #cybersecurity
Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Can a DHCP administrator become a domain administrator? Well, as it turns out, sometimes it sure can. 🥴 In our latest blog post, see how Akamai researchers discovered a new PrivEsc technique affecting Active Directory. Full write-up: akamai.com/blog/security-…

Can a DHCP administrator become a domain administrator? Well, as it turns out, sometimes it sure can. 🥴

In our latest blog post, see how Akamai researchers discovered a new PrivEsc technique affecting Active Directory.

Full write-up:
akamai.com/blog/security-…
Ori David (@oridavid123) 's Twitter Profile Photo

Excited to share my third blog covering Microsoft DHCP! This time we go into the DHCP Administrators group, while exploring the question: Can a DHCP admin become a Domain admin? (Spoiler alert: Pretty often!) Get the full details here: akamai.com/blog/security-…

RedTeamVillage (@redteamvillage_) 's Twitter Profile Photo

🚀 Dive into Kubernetes security with Tomer Peled at RTV during DEF CON 32! Join us for "Thinking Outside the Kube - Finding and Exploiting Command Injections in Kubernetes". 📅 Aug 9, 2024, 4:00 PM 📍 Narrows (Track 4)

🚀 Dive into Kubernetes security with <a href="/TomerPeled92/">Tomer Peled</a> at RTV during <a href="/defcon/">DEF CON</a> 32! Join us for "Thinking Outside the Kube - Finding and Exploiting Command Injections in Kubernetes".

📅 Aug 9, 2024, 4:00 PM
📍 Narrows (Track 4)
Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Akamai researcher Tomer Peled discovered a design flaw in Kubernetes sidecar project Gitsync that could allow for command injection. No patch was assigned 👀 He originally presented his findings at DEF CON, and the full write-up is now available: akamai.com/blog/security-…

0patch (@0patch) 's Twitter Profile Photo

We would like to thank Tomer Peled (Tomer Peled) of Akamai Technologies for sharing details of CVE-2024-38030. This prompted us to take a deeper look at theme files, and allowed us to create micropatches to fix this additional issue for 0patch users.

Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Sometimes features intended for good can be used maliciously. 🫤 Read how Tomer Peled discovered an attack technique within Microsoft UI Automation that evades EDR. 👀 One of the possible outcomes is theft of credit card information. akamai.com/blog/security-…

Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Since 2023, 12 security vulnerabilities were discovered in Kubernetes. 4 of those were identified by our very own Tomer Peled. Ready for another one? This one is in Log Query and can achieve RCE with SYSTEM privileges on all endpoints in the cluster. akamai.com/blog/security-…

Since 2023, 12 security vulnerabilities were discovered in Kubernetes. 4 of those were identified by our very own <a href="/TomerPeled92/">Tomer Peled</a>.  Ready for another one?

This one is in Log Query and can achieve RCE with SYSTEM privileges on all endpoints in the cluster.

akamai.com/blog/security-…
Akamai Technologies (@akamai) 's Twitter Profile Photo

A vulnerability in Kubernetes allows remote code execution. Read how abusing Log Query can lead to a complete takeover of all Windows nodes in a cluster. ow.ly/qZf150UM7zg

A vulnerability in Kubernetes allows remote code execution. Read how abusing Log Query can lead to a complete takeover of all Windows nodes in a cluster. ow.ly/qZf150UM7zg
Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Turns out that sharing is not ALWAYS caring 😬 Akamai SIG's latest blog post shows how shared credentials in third-party code opened the door to attackers. Learn what went wrong—and how to prevent it: akamai.com/blog/security-…

Turns out that sharing is not ALWAYS caring 😬

Akamai SIG's latest blog post shows how shared credentials in third-party code opened the door to attackers. 

Learn what went wrong—and how to prevent it:

akamai.com/blog/security-…
Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

This is a wild one. 🏜️ The Coyote malware is now abusing UI Automation (UIA) - marking the first known case of UIA abuse observed in the wild. 👀 Defenders pay attention - this novel technique can have serious implications. Full details here: akamai.com/blog/security-…

Hackread.com (@hackread) 's Twitter Profile Photo

Coyote banking trojan becomes first to exploit Microsoft UI Automation in active attacks against banks and crypto platforms. Read: hackread.com/coyote-trojan-… #CyberSecurity #Coyote #Banking #Trokan #Malware