Michael Coppola (@mncoppola) 's Twitter Profile
Michael Coppola

@mncoppola

Vulnerability researcher

ID: 452695479

linkhttp://www.poppopret.org/ calendar_today02-01-2012 04:27:48

1,1K Tweet

2,2K Followers

522 Following

Qualys (@qualys) 's Twitter Profile Photo

The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…

Michael Coppola (@mncoppola) 's Twitter Profile Photo

Really enjoyed reading this rebuttal. It touches on a topic I hope to write more about in the future, that offense and defense are both necessary and must exist in balance with one another.

dunadan (@udunadan) 's Twitter Profile Photo

Much of what you see publicly reported probably wouldn't fly as a fully working exploit. It may be obvious when you look into a bug, it may not be; just finding it doesn't prove anything, and the skill to take it to a true exploit is completely different from bug hunting.

Michael Coppola (@mncoppola) 's Twitter Profile Photo

After 10 years, today is my last day at Trenchant (Azimuth). It has been a truly incredible experience and immense privilege to work alongside some of the best in this industry.

Michael Coppola (@mncoppola) 's Twitter Profile Photo

IMO the hallmark of a "senior" vuln researcher is not only their ability to discover/exploit vulnerabilities in difficult targets, but, critically, their ability to effectively *invest and allocate resources*. Knowing when to sink more time/effort into an attack surface or

SummerCon (@summerc0n) 's Twitter Profile Photo

Summercon 2025 Call for Papers Since 1987, Summercon has been where serious security research meets irreverent hacker culture. We're looking for original, technically rigorous presentations that challenge assumptions and advance the state of the art. CFP: summercon.org/cfp/

Ian Beer (@i41nbeer) 's Twitter Profile Photo

My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp - googleprojectzero.blogspot.com/2025/03/blasti…

Sean Heelan (@seanhn) 's Twitter Profile Photo

Exploit devs and professional vuln hunters: How many false positives from a tool are you willing to go through to find one real, exploitable, vulnerability? Assume triage of each bug report at least 10 minutes. (Please RT for reach)

Catalyst Security (@catalystsec) 's Twitter Profile Photo

We're excited to announce the formation of Catalyst Security! We're a new company started by a small group of experienced vulnerability researchers, focused solely on innovative research. catalystsecurity.com

Catalyst Security (@catalystsec) 's Twitter Profile Photo

We're currently hiring experienced researchers, particularly focusing on the areas of iOS, Android, Browser, and 0click. If you're interested, please reach out: <[email protected]>

Michael Coppola (@mncoppola) 's Twitter Profile Photo

I'm beyond excited to be a part of this team and share our new company Catalyst Security. We've assembled a small team of exceptionally skilled vulnerability researchers focused particularly on iOS, Android, Browser, and 0click. We are hiring senior researchers. If you're

Margin Research (@margin_research) 's Twitter Profile Photo

Excited to announce our collaboration with DiceGang to host an epic battle for hackers of all ages. This will be the inaugural event for QuendCon. See you in Brooklyn…. Stay tuned for more