Red Dog Security
reddogsecurity.bsky.social
Red Dog Security
@reddogsecurity.bsky.social
Cybersecurity Expert | Cyber Defense & Offensive Cybersecurity
Critical React Vulnerability Achieves Perfect 10 CVSS Score, Enables Unauthenticated Remote Code Execution
theexploitpost.com/critical-rea...
Critical React Vulnerability Achieves Perfect 10 CVSS Score, Enables Unauthenticated Remote Code Execution
A critical vulnerability in React has received a perfect 10.0 CVSS score, allowing attackers to execute code remotely on servers without authentication. The flaw, tracked as CVE-2025-55182 and dubbed ...
theexploitpost.com
December 5, 2025 at 2:24 PM
Reposted by Red Dog Security
They need to release this video to the public
December 4, 2025 at 4:06 PM
Some Cisco products are vulnerable to the critical Erlang/OTP bug

Cisco developers are investigating the impact of the critical CVE-2025-32433 vulnerability related to remote code execution in Erlang/OTP on their products.

https://buff.ly/alNI2cf
Some Cisco products are vulnerable to the critical Erlang/OTP bug
Cisco developers are investigating the impact of a critical vulnerability, CVE-2025-32433, related to remote code execution in Erlang/OTP, on their products.
buff.ly
May 2, 2025 at 9:45 PM
🎣 Phishing in Pentesting: Strategic OSINT 🎣
Phishing thrives on meticulous OSINT—email lists, corporate writing styles, and DNSBL checks when reusing infrastructure. Even the most secure teams have weak links.
https://shorturl.at/esTba
#CyberSecurity #Phishing #Pentesting
May 2, 2025 at 2:21 PM
Critical zero-day vulnerability in SAP NetWeaver received an emergency patch

SAP has released out-of-band patches for NetWeaver and fixed a zero-day remote code execution (RCE) vulnerability. It is assumed that this problem is already being exploited for attacks.

https://buff.ly/7iyaYyE
Critical zero-day vulnerability in SAP NetWeaver received an emergency patch
SAP has released unscheduled patches for NetWeaver, addressing a zero-day vulnerability linked to remote code execution (RCE).
buff.ly
May 1, 2025 at 9:24 PM
🎯 Social Engineering Targets Small Businesses 🎯
Mass attacks fail against big organizations, but small businesses often lack awareness, making them easy prey for tailored social engineering tactics.

https://shorturl.at/ec5Lb

#CyberSecurity #SocialEngineering #SmallBusiness
Unveiling Social Engineering: Tactics and Real-World Examples.
A Deep Dive into the Art of Deception and Techniques Used by Social Engineers.
shorturl.at
May 1, 2025 at 2:14 PM
An empty inetpub folder in Windows can block OS updates
Recently, Microsoft created an empty inetpub folder in Windows and asked users not to delete it, as it prevents the vulnerability from being exploited.

https://shorturl.at/qk90j
April 30, 2025 at 10:20 PM
🚨 Conficker: The Malware That Refused to Die 🚨
This infamous worm, persisting for over a decade, exposes the dangers of neglecting updates and weak cybersecurity. A global cautionary tale—its legacy reminds us to stay vigilant.

https://shorturl.at/YxLqJ
April 30, 2025 at 5:35 PM
🌐 Shodan: The Hacker's Search Engine 🌐
IoT devices like baby monitors and hospital equipment are exposed online for convenience, but at great risk. Shodan reveals hidden vulnerabilities.
https://shorturl.at/GW8MS
#CyberSecurity #Shodan #IoT #Vulnerabilities
Shodan: The Hacker’s Search Engine
Exploring Shodan: Unveiling IoT Vulnerabilities and the Internet’s Hidden Layers
shorturl.at
April 29, 2025 at 7:07 PM
🎣 Phishing: Know the Threats, Stay Secure 🎣
Phishing attacks exploit human psychology to steal data through fake emails and websites. Learn how social engineers target victims, their end goals, and tips to protect yourself.

https://shorturl.at/kSpGD

#CyberSecurity #Phishing #DataProtection
What is Phishing?
Understanding Phishing: Unmasking Tactics and Defenses Against Cyber Threats
shorturl.at
April 29, 2025 at 2:10 PM
Attacks often succeed long before they start, thanks to OSINT. From finding open doors to gathering critical data, open-source intelligence is key to reducing costs and boosting efficiency for attackers.

https://shorturl.at/g88pr

#CyberSecurity #OSINT #Reconnaissance
OSINT — Open-Source Intelligence
Unveiling the Power of OSINT: The Critical Reconnaissance Phase of Cybersecurity
shorturl.at
April 28, 2025 at 6:22 PM
🌐 DNS: Fake Records & Cyber Risks 🌐
DNS, the backbone of the web, can be exploited by fraudsters to hijack traffic, steal data, or create phishing sites. Imagine logging into a fake version of your bank!.

https://shorturl.at/b1qWH

#CyberSecurity #Phishing #DNS
DNS: Fake Records, Traffic Interception, and Other Horrors
Exposing the dark side of DNS: How fake records and traffic interception open the door to cybersecurity chaos.
shorturl.at
April 28, 2025 at 4:18 PM
🚨 Linux Kernel Vulnerability Alert 🚨
The io_uring interface allows rootkits to bypass security tools undetected. ARMO's Curing rootkit highlights the risks, prompting Google to disable io_uring by default on Android/ChromeOS.

https://shorturl.at/JnUD2

#Cybersecurity #LinuxKernel #io_uring
April 28, 2025 at 2:18 PM
The Most Important Cybersecurity Events of March: Keenetic Experienced a User Data Breach, Cloudflare Launched a Maze to Trap AI Crawlers, a Cascading Supply Chain Attack Was Discovered in GitHub Actions

https://shorturl.at/8MDau

#cybersecurity
The Most Important Cybersecurity Events of March
This Month’s Highlights
shorturl.at
April 2, 2025 at 10:08 PM
New Android Trojan "Crocodilus" Steals Banking and Cryptocurrency App Data
A new Android banking malware called Crocodilus is forcing users to hand over their cryptocurrency wallet seed phrases under the pretext of creating a backup.

https://shorturl.at/SlUf1
April 2, 2025 at 7:01 PM
Researchers find backdoor in Unitree Go1 robotic dog

German cybersecurity firm discovers undocumented remote access tunnel in popular Chinese-made robotic canine.

https://shorturl.at/GXMK5
April 2, 2025 at 5:00 PM
Hackers Hide Malware in WordPress Using MU-Plugins
Analysts at Sucuri have discovered that hackers are using the MU-plugins (Must-Use Plugins) directory in WordPress to conceal malicious code and execute it while avoiding detection.

https://shorturl.at/2Va4k

#wordpress, #osint, #AI, #cybersecurity
Exploiting WordPress MU-Plugins: A Growing Threat to Website Security
How Hackers Are Leveraging Must-Use Plugins to Deploy Malicious Payloads and Evade Detection
shorturl.at
April 1, 2025 at 6:10 PM