Mastering Bug Bounty Recon: Essential Techniques for Ethical Hackers #BugBounty #EthicalHackers #Reconnaissance #BashScripts #CybersecurityExpert https://medium.verylazytech.com/mastering-bug-bounty-recon-essential-techniques-for-ethical-hackers-549c5b472975
Medium
Mastering Bug Bounty Recon: Essential Techniques for Ethical Hackers
The first step to attacking any target is conducting reconnaissance, or simply put, gathering information about the target. Reconnaissance…
Hacking AI Applications: From 3D Printing to Remote Code Execution #HackingAI #3DPrinting #RemoteCodeExecution #SystemPromptDisclosure #ExfiltrationTechniques https://www.securityrunners.io/post/hacking-ai-applications
www.securityrunners.io
Hacking AI Applications: From 3D Printing to Remote Code Execution
The blog post examines methods for hacking AI-native applications by detailing vulnerabilities discovered while building KachraCraft, a 3D design generation tool, including techniques for revealing system prompts, executing server-side request forgery (SSRF)…
Why Can't You Fix This Bug Faster? #BugReporting #DeveloperRelationships #VulnerabilityAssessment #BugFixing #SecurityResearcherPerspective https://maxwelldulin.com/BlogPost/Why-Can't-You-Fix-This-Bug-Faster
Strikeout Security Blog
Why Can't You Fix This Bug Faster?
Fixing security vulnerabilities in a timely manner is more complicated than you realize.
Far From Random: Three Mistakes From Dart/Flutter's Weak PRNG #DartSDK #WeakPRNG #Vulnerabilities #ProtonWallet #SecurityFixes https://www.zellic.io/blog/proton-dart-flutter-csprng-prng/
www.zellic.io
Far From Random: Three Mistakes From Dart/Flutter's Weak PRNG | Zellic — Research
A look into how an unexpectedly weak PRNG in Dart led to Zellic's discovery of multiple vulnerabilities
Messenger Group Call DoS for iOS #MessengerGroupCall #DoS #iOS #Signal11 #SecurityResearch https://s11research.com/posts/Messenger-Group-Call-DoS-for-iOS/
Signal 11
Messenger Group Call DoS for iOS
Messenger is used by hundreds of millions of people globally, and as of December 2023, it has adopted end-to-end encryption (E2EE) by default for chats and calls. However, when a group chat is created, it initially does not use E2EE. Interestingly, non-E2EE…
Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623) #CleoHarmony #VLTrader #LexiCom #RCE #ArbitraryFileWrite https://labs.watchtowr.com/cleo-cve-2024-50623/
watchTowr Labs
Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623)
We were having a nice uneventful week at watchTowr, when we got news of some ransomware operators using a zero-day exploit in Cleo MFT software - namely, LexiCom, VLTransfer, and Harmony - applications that many large enterprises rely on to share files securely.…
Astalavista is back! ❤️ https://forum.astalavista.com/
🔥2
Android's CVE-2022-20201 (InstalldNativeService) #Android #InstalldNativeService #CVE-2022-20201 #PoC #VulnerabilityFix https://pwner.gg/blog/Android's-CVE-2022-20201
( ͡◕ _ ͡◕)👌
Android's CVE-2022-20201 (InstalldNativeService)
Intro This is another attempt as part of my @vr_progress to hack my old, unpatched OnePlus phone which didn’t get any updates for years. This time I chose CVE-2022-20201, a crafty little bug hiding in one of the subsystems used by Android’s package manager.
Careto is back: what’s new after 10 years of silence? #CaretoAPT #RecentAttacks #Kaspersky #SecuritySolutions #CyberEspionage https://securelist.com/careto-is-back/114942/
Securelist
Careto APT’s recent attacks discovered
Kaspersky researchers analyze 2019, 2022 and 2024 attacks attributed to Careto APT with medium to high confidence.
Scanners Beware: Welcome to the Network from Hell #NetworkSecurity #Innovation #DeceptionDefense #CybersecuritySolution #DisruptAttackers https://medium.com/sensorfu/scanners-beware-welcome-to-the-network-from-hell-86989f29f17b
Medium
Scanners Beware: Welcome to the Network from Hell
We’ve crafted a bold defense strategy that not only slows scans but actively disrupts and deceives attackers.
🤔2👍1
Finding Bugs in Chrome with CodeQL #ChromeBugs #CodeQL #SecurityFlaws #BugHunting #WebDevelopment https://bughunters.google.com/blog/5085111480877056/finding-bugs-in-chrome-with-codeql
Google
Blog: Finding Bugs in Chrome with CodeQL
Want to learn about using a static analysis tool called CodeQL to search for vulnerabilities in Google Chrome? Then this blog post is for you!
Security vulnerability uncovered and patched in the golang.org/x/crypto /ssh package #PlatformshSecurityVulnerability #GoSSHAuthBypass #GoCryptoSSHPackage #SecurityDisclosure #OpenSourceBugs https://platform.sh/blog/uncovered-and-patched-golang-vunerability/
platform.sh
Platform.sh team finds auth bypass in Go SSH package
Platform.sh team discovers misimplementation of PublicKeyCallback leading to authorization bypass in Go's x/crypto/ssh | Platform.sh
Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE #KerioControl #Vulnerabilities #CVE202452875 #1ClickRCE #XSS https://karmainsecurity.com/hacking-kerio-control-via-cve-2024-52875
Karmainsecurity
Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE | Karma(In)Security
This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.
Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware #DarkGateMalware #MicrosoftTeamsExploit #AnyDeskExploit #CyberSecurity #MalwarePropagation https://techacademy.online/attackers-exploit-microsoft-teams-and-anydesk-to-deploy-darkgate-malware/
Understanding Logits And Their Possible Impacts On Large Language Model Output Safety #Logits #LanguageModels #SoftMaxFunction #ModelSafety #ArtificialIntelligence https://ioactive.com/understanding-logits-and-their-possible-impacts-on-large-language-model-output-safety/
Nice compilation of search evasion techniques #UnprotectProject #Home #TechniqueList #CodeSnippets #DetectionRules https://unprotect.it/
Exploiting Reflected Input Via the Range Header #ReflectedInputExploitation #RangeHeaderExploitation #ServerVulnerabilities #XSSAttacks #InformationSecurity https://attackshipsonfi.re/p/exploiting-reflected-input-via-the
attackshipsonfi.re
Exploiting Reflected Input Via the Range Header
TL;DR Reflected input is often unexploitable because the attack ends up in a place which stops it working, such as inside a quoted attribute.
CVE-2024-44825 - Invesalius Arbitrary File Write and Directory Traversal #CVE-2024-44825 #Invesalius #ArbitraryFileWrite #DirectoryTraversal #ZipSlip https://www.partywave.site/show/research/CVE-2024-44825%20-%20Invesalius%20Arbitrary%20File%20Write%20and%20Directory%20Traversal
www.partywave.site
cve-2024-44825-invesalius-arbitrary-file-write-and-directory-traversal
Discover cve-2024-44825-invesalius-arbitrary-file-write-and-directory-traversal article on partywave.
Another JWT Algorithm Confusion Vulnerability: CVE-2024-54150 #JWTAlgorithmConfusion #Vulnerability #CVE202454150 #SecurityCodeReview #AlgorithmConfusion https://pentesterlab.com/blog/another-jwt-algorithm-confusion-cve-2024-54150
Pentesterlab
Another JWT Algorithm Confusion Vulnerability: CVE-2024-54150
Discover how a code review uncovered a JWT algorithm confusion vulnerability (CVE-2024-54150). Learn key insights to enhance your security skills and spot vulnerabilities effectively.