Improper Privilege Management in Grails Spring Security Core <= 5.1.0 CVE-2022-41923 - Synacktiv [PDF]
https://ift.tt/40MbEsw
Submitted March 24, 2023 at 07:09PM by Gallus
via reddit https://ift.tt/x2cQVIw
https://ift.tt/40MbEsw
Submitted March 24, 2023 at 07:09PM by Gallus
via reddit https://ift.tt/x2cQVIw
Top 10 Mobile App Security Risks #1 — Improper Platform Usage on Android
https://ift.tt/rJNQhd2
Submitted March 24, 2023 at 08:36PM by RikoTheMachete
via reddit https://ift.tt/qlpCB4v
https://ift.tt/rJNQhd2
Submitted March 24, 2023 at 08:36PM by RikoTheMachete
via reddit https://ift.tt/qlpCB4v
Medium
Top 10 Mobile App Security Risks #1 — Improper Platform Usage on Android
The first article in a series dedicated to the OWASP Mobile Top 10 — a comprehensive list of the most common and significant security…
Have you ever heard of apk.sh? It makes reverse engineering Android apps easier.
https://ift.tt/GFdoUBS
Submitted March 24, 2023 at 11:13PM by FipoKa
via reddit https://ift.tt/60xsDgw
https://ift.tt/GFdoUBS
Submitted March 24, 2023 at 11:13PM by FipoKa
via reddit https://ift.tt/60xsDgw
GitHub
GitHub - ax/apk.sh: apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding…
apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK. - GitHub - ax/apk.sh: apk.sh makes reverse engineering...
2023 Red Canary Threat Detection Report
https://ift.tt/P4ca0EB
Submitted March 25, 2023 at 01:49AM by RedCanaryCo
via reddit https://ift.tt/ZpHxWfq
https://ift.tt/P4ca0EB
Submitted March 25, 2023 at 01:49AM by RedCanaryCo
via reddit https://ift.tt/ZpHxWfq
Red Canary
2023 Red Canary Threat Detection Report
View our latest threat report to learn about the top cyber threats, MITRE ATT&CK® techniques, and detection trends from the year.
Twitter Removed My Two-Factor Authentication Without Notice
https://ift.tt/c7eA5n8
Submitted March 25, 2023 at 03:33AM by Slapbox
via reddit https://ift.tt/36SUalh
https://ift.tt/c7eA5n8
Submitted March 25, 2023 at 03:33AM by Slapbox
via reddit https://ift.tt/36SUalh
Hacked.com
Twitter Removed My Two-Factor Authentication Without Notice
I woke up to a shocking email today. Twitter had turned off my two-factor authentication without my knowledge or approval.
Open Source API Security Tool
https://ift.tt/NfL9hwy
Submitted March 25, 2023 at 04:32AM by LawfulnessFlat9560
via reddit https://ift.tt/giCXpsO
https://ift.tt/NfL9hwy
Submitted March 25, 2023 at 04:32AM by LawfulnessFlat9560
via reddit https://ift.tt/giCXpsO
GitHub
GitHub - metlo-labs/metlo: Metlo is an open-source API security platform.
Metlo is an open-source API security platform. Contribute to metlo-labs/metlo development by creating an account on GitHub.
