bOt@zerobytes.monsterM · 5 hours agoKirin: Hitting the Internet with Distributed BGP Announcementsplus-squarekirin-attack.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKirin: Hitting the Internet with Distributed BGP Announcementsplus-squarekirin-attack.github.iobOt@zerobytes.monsterM · 5 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 hours agoRace Conditions Found in Open-source IAM Solution Keycloakplus-squarewww.cyberark.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRace Conditions Found in Open-source IAM Solution Keycloakplus-squarewww.cyberark.combOt@zerobytes.monsterM · 5 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoLaZagne: Open-source password recovery toolplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLaZagne: Open-source password recovery toolplus-squaremedium.combOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoCVE-2024-27292: docAssembling exploits for RCEplus-squaretantosec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-27292: docAssembling exploits for RCEplus-squaretantosec.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoProject Naptime: Evaluating Offensive Security Capabilities of Large Language Modelsplus-squaregoogleprojectzero.blogspot.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkProject Naptime: Evaluating Offensive Security Capabilities of Large Language Modelsplus-squaregoogleprojectzero.blogspot.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoPostviewer V3 - Racing All The Way To Glory (Google CTF)plus-squareeyald.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPostviewer V3 - Racing All The Way To Glory (Google CTF)plus-squareeyald.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoBytecode Breakdown: Unraveling Factorio's Lua Security Flawsplus-squarememorycorruption.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBytecode Breakdown: Unraveling Factorio's Lua Security Flawsplus-squarememorycorruption.netbOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoUnderstanding Protected Management Frames - Part 2plus-squarewww.thexero.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnderstanding Protected Management Frames - Part 2plus-squarewww.thexero.co.ukbOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days agoSouth Korean telecom company attacks customers with malware — over 600,000 torrent users report missing files, strange folders, and disabled PCsplus-squarewww.tomshardware.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSouth Korean telecom company attacks customers with malware — over 600,000 torrent users report missing files, strange folders, and disabled PCsplus-squarewww.tomshardware.combOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days ago17 vulnerabilities in Sharp Multi-Function Printersplus-squarepierrekim.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link17 vulnerabilities in Sharp Multi-Function Printersplus-squarepierrekim.github.iobOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days agoSustaining Digital Certificate Security - Entrust Certificate Distrustplus-squaresecurity.googleblog.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSustaining Digital Certificate Security - Entrust Certificate Distrustplus-squaresecurity.googleblog.combOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days agoFuzzing scripting languages' interpreters' native functions using AFL++ to find memory corruption and moreplus-squarejoshua.huexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFuzzing scripting languages' interpreters' native functions using AFL++ to find memory corruption and moreplus-squarejoshua.hubOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoPhantom Secrets: Undetected Secrets Expose Major Corporationsplus-squarewww.aquasec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhantom Secrets: Undetected Secrets Expose Major Corporationsplus-squarewww.aquasec.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoLearn how unsafe deserialization vulnerabilities work in Ruby projects (+ working gadget chains)plus-squaregithub.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLearn how unsafe deserialization vulnerabilities work in Ruby projects (+ working gadget chains)plus-squaregithub.blogbOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoWhy nested deserialization is harmful: Magento XXE (CVE-2024-34102)plus-squarewww.assetnote.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhy nested deserialization is harmful: Magento XXE (CVE-2024-34102)plus-squarewww.assetnote.iobOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoA Novel DoS Vulnerability affecting WebRTC Media Serversplus-squarewww.rtcsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Novel DoS Vulnerability affecting WebRTC Media Serversplus-squarewww.rtcsec.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoMy AWS “Segmentation Test” Methodology for Pentesters v1.0plus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMy AWS “Segmentation Test” Methodology for Pentesters v1.0plus-squaremedium.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoAuth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) - watchTowr Labsplus-squarelabs.watchtowr.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAuth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) - watchTowr Labsplus-squarelabs.watchtowr.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoMIPS Emulation with Qilingplus-squarelabs.nettitude.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMIPS Emulation with Qilingplus-squarelabs.nettitude.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoORM Leak vulnerabilitiesplus-squarewww.elttam.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkORM Leak vulnerabilitiesplus-squarewww.elttam.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink