ethicalhack3r
banner
ethicalhack3r.bsky.social
ethicalhack3r
@ethicalhack3r.bsky.social
200 followers 140 following 130 posts
Founder of Damn Vulnerable Web App (DVWA) Founder of WPScan (acquired by Automattic) Check out my new project! https://kevintel.com
Posts Media Videos Starter Packs
Reposted by ethicalhack3r
Unfortunately, CyberAlerts is not profitable as a business and it is time to shut it down.

This has not been an easy decision. After 6+ months of costs and no income, it is not sustainable.

Will be taken offline and your user data permanently deleted on June 30th, 2025.
Two CVEs have been assigned to the vulnerabilities in vBulletin 5.0.0 through 6.0.3 found by Karma(In)Security

• CVE-2025-48827
• CVE-2025-48828

These vulnerabilities were detected being exploited in the wild by the KEVIntel sensors on May 26th.
Great news! Added an extra 29 historical WordPress KEVs to KEVIntel!

If you have a Pro API subscription, these all have the "wordpress" tag.

Also, have you noticed CISA's next incremental number? Who's betting they only add just one new KEV next time? 😅
This morning I added 190 historical KEVs to KEVIntel, bringing the total count of KEVs to 1648. At the time of writing, that's 313 more than CISA.
Reposted by ethicalhack3r
Meta just landed a $167M verdict against NSO Group for their WhatsApp hack
• NSO's Pegasus spyware infected 1,400 WhatsApp users
• Zero-click attack (phone to be ON)
• Damages awarded = 3x NSO's annual R&D budget
• Meta's sharing court depositions publicly
www.theregister.com/2025/05/06/n...
NSO Group must pay Meta $168M in WhatsApp spy case
: Don't f&#k with Zuck
www.theregister.com
Good morning!

Two new KEVs this morning:

- CVE-2024-6047
- CVE-2024-11120

Both Unauthenticated OS Command Injection affecting GeoVision EOL devices.
Top 5 Worst of Worst (WoW) vulnerabilities within the past month.

What I would consider the most likely to be exploited (not including the prevalence of the product, which would make a big difference).

You should definitely patch these!
“The cyber criminals claim to have the private information of 20 million people wo signed up to Co-op's membership scheme, but the firm would not confirm that number.”

www.bbc.com/news/article...
Co-op hackers stole 'significant' amount of customer data
The firm previously said there was 'no evidence that customer data was compromised'.
www.bbc.com
Ha! Nice DVWA meme in latest WatchTowr blog post

cc @digi.ninja
Reposted by ethicalhack3r
Today is our last big ticket drop.

9am, 12pm, 7pm main event tickets

1pm kids track tickets

ti.to/steelcon/2025

You can see our speaker list here:

www.steelcon.info/the-event/ta...

Workshops tickets will be next week once the dust settles.
Talks | SteelCon
www.steelcon.info
Two new KEVs on KEVIntel this morning

- CVE-2024-38475 (Apache Software Foundation)
- CVE-2023-44221 (SonicWall)

kevintel.com
🚨 KEVIntel is live!

Known Exploited Vulnerabilities Intel

Open access via RSS, API, or CSV.

Enriched with EPSS scores, exploits, PoCs, and more.

Built for defenders.

🔗 Explore now: kevintel.com

#infosec #cybersecurity #threatintel
KEVIntel
kevintel.com
Known Exploited Vulnerabilities Intel

kevintel.com
Haha, thanks Justin

It’s Menorca. I would recommend it if you’re ever close by!
Not a bad place to take a couple of hours break from coding
Reposted by ethicalhack3r
CVE-2025-32432: Craft CMS Allows Remote Code Execution

Marked as known exploited.

Metasploit module also available.

cyberalerts.io/vulnerabilit...
SAP NetWeaver missing authorization has been marked as known exploited in CyberAlerts KEV

CVE-2025-31324

cyberalerts.io/kev
Thanks! Will look into gas pump!

Kibana Alerting is disabled in T-POT by default, so going to look into how to enable it.

And maybe link some more sensors up in different geo locations.
For anyone using T-Pot Honeypot, any cool tips/tricks/hacks I should know about?
Why didnt they release a statement like this during the panic? 🤔
“Recent public reporting inaccurately implied the program was at risk due to a lack of funding. To set the record straight, there was no funding issue, but rather a contract administration issue that was resolved prior to a contract lapse.“ - CISA

www.cisa.gov/news-events/...
Statement from Matt Hartman on the CVE Program | CISA
www.cisa.gov