Understanding Current CastleLoader Campaigns https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview#heading-1000
30 statistics about data breaches https://www.ooma.com/blog/30-statistics-about-data-breaches/
Ooma.com - Smart solutions for home and business.
30 statistics about data breaches | Ooma
Data breaches remain a massive concern and have seemed to shift from rare occurrences to disturbingly common ones. Here is what you need to know.
Stack Overflows, Heap Overflows, and Existential Dread (SonicWall SMA100 CVE-2025-40596, CVE-2025-40597 and CVE-2025-40598) https://labs.watchtowr.com/stack-overflows-heap-overflows-and-existential-dread-sonicwall-sma100-cve-2025-40596-cve-2025-40597-and-cve-2025-40598/
watchTowr Labs
Stack Overflows, Heap Overflows, and Existential Dread (SonicWall SMA100 CVE-2025-40596, CVE-2025-40597 and CVE-2025-40598)
It’s 2025, and at this point, we’re convinced there’s a secret industry-wide pledge: every network appliance must include at least one trivially avoidable HTTP header parsing bug - preferably pre-auth. Bonus points if it involves sscanf.
If that’s the case…
If that’s the case…
CrushFTP RCE Explained #CrushFTP #RCE #Exploit #Unauthenticated #XMLRPC https://pwn.guide/free/web/crushftp
Attacking GenAI applications and LLMs – Sometimes all it takes is to ask nicely! https://security.humanativaspa.it/attacking-genai-applications-and-llms-sometimes-all-it-takes-is-to-ask-nicely/
HN Security
Attacking GenAI applications and LLMs - Sometimes all it takes is to ask nicely! - HN Security
Real-world attack examples against GenAI and LLMs, highlighting attack techniques and often-overlooked security risks.
Be Patient and Keep it Simple, The Bug is There https://anasbetis023.medium.com/be-patient-and-keep-it-simple-the-bug-is-there-bdc93cfe50c6
Medium
Be Patient and Keep it Simple, The Bug is There
Good Day!
Remember, remember the 5th of November, gunpowder, treason and plot; for there is a reason why gunpowder and treason should ne'er be forgot
🤯3👍2
Kaoru Hash: A Constant-Free, Message-Emergent Hash Function Specification and Security Rationale #OpenScience #Research #Collaboration #Reproducibility #Framework https://osf.io/tgrzc/overview
InversePrompt: Turning Claude Against Itself, One Prompt at a Time (CVE-2025-54794 & CVE-2025-54795) #InversePrompt #ClaudeCode #CommandInjection #PathBypass #AIHackingAI https://cymulate.com/blog/cve-2025-547954-54795-claude-inverseprompt/
Cymulate
InversePrompt: Turning Claude Against Itself, One Prompt at a Time (CVE-2025-54794 & CVE-2025-54795)
Discovered flaws in Claude Code expose path restriction bypass and command injection risks - turning AI inward with inverse prompting
New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer #DarkCloudStealer #InfectionChain #ConfuserEx #VB6Malware #ThreatAnalysis https://unit42.paloaltonetworks.com/new-darkcloud-stealer-infection-chain/
Unit 42
New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
DarkCloud Stealer's delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in Visual Basic 6.
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault #HashiCorpVault #ZeroDay #AuthBypass #RCE #LogicFlaws https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/
Cyata | The Control Plane for Agentic Identity
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyata | The…
Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust…
We replaced passwords with something worse Response: #Authentication #SecurityFlaw #6DigitCode #PhishingAlert #WorseThanPasswords https://blog.danielh.cc/blog/passwords
blog.danielh.cc
We replaced passwords with something worse | Blog - Daniel Huang
where my words occasionally escape /dev/null
CVE-2024-12718: Path Escape via Python’s tarfile Extraction Filters #JavaScript #Cookies #Enable #WebsiteAccess #BrowserSettings https://www.upwind.io/feed/cve-2024-12718-path-escape-via-pythons-tarfile-extraction-filters
Upwind | Cloud Security Happens at Runtime
CVE-2024-12718: Path Escape via Python’s tarfile Extraction Filters
A newly disclosed vulnerability in Python’s standard library, CVE-2024-12718, allows attackers to modify file metadata or file permissions outside the intended extraction directory. This issue affects systems running Python 3.12 and above when using tarfile.extract()…
🔥1
Prompt injection engineering for attackers: Exploiting GitHub Copilot #PromptInjection #GitHubCopilot #AIAgentSecurity #BackdoorAttack #SupplyChainSecurity https://blog.trailofbits.com/2025/08/06/prompt-injection-engineering-for-attackers-exploiting-github-copilot/
The Trail of Bits Blog
Prompt injection engineering for attackers: Exploiting GitHub Copilot
Prompt injection pervades discussions about security for LLMs and AI agents. But there is little public information on how to write powerful, discreet, and reliable prompt injection exploits. In this post, we will design and implement a prompt injection exploit…
Exploiting Retbleed in the real world #Retbleed #Exploitation #RealWorld #CPU #Security https://bughunters.google.com/blog/6243730100977664/exploiting-retbleed-in-the-real-world
Google
Blog: Exploiting Retbleed in the real world
Curious to hear about our experience exploiting Retbleed (a security vulnerability affecting modern CPUs)? Then check out this post to see how we pushed the boundaries of Retbleed exploitation and understand more about the security implications of this exploit…
Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications #EntraOAuth #MicrosoftVulnerability #MultiTenantMisconfig #InternalAccess #BugBounty https://research.eye.security/consent-and-compromise/
Eye Research
Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
The Eye Security Research team has uncovered a new critical misconfiguration that exposed sensitive data at internal Microsoft applications.
Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge #AICyberChallenge #LLMAgents #VulnerabilityResearch #SoftwareSecurity #AutonomousHacking https://theori.io/blog/exploring-traces-63950
theori.io
Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge - Theori BLOG
Agent trajectory walkthroughs of a fully autonomous hacking system | AI for Security, AIxCC
Pentest Trick: Out of sight, out of mind with Windows Long File Names #PentestTrick #EDREvasion #LongFileNames #PayloadStealth #MAX_PATHBypass https://www.zerosalarium.com/2025/08/pentest-trick-out-of-sight-out-of-mind-long-filename.html
Zerosalarium
Pentest Trick: Out of sight, out of mind with Windows Long File Names
Abusing Windows file names that exceed 260 characters to bypass the EDR's sample collection tool by the pentester. Redteam trick
From Drone Strike to File Recovery: Outsmarting a Nation State #IranCyberattack #DarkBitRansomware #ESXiDataRecovery #BreakingEncryption #NationStateOutsmarted https://profero.io/blog/from-drone-strike-to-file-recovery-outsmarting-a-nation-state
profero.io
From Drone Strike to File Recovery: Outsmarting a Nation State
Walk through our investigation workflow, cryptographic analysis, and end-to-end data-recovery strategy, proving that "encrypted" doesn't mean unrecoverable
Zero Click, One NTLM: Microsoft Security Patch Bypass (CVE-2025-50154) #CVE202550154 #ZeroClick #NTLMLLeak #PatchBypass #RemoteBinary https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/
Cymulate
Zero Click, One NTLM: Microsoft Security Patch Bypass (CVE-2025-50154)
Learn about CVE-2025-50154 and its risk of NTLM attacks and RCE even after Microsoft’s fix for CVE-2025-24054.