Hi Robin, Iโve just tested it using a Romanian IP, and everything works fine on my end.
09.02.2026 14:07 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0@mariusavram.bsky.social
Cyber Security Enthusiast. Two sons' proud dad!
Hi Robin, Iโve just tested it using a Romanian IP, and everything works fine on my end.
09.02.2026 14:07 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0Notepad++ Hijacked by State-Sponsored Hackers notepad-plus-plus.org/news/hijacke...
02.02.2026 05:28 โ ๐ 0 ๐ 1 ๐ฌ 0 ๐ 0Poland CERT Report: Coordinated Cyber Sabotage Hits 30+ Wind/Solar Farms & CHP Plant (Dec 29, 2025) cert.pl/en/posts/202...
30.01.2026 14:52 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Weโre expanding localized pricing to Romania! ๐ท๐ด
Individual plan prices drop by 55%:
๐ธ Monthly: 20 USD โ 9 USD
๐ธ Yearly: 200 USD โ 90 USD
Know a hacker in Romania whoโs been waiting? Tag them๐
caido.io/pricing?utm_...
Voting is now live for the top ten web hacking techniques of 2025! Grab a brew, browse the 61 quality nominations and cast your vote on the most creative and ground-breaking techniques:
portswigger.net/polls/top-10...
Overview of the page.
๐ก OWASP Secure Headers Project: We have added information and examples regarding the Trusted Types feature of the Content-Security-Policy header.
๐ owasp.org/www-project-...
#appsec #appsecurity #owasp_shp
Venezuela and Ukraine expose the clearest form of double standards in international politics,when similar actions are taken by different actors,they are judged by entirely different criteria.Those who condemn Russia for intervening in Ukraine often welcome or justify US intervention in Venezuela
05.01.2026 17:05 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Despite fixed borders, the United States claims ownership of the West. Trump says it openly, echoed by Marco Rubio, this is our hemisphere. Such words expose hegemony. Faced with Trumpโs illegal acts, the EU behaves as a complicit impostor, submissive, silent, ready to drag the West into barbarism
05.01.2026 11:53 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0When the US kidnaps a foreign president with Western applause, no law protects anyone. Iraq, Libya, Syria, Ukraine show wars are thefts of resources. Narco-terror claims mask oil and gold looting. Power rules, rights vanish, democracy is a lie!
05.01.2026 11:31 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0I don't understand how these clubs are allowed to operate, why fireworks are permitted indoors, why the ceilings are so highly flammable, and, more importantly, why there are no proper emergency exits. It is as if they are designed to be death traps. ๐คฆโโ๏ธ
02.01.2026 13:09 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0It happened in Romania under almost identical circumstances: the ceiling caught fire due to fireworks, killing over 60 people.
02.01.2026 13:09 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0Shlomo Kramer, co-founder of Check Point, Imperva, and Cato Networks, has stated that โitโs time to limit the First Amendment. We need to control all social platformsโฆ and take control of what they are saying.โ
02.01.2026 10:54 โ ๐ 8 ๐ 4 ๐ฌ 0 ๐ 9Turning List-Unsubscribe into an SSRF/XSS Gadget security.lauritz-holtmann.de/post/xss-ssr...
23.12.2025 14:55 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0How we pwned X (Twitter), Vercel, Cursor, Discord, and hundreds of companies through a supply-chain attack gist.github.com/hackermondev...
19.12.2025 08:28 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0Bypass CSP in a single click using my new Custom Action, powered by @renniepak.nl's excellent CSP bypass project.
16.12.2025 15:31 โ ๐ 12 ๐ 6 ๐ฌ 1 ๐ 0Meet AutoVader. It automates DOM Invader with Playwright Java and feeds results back into Burp. Faster client side bug hunting for everyone. ๐
thespanner.co.uk/autovader
Grok - Elon Musk's AI chatbot - has been caught handing out home addresses of ordinary individuals... on demand. ๏ฟผ
When asked, Grok was willing to provide step-by-step instructions on how to stalk these people...
Read more in my article on the Bitdefender blog: www.bitdefender.com/en-us/blog/h...
We now have a (draft) @metasploit-r7.bsky.social exploit module for the recent Fortinet FortiWeb vulns, chaining CVE-2025-64446 (auth bypass) + CVE-2025-58034 (command injection) to achieve unauthenticated RCE with root privileges: github.com/rapid7/metas...
21.11.2025 13:29 โ ๐ 20 ๐ 10 ๐ฌ 1 ๐ 0Introducing the OWASP Top 10:2025
owasp.org/Top10/2025/0...
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms. www.tenable.com/blog/hackedg...
05.11.2025 16:39 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Phrack 72 Has Been Published phrack.org/issues/72/1
19.08.2025 07:13 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0IP data on compromised instances shared in our Compromised Website report tagged 'fortiweb-compromised': www.shadowserver.org/what-we-do/n...
IP data on exposed instances is in our Device ID report: www.shadowserver.org/what-we-do/n... (device model is set to FortiWeb Management Interface)
true legend!
11.07.2025 15:59 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0opossum-attack.comย <-ย Opossum is a cross-protocol application layer desynchronization attack that affects TLS-based application protocols that rely on both opportunistic and implicit TLS. Among the affected protocols are HTTP, FTP, POP3, SMTP, LMTP and NNTP.
08.07.2025 16:08 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0British Hacker โIntelBrokerโ Faces $25M Cybercrime Charges www.justice.gov/usao-sdny/pr...
26.06.2025 03:41 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0Looks like old age finally finished the job and wiped out whatever was left of his brain, not that there was much to begin with. ๐ฌ
17.06.2025 09:52 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0Free EC2 tool for pentesting or anything.
github.com/random-robbi...
Finding an SOQL Injection 0-Day in Salesforce mastersplinter.work/research/sal...
11.06.2025 06:20 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0