A complete OWASP API Top 10 Manual Testing Guide with vAPI
https://ift.tt/xUSVsuC
Submitted December 11, 2024 at 12:43PM by Altrntiv-to-security
via reddit https://ift.tt/opR14Is
https://ift.tt/xUSVsuC
Submitted December 11, 2024 at 12:43PM by Altrntiv-to-security
via reddit https://ift.tt/opR14Is
DarkRelay
OWASP API Testing Guide: A Visual Guide to OWASP API Testing with vAPI
Mastering OWASP API Testing: A Visual Guide to Testing OWASP Top 10 API Security with vAPI & real world examples. Learn expert techniques.
Mastering Bug Bounty Recon: Essential Techniques for Ethical Hackers
https://ift.tt/1xku4Ie
Submitted December 11, 2024 at 02:03PM by Justin_coco
via reddit https://ift.tt/Js3hALZ
https://ift.tt/1xku4Ie
Submitted December 11, 2024 at 02:03PM by Justin_coco
via reddit https://ift.tt/Js3hALZ
Medium
Mastering Bug Bounty Recon: Essential Techniques for Ethical Hackers
The first step to attacking any target is conducting reconnaissance, or simply put, gathering information about the target. Reconnaissance…
The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian’s Public Monitoring Data
https://ift.tt/WFsTgib
Submitted December 11, 2024 at 06:54PM by guedou
via reddit https://ift.tt/STdAwRz
https://ift.tt/WFsTgib
Submitted December 11, 2024 at 06:54PM by guedou
via reddit https://ift.tt/STdAwRz
GitGuardian Blog - Take Control of Your Secrets Security
The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian’s Public Monitoring Data
On December 4, 2024, the Ultralytics Python module was backdoored to deploy a cryptominer. Using GitGuardian’s data, we reconstructed deleted commits, connecting the dots with the initial analysis. This investigation highlights the value of GitGuardian’s…
Hacking AI Applications: From 3D Printing to Remote Code Execution
https://ift.tt/TKPx3iE
Submitted December 11, 2024 at 08:02PM by crustysecurity
via reddit https://ift.tt/tOzIywF
https://ift.tt/TKPx3iE
Submitted December 11, 2024 at 08:02PM by crustysecurity
via reddit https://ift.tt/tOzIywF
www.securityrunners.io
Hacking AI Applications: From 3D Printing to Remote Code Execution
The blog post examines methods for hacking AI-native applications by detailing vulnerabilities discovered while building KachraCraft, a 3D design generation tool, including techniques for revealing system prompts, executing server-side request forgery (SSRF)…
Why Can’t You Fix This Bug Faster?
https://ift.tt/E5cprh4
Submitted December 11, 2024 at 10:02PM by mdulin2
via reddit https://ift.tt/PTVjafe
https://ift.tt/E5cprh4
Submitted December 11, 2024 at 10:02PM by mdulin2
via reddit https://ift.tt/PTVjafe
Strikeout Security Blog
Why Can't You Fix This Bug Faster?
Fixing security vulnerabilities in a timely manner is more complicated than you realize.
