Remote Code Execution on Viasat Modems (CVE-2024-6198)
https://ift.tt/5mh2Stv
Submitted April 25, 2025 at 06:45PM by g_e_r_h_a_r_d
via reddit https://ift.tt/giWHtOu
https://ift.tt/5mh2Stv
Submitted April 25, 2025 at 06:45PM by g_e_r_h_a_r_d
via reddit https://ift.tt/giWHtOu
Onekey
Security Advisory: Remote Code Execution on Viasat Modems (CVE-2024-6198) | ONEKEY Research | Research | ONEKEY
Explore ONEKEY Research Lab's security advisory detailing a critical vulnerability in Viasat modems. Learn about the risks and recommended actions.
Ghosting AMSI: Cutting RPC to disarm AV
https://ift.tt/9tdDBYy
Submitted April 25, 2025 at 11:15PM by Echoes-of-Tomorroww
via reddit https://ift.tt/5DieBwL
https://ift.tt/9tdDBYy
Submitted April 25, 2025 at 11:15PM by Echoes-of-Tomorroww
via reddit https://ift.tt/5DieBwL
Medium
Ghosting AMSI: Cutting RPC to disarm AV
In this post, we explore how to bypass AMSI’s scanning logic by hijacking the RPC layer it depends on — specifically the NdrClientCall3…
RomHack 2025 Call for Papers
https://ift.tt/KgeFlLf
Submitted April 27, 2025 at 12:02PM by smaury
via reddit https://ift.tt/ONrFpk1
https://ift.tt/KgeFlLf
Submitted April 27, 2025 at 12:02PM by smaury
via reddit https://ift.tt/ONrFpk1
Comprehensive 2025 Report: Software Security Market Trends and User Pain Points in China
https://ift.tt/6eWzUxL
Submitted April 27, 2025 at 09:12PM by repoog
via reddit https://ift.tt/O3Rn91d
https://ift.tt/6eWzUxL
Submitted April 27, 2025 at 09:12PM by repoog
via reddit https://ift.tt/O3Rn91d
Medium
Software Security Market Demand Research Report (2025 Edition)
Understanding the Evolving Needs, Challenges, and Trends of China’s Software Security Landscape in 2025
Symbol Database for Reverse Engineers
https://ift.tt/X3ZaT8n
Submitted April 28, 2025 at 12:21AM by pwntheplanet
via reddit https://ift.tt/feiH5mc
https://ift.tt/X3ZaT8n
Submitted April 28, 2025 at 12:21AM by pwntheplanet
via reddit https://ift.tt/feiH5mc
RSAC Freeroll Poker Tournament
https://lu.ma/67vfrwzo
Submitted April 28, 2025 at 03:27AM by Even-Owl5829
via reddit https://ift.tt/NOu05mp
https://lu.ma/67vfrwzo
Submitted April 28, 2025 at 03:27AM by Even-Owl5829
via reddit https://ift.tt/NOu05mp
Luma
RSA Poker Tournament · Luma
Ready your poker face and join us for an exclusive RSA Poker Night with the ZeroPath team. We're bringing together cybersecurity professionals for an evening…
How a Single Line Of Code Could Brick Your iPhone
https://ift.tt/G2auVkl
Submitted April 28, 2025 at 05:15AM by _vavkamil_
via reddit https://ift.tt/a2zk7fH
https://ift.tt/G2auVkl
Submitted April 28, 2025 at 05:15AM by _vavkamil_
via reddit https://ift.tt/a2zk7fH
Rambo Codes
How a Single Line Of Code Could Brick Your iPhone | Rambo Codes
Gui Rambo writes about his coding and reverse engineering adventures.
Introducing HANAlyzer: An Open-Source Tool to Secure Your HANA databases - Anvil Secure
https://ift.tt/5bleUAJ
Submitted April 28, 2025 at 04:55PM by tlxio
via reddit https://ift.tt/aScJoKZ
https://ift.tt/5bleUAJ
Submitted April 28, 2025 at 04:55PM by tlxio
via reddit https://ift.tt/aScJoKZ
Anvil Secure
Introducing HANAlyzer: An Open-Source Tool to Secure Your HANA databases - Anvil Secure
Senior Security Engineer Alex Conti introduces HANAlyzer, an open-source tool that automates SAP HANA security checks.
