Systems Correctness Practices at AWS: Leveraging Formal and Semi-formal Methods #AWS #SystemsCorrectness #FormalMethods #TestingPractices #AWSInvestment https://dl.acm.org/doi/10.1145/3712057
Queue
Systems Correctness Practices at AWS: Leveraging Formal and Semi-formal Methods: Queue: Vol 22, No 6
Building reliable and secure software requires a range of approaches to reason about
systems correctness. Alongside industry-standard testing methods (such as unit and
integration testing), AWS has adopted model checking, fuzzing, property-based testing,…
systems correctness. Alongside industry-standard testing methods (such as unit and
integration testing), AWS has adopted model checking, fuzzing, property-based testing,…
LLM4Decompile: Reverse Engineering: Decompiling Binary Code with Large Language Models #ReverseEngineering #Decompiling #LargeLanguageModels #GitHub #OpenSource https://github.com/albertan017/LLM4Decompile
GitHub
GitHub - albertan017/LLM4Decompile: Reverse Engineering: Decompiling Binary Code with Large Language Models
Reverse Engineering: Decompiling Binary Code with Large Language Models - albertan017/LLM4Decompile
Hash collisions exploitation (great video) #HashCollision #Exploitation https://www.youtube.com/live/wv8aiqWE3Iw
YouTube
18 Hash collisions exploitation (1/2)
With all the tricks we know about file formats, let's move on to cryptography,
and exploit hash collisions!
Repository: https://github.com/corkami/collisions
Slides: https://speakerdeck.com/ange/colltris
00:00:00 introduction
00:00:59 timeline
00:04:53…
and exploit hash collisions!
Repository: https://github.com/corkami/collisions
Slides: https://speakerdeck.com/ange/colltris
00:00:00 introduction
00:00:59 timeline
00:04:53…
MalDoc in PDF - Detection bypass by embedding a malicious Word file into a PDF file #MalDoc #PDF #DetectionBypass #JPCERT #CyberSecurity https://blogs.jpcert.or.jp/en/2023/08/maldocinpdf.html
JPCERT/CC Eyes
MalDoc in PDF - Detection bypass by embedding a malicious Word file into a PDF file – - JPCERT/CC Eyes
JPCERT/CC has confirmed that a new technique was used in an attack that occurred in July, which bypasses detection by embedding a malicious Word file into a PDF file. This blog article calls the technique “MalDoc in PDF” hereafter and...
AArch64 memory and paging #AArch64 #MemoryPaging #DeviceMemory #Shareability #CachingMode https://krinkinmu.github.io/2024/01/14/aarch64-virtual-memory.html
Welcome to the Mike’s homepage!
AArch64 memory and paging
In this post I will return to my exploration of 64 bit ARM architecture and will touch on the exciting topic of virtual memory and AArch64 memory model. Hopefully, by the end of this post I will have an example of how to configure paging in AArch64 and will…
UK Is Ordering Apple to Break Its Own Encryption #UKencryptiondemand #breaktheencryption #userdataprivacy #governmentpower #cloudcomputing https://www.schneier.com/blog/archives/2025/02/uk-is-ordering-apple-to-break-its-own-encryption.html
Schneier on Security
UK Is Ordering Apple to Break Its Own Encryption - Schneier on Security
The Washington Post is reporting that the UK government has served Apple with a “technical capability notice” as defined by the 2016 Investigatory Powers Act, requiring it to break the Advanced Data Protection encryption in iCloud for the benefit of law enforcement.…
NanoCore RAT Malware Analysis #MalwareAnalysis #Phishing #EmailScams #NanoCoreRAT #CybersecurityBlog https://malwr-analysis.com/2025/02/10/nanocore-rat-malware-analysis/
Malware Analysis, Phishing, and Email Scams
NanoCore RAT Malware Analysis
NanoCore is a well-known Remote Access Trojan (RAT) used by threat actors for espionage, data theft, and system control. In this post, I will analyze a NanoCore RAT sample with the hash 18B476D3724…
Jooki - Taking Control of a Forgotten Device #Jooki #Firmware #ReverseEngineering #RCE #OpenSource https://nv1t.github.io/blog/reviving-jooki/
Blog
Jooki - Taking Control of a Forgotten Device
