Thought netsec people might enjoy this read - the ultimate guide to different types of wireless signals and what they are used for.
https://ift.tt/ktbeOBP
Submitted June 01, 2025 at 02:02AM by OpulentOwl
via reddit https://ift.tt/xr8wLIR
https://ift.tt/ktbeOBP
Submitted June 01, 2025 at 02:02AM by OpulentOwl
via reddit https://ift.tt/xr8wLIR
Ooma.com - Smart solutions for home and business.
The ultimate guide to different types of wireless signals | Ooma
Ooma has put together a guide that breaks down the different types of wireless signals, how they work and where you’re likely to run into them.
Reverse Engineer Android Apps for API Key
https://ift.tt/JSLMTyt
Submitted June 01, 2025 at 04:20AM by pwnguide
via reddit https://ift.tt/WL71JUh
https://ift.tt/JSLMTyt
Submitted June 01, 2025 at 04:20AM by pwnguide
via reddit https://ift.tt/WL71JUh
Canada, Australia or Netherlands
http://www.whattodo.com
Submitted June 01, 2025 at 04:01PM by ash347799
via reddit https://ift.tt/emCwEzv
http://www.whattodo.com
Submitted June 01, 2025 at 04:01PM by ash347799
via reddit https://ift.tt/emCwEzv
Whattodo
WhatToDo.com - What To Do - What To Do.com
What To Do.com affärsnavet för människor och företag!
r/netsec monthly discussion & tool thread
Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on r/netsec.As always, the content & discussion guidelines should also be observed on r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted June 01, 2025 at 06:59PM by albinowax
via reddit https://ift.tt/2vpn6K8
Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on r/netsec.As always, the content & discussion guidelines should also be observed on r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted June 01, 2025 at 06:59PM by albinowax
via reddit https://ift.tt/2vpn6K8
Reddit
From the netsec community on Reddit
Explore this post and more from the netsec community
Certification roadmap please
http://www.cisco.com
Submitted June 02, 2025 at 12:55PM by ash347799
via reddit https://ift.tt/8GEIQhc
http://www.cisco.com
Submitted June 02, 2025 at 12:55PM by ash347799
via reddit https://ift.tt/8GEIQhc
Cisco
AI Infrastructure, Secure Networking, and Software Solutions
Cisco is a worldwide technology leader powering an inclusive future for all. Learn more about our products, services, solutions, and innovations.
Vulnerabilities Found in Preinstalled apps on Android Smartphones could perform factory reset of device, exfiltrate PIN code or inject an arbitrary intent with system-level privileges
https://ift.tt/tmiAJf1
Submitted June 02, 2025 at 04:52PM by barakadua131
via reddit https://ift.tt/B4nRqvy
https://ift.tt/tmiAJf1
Submitted June 02, 2025 at 04:52PM by barakadua131
via reddit https://ift.tt/B4nRqvy
Mobile Hacker
Security Issues Found in preinstalled apps on Android Smartphones
Security researchers have uncovered several critical vulnerabilities in applications preloaded on Ulefone and Krüger&Matz Android smartphones. These flaws, reported by CERT Polska and discovered by Szymon Chadam, expose users to significant risks, including…
Seeking Insights from Network Security Leaders at Large Companies on Vendor Selection and Challenges
https://www.zintro.com/
Submitted June 02, 2025 at 07:25PM by brutalgrace
via reddit https://ift.tt/9r2cZwR
https://www.zintro.com/
Submitted June 02, 2025 at 07:25PM by brutalgrace
via reddit https://ift.tt/9r2cZwR
Zintro
Market Research Agency: Expert Network Co & Participant Recruitment
Discover Zintro's experienced market research and expert network. Connect with experts and research participants to inform your reasearch.
Seeking Insights from Network Security Leaders at Large Companies on Vendor Selection and Challenges
https://www.zintro.com/
Submitted June 02, 2025 at 11:20PM by brutalgrace
via reddit https://ift.tt/k0VdRjt
https://www.zintro.com/
Submitted June 02, 2025 at 11:20PM by brutalgrace
via reddit https://ift.tt/k0VdRjt
Zintro
Market Research Agency: Expert Network Co & Participant Recruitment
Discover Zintro's experienced market research and expert network. Connect with experts and research participants to inform your reasearch.
