π₯ Happening Now π₯
@CSEC_Cybersecurity #HackTheBox #HTBMeetup #CyberSecurity #EthicalHacking #InfoSec #CSEC #Adama #TechCommunity
Cybersecurity minds are gathered for the Hack The Box Meetup β Adama.
Challenges are live β come learn, hack, and connect with the community.
@CSEC_Cybersecurity #HackTheBox #HTBMeetup #CyberSecurity #EthicalHacking #InfoSec #CSEC #Adama #TechCommunity
π₯7β€3β‘1
π₯Happening Nowπ₯
Cyber Session
@CSEC_ASTU
#GrowthJourney #csecastu #cyberdivision #SESSION
Advent of Cyber: Let the hacks begin the challenge is live, and weβre diving in day by day.
Cyber Session
@CSEC_ASTU
#GrowthJourney #csecastu #cyberdivision #SESSION
β€8π₯1
π₯ Happening Now! π₯
The special session where we will hack alongside Tyler Ramsby. Link
@CSEC_Cybersecurity
#CyberDivision #CyberSecurity #EthicalHacking #ContinuousLearning #Innovation #FutureLeaders #TechSession
The special session where we will hack alongside Tyler Ramsby. Link
Dive into real-time hacking, learn by doing, and elevate your cyber mastery! ππ₯
@CSEC_Cybersecurity
#CyberDivision #CyberSecurity #EthicalHacking #ContinuousLearning #Innovation #FutureLeaders #TechSession
β€4π3π₯1
Forwarded from Yekolo Temari (α¨αα α°ααͺ)
Critical A pre-authentication remote code in React and Next.js - CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
npm install next@latest or explicitly: npm install next@15.3.6
https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
Exploitation requires only a crafted HTTP request and has shown near-100% reliability in testing. The flaw stems from insecure deserialization in the RSC payload handling logic, allowing attacker-controlled data to influence server-side execution.
npm install next@latest or explicitly: npm install next@15.3.6
https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
wiz.io
React2Shell (CVE-2025-55182): Critical React Vulnerability | Wiz Blog
React2Shell (CVE-2025-55182) is a critical RCE vulnerability in React Server Components. Learn which versions are impacted and how to mitigate.
π₯ Happening Now!
#CyberSecurity #CSEC_ASTU
Cyber Session on OS Command Injection by Lina Temam, how it works and how to stop it. π»βοΈ
#CyberSecurity #CSEC_ASTU
π₯4
Forwarded from CSEC ASTU
π₯ Happening Now!
File Upload Vulnerability session
@CSEC_Cybersecurity
#CyberSecurity #CSEC_ASTU
File Upload Vulnerability session
A deep dive into how insecure uploads are exploited and how to secure them. π»
@CSEC_Cybersecurity
#CyberSecurity #CSEC_ASTU
β€3π₯3
Forwarded from Yekolo Temari (α¨αα α°ααͺ)
#ETB #1.3 billion lost to digital fraud and #cyberattacks has increased by #115%, according to the National Bank of Ethiopia.
https://ethiopianreporter.com/148976/
#cybersecurity #fraud #cyberattack #yekolotemari
https://ethiopianreporter.com/148976/
#cybersecurity #fraud #cyberattack #yekolotemari
π€―2
π₯ Happening Now!
π‘ Login Brute Forcing
- Iman Bedru (Miss kal)
@CSEC_CyberSecurity
@CSEC_ASTU
#CyberSecurity #CSEC_ASTU #BruteForce #Login
π‘ Login Brute Forcing
Understanding how brute-force attacks work and how to defend against them. π»
- Iman Bedru (Miss kal)
@CSEC_CyberSecurity
@CSEC_ASTU
#CyberSecurity #CSEC_ASTU #BruteForce #Login
π₯8