Finding SSRFs in Azure DevOps - Part 2 #SSRF #AzureDevOps #AzureSecurity #DNSRebinding #SourceCodeDebugging https://binsec.no/posts/2025/05/finding-ssrfs-in-devops-part2
Binary Security AS
Finding SSRFs in Azure DevOps - Part 2
Binary Security was previously rewarded for three Server-Side Request Forgery (SSRF) vulnerabilities in Azure DevOps, which you can read about here. Now we have found another SSRF vulnerability that we also reported to Microsoft. We then bypassed Microsoft’s…
LOLCLOUD - Azure Arc - C2aaS #AzureArc #C2aaS #AndyGill #RedTeam #DetectionEngineering https://blog.zsec.uk/azure-arc-c2aas/
ZephrSec - Adventures In Information Security
Azure Arc - C2aaS
Exploring Azure Arc’s overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
Wireless Pivots: How Trusted Networks Become Invisible Threat Vectors #WirelessPivots #ThreatVectors #WiFiSecurity #WPA2 #EAPTLS https://www.thexero.co.uk/wifi/wireless-pivots
TheXero
Wireless Pivots: How Trusted Networks Become Invisible Threat Vectors
Discover how attackers exploit trusted wireless networks using rogue APs, wireless pivots, and legacy protocols to turn secure EAP-TLS deployments into invisible attack surfaces.
Beyond HTTP: InterceptSuite for TCP/TLS Traffic Interception #InterceptSuite #TCP #TLS #TrafficInterception #NetworkSecurity https://blog.souravkalal.tech/beyond-http-interceptsuite-for-tcp-tls-traffic-interception-in-windows-518934bba22f
Medium
Beyond HTTP: InterceptSuite for TCP/TLS Traffic Interception
InterceptSuite is a tool I created to intercept and analyse network traffic in desktop applications, whether encrypted or not. Unlike…
😱1
Can You Turn a Normal USB into a Bad KB? Exploring the Limits and Cybersecurity Uses #USBHacking #Cybersecurity #BadUSB #Limitations #EthicalHacking https://medium.com/@Ayush.S.K/can-you-turn-a-normal-usb-into-a-bad-kb-exploring-the-limits-and-cybersecurity-uses-f3ba11e491c4
Medium
Can You Turn a Normal USB into a Bad KB? Exploring the Limits and Cybersecurity Uses
Converting a Normal SanDisk USB into a Bad USB or Rubber Ducky
Security Issues Found in preinstalled apps on Android Smartphones #AndroidSecurity #PreinstalledApps #VulnerabilitiesFound #DataTheft #DeviceManipulation https://www.mobile-hacker.com/2025/06/02/security-issues-found-in-android-smartphones/
Mobile Hacker
Security Issues Found in preinstalled apps on Android Smartphones
Security researchers have uncovered several critical vulnerabilities in applications preloaded on Ulefone and Krüger&Matz Android smartphones. These flaws, reported by CERT Polska and discovered by Szymon Chadam, expose users to significant risks, including…
iOS Activation Infrastructure: Unauthenticated XML Payload Injection #iOSActivationInfrastructure #UnauthenticatedXMLInjection #IndependentVoicesApp #CtrlKSignin https://substack.com/home/post/p-165008980
Substack
iOS Activation Infrastructure: Unauthenticated XML Payload Injection
A backend flaw in Apple’s iOS infrastructure enables stealth provisioning on iPhones before the user ever sees a home screen.
