π₯Happening Nowπ₯
Cyber Session
@CSEC_ASTU
#GrowthJourney #csecastu #cyberdivision #SESSION
Advent of Cyber: Let the hacks begin the challenge is live, and weβre diving in day by day.
Cyber Session
@CSEC_ASTU
#GrowthJourney #csecastu #cyberdivision #SESSION
β€8π₯1
π₯ Happening Now! π₯
The special session where we will hack alongside Tyler Ramsby. Link
@CSEC_Cybersecurity
#CyberDivision #CyberSecurity #EthicalHacking #ContinuousLearning #Innovation #FutureLeaders #TechSession
The special session where we will hack alongside Tyler Ramsby. Link
Dive into real-time hacking, learn by doing, and elevate your cyber mastery! ππ₯
@CSEC_Cybersecurity
#CyberDivision #CyberSecurity #EthicalHacking #ContinuousLearning #Innovation #FutureLeaders #TechSession
β€4π3π₯1
Forwarded from Yekolo Temari (α¨αα α°ααͺ)
Critical A pre-authentication remote code in React and Next.js - CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
npm install next@latest or explicitly: npm install next@15.3.6
https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
Exploitation requires only a crafted HTTP request and has shown near-100% reliability in testing. The flaw stems from insecure deserialization in the RSC payload handling logic, allowing attacker-controlled data to influence server-side execution.
npm install next@latest or explicitly: npm install next@15.3.6
https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
wiz.io
React2Shell (CVE-2025-55182): Critical React Vulnerability | Wiz Blog
React2Shell (CVE-2025-55182) is a critical RCE vulnerability in React Server Components. Learn which versions are impacted and how to mitigate.
π₯ Happening Now!
#CyberSecurity #CSEC_ASTU
Cyber Session on OS Command Injection by Lina Temam, how it works and how to stop it. π»βοΈ
#CyberSecurity #CSEC_ASTU
π₯4
Forwarded from CSEC ASTU
π₯ Happening Now!
File Upload Vulnerability session
@CSEC_Cybersecurity
#CyberSecurity #CSEC_ASTU
File Upload Vulnerability session
A deep dive into how insecure uploads are exploited and how to secure them. π»
@CSEC_Cybersecurity
#CyberSecurity #CSEC_ASTU
β€3π₯3
Forwarded from Yekolo Temari (α¨αα α°ααͺ)
#ETB #1.3 billion lost to digital fraud and #cyberattacks has increased by #115%, according to the National Bank of Ethiopia.
https://ethiopianreporter.com/148976/
#cybersecurity #fraud #cyberattack #yekolotemari
https://ethiopianreporter.com/148976/
#cybersecurity #fraud #cyberattack #yekolotemari
π€―2
π₯ Happening Now!
π‘ Login Brute Forcing
- Iman Bedru (Miss kal)
@CSEC_CyberSecurity
@CSEC_ASTU
#CyberSecurity #CSEC_ASTU #BruteForce #Login
π‘ Login Brute Forcing
Understanding how brute-force attacks work and how to defend against them. π»
- Iman Bedru (Miss kal)
@CSEC_CyberSecurity
@CSEC_ASTU
#CyberSecurity #CSEC_ASTU #BruteForce #Login
π₯8
Forwarded from CSEC ASTU
π₯Happening Nowπ₯
- Cyber Security Division
@CSEC_ASTU
@CSEC_CyberSecurity
#IDOR #CSEC_ASTU #GrowthJourney #cybersecurity
Understanding IDOR Vulnerabilities & Real-World Exploits.
- Cyber Security Division
@CSEC_ASTU
@CSEC_CyberSecurity
#IDOR #CSEC_ASTU #GrowthJourney #cybersecurity
π₯4
Forwarded from CSEC ASTU
π₯ Happening Now!
- Cyber Security Division
@CSEC_CyberSecurity
@CSEC_ASTU
#CyberSecurity #CSEC_ASTU
Insightful conversations, shared experiences, and security-minded thinking in action. π»
- Cyber Security Division
@CSEC_CyberSecurity
@CSEC_ASTU
#CyberSecurity #CSEC_ASTU
π₯3
CSEC Cybersecurity
π Get Ready for Another Thrilling CTF Night! π»π
Think you have what it takes to solve cybersecurity challenges and capture the flag? Join us this Monday for an exciting CTF!
π Location: B508, R10
π Day Dec-29-2025 on MONDAY
π Time: 2:30 night
π― What to Expect:
π΄ββ οΈ
Capture The Flag challenges
π Challenges designed for both beginners and intermediate players so if you're just starting your cyber journey, this is your moment!
π§ Learn, compete, grow your skills
π¨βπ» All skill levels welcome come try, have fun, and level up!
π¨ Donβt forget to bring your laptop! π¨
β οΈ β οΈ REGISTER β¬οΈ
REGISTER HERE
#CSEC_Cybersecurity #CSEC_ASTU #CTF_Night
π₯11β€1π₯°1
Forwarded from CSEC ASTU
π₯Sunday Tech Talk
π΅οΈββοΈ Why Your Computer Is a Terrible Liar & Hackers Know It ?
Ever asked:
If they say βNoβ instantly , you believe them. If they pauseβ¦ think look away then say βNoβ yeah, you already know the truth π
Guess what?
π» Computers behave the exact same way.
This is where Timing Attacks come inβ±οΈ
π‘ Boom. Clue found.
π§ Big lesson
Hackers donβt just listen to what systems say. They measure how long it takes to say it.
Security isnβt always about stronger locks. Sometimes itβs about hiding your reaction time.
What do you think ?
π₯ Join us:
π LinkedIn
π¬ Telegram
βΆοΈ YouTube
- Cyber Security Division
#CyberSecurity #TimingAttack #CSEC_ASTU
π΅οΈββοΈ Why Your Computer Is a Terrible Liar & Hackers Know It ?
Ever asked:
π βDid you eat my lunch?β π
If they say βNoβ instantly , you believe them. If they pauseβ¦ think look away then say βNoβ yeah, you already know the truth π
π» Computers behave the exact same way.
This is where Timing Attacks come inβ±οΈ
π― How hackers play the game:
Hacker tries a fake username: βAbc123β
β Server replies βAccess Deniedβ in 0.1 seconds
Hacker tries βAbebeβ
π€ Server thinks: βHmmβ¦ I know this nameβ¦ let me check the databaseβ
β Still says βAccess Deniedβ but this time in 1.2 seconds
π‘ Boom. Clue found.
Even though the message was the same, the time exposed the truth.π§ Big lesson
Hackers donβt just listen to what systems say. They measure how long it takes to say it.
Security isnβt always about stronger locks. Sometimes itβs about hiding your reaction time.
π₯ Join us:
π LinkedIn
π¬ Telegram
βΆοΈ YouTube
- Cyber Security Division
#CyberSecurity #TimingAttack #CSEC_ASTU
π6β€1