Shattering the Rotation Illusion: Part 4 - Developer Forums #NHI #Security #DeveloperForums #AWSKeys #SecurityRisk https://www.clutch.security/blog/shattering-the-rotation-illusion-part4-developer-forums
Clutch Security
Shattering the Rotation Illusion: Part 4 - Developer Forums
Explore Clutch Security’s research on leaked AWS Access Keys in developer forums like Stack Overflow and Quora, revealing critical security…
Trigon: developing a deterministic kernel exploit for iOS #TrigonExploit #iOSKernel #Vulnerability #PhysicalMapping #KernelReadAndWrite https://alfiecg.uk/2025/03/01/Trigon.html
Alfie CG
Trigon: developing a deterministic kernel exploit for iOS (part 1)
Background Vulnerability Experimentation Arbitrary physical mapping Dynamically finding our mapping base Finding the kernel base A10(X) A11 Non-KTRR devices Virtual kernel read/write Page table panic Brandon Azad’s method PV head table (again) IOSurface kernel…
New Method to Leverage Unsafe Reflection and Deserialisation to RCE on Rails #RailsRCE #UnsafeReflection #DeserialisationGadget #SQLite3 #RubyonRails https://www.elttam.com/blog/rails-sqlite-gadget-rce/
Elttam
New Method to Leverage Unsafe Reflection and Deserialisation to RCE on Rails - elttam
elttam is a globally recognised, independent information security company, renowned for our advanced technical security assessments.
CVSS-Threat Enhanced (CVSS-TE) Vulnerability Lookup #CVSS-TE #VulnerabilityLookup #ThreatEnhanced #CVE #ThreatIntelligence https://kston83.github.io/cvss-te/
kston83.github.io
CVSS-TE Vulnerability Lookup
Enhanced vulnerability scoring system combining CVSS with threat intelligence
Case Study: Analyzing macOS IONVMeFamily Driver Denial of Service Issue #macOS #DriverIssue #DenialofService #AFINE #Cybersecurity https://afine.com/case-study-analyzing-macos-ionvmefamily-driver-denial-of-service-issue/
AFINE - digitally secure
Case Study: Analyzing macOS IONVMeFamily Driver Denial of Service Issue - AFINE - digitally secure
The discovery of a DoS in the macOS NS_01 driver within Apple’s IONVMeFamily, offering insights into integer overflow detection, and crash analysis.
🔥1
Ransomhub Ransomware: Double-Extortion Attack and How to Defend #Ransomhub #DoubleExtortion #Attack #Defend #SecConsult https://sec-consult.com/blog/detail/ransomhub-ransomware-gang/
SEC Consult
Ransomhub Ransomware: Double-Extortion Attack and How to Defend
Cyberattacks are constantly evolving, and ransomware remains a critical threat. We recently encountered the RansomHub ransomware group, which leverages double-extortion tactics against businesses and critical infrastructure. In this blog post, we share key…
Cybersecurity ROI Explained: “Why Investing in Penetration Testing Saves Your Business” #CybersecurityROI #PenetrationTesting #SaveBusiness #LaburityResearch #CybersecurityStrategy https://laburity.com/cybersecurity-roi-explained-why-investing-in-penetration-testing-saves-your-business/
Laburity - Cyber Security Services
Cybersecurity ROI Explained: “Why Investing in Penetration Testing Saves Your Business” - Laburity
Introduction: Cybersecurity has to be a major concern for businesses in light of the growing cyber threats and increased regulatory pressure. A single breach can cost a business dearly, financially, and reputation-wise. Investing in the operation of security…
Understanding and Mitigating TOCTOU Vulnerabilities in C# Applications #TOCTOU #Csharp #SecureCoding #Vulnerabilities #Mitigation https://afine.com/understanding-and-mitigating-toctou-vulnerabilities-in-c-applications/
AFINE - digitally secure
TOCTOU Vulnerabilities in C# Applications: Mitigation - AFINE - digitally secure
Learn TOCTOU mitigation for C# apps. Atomic operations, file locking, and race condition defenses for Windows developers.
