Series 2: Implementing the WPA in RAWPA - Part 2 https://kuwguap.github.io/posts/series-2-implementing-the-WPA-in-rawpa-part-2/
Rodney’s Intuition
Series 2: Implementing the WPA in RAWPA - Part 2
What’s up, everyone? I’m back with Part 2 on implementing the Web Penetration Assistant (WPA) logic in RAWPA. Last time, we talked about the initial steps, and now, I’ve got some major updates to share.
Navigating the "So What Now?" of CyberSecurity https://rawpa.vercel.app/
Novel SSRF Technique Involving HTTP Redirect Loops https://slcyber.io/assetnote-security-research-center/novel-ssrf-technique-involving-http-redirect-loops/
Searchlight Cyber
Novel SSRF Technique Involving HTTP Redirect Loops › Searchlight Cyber
It's difficult to show impact for Server-Side Request Forgery (SSRF) vulnerabilities when you cannot see the full HTTP response. Our research team details a novel technique that allowed for us to leak the full HTTP response, even though the SSRF seemed like…
MCP Authorization in 5 easy OAuth specs https://workos.com/blog/mcp-authorization-in-5-easy-oauth-specs
Workos
MCP Authorization in 5 easy OAuth specs — WorkOS
Behind every secure MCP integration is a stack of OAuth standards working in harmony. Learn how they combine to deliver seamless authorization for LLMs.
Deleting a file in Wire doesn’t remove it from servers — and other findings https://offsec.almond.consulting/deleting-file-wire-doesnt-remove-it.html
Cryptominers’ Anatomy: Shutting Down Mining Botnets https://www.akamai.com/blog/security-research/cryptominers-anatomy-shutting-down-mining-botnets
Akamai
Cryptominers’ Anatomy: Shutting Down Mining Botnets | Akamai
In the final installment of Cryptominers’ Anatomy, Akamai researchers analyze cryptominers and reveal a novel technique to shut down mining botnet campaigns.
Remote code execution in CentOS Web Panel - CVE-2025-48703 https://fenrisk.com/rce-centos-webpanel
Fenrisk
Remote code execution in CentOS Web Panel - CVE-2025-48703
Security experts
When Your Login Page Becomes the Frontline: Lessons from a Real-World DDoS Attack https://www.cloud-iam.com/post/our-resilience-against-cyber-attacks
Cloud-Iam
Our resilience against cyber attacks
As an IAM SaaS company, our work often remains in the shadows—until something goes wrong. Today, I want to shed light on how we handle security at the very first layer all IAM systems have: the login page. Specifically, I’ll walk you through an incident we…
Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 1 https://sud0ru.ghost.io/windows-inter-process-communication-a-deep-dive-beyond-the-surface-part-1/
Sud0Ru
Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 1
Windows Inter-Process Communication (IPC) is one of the most complex technologies in the Windows operating system. It consists of multiple layers that can work together or operate independently, depending on the usage context.
For example, you can use RPC…
For example, you can use RPC…
Analyzing the Windows 11 24H2 kernel shadow stack mitigation https://github.com/synacktiv/windows_kernel_shadow_stack
GitHub
GitHub - synacktiv/windows_kernel_shadow_stack: Proof of concepts demonstrating some aspects of the Windows kernel shadow stack…
Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation. - synacktiv/windows_kernel_shadow_stack
Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 2 https://sud0ru.ghost.io/windows-inter-process-communication-a-deep-dive-beyond-the-surface-part-2/
Sud0Ru
Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 2
Let’s continue our journey into the world of IPC. As I mentioned in part one, we’re starting with RPC (Remote Procedure Call). I also said in my strategy that I’d begin with a high-level network overview of the technology to understand how the interface is…
Windows Registry Manipulation https://onesithuation.medium.com/windows-registry-manipulation-48e6b4bab676
Medium
Windows Registry Manipulation
Episode 01
Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 3 https://sud0ru.ghost.io/windows-inter-process-communication-a-deep-dive-beyond-the-surface-part-3/
Sud0Ru
Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 3
In the previous part, we started digging into RPC — covering the server, the client, the interface, and topics like the endpoint mapper, well-known endpoints, and dynamic ones. Along the way, I mentioned a few things that I’d come back to later — like binding…
🔥1
Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 4 https://sud0ru.ghost.io/windows-inter-process-communication-a-deep-dive-beyond-the-surface-part-4/
Sud0Ru
Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 4
Welcome to the fourth part of the IPC series — and the third part focused specifically on RPC. Today, we’re going to talk about: RPC security, which will help complete the picture we've been building around how RPC works under the hood.
RPC security is a…
RPC security is a…
Introducing FileFix – A New Alternative to ClickFix Attacks https://www.mobile-hacker.com/2025/06/24/introducing-filefix-a-new-alternative-to-clickfix-attacks/
Mobile Hacker
Introducing FileFix – A New Alternative to ClickFix Attacks
A new browser attack vectors just dropped, and it’s called FileFix — an alternative to the well-known ClickFix attack. This method, discovered and shared by mrd0x, shows how attackers can to execute commands right from browser, without requesting target to…
When Backups Open Backdoors: Accessing Sensitive Cloud Data via "Synology Active Backup for Microsoft 365" https://modzero.com/en/blog/when-backups-open-backdoors-synology-active-backup-m365/
Modzero
When Backups Open Backdoors: Accessing Sensitive Cloud Data via "Synology Active Backup for Microsoft 365"
C4 Bomb: Blowing Up Chrome’s AppBound Cookie Encryption https://www.cyberark.com/resources/threat-research-blog/c4-bomb-blowing-up-chromes-appbound-cookie-encryption
Cyberark
C4 Bomb: Blowing Up Chrome’s AppBound Cookie Encryption
In July 2024, Google introduced a new feature to better protect cookies in Chrome: AppBound Cookie Encryption. This new feature was able to disrupt the world of infostealers, forcing the malware...
Meet APOTHEOSIS: our open-source system for scalable search in DF, combining fast hash lookups and approximate matching. Catch us at #DFRWS2025! @DFRWS Read more here: https://reversea.me/index.php/scalable-similarity-detection-in-digital-forensics-meet-apotheosis/ #DigitalForensics #OpenSource #PlanDeRecuperación #NextGenerationEU #ProyectosCiber