<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-09T12:38:28Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by watchTowr</title>
  <author>
    <name>watchTowr</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1r4a3cqjhh06tmrex84st3w20407uuq3w4q2m5v3mcu86ffzdlchqj2u230.rss" />
  <link href="https://yabu.me/npub1r4a3cqjhh06tmrex84st3w20407uuq3w4q2m5v3mcu86ffzdlchqj2u230" />
  <id>https://yabu.me/npub1r4a3cqjhh06tmrex84st3w20407uuq3w4q2m5v3mcu86ffzdlchqj2u230</id>
  <icon>https://pbs.twimg.com/profile_images/1943602243380576256/ka4fHHmU.jpg</icon>
  <logo>https://pbs.twimg.com/profile_images/1943602243380576256/ka4fHHmU.jpg</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsp2twcpwarwnpkhkufq42nmcz9n4ttpts0r6eh6pg4ye3k4c0anuqzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzumrk2qw</id>
    
      <title type="html">watchTowr Intel is detecting active reconnaissance against ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp2twcpwarwnpkhkufq42nmcz9n4ttpts0r6eh6pg4ye3k4c0anuqzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzumrk2qw" />
    <content type="html">
      watchTowr Intel is detecting active reconnaissance against NetScalers for CVE-2026-3055 through our Attacker Eye honeypot network.&lt;br/&gt;&lt;br/&gt;Exploitation is likely imminent. Patch now.&lt;br/&gt;&lt;br/&gt;watchTowr clients already have access to internal mechanisms to confidently identify their exposure.&lt;br/&gt; &lt;img src=&#34;https://pbs.twimg.com/media/HEcdMc7WIAEA5vX.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-03-27T20:35:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs29ymw2cpek0zzpfg8cks6apku8sy8a37xdjmq6kqslly4257clqgzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzusszxay</id>
    
      <title>Nostr event nevent1qqs29ymw2cpek0zzpfg8cks6apku8sy8a37xdjmq6kqslly4257clqgzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzusszxay</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs29ymw2cpek0zzpfg8cks6apku8sy8a37xdjmq6kqslly4257clqgzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzusszxay" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqg2p9atfv69fsdlll6un8fghgcdag5t2e835uye777wcptmzkewc05td46&#39;&gt;nevent1q…td46&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/&#34;&gt;https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/&lt;/a&gt;
    </content>
    <updated>2026-01-27T20:13:32Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqg2p9atfv69fsdlll6un8fghgcdag5t2e835uye777wcptmzkewczyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzuukwvmd</id>
    
      <title type="html">absolutely fantastic ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqg2p9atfv69fsdlll6un8fghgcdag5t2e835uye777wcptmzkewczyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzuukwvmd" />
    <content type="html">
      absolutely fantastic&lt;br/&gt; &lt;img src=&#34;https://pbs.twimg.com/media/G_siC5VWEAAQv3u.jpg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-01-27T20:11:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswajkq8rfrvqasccmqmn3hqs4r7h8elwm3x8tjwgmwzaz3skdjwxqzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzu8z40am</id>
    
      <title type="html">gasp https://portal.smartertools.com/community/a97650/cve.aspx</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswajkq8rfrvqasccmqmn3hqs4r7h8elwm3x8tjwgmwzaz3skdjwxqzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzu8z40am" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszn6rsyzr7nnv7p2890kmnx8dvnaptcqtd5cccqt5k3qwjraafmqs7dwt4u&#39;&gt;nevent1q…wt4u&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;gasp  &lt;a href=&#34;https://portal.smartertools.com/community/a97650/cve.aspx&#34;&gt;https://portal.smartertools.com/community/a97650/cve.aspx&lt;/a&gt;
    </content>
    <updated>2026-01-09T02:01:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszn6rsyzr7nnv7p2890kmnx8dvnaptcqtd5cccqt5k3qwjraafmqszyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzulf3dng</id>
    
      <title type="html">And, we&amp;#39;re back - analyzing CVE-2025-52691, a pre-auth RCE in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszn6rsyzr7nnv7p2890kmnx8dvnaptcqtd5cccqt5k3qwjraafmqszyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzulf3dng" />
    <content type="html">
      And, we&amp;#39;re back - analyzing CVE-2025-52691, a pre-auth RCE in SmarterTools SmarterMail mail server solution.&lt;br/&gt;&lt;br/&gt;Speak soon (:^)) and enjoy..&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/&#34;&gt;https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/&lt;/a&gt;
    </content>
    <updated>2026-01-08T18:31:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst0ruttgg2a246tgpp3vvrq2t9eewm0kw8zhs78lupmz6g6sw833gzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzuu0aa3z</id>
    
