Netlas.io
2.08K subscribers
355 photos
3 videos
489 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
πŸ“Œ Software Supply Chain Attacks β€” how trust breaks, and how to fix it

Modern apps lean on open-source packages, registries, clouds, and CI/CD. When any upstream link is compromised, clean projects ship trojanized code β€” as in the CCleaner incident. This explainer maps where trust fails and what to harden.

What’s inside:

1️⃣ The chain itself: repos, dependency managers, CI/CD, artifact storage β€” and the weak assumptions they rely on.
2️⃣ How attacks land: stolen maintainer accounts, poisoned updates, abused credentials, and automated pulls.
3️⃣ Case in point: a signed build gone rogue (CCleaner) shows why β€œofficial” isn’t always safe.
4️⃣ Mitigations that matter: SBOMs, provenance and signed builds to verify what you ship and where it came from.

πŸ‘‰ Full article here: https://netlas.io/blog/supply_chain_attack/
1πŸ‘Ύ4❀3πŸ‘1
πŸ“Œ Bug Bounty 101 β€” a complete 2026 roadmap for beginners

Netlas’ new guide cuts through the β€œdead vs $100k” hype: bug bounty isn’t dead, it’s just more mature. Success now comes from smart target selection, solid recon, manual testing, and reports that get accepted.

What’s inside:

1️⃣ Prerequisites checklist: networking, HTTP basics, light coding, core vulns, and why patience/focus matter.
2️⃣ Picking targets: start with VDPs and less-crowded programs; use HackerOne/Bugcrowd/Intigriti and Google dorks to find scopes; stick to one target.
3️⃣ Recon that works: org WHOIS β†’ asset mapping β†’ subdomains; customize your flow, with a concrete Netlas example and CLI tips.
4️⃣ Hunting methodology: build product knowledge first; use a single multi-signal test string to probe inputs; avoid blind payload spam.
5️⃣ Reports that get paid and beginner mistakes to avoid, plus a practical 60-day plan to your first live finding.

πŸ‘‰ Read here: https://netlas.io/blog/bug_bounty_roadmap/
1πŸ”₯3πŸ‘Ύ3πŸ‘1
CVE-2025-37165, -37166: Multiple vulnerabilities in Aruba, 7.5 rating❗️

Vulnerabilities in Aruba HPE allow an attacker to perform a DoS or gain knowledge of the internal network configuration.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/AlIHR
πŸ‘‰ Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753

Vendor's advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04988en_us&docLocale=en_US#hpesbnw04988-rev-1-hpe-networking-instant-on-multi-0
1πŸ‘Ύ3πŸ”₯1
CVE-2025-13927, -13928, -13335, CVE-2026-0723, -1102: Multiple vulnerabilitites in GitLab, 3.1 - 7.5 rating❗️

Several recent vulnerabilities in GitLab include DoS, Incorrect Authorization, and other issues.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/5JrG3
πŸ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/
πŸ‘Ύ3
CVE-2025-59718, -59719: Improper Verification of Cryptographic Signature in Fortinet devices, 9.8 rating πŸ”₯

Fortinet researchers have discovered instances of exploitation of last year's vulnerabilities that bypassed patches. We recommend reviewing the mitigation recommendations.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/X38VT
πŸ‘‰ Dork: http.favicon.hash_sha256:d18b3c9feb76c3c1cfdcc51c732f113327e3c33fb3f63b479951f7da6ed1216f

Vendor's advisory: https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios
1πŸ”₯3πŸ‘Ύ3
Top 10 Critical Threat Actors - who they are, how they operate, how to respond πŸ“Œ

Netlas distills the ten most consequential adversaries shaping 2026 risk. For each actor you get a clean snapshot: motives, preferred targets, initial-access methods, tooling/C2 habits, notable intrusions, and concrete detections/mitigations.

What’s inside:
βœ… Clear selection criteria (impact, capability, tempo, cross-sector reach) for each actor.
πŸ› οΈ Playbook patterns you’ll actually see: phishing & social engineering, supply-chain/third-party abuse, cloud & SaaS compromise, data theft and extortion.
🌐 Infrastructure habits: rotating domains/hosts, abuse of legitimate services, and operational security tells defenders can hunt for.
πŸ›οΈ Sector focus: government, finance, telco, healthcare, manufacturing, and critical infrastructure - with risk notes per vertical.
πŸ”Copy-paste defenses: phishing-resistant MFA, hardening endpoints and SaaS, egress/DNS controls, backup immutability, logging that supports fast IR, and tabletop exercises mapped to these actors.