Root CA Emergency Self-Termination Protocol (RTO-Extension) #RootCA #CompromiseDetection #EmergencyResponse #RapidTermination #GameTheoreticAnaIysis https://datatracker.ietf.org/doc/html/draft-jahnke-ca-self-revocation-04
IETF Datatracker
Root CA Emergency Self-Termination Protocol (RTO-Extension)
This document defines a cryptographically secure mechanism for Root Certificate Authorities to perform emergency self-termination upon compromise detection. Current PKI architecture creates a mathematical impossibility: Root CAs cannot be cryptographically…
Root Shell on Credit Card Terminal #RootShell #CreditCardTerminal #SecurityResearch #FirmwareExtraction #ExposedRootShell https://stefan-gloor.ch/yomani-hack
How to build a high-performance network fuzzer with LibAFL and libdesock #NetworkFuzzing #Efficiency #LibAFL #Libdesock #PerformanceBoost https://lolcads.github.io/posts/2025/05/high_performance_network_fuzzing/
lolcads tech blog
How to build a high-performance network fuzzer with LibAFL and libdesock
We explain how we built a fuzzer for network applications that we tried to make as efficient and as effective as possible. We utilized custom mutators and input passing over shared memory and found that it gave us a huge speed and coverage boost compared…
So you want to rapidly run a BOF? Let's look at this 'cli4bofs' thing then #BOF #cli4bofs #metadata #BOFcollection #testing https://blog.z-labs.eu/2025/06/04/all-about-cli4bofs-tool.html
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities #InfobloxNetMRI #RCE #SQLi #FileReadVulnerabilities https://rhinosecuritylabs.com/research/infoblox-multiple-cves/
Rhino Security Labs
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
While performing research on Infoblox's NetMRI network automation and configuration management solution, we discovered 5 vulnerabilities.
Analysis of Spyware That Helped to Compromise a Syrian Army from Within #SyrianArmyCompromised #AndroidSpyware #SpyMax #SyrianCrisis #CybersecurityAnalysis https://www.mobile-hacker.com/2025/06/05/analysis-of-spyware-that-helped-to-compromise-a-syrian-army-from-within/
Mobile Hacker
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
This case demonstrates that effective smartphone espionage doesn't always require expensive zero-day exploits or the development of sophisticated, custom and undetected spyware. Instead, attackers can achieve significant intelligence gains using older, off…
🔥1
Tnok – Next Generation Port Security #Tnok #NextGeneration #PortSecurity #AIS #AssuredInformationSecurity https://www.ainfosec.com/tnok-next-generation-port-security
Cards Are Still the Weakest Link #CardsNotSafe #WalletsAreSecure #CryptogramReplayFraud #MerchantSecurityChecks #WalletsAreTheFuture https://paymentvillage.substack.com/p/cards-are-still-the-weakest-link
Substack
Cards Are Still the Weakest Link
Still Using Cards? You’re the Weakest Link in the Payment Chain
Riding The Time Machine: Journey Through An Old vBulletin PHP Object Injection #vBulletin4 #PHPObjectInjection #TimeMachine #LegacyCode #RCEExploitation https://karmainsecurity.com/riding-the-time-machine-old-vbulletin-php-object-injection
Karmainsecurity
Riding The Time Machine: Journey Through An Old vBulletin PHP Object Injection | Karma(In)Security
This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.
Bruteforcing the phone number of any Google user #GoogleBruteforce #PhoneNumberRecovery #NoJSForm #BotGuardToken #VendorDisclosure https://brutecat.com/articles/leaking-google-phones
brutecat.com
Leaking the phone number of any Google user
From rate limits to no limits: How IPv6's massive address space and a crafty botguard bypass left every Google user's phone number vulnerable
🔥3
CVE-2025-47934 – Spoofing OpenPGP.js signature verification https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/
codeanlabs
CVE-2025-47934 - Spoofing OpenPGP.js signature verification - Codean Labs
CVE-2025-47934 allows attackers to spoof arbitrary signatures and encrypted emails that appear as valid in OpenPGP.js. The only requirement is access to a single valid signed message from the target author ("Alice"). Since this undermines the core principle…
Code execution from web browser using URL schemes handled by KDE's KTelnetService and Konsole (CVE-2025-49091) #proofnet #KDE #Konsole #CVE202549091 #CodeExecution https://proofnet.de/publikationen/konsole_rce.html
proofnet.de
proofnet - Code execution from web browser using URL schemes handled by KDE's KTelnetService and Konsole (CVE-2025-49091)
proofnet ist spezialisiert auf Security PenTests im Connected Car Umfeld.
A Look in the Mirror - The Reflective Kerberos Relay Attack #KerberosRelayAttack #ReflectiveAttack #CVE202533073 #PatchTuesday #SecurityDisclosure https://blog.redteam-pentesting.de/2025/reflective-kerberos-relay-attack/
RedTeam Pentesting - Blog
A Look in the Mirror - The Reflective Kerberos Relay Attack
It is a sad truth in IT security that some vulnerabilities never quite want to die and time and time again, vulnerabilities that have long been fixed get revived and come right back at you. While researching relay attacks, the bane of Active …