Fuzzing Windows ARM64 closed-source binary with QBDI and libFuzzer
https://ift.tt/t59kNq6
Submitted April 28, 2025 at 06:07PM by rh0main
via reddit https://ift.tt/Z8wsOdq
https://ift.tt/t59kNq6
Submitted April 28, 2025 at 06:07PM by rh0main
via reddit https://ift.tt/Z8wsOdq
Romain Thomas
Fuzzing Windows ARM64 closed-source binary | Romain Thomas
This blog post introduces coverage-guided fuzzing with QBDI and libFuzzer targeting Windows ARM64.
Using an LLM with MCP for Threat Hunting
https://ift.tt/VYKkCUA
Submitted April 29, 2025 at 07:51AM by eitot8
via reddit https://ift.tt/UZ92DP3
https://ift.tt/VYKkCUA
Submitted April 29, 2025 at 07:51AM by eitot8
via reddit https://ift.tt/UZ92DP3
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
Ruby on Rails Cross-Site Request Forgery
https://ift.tt/EHG2m8Q
Submitted April 29, 2025 at 05:30PM by thricethagr8est
via reddit https://ift.tt/dFPpEhi
https://ift.tt/EHG2m8Q
Submitted April 29, 2025 at 05:30PM by thricethagr8est
via reddit https://ift.tt/dFPpEhi
seclists.org
Full Disclosure: Ruby on Rails Cross-Site Request Forgery
AirBorne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk
https://ift.tt/1tx2wuJ
Submitted April 29, 2025 at 08:07PM by cov_id19
via reddit https://ift.tt/4jVG6oY
https://ift.tt/1tx2wuJ
Submitted April 29, 2025 at 08:07PM by cov_id19
via reddit https://ift.tt/4jVG6oY
www.oligo.security
Airborne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk | Oligo Security | Oligo Security
Oligo Security reveals AirBorne, a new set of vulnerabilities in Apple’s AirPlay protocol and SDK. Learn how zero-click RCEs, ACL bypasses, and wormable exploits could endanger Apple and IoT devices worldwide — and how to protect yourself.
Shadow Roles: AWS Defaults Can Open the Door to Service Takeover
https://ift.tt/YqzHDnN
Submitted April 29, 2025 at 09:57PM by Pale_Fly_2673
via reddit https://ift.tt/PYJ80Ij
https://ift.tt/YqzHDnN
Submitted April 29, 2025 at 09:57PM by Pale_Fly_2673
via reddit https://ift.tt/PYJ80Ij
Aqua
Shadow Roles: AWS Defaults Can Open the Door to Service Takeover
Shadow roles in AWS defaults can expose hidden attack paths enabling privilege escalation, cross-service access, and even account compromise
A Look Into the Secrets of MCP: The New Secret Leak Source
https://ift.tt/dnWrmjx
Submitted April 29, 2025 at 10:37PM by guedou
via reddit https://ift.tt/TMIf16r
https://ift.tt/dnWrmjx
Submitted April 29, 2025 at 10:37PM by guedou
via reddit https://ift.tt/TMIf16r
GitGuardian Blog - Take Control of Your Secrets Security
A Look Into the Secrets of MCP: The New Secret Leak Source
MCP rapidly enhances AI capabilities but introduces security challenges through its distributed architecture. Especially, the distributed nature of MCP requires a lot of NHIs and their secrets. Our research shows that MCP is a new source of leaks that already…
Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
https://ift.tt/ZU063dQ
Submitted April 30, 2025 at 12:51AM by evilpies
via reddit https://ift.tt/sKbmO2Y
https://ift.tt/ZU063dQ
Submitted April 30, 2025 at 12:51AM by evilpies
via reddit https://ift.tt/sKbmO2Y
Google Cloud Blog
Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis | Google Cloud Blog
This Google Threat Intelligence Group report presents an analysis of detected 2024 zero-day exploits.
