Praetorian (@praetorianlabs) 's Twitter Profile
Praetorian

@praetorianlabs

Praetorian provides a suite of #security solutions that enable clients to solve #cybersecurity problems across their #enterprise and product portfolios.

ID: 228835232

linkhttps://www.praetorian.com calendar_today20-12-2010 20:20:21

1,1K Tweet

8,8K Followers

1,1K Following

Praetorian (@praetorianlabs) 's Twitter Profile Photo

🚨 We have released an improved Nuclei template that more accurately detects the unauthenticated RCE vulnerability in Ingress NGINX Controller for Kubernetes. See why this is important and access the template via our latest blog: praetorian.com/blog/an-improv…

Praetorian (@praetorianlabs) 's Twitter Profile Photo

In just 1.022 seconds, a token exposure created a seam that could have lead to a large-scale supply chain attack - a la tj-actions. Join us on 4/10 as we walk through CodeQLEAKED, how it was uncovered, and how you can find similar vulns in the future 🐴 praetorian.com/resources/unpa…

Praetorian (@praetorianlabs) 's Twitter Profile Photo

Stoked for next week's "Securing GenAI Applications" session at hashtag#VulnCon! We'll get our hands dirty breaking into a vulnerable GenAI app with an emphasis on the OWASP Top 10 for LLM Apps! Reg here: first.org/conference/vul… #vulncon FIRST.org

Stoked for next week's "Securing GenAI Applications" session at hashtag#VulnCon! We'll get our hands dirty breaking into a vulnerable GenAI app with an emphasis on the OWASP Top 10 for LLM Apps!

Reg here: first.org/conference/vul…

#vulncon <a href="/FIRSTdotOrg/">FIRST.org</a>
Praetorian (@praetorianlabs) 's Twitter Profile Photo

⭐️ Strong showing at FIRST.org's #VulnCon for Praetorian's Director of OffSec L&D session - Breaking the Bot: GenAI Web App Attack Surface & Exploitation. Don't fret, you can catch Ken IRL at plenty of events in the not-so-distant future. Check it : praetorian.com/speaking-and-e…

⭐️ Strong showing at <a href="/FIRSTdotOrg/">FIRST.org</a>'s #VulnCon for Praetorian's Director of OffSec L&amp;D session - Breaking the Bot: GenAI Web App Attack Surface &amp; Exploitation.

Don't fret, you can catch Ken IRL at plenty of events in the not-so-distant future.

Check it : praetorian.com/speaking-and-e…
Michelle Rhodes (@mircyberrecruit) 's Twitter Profile Photo

Skills can be taught. Tools change. Principles? That's what holds Praetorian together. Our culture is built on this foundation. Learn how being guardians of talent guides everything we do: rb.gy/0q5l0s #PraetorianLife

Praetorian (@praetorianlabs) 's Twitter Profile Photo

That DICOM vulnerability allowing code in medical images? It's not just Windows. Our ELFDICOM PoC extends the threat to Linux systems in healthcare via polyglot (ELF+DICOM) malware. Novel attack path analysis: praetorian.com/blog/elfdicom-…

Praetorian (@praetorianlabs) 's Twitter Profile Photo

Praetorian research found RCE & code smuggling vulns in Node.js CI/CD (GitHub/Jenkins). If it happened there, are your pipelines secure? Kudos Node.js for the swift fix! Full details: praetorian.com/blog/agent-of-… #AppSec #RSAC #RSAC2025

Praetorian (@praetorianlabs) 's Twitter Profile Photo

Our HackSpaceCon takeover was a success 🚀🚀🚀🚀🚀🚀 Big thanks to all of our workshop participants and presentation attendees! Be sure to follow our in-person events calendar to find opportunities to connect with us in the future: praetorian.com/speaking-and-e…

Our <a href="/HackSpaceCon/">HackSpaceCon</a>  takeover was a success 🚀🚀🚀🚀🚀🚀

Big thanks to all of our workshop participants and presentation attendees!

Be sure to follow our in-person events calendar to find opportunities to connect with us in the future: praetorian.com/speaking-and-e…
Praetorian (@praetorianlabs) 's Twitter Profile Photo

.THOTCON! , we're comin' for ya!!! Attendees will get the chance to catch a (final) encore of our training, "Breaking the Bot: GenAI Web App Attack Surface & Exploitation." We'll also be debuting a never-before-seen lateral movement technique for domain-joined Linux machines.

.<a href="/thotcon/">THOTCON!</a> , we're comin' for ya!!!

Attendees will get the chance to catch a (final) encore of our training, "Breaking the Bot: GenAI Web App Attack Surface &amp; Exploitation."

We'll also be debuting a never-before-seen lateral movement technique for domain-joined Linux machines.
Praetorian (@praetorianlabs) 's Twitter Profile Photo

You wouldn't download a vape.... but if you're a Prae engineer in front of a HackSpaceCon then you might reverse engineer one in a bar 🤔 Our latest blog breaks down the entire journey - from initial teardown to discovering the surprising architecture inside consumer vaping

Praetorian (@praetorianlabs) 's Twitter Profile Photo

Last week's THOTCON! crowds were all smiles. Thanks to everyone who came out for any or all of our three sessions. See you next year 😄

Last week's <a href="/thotcon/">THOTCON!</a>  crowds were all smiles.

Thanks to everyone who came out for any or all of our three sessions.

See you next year 😄
Praetorian (@praetorianlabs) 's Twitter Profile Photo

🚨 New attack disclosed: GitHub Device Code Phishing John, Matt, and Mason reveal how they've been using this technique to compromise F500 orgs with high success rates. 📖 Blog covers methodology, red team case studies & detection strategies praetorian.com/blog/introduci…

Praetorian (@praetorianlabs) 's Twitter Profile Photo

The Lockstep team are bringing back their annual #BlackHat party in Vegas on Weds, Aug 6th! Food, drinks, DJ, and good people - including our CEO, Nathan Sportsman! Space is limited - register now to 🔒 in your spot: lu.ma/zi3psuxr #BlackHat2025 #BHUSA

The <a href="/lockstepvc/">Lockstep</a>  team are bringing back their annual #BlackHat party in Vegas on Weds, Aug 6th! Food, drinks, DJ, and good people - including our CEO, Nathan Sportsman! 

Space is limited - register now to 🔒 in your spot: lu.ma/zi3psuxr

#BlackHat2025 #BHUSA
Will Schroeder (@harmj0y) 's Twitter Profile Photo

One of the fun things we did for the Nemesis 2.0 release was heavily optimizing our usage of Praetorian' Nosey Parker. Specifically, instead of calling the binary to scan + recalling to retrieve structured data all wrapped in a Python API as before, we now 1/3

Praetorian (@praetorianlabs) 's Twitter Profile Photo

🚨 GitPhish is now open source Our GitHub Device Code Phishing automation tool is live: 🕒 Dynamic device code generation 🚀 Auto GitHub Pages deployment 💻 CLI + web dashboard 🎯 Multi-target capability Learn more via our latest blog: praetorian.com/blog/gitphish-…

Praetorian (@praetorianlabs) 's Twitter Profile Photo

We've spent years researching and building tools for CICD security. Now, we're ready to knowledge dump at a 2-day hands-on training at Black Hat (Aug 2-3, 4-5): Learn more: praetorian.com/blog/ci-cd-tra…

Rad (@rad9800) 's Twitter Profile Photo

When we got access to Git[Hub,Lab] on Red Teams - it was almost always $$$. So it's pretty awesome to see a couple folk and friends over on my old RT running a training giving away the secret sauce we used to pwn these orgs! Mason Davis wrote up a post on more details on the