CVE-2025-32756: Low-Rise Jeans are Back and so are Buffer Overflows #CVE-2025-32756 #NodeZero #RCE #BufferOverflow #Fortinet https://horizon3.ai/attack-research/attack-blogs/cve-2025-32756-low-rise-jeans-are-back-and-so-are-buffer-overflows/
Horizon3.ai
CVE-2025-32756: Fortinet RCE Exploited in the Wild
Analyze CVE-2025-32756, a Fortinet buffer overflow flaw under active attack, and see how NodeZero can validate exposure now.
BadUSB Attack Explained: From Principles to Practice and Defense #BadUSBAttack #USBsecurity #ArduinoHack #DefenseStrategy #CybersecurityTips https://insbug.medium.com/badusb-attack-explained-from-principles-to-practice-and-defense-3bfe88ec2eeb
Medium
BadUSB Attack Explained: From Principles to Practice and Defense
Discover how to implement it with Arduino UNO, and what security measures can protect your system.
How I ruined my vacation by reverse engineering WSC #ReverseEngineering #WindowsDefender #PainfulResearch #DebuggingWSC https://blog.es3n1n.eu/posts/how-i-ruined-my-vacation/
blog.es3n1n.eu
How I ruined my vacation by reverse engineering WSC
In this post I will briefly describe the journey I went through while implementing defendnot, a tool that disables Windows Defender by using the Windows Security Center (WSC) service API directly.
Even though this is most likely not what you expected to see…
Even though this is most likely not what you expected to see…
🔥1😢1
Threat of TCC Bypasses on macOS #TCCBypass #macOSThreat #AFINECybersecurity #DigitallySecure #PrivacyProtection https://afine.com/threat-of-tcc-bypasses-on-macos/
AFINE - digitally secure
Threat of TCC Bypasses on macOS - AFINE - digitally secure
TCC bypass on macOS isn't just an annoying prompt—it's the last line of defense between malware and your private data. Learn why.
Security Advisory: Remote Command Execution on Smartbedded MeteoBridge (CVE-2025-4008) #SecurityAdvisory #RemoteCommandExecution #CVE20254008 #ONEKEYResearch #EUcyberresilienceact https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008
Onekey
Security Advisory: Remote Command Execution on Smartbedded MeteoBridge (CVE-2025-4008) | ONEKEY Research | Research | ONEKEY
Explore ONEKEY Research Lab's security advisory detailing a critical vulnerability in Smartbedded MeteoBridge. Learn about the risks and recommended actions.
The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling #RequestTunnelling #DetectionTechnique #WebSecurityResearch #HTTPDesyncAttacks #SinglePacketAttack https://www.assured.se/posts/the-single-packet-shovel-desync-powered-request-tunnelling
Assured AB
The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling
In this paper I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and AWS' application load balancer including the creation of a novel detection technique that combined…
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft #RemotePromptInjection #GitLabDuo #SourceCodeTheft #LegitPrevention #OWASPTop10 https://www.legitsecurity.com/blog/remote-prompt-injection-in-gitlab-duo
Legitsecurity
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft
The Legit research team unearthed vulnerabilities in GitLab Duo.
Decoding TCP SYN for Stronger Network Security #networksecurity #TCPsyn #datalayeranalysis #Cyberthreats #Networkanomalies https://www.netscout.com/blog/asert/decoding-tcp-syn-stronger-network-security
NETSCOUT
Decoding TCP SYN for Stronger Network Security | NETSCOUT
Executive SummaryAnalyzing transmission control protocol (TCP) SYN segments,
Part 2 - From Reverse Engineering to Cheat Development: Internal Game Hacks with AssaultCube #gamehacking #internalcheats #reverseengineering #gamefunctionhooking #assaultcube https://adminions.ca/books/articles/page/part-2-from-reverse-engineering-to-cheat-development-internal-game-hacks-with-assaultcube
adminions.ca
Part 2 - From Reverse ... | ADMinions
Introduction
In this guide, we’ll walk step-by-step through building a fully functional internal che...
In this guide, we’ll walk step-by-step through building a fully functional internal che...
Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict #PTCL #BitterAPT #CyberEspionage #InfoStealers #RegionalConflict https://www.infostealers.com/article/pakistan-telecommunication-company-ptcl-targeted-by-bitter-apt-during-heightened-regional-conflict/
InfoStealers
Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
EclecticIQ and Hudson Rock researchers assess that Bitter APT very likely used stolen email credentials from Pakistan’s Counter Terrorism Department (CTD) to carry out the attack. The spear phishing campaign targeted PTCL personnel in critical roles, including…
Introduction to deguard #IntroductionToDeguard #DevelopersVPub #0xE #IntelBootGuard #CorebootDevelopment https://cfp.3mdeb.com/developers-vpub-0xe-2025/talk/WVJFQD/
3Mdeb
Introduction to deguard Developers vPub 0xE
This talk will introduce the deguard utility, allowing to bypass Intel BootGuard and enabling coreboot development on previously locked down platforms.
