Netlas.io
2.02K subscribers
344 photos
3 videos
468 links
Explore the latest in cybersecurity with Netlas.io. Stay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
Download Telegram
We’ve just shipped Netlas Python SDK v0.8.0 🐍✨

This update brings more reliable downloads, refreshed stats handling, and broader SDK coverage β€” including new Discovery/Mapping methods, improved Scanner and Datastore tools, and a couple of nice usability touches in both profiles and the CLI.

πŸ‘‰ Check full changelog here: https://docs.netlas.io/changelog/
πŸ”₯4❀2πŸ‘Ύ2
CVE-2025-11699: Insufficient Session Expiration in nopCommerce, 7.1 rating❗️

Because some versions of nopCommerce do not clear cookies, an attacker who gains access to someone else's cookie can use it to hijack a session or escalate privileges.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/6rFG4
πŸ‘‰ Dork: http.meta:"nopCommerce"

Read more: https://seclists.org/fulldisclosure/2025/Aug/14
πŸ‘Ύ5
CVE-2025-55182: RCE in React Server Components, 10.0 rating πŸ”₯πŸ”₯πŸ”₯

The code of vulnerable components insecurely deserializes HTTP requests, which could allow an attacker to perform RCE.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/lg3gz
πŸ‘‰ Dork: tag.name:"react"

Vendor's advisory: https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
πŸ”₯8πŸ‘Ύ4
CVE-2025-66399: Command Injection in Cacti, 7.4 rating❗️

A vulnerability in the SNMP component of Cacti could allow an authenticated attacker to perform RCE.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/VJyxC
πŸ‘‰ Dork: http.title:"Login to Cacti" OR http.headers.set_cookie:"Cacti"

Vendor's advisory: https://github.com/Cacti/cacti/security/advisories/GHSA-c7rr-2h93-7gjf
πŸ‘Ύ7
πŸ“Œ The Evolution of C2: Centralized to On-Chain

We map how C2 moved from IRC and web panels to DGAs, P2P, fast-flux, abuse of legit cloud platforms, and now smart-contract C2 on public blockchains β€” with concrete detection playbooks.

What’s inside:

1. The lineage: IRC β†’ HTTP/HTTPS β†’ DGA & P2P β†’ fast-flux β†’ cloud/β€œlegit” platforms β†’ blockchain contracts.
2. Why on-chain C2 matters: immutable contracts, pseudonymous wallets, and payload retrieval over public RPC.
3. Trade-offs: resilience vs latency, and how transparency enables forensics even as takedowns get harder.
4. Practical detection: block JSON-RPC egress to public providers, use TLS/JARM and beacon-timing patterns, and watch for DNS tunneling.

πŸ‘‰ Read now: https://netlas.io/blog/evolution_of_c2_infrastructure/
πŸ‘Ύ3πŸ”₯2
CVE-2025-14265: Download of Code Without Integrity Check in ScreenConnect, 9.1 rating πŸ”₯

A server-side vulnerability could allow an authenticated attacker to execute custom code or access configuration data.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/1JSOa
πŸ‘‰ Dork: http.headers.server:"ScreenConnect"

Vendor's advisory: https://www.connectwise.com/company/trust/security-bulletins/screenconnect-2025.8-security-patch
πŸ‘Ύ7
CVE-2025-14733: Out-of-bounds Write in WatchGuard, 9.1 rating πŸ”₯

A vulnerability in Fireware OS allows a remote unauthenticated user to execute arbitrary code.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/jooF2
πŸ‘‰ Dork: http.favicon.hash_sha256:9560bc07784890efa36dc4636b6d5f091059914bb5cb8941d00c5b47646efb8c

Read more: https://github.com/advisories/GHSA-hv82-jj64-jf47
πŸ‘Ύ4
CVE-2025-68385: Cross-site Scripting in Kibana, 7.2 rating❗️

A vulnerability in the Vega renderer could allow an authenticated attacker to perform XSS injection.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/XGTPX
πŸ‘‰ Dork: http.unknown_headers.key:"kbn_name"

Vendor's advisory: https://discuss.elastic.co/t/kibana-8-19-9-9-1-9-and-9-2-3-security-update-esa-2025-34/384182
πŸ‘Ύ4
πŸŽ„πŸŽ…πŸΌβ„οΈ Netlas v1.5.1

We introduce Daily Internet Scan Data Snapshots β€” time-bounded datasets containing all scan results collected within a 24-hour period.

