Netlas.io – Telegram
Netlas.io
2.04K subscribers
347 photos
3 videos
474 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
🎄🎅🏼❄️ Netlas v1.5.1

We introduce Daily Internet Scan Data Snapshots — time-bounded datasets containing all scan results collected within a 24-hour period.

Plus:
🏷️ improved technology tags
💭 visual mapping hints

👉 Check full changelog here: https://docs.netlas.io/changelog/
🔥6👍1
❗️Technical Issue Alert❗️

Due to issues with database cluster, Netlas is temporarily suspended to reboot the affected nodes.

Our team is working hard to resolve the issue as quickly as possible.

👉 You can also follow the Netlas status on the corresponding page: https://status.netlas.io/

We sincerely apologize for the inconvenience and appreciate your patience 🙏
💊4
📌 Software Supply Chain Attacks — how trust breaks, and how to fix it

Modern apps lean on open-source packages, registries, clouds, and CI/CD. When any upstream link is compromised, clean projects ship trojanized code — as in the CCleaner incident. This explainer maps where trust fails and what to harden.

What’s inside:

1️⃣ The chain itself: repos, dependency managers, CI/CD, artifact storage — and the weak assumptions they rely on.
2️⃣ How attacks land: stolen maintainer accounts, poisoned updates, abused credentials, and automated pulls.
3️⃣ Case in point: a signed build gone rogue (CCleaner) shows why “official” isn’t always safe.
4️⃣ Mitigations that matter: SBOMs, provenance and signed builds to verify what you ship and where it came from.

👉 Full article here: https://netlas.io/blog/supply_chain_attack/
1👾43
📌 Bug Bounty 101 — a complete 2026 roadmap for beginners

Netlas’ new guide cuts through the “dead vs $100k” hype: bug bounty isn’t dead, it’s just more mature. Success now comes from smart target selection, solid recon, manual testing, and reports that get accepted.

What’s inside:

1️⃣ Prerequisites checklist: networking, HTTP basics, light coding, core vulns, and why patience/focus matter.
2️⃣ Picking targets: start with VDPs and less-crowded programs; use HackerOne/Bugcrowd/Intigriti and Google dorks to find scopes; stick to one target.
3️⃣ Recon that works: org WHOIS → asset mapping → subdomains; customize your flow, with a concrete Netlas example and CLI tips.
4️⃣ Hunting methodology: build product knowledge first; use a single multi-signal test string to probe inputs; avoid blind payload spam.
5️⃣ Reports that get paid and beginner mistakes to avoid, plus a practical 60-day plan to your first live finding.

👉 Read here: https://netlas.io/blog/bug_bounty_roadmap/
1🔥3👾3
CVE-2025-37165, -37166: Multiple vulnerabilities in Aruba, 7.5 rating❗️

Vulnerabilities in Aruba HPE allow an attacker to perform a DoS or gain knowledge of the internal network configuration.

Search at Netlas.io:
👉 Link: https://nt.ls/AlIHR
👉 Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753

Vendor's advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04988en_us&docLocale=en_US#hpesbnw04988-rev-1-hpe-networking-instant-on-multi-0
1👾3🔥1
CVE-2025-13927, -13928, -13335, CVE-2026-0723, -1102: Multiple vulnerabilitites in GitLab, 3.1 - 7.5 rating❗️

Several recent vulnerabilities in GitLab include DoS, Incorrect Authorization, and other issues.

Search at Netlas.io:
👉 Link: https://nt.ls/5JrG3
👉 Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/
👾3
CVE-2025-59718, -59719: Improper Verification of Cryptographic Signature in Fortinet devices, 9.8 rating 🔥

Fortinet researchers have discovered instances of exploitation of last year's vulnerabilities that bypassed patches. We recommend reviewing the mitigation recommendations.

Search at Netlas.io:
👉 Link: https://nt.ls/X38VT
👉 Dork: http.favicon.hash_sha256:d18b3c9feb76c3c1cfdcc51c732f113327e3c33fb3f63b479951f7da6ed1216f

Vendor's advisory: https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios
🔥2👾2
Top 10 Critical Threat Actors - who they are, how they operate, how to respond 📌

Netlas distills the ten most consequential adversaries shaping 2026 risk. For each actor you get a clean snapshot: motives, preferred targets, initial-access methods, tooling/C2 habits, notable intrusions, and concrete detections/mitigations.