A practical brief for CISOs, IR leads, and engineering managers planning 2026 controls.

πŸ‘‰ Read now: https://netlas.io/blog/top_10_critical_threat_actors/
πŸ”₯6❀2πŸ‘1
πŸ“Œ Inside ClickFix: how fake prompts took over the web

Fake CAPTCHAs and β€œverification” pages coax users into pasting system commands via trusted tools like Run or PowerShell. No exploit, no download β€” the victim executes the payload themselves, sidestepping many defenses.

What’s inside
1️⃣ The evolution: from simple error popups to polished reCAPTCHA/Turnstile clones, OS-aware pages, and video walk-throughs that raise urgency.
2️⃣ Scale of the problem: ESET tracked a 517% rise (H2’24β†’H1’25); ClickFix-style lures now account for ~8% of blocked attacks.
3️⃣ APT adoption: ClearFake, TA571, Lazarus, Kimsuky, Callisto/Sednit, MuddyWater, APT36 β€” cross-platform, high-impact use.
4️⃣ Anatomy of an attack: delivery β†’ deceptive prompt β†’ clipboard injection β†’ user-initiated execution β†’ payload retrieval.
5️⃣ Real-world sample: a faux CAPTCHA plants a VBS downloader command, then runs the fetched script from %TEMP%.
6️⃣ Why it lands: Microsoft’s 2025 report calls ClickFix the top initial-access vector, tied to 47% of recorded intrusions.

Bonus: the article includes hunting tips and how to stop these chains at scale. πŸ”ŽπŸ›‘οΈ

πŸ‘‰ Read here: https://netlas.io/blog/fake_prompts/
πŸ”₯5πŸ‘Ύ3❀2πŸ‘2
CVE-2026-1281, -1340: Two vulnerabilities in Ivanti EPMM, 9.8 rating πŸ”₯

Two recent vulnerabilities in Ivanti EPMM allow attackers to perform RCE. Cases have already been reported in the wild!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/EbWv1
πŸ‘‰ Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")

Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
πŸ‘Ύ5πŸ‘3πŸ”₯3❀1
CVE-2026-1207, -1285, -1287 and other: Multiple vulnerabilities in Django Framework, 5.3 - 7.5 rating❗️

Several vulnerabilities in Django allow attackers to perform SQL injection and DoS attacks.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/SOxq1
πŸ‘‰ Dork: tag.name:"django"

Vendor's advisory: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
πŸ”₯5πŸ‘3πŸ‘Ύ2
πŸ“Œ Top 10 Hacking Devices for Ethical Hackers in 2026

Here is a practical guide to the hardware pentesting toolkit that keeps showing up in real engagements: what each device does, what it’s good for, and where the legal/ethical lines are.

What you’ll get from the list:
1️⃣ Flipper Zero 🐬: a pocket multi-tool for Sub-GHz, RFID/NFC, IR and more, plus real-world examples of signal abuse.
2️⃣ USB Rubber Ducky πŸ¦†: HID β€œkeyboard” injection that turns physical access into instant scripted actions.
3️⃣ Wi-Fi / wireless pentest gear πŸ“‘: purpose-built tools for testing how networks handle rogue access points and user behavior.
4️⃣ RFID/NFC specialists 🎫: devices like Proxmark3 for assessing badge systems and weak access control tech.
5️⃣ SDR hardware πŸ“»: HackRF and friends for exploring radio-based attack surfaces beyond β€œnormal” Wi-Fi/Bluetooth.
6️⃣ Clear boundaries βš–οΈ: what’s generally legal to own vs. what becomes illegal fast without written permission and scope.

If you’re building a red-team kit (or defending against these exact techniques), this one’s a solid bookmark. πŸ”ŽπŸ›‘οΈ

πŸ‘‰ Read here: https://netlas.io/blog/top_10_hacking_devices_2026/
1πŸ‘4πŸ”₯4πŸ‘Ύ4❀1
CVE-2026-1490: Vulnerability in CleanTalk WordPress plugin, 9.8 rating πŸ”₯

The vulnerability allows attackers to install any plugin on an affected website, which could be the first step in any attack chain.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/wZ4Qu
πŸ‘‰ Dork: http.body:"plugins/cleantalk-spam-protect"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/cleantalk-spam-protect/spam-protection-honeypot-anti-spam-by-cleantalk-671-authorization-bypass-via-reverse-dns-ptr-record-spoofing-to-unauthenticated-arbitrary-plugin-installation
1❀3πŸ‘3πŸ‘Ύ2
Netlas v1.6 is out

πŸ” Private Scanner now supports β€œScan all ports” β€” non-intrusive scans across 65,536 TCP ports.
πŸ†• Added CWMP protocol support.
⚠️ Breaking change: updated Discovery API response format for groups.