Finding SSRFs in Azure DevOps - Part 2 #SSRF #AzureDevOps #AzureSecurity #DNSRebinding #SourceCodeDebugging https://binsec.no/posts/2025/05/finding-ssrfs-in-devops-part2
Binary Security AS
Finding SSRFs in Azure DevOps - Part 2
Binary Security was previously rewarded for three Server-Side Request Forgery (SSRF) vulnerabilities in Azure DevOps, which you can read about here. Now we have found another SSRF vulnerability that we also reported to Microsoft. We then bypassed Microsoft’s…
LOLCLOUD - Azure Arc - C2aaS #AzureArc #C2aaS #AndyGill #RedTeam #DetectionEngineering https://blog.zsec.uk/azure-arc-c2aas/
ZephrSec - Adventures In Information Security
Azure Arc - C2aaS
Exploring Azure Arc’s overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
Wireless Pivots: How Trusted Networks Become Invisible Threat Vectors #WirelessPivots #ThreatVectors #WiFiSecurity #WPA2 #EAPTLS https://www.thexero.co.uk/wifi/wireless-pivots
TheXero
Wireless Pivots: How Trusted Networks Become Invisible Threat Vectors
Discover how attackers exploit trusted wireless networks using rogue APs, wireless pivots, and legacy protocols to turn secure EAP-TLS deployments into invisible attack surfaces.
Beyond HTTP: InterceptSuite for TCP/TLS Traffic Interception #InterceptSuite #TCP #TLS #TrafficInterception #NetworkSecurity https://blog.souravkalal.tech/beyond-http-interceptsuite-for-tcp-tls-traffic-interception-in-windows-518934bba22f
Medium
Beyond HTTP: InterceptSuite for TCP/TLS Traffic Interception
InterceptSuite is a tool I created to intercept and analyse network traffic in desktop applications, whether encrypted or not. Unlike…
😱1
Can You Turn a Normal USB into a Bad KB? Exploring the Limits and Cybersecurity Uses #USBHacking #Cybersecurity #BadUSB #Limitations #EthicalHacking https://medium.com/@Ayush.S.K/can-you-turn-a-normal-usb-into-a-bad-kb-exploring-the-limits-and-cybersecurity-uses-f3ba11e491c4
Medium
Can You Turn a Normal USB into a Bad KB? Exploring the Limits and Cybersecurity Uses
Converting a Normal SanDisk USB into a Bad USB or Rubber Ducky
Security Issues Found in preinstalled apps on Android Smartphones #AndroidSecurity #PreinstalledApps #VulnerabilitiesFound #DataTheft #DeviceManipulation https://www.mobile-hacker.com/2025/06/02/security-issues-found-in-android-smartphones/
Mobile Hacker
Security Issues Found in preinstalled apps on Android Smartphones
Security researchers have uncovered several critical vulnerabilities in applications preloaded on Ulefone and Krüger&Matz Android smartphones. These flaws, reported by CERT Polska and discovered by Szymon Chadam, expose users to significant risks, including…
iOS Activation Infrastructure: Unauthenticated XML Payload Injection #iOSActivationInfrastructure #UnauthenticatedXMLInjection #IndependentVoicesApp #CtrlKSignin https://substack.com/home/post/p-165008980
Substack
iOS Activation Infrastructure: Unauthenticated XML Payload Injection
A backend flaw in Apple’s iOS infrastructure enables stealth provisioning on iPhones before the user ever sees a home screen.
Root CA Emergency Self-Termination Protocol (RTO-Extension) #RootCA #CompromiseDetection #EmergencyResponse #RapidTermination #GameTheoreticAnaIysis https://datatracker.ietf.org/doc/html/draft-jahnke-ca-self-revocation-04
IETF Datatracker
Root CA Emergency Self-Termination Protocol (RTO-Extension)
This document defines a cryptographically secure mechanism for Root Certificate Authorities to perform emergency self-termination upon compromise detection. Current PKI architecture creates a mathematical impossibility: Root CAs cannot be cryptographically…
Root Shell on Credit Card Terminal #RootShell #CreditCardTerminal #SecurityResearch #FirmwareExtraction #ExposedRootShell https://stefan-gloor.ch/yomani-hack