Far From Random: Three Mistakes From Dart/Flutter's Weak PRNG
https://ift.tt/2Rpw9Gm
Submitted December 12, 2024 at 04:12AM by bored_cs_student
via reddit https://ift.tt/5EpFwTV
https://ift.tt/2Rpw9Gm
Submitted December 12, 2024 at 04:12AM by bored_cs_student
via reddit https://ift.tt/5EpFwTV
www.zellic.io
Far From Random: Three Mistakes From Dart/Flutter's Weak PRNG | Zellic — Research
A look into how an unexpectedly weak PRNG in Dart led to Zellic's discovery of multiple vulnerabilities
Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623) - watchTowr Labs
https://ift.tt/7syQbEd
Submitted December 12, 2024 at 05:11AM by dx7r__
via reddit https://ift.tt/MmBXkK8
https://ift.tt/7syQbEd
Submitted December 12, 2024 at 05:11AM by dx7r__
via reddit https://ift.tt/MmBXkK8
watchTowr Labs
Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623)
We were having a nice uneventful week at watchTowr, when we got news of some ransomware operators using a zero-day exploit in Cleo MFT software - namely, LexiCom, VLTransfer, and Harmony - applications that many large enterprises rely on to share files securely.…
Facebook Messenger Group Call DoS Write-up
https://ift.tt/ceTECVA
Submitted December 12, 2024 at 04:49AM by theappanalyst
via reddit https://ift.tt/6UDXpg2
https://ift.tt/ceTECVA
Submitted December 12, 2024 at 04:49AM by theappanalyst
via reddit https://ift.tt/6UDXpg2
Signal 11
Messenger Group Call DoS for iOS
Messenger is used by hundreds of millions of people globally, and as of December 2023, it has adopted end-to-end encryption (E2EE) by default for chats and calls. However, when a group chat is created, it initially does not use E2EE. Interestingly, non-E2EE…
Forget PSEXEC: DCOM Upload & Execute Backdoor
https://ift.tt/9Yau7l1
Submitted December 11, 2024 at 09:29PM by AlmondOffSec
via reddit https://ift.tt/YywOJlP
https://ift.tt/9Yau7l1
Submitted December 11, 2024 at 09:29PM by AlmondOffSec
via reddit https://ift.tt/YywOJlP
Deep Instinct
Forget PSEXEC: DCOM Upload & Execute Backdoor
Join Deep Instinct Security Researcher Eliran Nissan as he exposes a powerful new DCOM lateral movement attack that remotely writes custom payloads to create an embedded backdoor.
Exploiting Device Authentication Vulns in Cloud-Managed IoT Devices
https://ift.tt/GzLiJBf
Submitted December 12, 2024 at 06:23PM by derp6996
via reddit https://ift.tt/INURoHQ
https://ift.tt/GzLiJBf
Submitted December 12, 2024 at 06:23PM by derp6996
via reddit https://ift.tt/INURoHQ
Claroty
The Insecure IoT Cloud Strikes Again: RCE on Ruijie Cloud-Connected Devices
Team82's research of Ruijie Networks’ cloud and device ecosystem uncovered 10 vulnerabilities that would allow an attacker to execute arbitrary code on every cloud-connected device. Team82 also developed an attack called Open Sesame that allows an attacker…
Citrix Denial of Service: Analysis of CVE-2024-8534
https://ift.tt/cLwJ0DC
Submitted December 12, 2024 at 07:01PM by Mempodipper
via reddit https://ift.tt/Lwqfa0j
https://ift.tt/cLwJ0DC
Submitted December 12, 2024 at 07:01PM by Mempodipper
via reddit https://ift.tt/Lwqfa0j
www.assetnote.io
Citrix Denial of Service: Analysis of CVE-2024-8534
An analysis of CVE-2024-8534, a memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway.
