Police arrests 2 Phobos ransomware suspects, seizes 8Base sites #PhobosRansomware #SuspectsArrested #8BaseSitesSeized #GlobalLawEnforcementSuccess #RansomwareGangsExploitingBug https://www.bleepingcomputer.com/news/legal/police-arrests-2-phobos-ransomware-suspects-seizes-8base-sites/
BleepingComputer
Police arrests 2 Phobos ransomware suspects, seizes 8Base sites
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of two suspected hackers in Phuket, Thailand, and the seizure of 8Base's dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims…
PsExec’ing the right way and why zero trust is mandatory #SensePost #Psexec #ZeroTrust #Cybersecurity #Hacking https://sensepost.com/blog/2025/psexecing-the-right-way-and-why-zero-trust-is-mandatory/
Sensepost
SensePost | Psexec’ing the right way and why zero trust is mandatory
Leaders in Information Security
Exploring a VPN Appliance: A Researcher’s Journey #VPN #Researcher #Vulnerabilities #Fortinet #Akamai https://www.akamai.com/blog/security-research/2025-february-fortinet-critical-vulnerabilities
Akamai
Exploring a VPN Appliance: A Researcher’s Journey | Akamai
Akamai researchers explore Fortinet FortiOS and discover multiple vulnerabilities that can lead to denial-of-service and remote code execution attacks.
!exploitable Episode One - Breaking IoT #doyensec #breakingIoT #vulnerabilityAnalysis #exploitable #IoTChallenge https://blog.doyensec.com/2025/02/11/exploitable-iot.html
Doyensec
!exploitable Episode One - Breaking IoT
For our last company retreat, the Doyensec team went on a cruise along the coasts of the Mediterranean Sea. As amazing as each stop was, us being geeks, we had to break the monotony of daily pool parties with some much-needed hacking sessions. Luca and John…
CVE-2025-0693: AWS IAM User Enumeration #RhinoSecurityLabs #AWSIAM #PenetrationTesting #FindingCVE-2025-0693 #VulnerabilityDisclosure https://rhinosecuritylabs.com/research/unauthenticated-username-enumeration-in-aws/
Rhino Security Labs
CVE-2025-0693: AWS IAM User Enumeration
Rhino Security Labs discovered two username enumeration vulnerabilities in the AWS Web Console.
👍1
How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 #SitevisionAutoGeneratedPasswords #SigningKeyLeakage #CVE202235202 #SwedishOffensiveSecurity #ShelltrailExperts https://www.shelltrail.com/research/how-auto-generated-passwords-in-sitevision-leads-to-signing-key-leakage-cve-2022-35202/
Shelltrail - Swedish offensive security experts
How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 | Shelltrail - Swedish offensive security…
A security issue in Sitevision version 10.3.1 and older allows remote attacker, in certain scenarios, to gain access signing keys used for Authn SAML requests.
whoAMI: A cloud image name confusion attack #cloudsecurity #whoAMI #vulnerabilitydisclosure #datadog #research https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/
Datadoghq
whoAMI: A cloud image name confusion attack
Detailing the discovery and impact of the whoAMI cloud image name confusion attack, which could allow attackers to execute code within AWS accounts due to a vulnerable pattern in AMI retrieval.
👍2
Nginx/Apache Path Confusion to Auth Bypass in PAN-OS (CVE-2025-0108) #CVE-2025-0108 #PANOS #AuthBypass #NginxApache #SearchlightCyber https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/
Writing a Ghidra processor module #iRISC #GhidraProcessorModule #MIPSArchitecture #SLEIGH #ProcessorModule https://irisc-research-syndicate.github.io/2025/02/14/writing-a-ghidra-processor-module/
boofuzz: Network Protocol Fuzzing for Humans #boofuzz #networkprotocol #fuzzing #documentation #Python https://boofuzz.readthedocs.io/en/stable/
UUP dump: Download UUP files from Windows Update servers with ease #UUPdump #WindowsUpdate #LatestBuilds #Windows11 #Windows10 https://uupdump.net/
UUP dump
UUP dump lets you download Unified Update Platform files, like Windows Insider updates, directly from Windows Update.
Arechclient2 Malware Analysis (sectopRAT) #Arechclient2 #MalwareAnalysis #Phishing #EmailScams #CybersecurityBlog https://malwr-analysis.com/2025/02/18/arechclient2-malware-analysis-sectoprat/
Malware Analysis, Phishing, and Email Scams
Arechclient2 Malware Analysis (sectopRAT)
Overview Arechclient2, also known as sectopRAT, is a Remote Access Trojan (RAT) written in .NET. This malware is highly obfuscated using the calli obfuscator, making its analysis challenging. Despi…
Microsoft Edge Developer VM Remote Code Execution #MicrosoftEdge #RemoteCodeExecution #InfoSec #Puppet #VMCompromise https://infosec.rm-it.de/2025/02/17/microsoft-edge-developer-vm-remote-code-execution/
Everyday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysis #GhidraPlatformChoice #BinaryAnalysis #Windows #MacOS #ReverseEngineering https://medium.com/@clearbluejar/everyday-ghidra-how-platform-choice-influences-ghidras-binary-analysis-76c40db0e407
Medium
Everyday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysis
Where you choose to “fly your dragon” truly matters. Learn the RE impacts of your runtime platform.
🔥3
How to prove false statements? (Part 3) #ProofingFalseStatements #CryptographicEngineering #FiatShamir #WeakChallenges #SecurityGuarantees https://blog.cryptographyengineering.com/2025/02/19/how-to-prove-false-statements-part-3/
A Few Thoughts on Cryptographic Engineering
How to prove false statements? (Part 3)
This is the third and penultimate post in a series about theoretical weaknesses in Fiat-Shamir as applied to proof systems. The first post is here, the second post is here, and you should probably …
ransacked: 119 vulnerabilities in LTE/5G core infrastructure #CellularSecurity #FloridaInstituteForCybersecurityResearch #LTE #5G #Vulnerabilities https://cellularsecurity.org/ransacked
JDBG: Java Dynamic Reverse Engineering and Debugging Tool #JDBG #JavaDynamicReverseEngineering #DebuggingTool #GitHub #OpenSource https://github.com/roger1337/JDBG
GitHub
GitHub - roger1337/JDBG: Java Dynamic Reverse Engineering and Debugging Tool
Java Dynamic Reverse Engineering and Debugging Tool - roger1337/JDBG
Exploring OpenSSH's Agent Forwarding RCE (CVE-2023-38408) #OpenSSH #AgentForwarding #RCE #CVE-2023-38408 #vsociety https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408
www.vicarius.io
Exploring OpenSSH's Agent Forwarding RCE (CVE-2023-38408) - vsociety
The Burn Notice, Part 1/5 — Revealing Shadow Copilots #TheBurnNotice #AIAgents #DataExtraction #CybersecurityThreats #CopilotStudio https://medium.com/@attias.dor/the-burn-notice-part-1-5-revealing-shadow-copilots-812def588a7a
Medium
The Burn Notice, Part 1/5 — Revealing Shadow Copilots
How We Extracted Financial Data from a Multi-Billion-Dollar Company