      <title type="html">Following our now published analysis, we&amp;#39;ve released our ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst0ruttgg2a246tgpp3vvrq2t9eewm0kw8zhs78lupmz6g6sw833gzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzuu0aa3z" />
    <content type="html">
      Following our now published analysis, we&amp;#39;ve released our Detection Artifact Generator for the Oracle EBS pre-auth RCE chain (CVE-2025-61882), giving defenders the same tools attackers already have.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882/&#34;&gt;https://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882/&lt;/a&gt;
    </content>
    <updated>2025-10-06T21:08:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8x959zv3e55hvpdlefljjl8yt9k6e6gulq2u0een6l9spadrsj4qzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzuhqwku0</id>
    
      <title type="html">🚨 SolarWinds, the gift that keeps on giving: a new Web Help ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8x959zv3e55hvpdlefljjl8yt9k6e6gulq2u0een6l9spadrsj4qzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzuhqwku0" />
    <content type="html">
      🚨 SolarWinds, the gift that keeps on giving: a new Web Help Desk patch bypass, CVE-2025-26399, enables unauthenticated RCE via deserialization.&lt;br/&gt;&lt;br/&gt;It’s a patch bypass of CVE-2024-28988/CVE-2024-28986 - previously exploited.&lt;br/&gt;&lt;br/&gt;Given SolarWinds’ past, in-the-wild exploitation is highly likely. Patch now.&lt;br/&gt;&lt;br/&gt;Need help assessing your exposure? &lt;a href=&#34;https://watchtowr.com/&#34;&gt;https://watchtowr.com/&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://pbs.twimg.com/media/G1hlzMIWYAAA9rV.jpg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-09-23T10:46:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz0d7sc96ywhtrkglnnld69dlrqlctf249tes6nk5fygesdw6cppczyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzujj3cyd</id>
    
      <title type="html">Are we bleeding out? Enjoy our analysis of CitrixBleed 2, aka ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz0d7sc96ywhtrkglnnld69dlrqlctf249tes6nk5fygesdw6cppczyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzujj3cyd" />
    <content type="html">
      Are we bleeding out? Enjoy our analysis of CitrixBleed 2, aka CVE-2025-5777 - the &amp;#34;new&amp;#34; Citrix NetScaler Memory Leak vulnerability.&lt;br/&gt;&lt;br/&gt;We&amp;#39;ve been using this mechanism to identify vulnerable systems, and hope it helps the teams that need it.. enjoy!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777&#34;&gt;https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777&lt;/a&gt;
    </content>
    <updated>2025-07-04T19:17:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsql2p8xymk9tsmryzwnh329a9nq73we7uw8nwsyc3jxetgvupzs0gzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzude5nkm</id>
    
      <title type="html">https://pbs.twimg.com/media/GnsGryPbEAA1Bk1.png</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsql2p8xymk9tsmryzwnh329a9nq73we7uw8nwsyc3jxetgvupzs0gzyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzude5nkm" />
    <content type="html">
       &lt;img src=&#34;https://pbs.twimg.com/media/GnsGryPbEAA1Bk1.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-04T11:55:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvu7tg20xyp5fx2l3ggkm44m57x54h9ecv8ae2xqx3j4qpze9lf9szyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzuqwe339</id>
    
      <title type="html">We are nearing the end of our 90 day disclosure window for an ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvu7tg20xyp5fx2l3ggkm44m57x54h9ecv8ae2xqx3j4qpze9lf9szyqwhk8qz27alf0v0yc7kpw9ef74lmnsz965ptw3j80rslf9yfhlzuqwe339" />
    <content type="html">
      We are nearing the end of our 90 day disclosure window for an unauth RCE in a solution previously targeted by ransomware gangs - with no engagement from the vendor. Once again, this must be absolutely brilliant for their customers. &lt;br/&gt;&lt;br/&gt;Speak soon.
    </content>
    <updated>2025-03-27T07:32:02Z</updated>
  </entry>

</feed>