Methods of defeating potting compound on electronics
https://ift.tt/5Re62mC
Submitted February 25, 2025 at 12:27AM by gsuberland
via reddit https://ift.tt/5oJKPSR
https://ift.tt/5Re62mC
Submitted February 25, 2025 at 12:27AM by gsuberland
via reddit https://ift.tt/5oJKPSR
blog.poly.nomial.co.uk
Methods of defeating potting compound on electronics - Graham Sutherland's Blog
Cybercrooks Are Using Fake Job Listings to Steal Crypto | HackerNoon
https://ift.tt/gjZUv7n
Submitted February 24, 2025 at 02:41AM by Individual-Gas5276
via reddit https://ift.tt/mNoGdRp
https://ift.tt/gjZUv7n
Submitted February 24, 2025 at 02:41AM by Individual-Gas5276
via reddit https://ift.tt/mNoGdRp
Hackernoon
Cybercrooks Are Using Fake Job Listings to Steal Crypto
Moonlock Lab dives deep into a campaign tricking blockchain developers with fake job interviews to deploy malware that installs a backdoor and targets MetaMask.
Streamlining vulnerability research with IDA Pro and Rust
https://ift.tt/hVS3RBN
Submitted February 25, 2025 at 11:57AM by 0xdea
via reddit https://ift.tt/45xsCMR
https://ift.tt/hVS3RBN
Submitted February 25, 2025 at 11:57AM by 0xdea
via reddit https://ift.tt/45xsCMR
HN Security
Streamlining vulnerability research with IDA Pro and Rust - HN Security
“Rebels on the rise, we have sacrificed Been knocked down like a poltergeist Nocturnal by blood, in darkness we stand […]
Caller ID Spoofing: The Invisible Threat to Phone Security and How to Combat It
https://ift.tt/oQCU8Hl
Submitted February 25, 2025 at 01:13PM by s3yfullah
via reddit https://ift.tt/fdZ5Y8C
https://ift.tt/oQCU8Hl
Submitted February 25, 2025 at 01:13PM by s3yfullah
via reddit https://ift.tt/fdZ5Y8C
SwordSec
Caller ID Spoofing
Abusing VBS Enclaves to Create Evasive Malware
https://ift.tt/Zx9W2kQ
Submitted February 25, 2025 at 09:31PM by Narrow_Rooster_630
via reddit https://ift.tt/dPzIOBl
https://ift.tt/Zx9W2kQ
Submitted February 25, 2025 at 09:31PM by Narrow_Rooster_630
via reddit https://ift.tt/dPzIOBl
Akamai
Abusing VBS Enclaves to Create Evasive Malware | Akamai
Learn how attackers can abuse VBS enclaves, a Windows security feature, for malicious purposes.
Mixing up Public and Private Keys in OpenID Connect deployments
https://ift.tt/MtbQg9A
Submitted February 26, 2025 at 12:02AM by hannob
via reddit https://ift.tt/gHKcnBF
https://ift.tt/MtbQg9A
Submitted February 26, 2025 at 12:02AM by hannob
via reddit https://ift.tt/gHKcnBF
A Random and Simple Tip: Advanced Analysis of JNI Methods Using Frida
https://ift.tt/3twxUlu
Submitted February 25, 2025 at 10:20PM by thewatcher_
via reddit https://ift.tt/95RiE20
https://ift.tt/3twxUlu
Submitted February 25, 2025 at 10:20PM by thewatcher_
via reddit https://ift.tt/95RiE20
Medium
A Random and Simple Tip: Advanced Analysis of JNI Methods Using Frida
In this article, I will share a tip for those interested in performing a more detailed analysis of the behavior of native methods, with a…
The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248) - watchTowr Labs
https://ift.tt/LXQgVs4
Submitted February 26, 2025 at 04:31PM by dx7r__
via reddit https://ift.tt/1icquOg
https://ift.tt/LXQgVs4
Submitted February 26, 2025 at 04:31PM by dx7r__
via reddit https://ift.tt/1icquOg
watchTowr Labs
The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248)
As an industry, we believe that we’ve come to a common consensus after 25 years of circular debates - disclosure is terrible, information is actually dangerous, it’s best that it’s not shared, and the only way to really to ensure that no one ever uses information…