Simple Shellcode Dissection
https://ift.tt/JEvTmqb
Submitted March 25, 2023 at 04:30AM by _vavkamil_
via reddit https://ift.tt/ZF5N3Sm
https://ift.tt/JEvTmqb
Submitted March 25, 2023 at 04:30AM by _vavkamil_
via reddit https://ift.tt/ZF5N3Sm
SANS Internet Storm Center
InfoSec Handlers Diary Blog - SANS Internet Storm Center
Internet Storm Center Diary 2023-04-13, Author: Johannes Ullrich
InjectGPT: remote code execution by asking nicely (literally)
https://ift.tt/3EpSfgH
Submitted March 25, 2023 at 03:05PM by TheMedianPrinter
via reddit https://ift.tt/DVJ3Kd6
https://ift.tt/3EpSfgH
Submitted March 25, 2023 at 03:05PM by TheMedianPrinter
via reddit https://ift.tt/DVJ3Kd6
Synthetic Memory Protections: An update on ROP mitigations [PDF]
https://ift.tt/Ij21tfZ
Submitted March 25, 2023 at 10:17PM by Gallus
via reddit https://ift.tt/6gwia9k
https://ift.tt/Ij21tfZ
Submitted March 25, 2023 at 10:17PM by Gallus
via reddit https://ift.tt/6gwia9k
Breaking Pedersen Hashes in Practice
https://ift.tt/2SbolU8
Submitted March 26, 2023 at 07:41AM by Gallus
via reddit https://ift.tt/2lHmMsB
https://ift.tt/2SbolU8
Submitted March 26, 2023 at 07:41AM by Gallus
via reddit https://ift.tt/2lHmMsB
NCC Group Research Blog
Breaking Pedersen Hashes in Practice
The Pedersen hash function has gained popularity due to its efficiency in the arithmetic circuits used in zero-knowledge proof systems. Hash functions are a crucial primitive in cryptography, and z…
The rising trend of malicious packages in open source ecosystems | Snyk
https://ift.tt/Q3Nx1mw
Submitted March 26, 2023 at 01:16PM by lirantal
via reddit https://ift.tt/0cCmusf
https://ift.tt/Q3Nx1mw
Submitted March 26, 2023 at 01:16PM by lirantal
via reddit https://ift.tt/0cCmusf
Snyk
The rising trend of malicious packages in open source ecosystems | Snyk
In this article, we want to share a broader picture of how the Snyk security team is monitoring and disclosing security incidents concerning malicious packages.
shortest input that will trick GPT to reveal the secret key
https://gpa.43z.one
Submitted March 26, 2023 at 04:41PM by aNieke4bToSega8cIomu
via reddit https://ift.tt/7DMcx1X
https://gpa.43z.one
Submitted March 26, 2023 at 04:41PM by aNieke4bToSega8cIomu
via reddit https://ift.tt/7DMcx1X
Reddit
r/netsec on Reddit: shortest input that will trick GPT to reveal the secret key
Posted by u/aNieke4bToSega8cIomu - 59 votes and 16 comments
New OST2 class: "Vulnerabilities 1002: C-Family Software Implementation Vulnerabilities"
https://ift.tt/fDpq635
Submitted March 27, 2023 at 05:50PM by OpenSecurityTraining
via reddit https://ift.tt/vowpPcN
https://ift.tt/fDpq635
Submitted March 27, 2023 at 05:50PM by OpenSecurityTraining
via reddit https://ift.tt/vowpPcN
p.ost2.fyi
Vulnerabilities 1002: C-Family Software Implementation Vulnerabilities
This class teaches developers about vulnerabilities so that they can avoid writing them, and it teaches vulnerability hunters how to find them so they can be reported. The vulnerabilities covered in this class are uninitialized data access (UDA), race conditions…
SSH Security: Protecting Linux Server from Threats
https://ift.tt/lCR3okQ
Submitted March 27, 2023 at 05:31PM by Unprotectedtxt
via reddit https://ift.tt/uwpezgo
https://ift.tt/lCR3okQ
Submitted March 27, 2023 at 05:31PM by Unprotectedtxt
via reddit https://ift.tt/uwpezgo
Linux Blog
SSH Security: Protecting Your Linux Server from Threats
As an essential tool for managing servers, SSH (Secure Shell) provides a secure way to remotely access a server's command line. However, for best SSH
Using an Undocumented Amplify API to Leak AWS Account IDs
https://ift.tt/AI3lj9S
Submitted March 27, 2023 at 08:00PM by RedTermSession
via reddit https://ift.tt/KApIgea
https://ift.tt/AI3lj9S
Submitted March 27, 2023 at 08:00PM by RedTermSession
via reddit https://ift.tt/KApIgea
Frichetten
Using an Undocumented Amplify API to Leak AWS Account IDs
Writeup for a technique I found to leak an AWS account ID from an Amplify app.