Details at https://docs.netlas.io/changelog/
1πŸ”₯5❀4πŸ‘2
Netlas Legal Update

We’ve revised the Netlas Terms & Conditions and API & Data License Agreement.
The updated terms take effect on March 6, 2026.

Details: https://netlas.io/blog/terms_updated/
πŸ‘3❀1✍1πŸ₯°1πŸ‘1
πŸ”„ Netlas and Uncover
The article has been updated. All commands were reviewed and tested.

πŸ‘‰πŸΌ Read the guide:
https://netlas.io/blog/netlas_and_uncover/
πŸ‘5❀3πŸ”₯3
⭐️ Ever wondered how professional threat intelligence feeds are actually built?

Our partners at RST Cloud pull back the curtain on their approach to threat hunting β€” revealing how they identify, track, and expand command-and-control (C2) infrastructure at scale.

πŸ” Inside the post:
β€’ How RST Cloud discovers malicious infrastructure in the wild
β€’ Techniques for linking isolated IoCs into meaningful threat clusters
β€’ The methodology behind building reliable, high-quality threat intelligence feeds
β€’ How Netlas data helps enrich and accelerate investigations

This is a rare look into the real workflows behind modern threat intelligence β€” straight from a team doing it every day.

πŸ•’ 5 min read

πŸ‘‰ https://netlas.io/blog/с2_hunting_by_rst_cloud/
πŸ‘3πŸ”₯2❀1
CVE-2026-3429, CVE-2026-4636 and others in Keycloak.

Several vulnerabilities in Keycloak allow attackers to bypass MFA, steal access tokens, and access confidential user data.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Ooqi1
πŸ‘‰ Dork: http.favicon.hash_sha256:47dcf1f1a8f1afd68297a294a263849069a7a62b2e86550241416c2cc56c5676

Vendor's advisory: https://www.keycloak.org/2026/04/keycloak-2657-released
πŸ”₯5
CVE-2026-0740: Vulnerability in Ninja Forms WordPress plugin, 9.8 rating

The vulnerability allows unauthenticated attackers to upload arbitrary files to a vulnerable site and achieve remote code execution.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/rkM7h
πŸ‘‰ Dork: http.body:"plugins/ninja-forms"

Read more: https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/
πŸ”₯6
πŸ”„ How to Find Unprotected Databases β€” Chapter 2

A Netlas beginner’s guide β€” now republished on our blog (moved from Medium). Reviewed and updated.

πŸ•’ 5 min read

πŸ‘‰ https://netlas.io/blog/how_to_find_unprotected_databases_chapter_2/
πŸ‘5❀1
CVE-2026-4112 and other: SQL injection and TOTP vulnerabilities in SonicWall SMA 1000 Series, up to 7.2 rating ❗️

The most severe vulnerability (SQL injection) allows remote authenticated attacker with read-only administrator privileges to escalate privileges to primary administrator.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/mzseI
πŸ‘‰ Dork: http.favicon.hash_sha256:6bb6f64adaa6a7ed4da10a2fe4edf4cb4d9914aa742c7ad607ca4ca678dcd3f1 OR certificate.subject_dn:"HTTPS Management Certificate for SonicWALL (self-signed)"

Vendor's advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0003
❀3πŸ”₯3
CVE-2026-5173, CVE-2026-1092, CVE-2025-12664 and other: Vulnerabilities in GitLab CE and EE, up to 8.5 rating πŸ”₯

Several vulnerabilities in GitLab could compromise code integrity and allow an unauthenticated user to cause denial of service.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/QGxUF
πŸ‘‰ Dork: http.title:"GitLab" OR http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef

Vendor's advisory: https://about.gitlab.com/releases/2026/04/08/patch-release-gitlab-18-10-3-released/
❀2πŸ”₯2πŸ‘1
CVE-2026-40175: Unrestricted Cloud Metadata Exfiltration in Axios, 10.0 rating 😱

A critical security vulnerability in Axios allows prototype pollution in any third-party dependency to be escalated into RCE or Full Cloud Compromise. PoC is now available!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/i7rT8
πŸ‘‰ Dork: tag.name:"axios"

Read more:
https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx
πŸ”₯5❀2