Jooki was a dream come true for parents—an intuitive, screen-free audio player that let kids enjoy music and stories with the tap of a token. But that dream turned into frustration when the company behind Jooki went bankrupt, leaving countless devices bricked…
Police arrests 2 Phobos ransomware suspects, seizes 8Base sites #PhobosRansomware #SuspectsArrested #8BaseSitesSeized #GlobalLawEnforcementSuccess #RansomwareGangsExploitingBug https://www.bleepingcomputer.com/news/legal/police-arrests-2-phobos-ransomware-suspects-seizes-8base-sites/
BleepingComputer
Police arrests 2 Phobos ransomware suspects, seizes 8Base sites
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of two suspected hackers in Phuket, Thailand, and the seizure of 8Base's dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims…
PsExec’ing the right way and why zero trust is mandatory #SensePost #Psexec #ZeroTrust #Cybersecurity #Hacking https://sensepost.com/blog/2025/psexecing-the-right-way-and-why-zero-trust-is-mandatory/
Sensepost
SensePost | Psexec’ing the right way and why zero trust is mandatory
Leaders in Information Security
Exploring a VPN Appliance: A Researcher’s Journey #VPN #Researcher #Vulnerabilities #Fortinet #Akamai https://www.akamai.com/blog/security-research/2025-february-fortinet-critical-vulnerabilities
Akamai
Exploring a VPN Appliance: A Researcher’s Journey | Akamai
Akamai researchers explore Fortinet FortiOS and discover multiple vulnerabilities that can lead to denial-of-service and remote code execution attacks.
!exploitable Episode One - Breaking IoT #doyensec #breakingIoT #vulnerabilityAnalysis #exploitable #IoTChallenge https://blog.doyensec.com/2025/02/11/exploitable-iot.html
Doyensec
!exploitable Episode One - Breaking IoT
For our last company retreat, the Doyensec team went on a cruise along the coasts of the Mediterranean Sea. As amazing as each stop was, us being geeks, we had to break the monotony of daily pool parties with some much-needed hacking sessions. Luca and John…
CVE-2025-0693: AWS IAM User Enumeration #RhinoSecurityLabs #AWSIAM #PenetrationTesting #FindingCVE-2025-0693 #VulnerabilityDisclosure https://rhinosecuritylabs.com/research/unauthenticated-username-enumeration-in-aws/
Rhino Security Labs
CVE-2025-0693: AWS IAM User Enumeration
Rhino Security Labs discovered two username enumeration vulnerabilities in the AWS Web Console.
👍1
How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 #SitevisionAutoGeneratedPasswords #SigningKeyLeakage #CVE202235202 #SwedishOffensiveSecurity #ShelltrailExperts https://www.shelltrail.com/research/how-auto-generated-passwords-in-sitevision-leads-to-signing-key-leakage-cve-2022-35202/
Shelltrail - Swedish offensive security experts
How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 | Shelltrail - Swedish offensive security…
A security issue in Sitevision version 10.3.1 and older allows remote attacker, in certain scenarios, to gain access signing keys used for Authn SAML requests.
whoAMI: A cloud image name confusion attack #cloudsecurity #whoAMI #vulnerabilitydisclosure #datadog #research https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/
Datadoghq
whoAMI: A cloud image name confusion attack
Detailing the discovery and impact of the whoAMI cloud image name confusion attack, which could allow attackers to execute code within AWS accounts due to a vulnerable pattern in AMI retrieval.
👍2
Nginx/Apache Path Confusion to Auth Bypass in PAN-OS (CVE-2025-0108) #CVE-2025-0108 #PANOS #AuthBypass #NginxApache #SearchlightCyber https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/
Writing a Ghidra processor module #iRISC #GhidraProcessorModule #MIPSArchitecture #SLEIGH #ProcessorModule https://irisc-research-syndicate.github.io/2025/02/14/writing-a-ghidra-processor-module/
boofuzz: Network Protocol Fuzzing for Humans #boofuzz #networkprotocol #fuzzing #documentation #Python https://boofuzz.readthedocs.io/en/stable/
UUP dump: Download UUP files from Windows Update servers with ease #UUPdump #WindowsUpdate #LatestBuilds #Windows11 #Windows10 https://uupdump.net/
UUP dump
UUP dump lets you download Unified Update Platform files, like Windows Insider updates, directly from Windows Update.