🔥1
How Beyond Gravity, a leading Swiss aerospace company, is fortifying cybersecurity: a real-life success story #BeyondGravity #Cybersecurity #SuccessStory #SECConsult #SwissAerospaceCompany https://sec-consult.com/blog/detail/beyond-gravity-success-story/
SEC Consult
How Beyond Gravity, a leading Swiss aerospace company, is fortifying cybersecurity: a real-life success story
In the highly sensitive aerospace industry, a comprehensive and proactive security strategy is paramount for companies to meet long-term security standards and protect against cyber threats.
Sitecore: Unsafe Deserialisation Again! (CVE-2025-27218) #Sitecore #UnsafeDeserialisation #RemoteCommandExecution #CVE-2025-27218 #SearchlightCyber https://slcyber.io/blog/sitecore-unsafe-deserialization-again-cve-2025-27218/
Searchlight Cyber
Sitecore: Unsafe Deserialisation Again! (CVE-2025-27218) › Searchlight Cyber
Assetnote, now a searchlight cyber company, has uncovered a REMOTE COMMAND EXECUTION VULNERABILITY in SITECORE EXPERIENCE PLATFORM new Sitecore vulnerabilities discovered
The Burn Notice, Part 2/5 | AI Agents: When Everything Becomes an Attack Surface #TheBurnNotice #AIagents #CybersecurityThreats #FlowiseVulnerability #NewAttackSurfaces https://medium.com/@attias.dor/the-burn-notice-part-2-5-ai-agents-when-everything-becomes-an-attack-surface-bbcece386f02
Medium
The Burn Notice, Part 2/5 | AI Agents: When Everything Becomes an Attack Surface
We Manipulated an HR Agent to Betray Its Own Organization and Discovered a Critical Vulnerability in The Process (CVE-2025–26319)
Detecting and Mitigating the Apache Camel Vulnerabilities #ApacheCamel #Vulnerabilities https://www.akamai.com/blog/security-research/march-apache-camel-vulnerability-detections-and-mitigations
Akamai
Detecting and Mitigating the Apache Camel Vulnerabilities | Akamai
Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.
Pre-authentication SQL injection to RCE in GLPI (CVE-2025-24799/CVE-2025-24801) #GLPI #SQLinjection #RCE #webexploitation #cybersecurity https://blog.lexfo.fr/glpi-sql-to-rce.html
blog.lexfo.fr
Pre-authentication SQL injection to RCE in GLPI (CVE-2025-24799/CVE-2025-24801)
<p>Exploitation of multiple vulnerabilities in GLPI to gain remote code execution from unauthenticated privileges.</p>
Modus Operandi of Ruthless Mantis https://catalyst.prodaft.com/public/report/modus-operandi-of-ruthless-mantis/overview
Smart male chastity lock cock-up #SmartMaleChastityLock #PenTestPartners #SecurityConsulting #VulnerabilityDisclosure #IoTSecurity https://www.pentestpartners.com/security-blog/smart-male-chastity-lock-cock-up/
Pen Test Partners
Smart male chastity lock cock-up | Pen Test Partners
TL;DR Smart Bluetooth male chastity lock, designed for user to give remote control to a trusted 3rd party using mobile app/API Multiple API flaws meant anyone could remotely lock all devices and prevent users from releasing themselves Removal then requires…
Fake Reddit and WeTransfer pages are spreading stealer malware #FakeReddit #WeTransfer #StealerMalware #CybersecurityThreats #LummaStealer https://moonlock.com/fake-reddit-wetransfer-lumma-stealer
Moonlock
Fake Reddit and WeTransfer pages are spreading malware
Lumma Stealer and AMOS are used in the campaign.
Memory Corruption in Delphi #DelphiMemoryCorruption #MemorySafety #ProgrammingVulnerabilities #SecureCode #IncludeSecurityBlog https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/
Include Security Research Blog
Memory Corruption in Delphi - Include Security Research Blog
In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how…
👍1
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs #DecryptingAkiraRansomware #GPUbruteforce #ReverseEngineering #FileEncryption #ESXIdatarecovery https://tinyhack.com/2025/03/13/decrypting-encrypted-files-from-akira-ransomware-linux-esxi-variant-2024-using-a-bunch-of-gpus/
Tinyhack.com
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
I recently helped a company recover their data from the Akira ransomware without paying the ransom. I'm sharing how I did it, along with the full source code.
Update: since this article was written, a new version of Akira ransomware has appeared that…
Update: since this article was written, a new version of Akira ransomware has appeared that…