Kubernetes Golden Tickets
https://ift.tt/wB8ilbt
Submitted February 26, 2025 at 06:40PM by therealjoetesta
via reddit https://ift.tt/vSe73H6
https://ift.tt/wB8ilbt
Submitted February 26, 2025 at 06:40PM by therealjoetesta
via reddit https://ift.tt/vSe73H6
How Mercury defeats phishing with device verification
https://ift.tt/g0sFd5x
Submitted February 26, 2025 at 11:24PM by MaxGabriel
via reddit https://ift.tt/sdOkMjf
https://ift.tt/g0sFd5x
Submitted February 26, 2025 at 11:24PM by MaxGabriel
via reddit https://ift.tt/sdOkMjf
Mercury
How Mercury defeats phishing with device verification | Mercury
How Mercury defeated a phishing attack with device verification
An inside look at Equation/APT-C-40 TTPs from China’s lense
https://ift.tt/ENl3RFg
Submitted February 26, 2025 at 04:23PM by dukeofmola
via reddit https://ift.tt/2XOYj9e
https://ift.tt/ENl3RFg
Submitted February 26, 2025 at 04:23PM by dukeofmola
via reddit https://ift.tt/2XOYj9e
Inversecos
An inside look at NSA (Equation Group) TTPs from China’s lense
16 Malicious Chrome extensions infected over 3.2 mln users worldwide.
https://ift.tt/EvKZ8Do
Submitted February 27, 2025 at 03:54PM by Incogni_hi
via reddit https://ift.tt/7A2MCcL
https://ift.tt/EvKZ8Do
Submitted February 27, 2025 at 03:54PM by Incogni_hi
via reddit https://ift.tt/7A2MCcL
Research: Using Stylometry & Topic Modeling to Attribute State-Sponsored Hacktivist Groups
https://ift.tt/g8YXkfT
Submitted February 27, 2025 at 07:40PM by Megabeets
via reddit https://ift.tt/32FYXE0
https://ift.tt/g8YXkfT
Submitted February 27, 2025 at 07:40PM by Megabeets
via reddit https://ift.tt/32FYXE0
Check Point Research
Modern Approach to Attributing Hacktivist Groups - Check Point Research
Research by: Itay Cohen (@megabeets_) Over the past few decades, hacktivism has been, in a lot of cases, characterized by minor website defacements and distributed denial-of-service (DDoS) attacks, which, while making headlines, had minimal lasting impact.…
How to Find More IDORs - @verylazytech
https://ift.tt/gYdr4Je
Submitted February 27, 2025 at 10:07PM by Justin_coco
via reddit https://ift.tt/4tEa5Ii
https://ift.tt/gYdr4Je
Submitted February 27, 2025 at 10:07PM by Justin_coco
via reddit https://ift.tt/4tEa5Ii
Verylazytech
IDOR | VeryLazyTech
Learn to uncover more IDORs the lazy way with VeryLazyTech—tips, tricks, and hacks revealed!
Join us in 2 weeks on March 12th at 13:00 GMT-5 for a meetup teamup: Liz Steininger from Least Authority and Pacu from Zcash Community Grants! The two will be presenting "Enhancing Zcash Security: a long-term engagement with Least Authority, the Zcash Ecosystem Security Lead".
https://lu.ma/uxmc2wgl
Submitted February 27, 2025 at 09:54PM by carrotcypher
via reddit https://ift.tt/1Lr3zaC
https://lu.ma/uxmc2wgl
Submitted February 27, 2025 at 09:54PM by carrotcypher
via reddit https://ift.tt/1Lr3zaC
lu.ma
Enhancing Zcash Security w/ Least Authority and Zcash · Zoom · Luma
Denoscription
Join us for a deep dive into the ongoing security audits of Zcash, completed by the Zcash Ecosystem Security Lead Least Authority, and funded by…
Join us for a deep dive into the ongoing security audits of Zcash, completed by the Zcash Ecosystem Security Lead Least Authority, and funded by…
Github scam investigation: Thousands of "mods" and "cracks" stealing your data
https://ift.tt/FoAbOp9
Submitted February 28, 2025 at 03:39AM by WesternBest
via reddit https://ift.tt/ihceDHw
https://ift.tt/FoAbOp9
Submitted February 28, 2025 at 03:39AM by WesternBest
via reddit https://ift.tt/ihceDHw
tim.sh
Github scam investigation: Thousands of "mods" and "cracks" stealing your data
How I found 1000+ malicious repositories spread on Github
Bypass AMSI in 2025
https://ift.tt/dMx63nV
Submitted February 28, 2025 at 07:15PM by S3cur3Th1sSh1t
via reddit https://ift.tt/4tL5FWS
https://ift.tt/dMx63nV
Submitted February 28, 2025 at 07:15PM by S3cur3Th1sSh1t
via reddit https://ift.tt/4tL5FWS
www.r-tec.net
r-tec Blog | Bypass AMSI in 2025
This blog post will shed some light on what's behind AMSI (roughly, but hopefully easy to understand) and how you can still effectively bypass it - more than four years later.
Bybit $1.5b hack was a Safe Wallet web app JS payload injection
https://ift.tt/Bklboh7
Submitted March 01, 2025 at 05:48PM by pzduniak
via reddit https://ift.tt/MESOdH1
https://ift.tt/Bklboh7
Submitted March 01, 2025 at 05:48PM by pzduniak
via reddit https://ift.tt/MESOdH1
DocSend
Bybit Hack Report
Former Disney employee files wrongful termination complaint after compromise
https://ift.tt/BgKAIYs
Submitted March 01, 2025 at 06:31PM by damontoo
via reddit https://ift.tt/13kxpQL
https://ift.tt/BgKAIYs
Submitted March 01, 2025 at 06:31PM by damontoo
via reddit https://ift.tt/13kxpQL
CBS News
Former Disney employee files wrongful termination complaint after cyber attack
Matthew Van Andel filed a wrongful termination complaint against Disney after he unknowingly downloaded malware that compromised the company's cybersecurity.
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
https://ift.tt/TroV8cJ
Submitted March 02, 2025 at 06:35AM by campuscodi
via reddit https://ift.tt/gXLOQlS
https://ift.tt/TroV8cJ
Submitted March 02, 2025 at 06:35AM by campuscodi
via reddit https://ift.tt/gXLOQlS
GFW Report
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
We present Wallbleed, a buffer over-read vulnerability that existed in the DNS injection subsystem of the Great Firewall of China. Wallbleed caused certain nation-wide censorship middleboxes to reveal up to 125 bytes of their memory when censoring a crafted…
Substack Domain Takeover
https://ift.tt/2lLepmF
Submitted March 02, 2025 at 04:30PM by whisperingmime
via reddit https://ift.tt/MFjugit
https://ift.tt/2lLepmF
Submitted March 02, 2025 at 04:30PM by whisperingmime
via reddit https://ift.tt/MFjugit
Blog by Joren Vrancken
Substack Domain Takeover
Substack is a popular blogging platform. It allows writers to easily create their own personal blog, with payments, comments, analytics and other advanced features. Substack empowers writers to customize their blogs by adding a custom domain.