CVE-2025-0693: AWS IAM User Enumeration #RhinoSecurityLabs #AWSIAM #PenetrationTesting #FindingCVE-2025-0693 #VulnerabilityDisclosure https://rhinosecuritylabs.com/research/unauthenticated-username-enumeration-in-aws/
Rhino Security Labs
CVE-2025-0693: AWS IAM User Enumeration
Rhino Security Labs discovered two username enumeration vulnerabilities in the AWS Web Console.
👍1
How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 #SitevisionAutoGeneratedPasswords #SigningKeyLeakage #CVE202235202 #SwedishOffensiveSecurity #ShelltrailExperts https://www.shelltrail.com/research/how-auto-generated-passwords-in-sitevision-leads-to-signing-key-leakage-cve-2022-35202/
Shelltrail - Swedish offensive security experts
How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 | Shelltrail - Swedish offensive security…
A security issue in Sitevision version 10.3.1 and older allows remote attacker, in certain scenarios, to gain access signing keys used for Authn SAML requests.
whoAMI: A cloud image name confusion attack #cloudsecurity #whoAMI #vulnerabilitydisclosure #datadog #research https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/
Datadoghq
whoAMI: A cloud image name confusion attack
Detailing the discovery and impact of the whoAMI cloud image name confusion attack, which could allow attackers to execute code within AWS accounts due to a vulnerable pattern in AMI retrieval.
👍2
Nginx/Apache Path Confusion to Auth Bypass in PAN-OS (CVE-2025-0108) #CVE-2025-0108 #PANOS #AuthBypass #NginxApache #SearchlightCyber https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/
Writing a Ghidra processor module #iRISC #GhidraProcessorModule #MIPSArchitecture #SLEIGH #ProcessorModule https://irisc-research-syndicate.github.io/2025/02/14/writing-a-ghidra-processor-module/
boofuzz: Network Protocol Fuzzing for Humans #boofuzz #networkprotocol #fuzzing #documentation #Python https://boofuzz.readthedocs.io/en/stable/
UUP dump: Download UUP files from Windows Update servers with ease #UUPdump #WindowsUpdate #LatestBuilds #Windows11 #Windows10 https://uupdump.net/
UUP dump
UUP dump lets you download Unified Update Platform files, like Windows Insider updates, directly from Windows Update.
Arechclient2 Malware Analysis (sectopRAT) #Arechclient2 #MalwareAnalysis #Phishing #EmailScams #CybersecurityBlog https://malwr-analysis.com/2025/02/18/arechclient2-malware-analysis-sectoprat/
Malware Analysis, Phishing, and Email Scams
Arechclient2 Malware Analysis (sectopRAT)
Overview Arechclient2, also known as sectopRAT, is a Remote Access Trojan (RAT) written in .NET. This malware is highly obfuscated using the calli obfuscator, making its analysis challenging. Despi…
Microsoft Edge Developer VM Remote Code Execution #MicrosoftEdge #RemoteCodeExecution #InfoSec #Puppet #VMCompromise https://infosec.rm-it.de/2025/02/17/microsoft-edge-developer-vm-remote-code-execution/
Everyday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysis #GhidraPlatformChoice #BinaryAnalysis #Windows #MacOS #ReverseEngineering https://medium.com/@clearbluejar/everyday-ghidra-how-platform-choice-influences-ghidras-binary-analysis-76c40db0e407
Medium
Everyday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysis
Where you choose to “fly your dragon” truly matters. Learn the RE impacts of your runtime platform.
🔥3
How to prove false statements? (Part 3) #ProofingFalseStatements #CryptographicEngineering #FiatShamir #WeakChallenges #SecurityGuarantees https://blog.cryptographyengineering.com/2025/02/19/how-to-prove-false-statements-part-3/
A Few Thoughts on Cryptographic Engineering
How to prove false statements? (Part 3)
This is the third and penultimate post in a series about theoretical weaknesses in Fiat-Shamir as applied to proof systems. The first post is here, the second post is here, and you should probably …
ransacked: 119 vulnerabilities in LTE/5G core infrastructure #CellularSecurity #FloridaInstituteForCybersecurityResearch #LTE #5G #Vulnerabilities https://cellularsecurity.org/ransacked
JDBG: Java Dynamic Reverse Engineering and Debugging Tool #JDBG #JavaDynamicReverseEngineering #DebuggingTool #GitHub #OpenSource https://github.com/roger1337/JDBG
GitHub
GitHub - roger1337/JDBG: Java Dynamic Reverse Engineering and Debugging Tool
Java Dynamic Reverse Engineering and Debugging Tool - roger1337/JDBG
Exploring OpenSSH's Agent Forwarding RCE (CVE-2023-38408) #OpenSSH #AgentForwarding #RCE #CVE-2023-38408 #vsociety https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408
www.vicarius.io
Exploring OpenSSH's Agent Forwarding RCE (CVE-2023-38408) - vsociety
The Burn Notice, Part 1/5 — Revealing Shadow Copilots #TheBurnNotice #AIAgents #DataExtraction #CybersecurityThreats #CopilotStudio https://medium.com/@attias.dor/the-burn-notice-part-1-5-revealing-shadow-copilots-812def588a7a
Medium
The Burn Notice, Part 1/5 — Revealing Shadow Copilots
How We Extracted Financial Data from a Multi-Billion-Dollar Company
keycred: Generate and Manage KeyCredentialLinks #GitHub #Keycred #Generate #Manage #KeyCredentialLinks https://github.com/RedTeamPentesting/keycred
GitHub
GitHub - RedTeamPentesting/keycred: Generate and Manage KeyCredentialLinks
Generate and Manage KeyCredentialLinks. Contribute to RedTeamPentesting/keycred development by creating an account on GitHub.
Removing Jeff Bezos From My Bed #RemovingJeffBezos #TruffleSecurityCo #AIcodingrisks #IoTprivacyconcerns #SleepSolution https://trufflesecurity.com/blog/removing-jeff-bezos-from-my-bed
Trufflesecurity
Removing Jeff Bezos From My Bed ◆ Truffle Security Co.
Eight Sleep smart bed found to contain an exposed AWS key and a likely backdoor that allowed engineers to remotely access users' beds
Abusing VBS Enclaves to Create Evasive Malware https://www.akamai.com/blog/security-research/2025-february-abusing-vbs-enclaves-evasive-malware
Akamai
Abusing VBS Enclaves to Create Evasive Malware | Akamai
Learn how attackers can abuse VBS enclaves, a Windows security feature, for malicious purposes.
Mixing up Public and Private Keys in OpenID Connect deployments #OpenIDConnect #PublicPrivateKeyConfusion #ShortRSAKeys #CryptographyVulnerabilities #BetterSecurityPractices https://blog.hboeck.de/archives/909-Mixing-up-Public-and-Private-Keys-in-OpenID-Connect-deployments.html