What’s inside:
Clear selection criteria (impact, capability, tempo, cross-sector reach) for each actor.
🛠️ Playbook patterns you’ll actually see: phishing & social engineering, supply-chain/third-party abuse, cloud & SaaS compromise, data theft and extortion.
🌐 Infrastructure habits: rotating domains/hosts, abuse of legitimate services, and operational security tells defenders can hunt for.
🏛️ Sector focus: government, finance, telco, healthcare, manufacturing, and critical infrastructure - with risk notes per vertical.
🔐Copy-paste defenses: phishing-resistant MFA, hardening endpoints and SaaS, egress/DNS controls, backup immutability, logging that supports fast IR, and tabletop exercises mapped to these actors.

A practical brief for CISOs, IR leads, and engineering managers planning 2026 controls.

👉 Read now: https://netlas.io/blog/top_10_critical_threat_actors/
🔥51
📌 Inside ClickFix: how fake prompts took over the web

Fake CAPTCHAs and “verification” pages coax users into pasting system commands via trusted tools like Run or PowerShell. No exploit, no download — the victim executes the payload themselves, sidestepping many defenses.

What’s inside
1️⃣ The evolution: from simple error popups to polished reCAPTCHA/Turnstile clones, OS-aware pages, and video walk-throughs that raise urgency.
2️⃣ Scale of the problem: ESET tracked a 517% rise (H2’24→H1’25); ClickFix-style lures now account for ~8% of blocked attacks.
3️⃣ APT adoption: ClearFake, TA571, Lazarus, Kimsuky, Callisto/Sednit, MuddyWater, APT36 — cross-platform, high-impact use.
4️⃣ Anatomy of an attack: delivery → deceptive prompt → clipboard injection → user-initiated execution → payload retrieval.
5️⃣ Real-world sample: a faux CAPTCHA plants a VBS downloader command, then runs the fetched noscript from %TEMP%.
6️⃣ Why it lands: Microsoft’s 2025 report calls ClickFix the top initial-access vector, tied to 47% of recorded intrusions.

Bonus: the article includes hunting tips and how to stop these chains at scale. 🔎🛡️

👉 Read here: https://netlas.io/blog/fake_prompts/
🔥4👾21👍1
CVE-2026-1281, -1340: Two vulnerabilities in Ivanti EPMM, 9.8 rating 🔥

Two recent vulnerabilities in Ivanti EPMM allow attackers to perform RCE. Cases have already been reported in the wild!

Search at Netlas.io:
👉 Link: https://nt.ls/EbWv1
👉 Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")

Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
👾4🔥21👍1
CVE-2026-1207, -1285, -1287 and other: Multiple vulnerabilities in Django Framework, 5.3 - 7.5 rating❗️

Several vulnerabilities in Django allow attackers to perform SQL injection and DoS attacks.

Search at Netlas.io:
👉 Link: https://nt.ls/SOxq1
👉 Dork: tag.name:"django"

Vendor's advisory: https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
🔥4👍1👾1
📌 Top 10 Hacking Devices for Ethical Hackers in 2026

Here is a practical guide to the hardware pentesting toolkit that keeps showing up in real engagements: what each device does, what it’s good for, and where the legal/ethical lines are.

What you’ll get from the list:
1️⃣ Flipper Zero 🐬: a pocket multi-tool for Sub-GHz, RFID/NFC, IR and more, plus real-world examples of signal abuse.
2️⃣ USB Rubber Ducky 🦆: HID “keyboard” injection that turns physical access into instant noscripted actions.
3️⃣ Wi-Fi / wireless pentest gear 📡: purpose-built tools for testing how networks handle rogue access points and user behavior.
4️⃣ RFID/NFC specialists 🎫: devices like Proxmark3 for assessing badge systems and weak access control tech.
5️⃣ SDR hardware 📻: HackRF and friends for exploring radio-based attack surfaces beyond “normal” Wi-Fi/Bluetooth.
6️⃣ Clear boundaries ⚖️: what’s generally legal to own vs. what becomes illegal fast without written permission and scope.

If you’re building a red-team kit (or defending against these exact techniques), this one’s a solid bookmark. 🔎🛡️

👉 Read here: https://netlas.io/blog/top_10_hacking_devices_2026/
🔥3👾3👍2