Plus:
🏷️ improved technology tags
πŸ’­ visual mapping hints

πŸ‘‰ Check full changelog here: https://docs.netlas.io/changelog/
πŸ”₯6πŸ‘1
❗️Technical Issue Alert❗️

Due to issues with database cluster, Netlas is temporarily suspended to reboot the affected nodes.

Our team is working hard to resolve the issue as quickly as possible.

πŸ‘‰ You can also follow the Netlas status on the corresponding page: https://status.netlas.io/

We sincerely apologize for the inconvenience and appreciate your patience πŸ™
πŸ’Š4
πŸ“Œ Software Supply Chain Attacks β€” how trust breaks, and how to fix it

Modern apps lean on open-source packages, registries, clouds, and CI/CD. When any upstream link is compromised, clean projects ship trojanized code β€” as in the CCleaner incident. This explainer maps where trust fails and what to harden.

What’s inside:

1️⃣ The chain itself: repos, dependency managers, CI/CD, artifact storage β€” and the weak assumptions they rely on.
2️⃣ How attacks land: stolen maintainer accounts, poisoned updates, abused credentials, and automated pulls.
3️⃣ Case in point: a signed build gone rogue (CCleaner) shows why β€œofficial” isn’t always safe.
4️⃣ Mitigations that matter: SBOMs, provenance and signed builds to verify what you ship and where it came from.

πŸ‘‰ Full article here: https://netlas.io/blog/supply_chain_attack/
1πŸ‘Ύ4❀3
πŸ“Œ Bug Bounty 101 β€” a complete 2026 roadmap for beginners

Netlas’ new guide cuts through the β€œdead vs $100k” hype: bug bounty isn’t dead, it’s just more mature. Success now comes from smart target selection, solid recon, manual testing, and reports that get accepted.

What’s inside:

1️⃣ Prerequisites checklist: networking, HTTP basics, light coding, core vulns, and why patience/focus matter.
2️⃣ Picking targets: start with VDPs and less-crowded programs; use HackerOne/Bugcrowd/Intigriti and Google dorks to find scopes; stick to one target.
3️⃣ Recon that works: org WHOIS β†’ asset mapping β†’ subdomains; customize your flow, with a concrete Netlas example and CLI tips.
4️⃣ Hunting methodology: build product knowledge first; use a single multi-signal test string to probe inputs; avoid blind payload spam.
5️⃣ Reports that get paid and beginner mistakes to avoid, plus a practical 60-day plan to your first live finding.

πŸ‘‰ Read here: https://netlas.io/blog/bug_bounty_roadmap/
1πŸ”₯3πŸ‘Ύ3
CVE-2025-37165, -37166: Multiple vulnerabilities in Aruba, 7.5 rating❗️

Vulnerabilities in Aruba HPE allow an attacker to perform a DoS or gain knowledge of the internal network configuration.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/AlIHR
πŸ‘‰ Dork: http.favicon.hash_sha256:dfa04944308ed6c96563ff88cdb767ed5177c76c8a386f7a5803b534e9bff753

Vendor's advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04988en_us&docLocale=en_US#hpesbnw04988-rev-1-hpe-networking-instant-on-multi-0
1πŸ‘Ύ3πŸ”₯1
CVE-2025-13927, -13928, -13335, CVE-2026-0723, -1102: Multiple vulnerabilitites in GitLab, 3.1 - 7.5 rating❗️

Several recent vulnerabilities in GitLab include DoS, Incorrect Authorization, and other issues.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/5JrG3
πŸ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/
πŸ‘Ύ2