PT SWARM (@ptswarm) 's Twitter Profile
PT SWARM

@ptswarm

Positive Technologies Offensive Team

ID: 1280533400647086080

linkhttps://swarm.ptsecurity.com/ calendar_today07-07-2020 16:06:21

225 Tweet

18,18K Followers

144 Following

PT SWARM (@ptswarm) 's Twitter Profile Photo

🔥 ESET fixed CVE-2024-7400 found by our researcher Dmitriy Zuzlov! This is an LPE that affects 13 ESET solutions and allows a low-privileged attacker to delete arbitrary files, which can be used to obtain NT AUTHORITY\SYSTEM privileges! The advisory 👉 support.eset.com/en/ca8726-loca…

PT SWARM (@ptswarm) 's Twitter Profile Photo

📢 We’re hosting a major event in Vietnam 🇻🇳! 🎙️ As part of Hanoi Hacking Week, we're running a meetup for offensive & defensive sec pros and scouting for speakers! Evnt: hacking-week.com/hanoi/ CFP: cfp.standoff365.com/standoff-talks… 🌎 Intl.&local speakers welcome! Travel&stay covered.

📢 We’re hosting a major event in Vietnam 🇻🇳!

🎙️ As part of Hanoi Hacking Week, we're running a meetup for offensive & defensive sec pros and scouting for speakers!

Evnt: hacking-week.com/hanoi/
CFP: cfp.standoff365.com/standoff-talks…

🌎 Intl.&local speakers welcome! Travel&stay covered.
PT SWARM (@ptswarm) 's Twitter Profile Photo

🇻🇳 The Vietnam program is out! ➡️ phtalks.ptsecurity.com 📍 Hanoi, Vietnam 🗓️ Nov 29, 2024 UPD: Hacking Week is off due to org issues. Positive Hack Talks is on! 🎉 8 intl + 3 local speakers 🤩 Participant spots are still available—register now! No fees, just great talks!

PT SWARM (@ptswarm) 's Twitter Profile Photo

🎤✨ Our security researcher, Konstantin Polishin, presented “Red Team Social Engineering 2024: Initial Access TTP and Project Experience of Our Team” at #ROOTCON18 🚀 Recording: youtube.com/watch?v=6nnZJi…

🎤✨ Our security researcher, Konstantin Polishin, presented “Red Team Social Engineering 2024: Initial Access TTP and Project Experience of Our Team” at #ROOTCON18 🚀

Recording: youtube.com/watch?v=6nnZJi…
PT SWARM (@ptswarm) 's Twitter Profile Photo

🌏 We’re in Hanoi today for #PHTalks! 🇻🇳 It’s a live meetup about offensive and defensive security with amazing speakers: Hieu Minh Ngo (Hieupc), nikhil(niks), m4n0w4r, zhassulan zhussupov, our own Arseniy Sharoglazov, and many more! Around 200 people are here to learn. See you in your country soon!

🌏 We’re in Hanoi today for #PHTalks! 🇻🇳

It’s a live meetup about offensive and defensive security with amazing speakers: <a href="/HHieupc/">Hieu Minh Ngo (Hieupc)</a>, <a href="/niksthehacker/">nikhil(niks)</a>, <a href="/kienbigmummy/">m4n0w4r</a>, <a href="/cocomelonckz/">zhassulan zhussupov</a>, our own <a href="/_mohemiv/">Arseniy Sharoglazov</a>, and many more!

Around 200 people are here to learn. See you in your country soon!
PT SWARM (@ptswarm) 's Twitter Profile Photo

🆕 Check out our latest publication on DMA attacks via SD cards! 💾 The article was written by our researcher Gesser. ➡️ swarm.ptsecurity.com/new-dog-old-tr…

🆕 Check out our latest publication on DMA attacks via SD cards! 💾

The article was written by our researcher Gesser.

➡️ swarm.ptsecurity.com/new-dog-old-tr…
PT SWARM (@ptswarm) 's Twitter Profile Photo

🇻🇳 The Positive Hack Talks in Vietnam has finished! Slides from our researcher Arseniy Sharoglazov: static.ptsecurity.com/events/exch-vi… Wordlist: github.com/mohemiv/dodgyp… 🎁 Includes a PoC for MyQ Unauthenticated RCE! (CVE-2024-28059)

🇻🇳 The Positive Hack Talks in Vietnam has finished!