GFI MailEssentials - Yet Another .NET Target - Frycos
https://ift.tt/gNQeJvA
Submitted April 30, 2025 at 09:36AM by smaury
via reddit https://ift.tt/ydztq05
https://ift.tt/gNQeJvA
Submitted April 30, 2025 at 09:36AM by smaury
via reddit https://ift.tt/ydztq05
Frycos Security Diary
GFI MailEssentials - Yet Another .NET Target
What is this product GFI MailEssentials all about? We’re living the future, right? So let’s ask the GFI AI.
A Technical Review of AI-Infra-Guard V2: New MCP Server Security Analysis Tool
https://ift.tt/FUDpmMb
Submitted April 30, 2025 at 02:26PM by CoatPowerful1541
via reddit https://ift.tt/FonV9rl
https://ift.tt/FUDpmMb
Submitted April 30, 2025 at 02:26PM by CoatPowerful1541
via reddit https://ift.tt/FonV9rl
Medium
A Technical Review of AI-Infra-Guard V2: New MCP Server Security Analysis Tool
Tencent’s Zhuque Lab recently dropped AI-Infra-Guard V2, an open-source, AI-driven security tool built specifically for MCP servers. After…
Samsung MagicINFO Unauthenticated RCE
https://ift.tt/8NEyMci
Submitted April 30, 2025 at 02:53PM by Straight-Zombie-646
via reddit https://ift.tt/iH0Cz4l
https://ift.tt/8NEyMci
Submitted April 30, 2025 at 02:53PM by Straight-Zombie-646
via reddit https://ift.tt/iH0Cz4l
SSD Secure Disclosure
SSD Advisory - Samsung MagicINFO Unauthenticated RCE - SSD Secure Disclosure
Summary MagicINFO exposes an endpoint which: Wrapping all together it is possible to upload a JSP file to execute arbitrary server-side code without having a valid user. Credit An independent security researcher working with SSD Secure Disclosure. Vendor…
Supercharging Ghidra: Using Local LLMs with GhidraMCP via Ollama and OpenWeb-UI
https://ift.tt/pKZW21S
Submitted April 30, 2025 at 06:01PM by onlinereadme
via reddit https://ift.tt/25LQxug
https://ift.tt/pKZW21S
Submitted April 30, 2025 at 06:01PM by onlinereadme
via reddit https://ift.tt/25LQxug
Medium
Supercharging Ghidra: Using Local LLMs with GhidraMCP via Ollama and OpenWeb-UI
Reverse engineering binaries often resembles digital archaeology: excavating layers of compiled code, interpreting obscured logic, and…
I tried out vibe hacking with Cursor. It kinda worked and I ultimately found RCE.
https://ift.tt/pWYbVEO
Submitted April 30, 2025 at 05:37PM by ezzzzz
via reddit https://ift.tt/5IGJjln
https://ift.tt/pWYbVEO
Submitted April 30, 2025 at 05:37PM by ezzzzz
via reddit https://ift.tt/5IGJjln
Research Blog | Project Black
Vibe Hacking: Finding Auth Bypass and RCE in Open Game Panel
You've heard of vibe coding, but have you considered vibe hacking? I tried thinking less to find an authentication bypass and RCE in OpenGamePanel.
AiTM for WHFB persistence
https://ift.tt/1TJStoG
Submitted April 30, 2025 at 10:39PM by rikvduijn
via reddit https://ift.tt/F4SWdiJ
https://ift.tt/1TJStoG
Submitted April 30, 2025 at 10:39PM by rikvduijn
via reddit https://ift.tt/F4SWdiJ
Attic
AiTM for WHFB persistence - Attic
Learn how we managed to circumvent "phishing-resistant" MFA based on Windows Hello for Business, during an internal capture-the-flag competition.