SSPM approach of french company Decathlon
https://ift.tt/MAXgV85
Submitted December 12, 2024 at 06:59PM by dupontee
via reddit https://ift.tt/ksX2VFU
https://ift.tt/MAXgV85
Submitted December 12, 2024 at 06:59PM by dupontee
via reddit https://ift.tt/ksX2VFU
Medium
Identifying security risks in our SaaS applications
A homemade SSPM framework to uncover SaaS security risks
Attacking Cortex XDR from an unprivileged user perspective
https://ift.tt/Tz8LeMf
Submitted December 12, 2024 at 06:54PM by AlmondOffSec
via reddit https://ift.tt/BElhqsy
https://ift.tt/Tz8LeMf
Submitted December 12, 2024 at 06:54PM by AlmondOffSec
via reddit https://ift.tt/BElhqsy
300K+ Prometheus Servers and Exporters Exposed to DoS Attack
https://ift.tt/F4AkUiJ
Submitted December 12, 2024 at 09:56PM by Pale_Fly_2673
via reddit https://ift.tt/9Mgtj4b
https://ift.tt/F4AkUiJ
Submitted December 12, 2024 at 09:56PM by Pale_Fly_2673
via reddit https://ift.tt/9Mgtj4b
Aqua
300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks
Our findings highlight that at least 336,000 servers expose their Prometheus servers and exporters to the internet
Astalavista.com - Security Community - Relaunch 2024
https://ift.tt/k3hR1mA
Submitted December 13, 2024 at 12:48AM by ddanchev123
via reddit https://ift.tt/9zTrE1Y
https://ift.tt/k3hR1mA
Submitted December 13, 2024 at 12:48AM by ddanchev123
via reddit https://ift.tt/9zTrE1Y
Android's CVE-2022-20201 (InstalldNativeService)
https://ift.tt/oF3W0gM
Submitted December 13, 2024 at 01:33AM by pwntheplanet
via reddit https://ift.tt/ioSlGKL
https://ift.tt/oF3W0gM
Submitted December 13, 2024 at 01:33AM by pwntheplanet
via reddit https://ift.tt/ioSlGKL
( ͡◕ _ ͡◕)👌
Android's CVE-2022-20201 (InstalldNativeService)
Intro This is another attempt as part of my @vr_progress to hack my old, unpatched OnePlus phone which didn’t get any updates for years. This time I chose CVE-2022-20201, a crafty little bug hiding in one of the subsystems used by Android’s package manager.
Using a 😡 emoji to DoS Facebook Messenger
https://ift.tt/ceTECVA
Submitted December 13, 2024 at 03:57AM by theappanalyst
via reddit https://ift.tt/sBrPCw3
https://ift.tt/ceTECVA
Submitted December 13, 2024 at 03:57AM by theappanalyst
via reddit https://ift.tt/sBrPCw3
Signal 11
Messenger Group Call DoS for iOS
Messenger is used by hundreds of millions of people globally, and as of December 2023, it has adopted end-to-end encryption (E2EE) by default for chats and calls. However, when a group chat is created, it initially does not use E2EE. Interestingly, non-E2EE…
CVE-2024-55557 - Weasis 4.5.1
https://ift.tt/pvPrkzH
Submitted December 13, 2024 at 01:36PM by AlbatrossMaximum4489
via reddit https://ift.tt/05t9ulO
https://ift.tt/pvPrkzH
Submitted December 13, 2024 at 01:36PM by AlbatrossMaximum4489
via reddit https://ift.tt/05t9ulO
Microsoft enforces defenses preventing NTLM relay attacks - Help Net Security
https://ift.tt/QHEwTZU
Submitted December 15, 2024 at 04:36PM by busevepet
via reddit https://ift.tt/45Gs1dv
https://ift.tt/QHEwTZU
Submitted December 15, 2024 at 04:36PM by busevepet
via reddit https://ift.tt/45Gs1dv
Help Net Security
Microsoft enforces defenses preventing NTLM relay attacks
Until NTLM gets disabled by default, Microsoft is working on shoring up defenses against NTLM relay attacks.
Post: Mutation XSS: Explained, CVE and Challenge | Jorian Woltjer
https://ift.tt/YBr0EFe
Submitted December 15, 2024 at 08:24PM by warbitlip
via reddit https://ift.tt/0A7ZPRO
https://ift.tt/YBr0EFe
Submitted December 15, 2024 at 08:24PM by warbitlip
via reddit https://ift.tt/0A7ZPRO
jorianwoltjer.com
Mutation XSS: Explained, CVE and Challenge | Jorian Woltjer
Learn how to bypass HTML sanitizers by abusing the intricate parsing rules and mutations. Including my CVE-2024-52595 (lxml_html_clean bypass) and the solution to a hard challenge I shared online
CVE-2024-42845
https://ift.tt/bksP1z3
Submitted December 16, 2024 at 03:09AM by AlbatrossMaximum4489
via reddit https://ift.tt/edIzkra
https://ift.tt/bksP1z3
Submitted December 16, 2024 at 03:09AM by AlbatrossMaximum4489
via reddit https://ift.tt/edIzkra