Guest Post: How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets #GitHubSecurity #LeakedSecrets #OopsCommits #TruffleHog #BugBounty https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets
Trufflesecurity
Guest Post: How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets ◆ Truffle Security Co.
GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. GitHub keeps these dangling commits, from what we can tell, forever. In the archive, they…
🔥2
Copy-Paste Pitfalls: Revealing the AppLocker Bypass Risks in The Suggested Block-list Policy #AppLocker #BypassRisk #BlocklistPolicy #ConfigurationError #CopyPastePitfalls https://www.varonis.com/blog/applocker-bypass-risks
Varonis
Copy-Paste Pitfalls: Revealing the AppLocker Bypass Risks in The Suggested Block-list Policy
A subtle versioning error in Microsoft’s AppLocker block list exposes a bypass risk — learn how to spot and fix this overlooked security gap.
Your Loyalty Card is a Liability: Lessons from the Co-op Hack #LoyaltyCardRisk #CoopHack #DataBreach #ConsumerPrivacy #SecurityLessons https://substack.com/home/post/p-168474995
Substack
Your Loyalty Card is a Liability: Lessons from the Co-op Hack
The Hidden Cost of Supermarket Loyalty: Data, Dependence, and Risk
What Is a Man-in-the-Middle Attack? https://www.proofpoint.com/us/threat-reference/man-in-the-middle-attack-mitm
Proofpoint
What Is a Man-in-the-Middle Attack? MitM Attacks Explained | Proofpoint US
A Man-in-the-Middle (MitM) is a form of data eavesdropping and theft. Learn what it is, how it works, how to prevent attacks, and more.
Enumerating Windows clipboard history in PowerShell https://devblogs.microsoft.com/oldnewthing/20230303-00/?p=107894
Microsoft News
Enumerating Windows clipboard history in PowerShell
Doing Windows Runtime things from PowerShell.
Path traversal issue in Vim’s zip.vim plugin #VimVulnerability #PathTraversal #CVE202553906 #FileOverwrite #SecurityPatch https://nvd.nist.gov/vuln/detail/CVE-2025-53906
Path traversal issue in Vim’s tar.vim plugin #Vim #PathTraversal #CVE202553905 #FileOverwrite #TarVim https://nvd.nist.gov/vuln/detail/CVE-2025-53905
A Novel Technique for SQL Injection in PDO’s Prepared Statements https://slcyber.io/assetnote-security-research-center/a-novel-technique-for-sql-injection-in-pdos-prepared-statements/
Searchlight Cyber
Novel SQL Injection Technique in PDO Prepared Statements
Searchlight Cyber's Security Research team details a Novel Technique for SQL Injection in PDO's Prepared Statements.
The Internet Red Button: a 2016 Bug Still Lets Anyone Kill Solar Farms in 3 Clicks https://reporter.deepspecter.com/the-internet-red-button-a-2016-bug-still-lets-anyone-kill-solar-farms-in-3-clicks-042eeca7df33
Medium
The Internet Red Button: a 2016 Bug Still Lets Anyone Kill Solar Farms in 3 Clicks
Spain’s April 2025 blackout cost €1.6 B. Keep ignoring firmware updates and you’re volunteering to be the sequel.
Quick-Skoping through Netskope SWG Tenants - CVE-2024-7401 #Netskope #CVE20247401 #Vulnerability #Impersonation #QuickSkope https://quickskope.com/
QuickSkope
Quick-Skoping through Netskope SWG Tenants - CVE-2024-7401
## Table of Contents1. [Introduction](#introduction)2. [Understanding How Netskope Client Works](#understanding-how-netskope-client-works)3. [Scraping for Ne...
Fixing A FakeNet/-NG PCAP #FakeNetNG #PacketSmith #PCAPFix #MalwareAnalysis #NetworkTraffic https://packetsmith.ca/tutorial-fakenet/
PacketSmith
Fixing FakeNet-NG - PacketSmith
Fixing A FakeNet/-NG PCAP Introduction In this tutorial, we’ll demonstrate some of PacketSmith’s capabilities by using a pcap file generated by FakeNet-NG. FakeNet-NG is an open-source, next-generation dynamic network analysis tool developed by Mandiant,…
How We Accidentally Discovered a Remote Code Execution Vulnerability in ETQ Reliance https://slcyber.io/assetnote-security-research-center/how-we-accidentally-discovered-a-remote-code-execution-vulnerability-in-etq-reliance/
Searchlight Cyber
RCE Vulnerability Discovered in ETQ Reliance | Searchlight Cyber
Note: In correspondence with Hexagon while disclosing the bugs below, they informed us that any sharing of source code would be considered a violation of their terms and license. The Java code has been replaced with similar code that illustrates the flow…
Invision Community <= 5.0.7 (oauth/callback) Reflected Cross-Site Scripting Vulnerability https://karmainsecurity.com/KIS-2025-05
Karmainsecurity
Invision Community <= 5.0.7 (oauth/callback) Reflected Cross-Site Scripting Vulnerability | Karma(In)Security
This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.
The Guest Who Could: Exploiting LPE in VMWare Tools #VMwareTools #VGAuth #LPE #NamedPipeAttack #ArbitraryFile https://swarm.ptsecurity.com/the-guest-who-could-exploiting-lpe-in-vmware-tools/
PT SWARM
The Guest Who Could: Exploiting LPE in VMWare Tools
VMWare Tools provides a rich set of drivers and services that enhance manageability of virtual machines and enable guest-host communication. While the host-to-guest RPC mechanisms have long been attractive targets for vulnerability research due to their potential…
Hijacking Cursor’s Agent: How We Took Over an EC2 Instance #CursorAgentHack #EC2Takeover #DockerEscape #SaaSSecurity #CloudVulnerability https://www.reco.ai/blog/hijacking-cursors-agent-how-we-took-over-an-ec2-instance
SharePoint ToolShell – One Request PreAuth RCE Chain Please provide the text you would like me to summarize! I need the content to create the 5 hashtags. https://blog.viettelcybersecurity.com/sharepoint-toolshell/
Understanding Current CastleLoader Campaigns https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview#heading-1000
30 statistics about data breaches https://www.ooma.com/blog/30-statistics-about-data-breaches/
Ooma.com - Smart solutions for home and business.
30 statistics about data breaches | Ooma
Data breaches remain a massive concern and have seemed to shift from rare occurrences to disturbingly common ones. Here is what you need to know.
Stack Overflows, Heap Overflows, and Existential Dread (SonicWall SMA100 CVE-2025-40596, CVE-2025-40597 and CVE-2025-40598) https://labs.watchtowr.com/stack-overflows-heap-overflows-and-existential-dread-sonicwall-sma100-cve-2025-40596-cve-2025-40597-and-cve-2025-40598/
watchTowr Labs
Stack Overflows, Heap Overflows, and Existential Dread (SonicWall SMA100 CVE-2025-40596, CVE-2025-40597 and CVE-2025-40598)
It’s 2025, and at this point, we’re convinced there’s a secret industry-wide pledge: every network appliance must include at least one trivially avoidable HTTP header parsing bug - preferably pre-auth. Bonus points if it involves sscanf.
If that’s the case…
If that’s the case…
CrushFTP RCE Explained #CrushFTP #RCE #Exploit #Unauthenticated #XMLRPC https://pwn.guide/free/web/crushftp