Ethiack (@ethiack) 's Twitter Profile
Ethiack

@ethiack

Autonomous Ethical Hacking

ID: 1494707118712184832

linkhttps://ethiack.com calendar_today18-02-2022 16:15:29

348 Tweet

683 Followers

89 Following

Ethiack (@ethiack) 's Twitter Profile Photo

Can you sum up a cybersecurity event with a box of chocolates? Absolutely. At yesterday's Digital Operational Resilience Summit (DORS) by NOS SGPS, we brought a sweet reminder of why prevention is key: a chocolate box with the message:Ā ā€œUm pentest por dia, nĆ£o sabes o bem que te

Can you sum up a cybersecurity event with a box of chocolates? Absolutely.

At yesterday's Digital Operational Resilience Summit (DORS) by NOS SGPS, we brought a sweet reminder of why prevention is key: a chocolate box with the message:Ā ā€œUm pentest por dia, nĆ£o sabes o bem que te
BSidesLisbon (@bsideslisbon) 's Twitter Profile Photo

šŸ“¢šŸ“¢ Please welcome @Ethiack to BSidesLisbon as a CTF Sponsor. Thank you for supporting the community and being a part of this event! #BSidesLisbon2024

šŸ“¢šŸ“¢ Please welcome @Ethiack to BSidesLisbon as a CTF Sponsor.

Thank you for supporting the community and being a part of this event!

#BSidesLisbon2024
Ethiack (@ethiack) 's Twitter Profile Photo

⭐A huge milestone for us at Ethiack—raising €4M to advance our mission of making cybersecurity smarter, faster, and continuous with AI-powered Hackbots. This achievement is about more than funding, it’s a testament to the trust and confidence our clients, partners, and

⭐A huge milestone for us at Ethiack—raising €4M to advance our mission of making cybersecurity smarter, faster, and continuous with AI-powered Hackbots.

This achievement is about more than funding, it’s a testament to the trust and confidence our clients, partners, and
Ethiack (@ethiack) 's Twitter Profile Photo

From Bugs to Brilliance šŸ” There's no doubt that AI is taking bug bounty hunting to the next level. It’s no longer just a dream to create subdomain wordlists in seconds, automate reconnaissance, and let tools like Eyeballer handle HTTP responses because now you can focus on

From Bugs to Brilliance šŸ”

There's no doubt that AI is taking bug bounty hunting to the next level.

It’s no longer just a dream to create subdomain wordlists in seconds, automate reconnaissance, and let tools like Eyeballer handle HTTP responses because now you can focus on
Ethiack (@ethiack) 's Twitter Profile Photo

Hackbots are here, now what? šŸ¤– AI-driven tools are changing how vulnerabilities are discovered, making security testing faster and more scalable. But automation alone isn’t the answer. As highlighted in HackerOne latest article, our CTO, AndrĆ© (AndrĆ© Baptista), emphasizes that the

Hackbots are here, now what? šŸ¤–

AI-driven tools are changing how vulnerabilities are discovered, making security testing faster and more scalable. But automation alone isn’t the answer. As highlighted in <a href="/Hacker0x01/">HackerOne</a> latest article, our CTO, AndrĆ© (<a href="/0xacb/">AndrĆ© Baptista</a>), emphasizes that the
Ethiack (@ethiack) 's Twitter Profile Photo

Oscars, who? šŸ‘€ At our Ethiacker Awards 2024, we celebrate the best in cybersecurity, those who dare to push boundaries, discover vulnerabilities no one saw coming and make the digital world safer for everyone. A huge congratulations to this year’s winners! Your skill,

Oscars, who? šŸ‘€

At our Ethiacker Awards 2024, we celebrate the best in cybersecurity, those who dare to push boundaries, discover vulnerabilities no one saw coming and make the digital world safer for everyone.

A huge congratulations to this year’s winners! Your skill,
Ethiack (@ethiack) 's Twitter Profile Photo

šŸ”“ Next.js Middleware Authorization Bypass – CVE-2025-29927 CVE-2025-29927 exposes a flaw in Next.js middleware, allowing attackers to bypass authorization by manipulating request headers. This could grant unauthorized access to protected resources. WhileĀ Vercel deployments are

šŸ”“ Next.js Middleware Authorization Bypass – CVE-2025-29927

CVE-2025-29927 exposes a flaw in Next.js middleware, allowing attackers to bypass authorization by manipulating request headers. This could grant unauthorized access to protected resources.

WhileĀ Vercel deployments are
AndrƩ Baptista (@0xacb) 's Twitter Profile Photo

If like me, you're sick of copying and pasting from ChatGPT, you should check out Simon Willison's LLM tool.Ā  It lets you keep everything within the terminal and write output directly into files.Ā  It's got some šŸ”„ features too šŸ‘‰ github.com/simonw/llm

If like me, you're sick of copying and pasting from ChatGPT, you should check out <a href="/simonw/">Simon Willison</a>'s LLM tool.Ā 

It lets you keep everything within the terminal and write output directly into files.Ā 

It's got some šŸ”„ features too šŸ‘‰ github.com/simonw/llm
AndrƩ Baptista (@0xacb) 's Twitter Profile Photo

Here's a challenge. There are at least two valid solutions! Solve it to discover a nice bug bounty tip! Play here šŸ‘‰ challenges.ethiack.ninja/leak-the-secre…

Here's a challenge. There are at least two valid solutions!

Solve it to discover a nice bug bounty tip!

Play here šŸ‘‰ challenges.ethiack.ninja/leak-the-secre…
Ethiack (@ethiack) 's Twitter Profile Photo

You can't secure the shadows šŸ”¦ Introducing Ethiack's Visualizer, a game-changing upgrade that maps your entire attack surface in an intuitive graph view (even 2D/3D!). See asset relationships, vulnerability severity, and third-party risks clearly. Finally, true visibility for

Ethiack (@ethiack) 's Twitter Profile Photo

We have a massive update to share: we’ve just upgraded our hacking engine, and Artiacker 2.0 is live āš”ļø This upgrade has been months in the making, and it's all about what matters most: better reconnaissance, more actionable findings, and higher precision in identifying

We have a massive update to share: we’ve just upgraded our hacking engine, and Artiacker 2.0 is live āš”ļø

This upgrade has been months in the making, and it's all about what matters most: better reconnaissance, more actionable findings, and higher precision in identifying
Ethiack (@ethiack) 's Twitter Profile Photo

AI won’t replace hackers. But it’s changing everything. We published our full guide from the ā€œAI for Ethical Hackingā€ workshop on C-DAYS: tutorials, tools, CTFs & live demos from LLM fuzzing to autonomous hackbots. Read + hack now: blog.ethiack.com/blog/dont-fear…