Slides from our researcher <a href="/_mohemiv/">Arseniy Sharoglazov</a>: static.ptsecurity.com/events/exch-vi…
Wordlist: github.com/mohemiv/dodgyp…

🎁 Includes a PoC for MyQ Unauthenticated RCE! (CVE-2024-28059)
PT SWARM (@ptswarm) 's Twitter Profile Photo

🇻🇳 From Positive Hack Talks in Hanoi: m4n0w4r on using IDA AppCall to deobfuscate malware! Learn how to: 1⃣ Recover hidden WinAPI names (e.g., #LokiBot) 2⃣ Extract strings & C&C addresses (e.g., #Emotet) Applicable to your samples! The slides 👉 static.ptsecurity.com/events/empower…

🇻🇳 From Positive Hack Talks in Hanoi: <a href="/kienbigmummy/">m4n0w4r</a> on using IDA AppCall to deobfuscate malware!

Learn how to:
1⃣ Recover hidden WinAPI names (e.g., #LokiBot)
2⃣ Extract strings &amp; C&amp;C addresses (e.g., #Emotet)

Applicable to your samples! The slides 👉 static.ptsecurity.com/events/empower…
PT SWARM (@ptswarm) 's Twitter Profile Photo

🎮 Xbox 360 security in details: the long way to RGH3. Read the exclusive story about the chipless and reliable Xbox 360 modding method by Alexey Shalpegin swarm.ptsecurity.com/xbox-360-secur… #Xbox360 #Modding #RGH3

🎮 Xbox 360 security in details: the long way to RGH3. Read the exclusive story about the chipless and reliable Xbox 360 modding method by <a href="/15432h/">Alexey Shalpegin</a>

swarm.ptsecurity.com/xbox-360-secur…

#Xbox360 #Modding #RGH3
PT SWARM (@ptswarm) 's Twitter Profile Photo

📢 Positive Hack Talks is heading to Egypt 🇪🇬! 📍 Cairo, Egypt 🗓️ Feb 26, 2025 We invite everyone to our in-person hacker event 😊 Sign up for CFP & Participants ⬇️ phtalks.ptsecurity.com

PT SWARM (@ptswarm) 's Twitter Profile Photo

🚀Positive Hack Talks is live in Cairo🇪🇬 The wait is over! Hackers, researchers, and enthusiasts are gathering for a day of knowledge-sharing and networking. 📍 Fairmont Nile City 🗓️ Feb 26, 2025 If you're here, tag us and share your experience! #PositiveHackTalks

🚀Positive Hack Talks is live in Cairo🇪🇬

The wait is over! Hackers, researchers, and enthusiasts are gathering for a day of knowledge-sharing and networking.

📍 Fairmont Nile City
🗓️ Feb 26, 2025

If you're here, tag us and share your experience! #PositiveHackTalks
PT SWARM (@ptswarm) 's Twitter Profile Photo

📟 Our researcher a1exdandy has uncovered vulnerabilities in GD32 microcontrollers (GigaDevice) that bypass protection mechanisms, allowing memory extraction. The article 👉 swarm.ptsecurity.com/gigavulnerabil…

📟 Our researcher a1exdandy has uncovered vulnerabilities in GD32 microcontrollers (GigaDevice) that bypass protection mechanisms, allowing memory extraction.

The article 👉 swarm.ptsecurity.com/gigavulnerabil…
PT SWARM (@ptswarm) 's Twitter Profile Photo

🔥 The "impossible" XXE in PHP? Not so impossible anymore. Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it. Read: swarm.ptsecurity.com/impossible-xxe…

🔥 The "impossible" XXE in PHP? Not so impossible anymore.

Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it.

Read: swarm.ptsecurity.com/impossible-xxe…
PT SWARM (@ptswarm) 's Twitter Profile Photo

🔥 Last barrier destroyed: The compromise of Fuse Encryption Key in Intel CPUs! Full story by our researcher Mark Ermolov swarm.ptsecurity.com/last-barrier-d…

🔥 Last barrier destroyed: The compromise of Fuse Encryption Key in Intel CPUs!

Full story by our researcher <a href="/_markel___/">Mark Ermolov</a>

swarm.ptsecurity.com/last-barrier-d…
PT SWARM (@ptswarm) 's Twitter Profile Photo

⚠️ We’ve reproduced CVE-2025-49113 in Roundcube. This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization. If you're running Roundcube — update immediately!