The curl quirk that exposed Burp Suite & Google Chrome
https://ift.tt/KrS7Qes
Submitted March 28, 2023 at 06:56PM by albinowax
via reddit https://ift.tt/BWGLY3c
https://ift.tt/KrS7Qes
Submitted March 28, 2023 at 06:56PM by albinowax
via reddit https://ift.tt/BWGLY3c
PortSwigger Research
The curl quirk that exposed Burp Suite & Google Chrome
In this post, we'll explore a little-known feature in curl that led to a local-file disclosure vulnerability in both Burp Suite Pro, and Google Chrome. We patched Burp Suite a while back, but suspect
The Case For Improving Crypto Wallet Security
https://ift.tt/7VCFn9u
Submitted March 28, 2023 at 08:46PM by nibblesec
via reddit https://ift.tt/9fiuTOs
https://ift.tt/7VCFn9u
Submitted March 28, 2023 at 08:46PM by nibblesec
via reddit https://ift.tt/9fiuTOs
Doyensec
The Case For Improving Crypto Wallet Security · Doyensec's Blog
Doyensec's Blog :: Doyensec is an independent security research and development company focused on vulnerability discovery and remediation.
🔒Beyond Firmware Encryption: Enhancing Embedded Device Security
https://ift.tt/mvt3uDM
Submitted March 29, 2023 at 06:43PM by attilaszia
via reddit https://ift.tt/jXNBcIV
https://ift.tt/mvt3uDM
Submitted March 29, 2023 at 06:43PM by attilaszia
via reddit https://ift.tt/jXNBcIV
Bugprove
Beyond Firmware Encryption: Enhancing Embedded Device Security
Discover why firmware encryption alone is not enough to protect IoT devices from hacking and how you can enhance your embedded device security.
How to Scan Vulnerabilities With Nmap: A Comprehensive Guide
https://ift.tt/r9JtQEP
Submitted March 29, 2023 at 06:29PM by KingSash
via reddit https://ift.tt/D8XEnRe
https://ift.tt/r9JtQEP
Submitted March 29, 2023 at 06:29PM by KingSash
via reddit https://ift.tt/D8XEnRe
StationX
How to Scan Vulnerabilities With Nmap: A Comprehensive Guide
If you want to conduct a vulnerability scan, you can use Nmap, which is a popular tool for the security testing process. Nmap is a powerful and versatile network scanning t...
Spyware vendors use 0-days and n-days against popular platforms
https://ift.tt/q9snRFC
Submitted March 29, 2023 at 07:29PM by YogiBerra88888
via reddit https://ift.tt/MThYKQu
https://ift.tt/q9snRFC
Submitted March 29, 2023 at 07:29PM by YogiBerra88888
via reddit https://ift.tt/MThYKQu
Google
Spyware vendors use 0-days and n-days against popular platforms
Google’s Threat Analysis Group (TAG) tracks actors involved in information operations (IO), government backed attacks and financially motivated abuse. For years, TAG has been tracking the activities of commercial spyware vendors to protect users. Today, we…
Bypassing DEP with gap restrictions
https://ift.tt/V7zZpyi
Submitted March 29, 2023 at 10:34PM by CarelessOne7933
via reddit https://ift.tt/A17Ckzv
https://ift.tt/V7zZpyi
Submitted March 29, 2023 at 10:34PM by CarelessOne7933
via reddit https://ift.tt/A17Ckzv
divyanshu-mehta.gitbook.io
Bypassing DEP - Increasing the Gap
This blog talks about how to use WriteProcessMemory API Call for executing shellcode in a scenario where there is very less gap between shellcode and WriteProcessMemory call skeleton