Active #RDP connections can reveal the client hostname π
A key indicator for investigations & #CTI: some attackers reuse hostnames.
Traces to check: CLIENTNAME env variable & RDP printer redirection.
π‘οΈ Incident? Contact #Synacktiv CSIRT 24/7: csirt@synacktiv.com
π Synacktiv training courses - April 2026
Hands-on #cybersecurity courses led by #Synacktiv experts: Cloud Forensics (AWS), Azure & AD intrusion tactics.
π
March-April | Onsite & Remote
π www.synacktiv.com/en/offers/tr...
π Feb 2026: #cybersecurity training with #Synacktiv!
5&6 Feb: Kubernetes Intrusion Tactics (Paris, FR)
9&10 Feb: AWS Intrusion Tactics (Paris, FR)
9-11 Feb: Malware Analysis (Remote, EN)
16-20 Feb: Attacking Web Apps (Paris, FR)
β
Register now: www.synacktiv.com/en/offers/tr...
Winter is here, it's time to test your assembly skills with the #Synacktiv Winter Challenge π.
A code golf competition that guarantees hours of intense x86 instruction optimization!
π Participate here: www.synacktiv.com/en/publicati...
π Itβs the big day for the #CBCToulouse!
The #Synacktiv team is on-site and ready to connect with you throughout the event.
π Visit our booth to learn more about our areas of expertise and our career opportunities!
π
26β27 November 2025
βΉοΈ More information: cbc-convention.com
Amazing few days at #MilipolParis 2025!
Thanks to everyone who visited our stand - your insights were truly inspiring.
Big thanks to the Milipol team and our specialists for making it a success π
See you soon!
#Synacktiv #MobileDeviceForensics
[ #EuropeanCyberWeek ]
Did you miss us yesterday? No worries, there's still time to visit #Synacktiv at booth 98!
Come discuss cybersecurity challenges and learn about our offensive security expertise. We're here until Thursday π
#ECW2025 #Rennes
Meet our #Synacktiv and @revel-io.bsky.social experts at #Milipol, from Tuesday 18 to Friday 21 November 2025!
π Visit us at Stand H063 (Hall 4 β Forensic Zone).
βΉοΈ www.milipol.com/fr-FR
Only 7 days to go until the #ECW gets underway!
#Synacktiv is all set and ready to showcase our #cybersecurity expertise.
π Do come and visit us at stand 98
Thinking about applying to #Synacktiv?
Before sending in your application, take a few minutes to explore our candidate #FAQ.
π― Our goal: to help you better understand who we are, how we work, and what we value in future teammates.
π Find all the answers here: www.synacktiv.com/faq-recrutem...
A big shout-out to the #Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork!
They proudly secured third place overall π
Next stop: Tokyo for the upcoming edition π―π΅ π
More details on the targets and participants here βΉοΈ
www.zerodayinitiative.com/blog/2025/20...
π Big win at #Pwn2Own Cork!
@pol-y.bsky.social of #Synacktiv successfully breached the @Ubiquiti AI Pro surveillance system π¦πΆ
What a way to wrap up the challenge - congrats, @pol-y.bsky.social πͺ
Congrats to tek and anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process π₯
Letβs keep pushing πͺ
#P2OIreland #Synacktiv
The #Synacktiv team is attending #Hexacon2025, the premier event dedicated to offensive security!
Come meet our experts over two days packed with technical talks, real-world feedback, and engaging discussions.
ποΈ Friday, October 10 & Saturday, October 11, 2025
π More info : www.hexacon.fr
#Security Alert: Massive #Laravel APP_KEY leak exposing 600+ apps to remote code execution π¨ #GitGuardian & #Synacktiv research reveals 260,000 exposed keys on #GitHub with potential RCE via deserialization attacks #cybersecurity #php #opensource
blog.gitguardian.com/exploiting-...
Whew! It took two attempts but the #Synacktiv team successfully exploited the #ChargePoint EV Charger and demonstrated signal manipulation over the connector. They are off to the disclosure room to go over how they did it. #P2OAuto #Pwn2Own