veritas (@blastbots) 's Twitter Profile
veritas

@blastbots

founder @nullpt_rs šŸ³ļøā€šŸŒˆ

ID: 981038096585314304

linkhttp://nullpt.rs calendar_today03-04-2018 05:18:03

6,6K Tweet

4,4K Followers

929 Following

alden (@birchb0y) 's Twitter Profile Photo

bella is an incredibly talented RE and would be a phenomenal addition to any team cannot vouch enough 🫔🫔

shubs (@infosec_au) 's Twitter Profile Photo

We recently looked deeper at the authentication bypass vulnerability in Next.js (CVE-2025-29927) and discovered some intelligent and comprehensive ways to check for the vulnerability. Read more in our blog post: slcyber.io/assetnote-secu…

We recently looked deeper at the authentication bypass vulnerability in Next.js (CVE-2025-29927) and discovered some intelligent and comprehensive ways to check for the vulnerability. Read more in our blog post: slcyber.io/assetnote-secu…
shubs (@infosec_au) 's Twitter Profile Photo

IT support software is often exposed on the ext. internet. Auditing the code of Halo ITSM, we found a sink that led to a critical pre-authentication SQLi. We reflect on how loose typing led to this vuln when compared to the rest of the codebase. Read more: slcyber.io/assetnote-secu…

alden (@birchb0y) 's Twitter Profile Photo

pwning my FTP server is a weird way to say you have a Crush on me but okay 🄰 anyways check out our analysis of some CrushFTP CVE-2025-31161 post exploitation activity! huntress.com/blog/crushftp-…

shubs (@infosec_au) 's Twitter Profile Photo

IP whitelisting is fundamentally broken. At Assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: github.com/assetnote/newt…

Cloudflare (@cloudflare) 's Twitter Profile Photo

It’s Content Independence Day: Cloudflare, along with a majority of the world's leading publishers and AI companies, is changing the default to block AI crawlers unless they pay creators for their content. cfl.re/3TjAjeY

shubs (@infosec_au) 's Twitter Profile Photo

Whenever I audit C# code, I look for benign file operations such as File.Exists(), especially if there's a preceding Path.Combine(). Read about how we leaked NTLM hashes pre-authentication in DotNetNuke (CVE-2025-52488) due to a perfect storm of issues. slcyber.io/assetnote-secu…

Whenever I audit C# code, I look for benign file operations such as File.Exists(), especially if there's a preceding Path.Combine(). Read about how we leaked NTLM hashes pre-authentication in DotNetNuke (CVE-2025-52488) due to a perfect storm of issues. slcyber.io/assetnote-secu…
Sam Curry (@samwcyo) 's Twitter Profile Photo

When applying for a job at McDonald's, over 90% of franchises use "Olivia," an AI-powered chatbot. We (Ian Carroll and I) discovered a vulnerability that could allow an attacker to access the over 64 million chat records using the password "123456". ian.sh/mcdonalds