Critical iOS Activation Infrastructure Vulnerability: Unauthenticated Provisioning Injection at Apple’s SIM Activation Endpoint
https://ift.tt/1xVDf03
Submitted June 03, 2025 at 04:46AM by Bright-Dependent2648
via reddit https://ift.tt/IqgTQHG
https://ift.tt/1xVDf03
Submitted June 03, 2025 at 04:46AM by Bright-Dependent2648
via reddit https://ift.tt/IqgTQHG
Substack
iOS Activation Infrastructure: Unauthenticated XML Payload Injection
A backend flaw in Apple’s iOS infrastructure enables stealth provisioning on iPhones before the user ever sees a home screen.
How to build a high-performance network fuzzer with LibAFL and libdesock
https://ift.tt/Bq0eNl5
Submitted June 03, 2025 at 05:20PM by martinclauss
via reddit https://ift.tt/cT2pjWs
https://ift.tt/Bq0eNl5
Submitted June 03, 2025 at 05:20PM by martinclauss
via reddit https://ift.tt/cT2pjWs
lolcads tech blog
How to build a high-performance network fuzzer with LibAFL and libdesock
We explain how we built a fuzzer for network applications that we tried to make as efficient and as effective as possible. We utilized custom mutators and input passing over shared memory and found that it gave us a huge speed and coverage boost compared…
Bypassing tamper protection and getting root shell access on a Worldline Yomani XR credit card terminal
https://ift.tt/bZJxP71
Submitted June 03, 2025 at 08:41PM by Titokhan
via reddit https://ift.tt/nirqdLb
https://ift.tt/bZJxP71
Submitted June 03, 2025 at 08:41PM by Titokhan
via reddit https://ift.tt/nirqdLb
[RFC Draft] Built mathematical solution for PKI's 'impossible' problem. Response time: months→2 hours. IETF interest level: ¯\(ツ)/¯
https://ift.tt/06OIVx5
Submitted June 04, 2025 at 02:08AM by keweonDNS
via reddit https://ift.tt/Ui0EC9N
https://ift.tt/06OIVx5
Submitted June 04, 2025 at 02:08AM by keweonDNS
via reddit https://ift.tt/Ui0EC9N
IETF Datatracker
Root CA Emergency Self-Termination Protocol (RTO-Extension)
This document defines a cryptographically secure mechanism for Root Certificate Authorities to perform emergency self-termination upon compromise detection. Current PKI architecture creates a mathematical impossibility: Root CAs cannot be cryptographically…
The Ultimate Guide to Windows Coercion Techniques in 2025
https://ift.tt/vNcxikJ
Submitted June 04, 2025 at 01:51PM by RedTeamPentesting
via reddit https://ift.tt/q5iYUBJ
https://ift.tt/vNcxikJ
Submitted June 04, 2025 at 01:51PM by RedTeamPentesting
via reddit https://ift.tt/q5iYUBJ
RedTeam Pentesting - Blog
The Ultimate Guide to Windows Coercion Techniques in 2025
Windows authentication coercion often feels like a magic bullet against the average Active Directory. With any old low-privileged account, it usually allows us to gain full administrative access to almost arbitrary Windows workstations and servers, …
So you want to rapidly run a BOF? Let's look at this 'cli4bofs' thing then
https://ift.tt/fxE9Z4j
Submitted June 04, 2025 at 05:15PM by mzet-
via reddit https://ift.tt/QwA13tG
https://ift.tt/fxE9Z4j
Submitted June 04, 2025 at 05:15PM by mzet-
via reddit https://ift.tt/QwA13tG
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
https://ift.tt/ypstm7q
Submitted June 04, 2025 at 09:52PM by hackers_and_builders
via reddit https://ift.tt/pS2g7Ch
https://ift.tt/ypstm7q
Submitted June 04, 2025 at 09:52PM by hackers_and_builders
via reddit https://ift.tt/pS2g7Ch
Rhino Security Labs
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
While performing research on Infoblox's NetMRI network automation and configuration management solution, we discovered 5 vulnerabilities.
Detailed research for Roundcube ≤ 1.6.10 Post-Auth RCE is out
https://ift.tt/lwBNyJ8
Submitted June 05, 2025 at 07:54AM by xIsis
via reddit https://ift.tt/5oDZxFk
https://ift.tt/lwBNyJ8
Submitted June 05, 2025 at 07:54AM by xIsis
via reddit https://ift.tt/5oDZxFk
fearsoff.org
Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization [CVE-2025-49113]
A deep technical breakdown of CVE-2025-49113, a critical Roundcube vulnerability involving PHP session serialization. Learn how the bug was discovered, exploited, and responsibly disclosed with full PoC and recommendations for defenders and developers. Kirill…
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
https://ift.tt/R0ALECw
Submitted June 05, 2025 at 01:41PM by barakadua131
via reddit https://ift.tt/n6pHbe4
https://ift.tt/R0ALECw
Submitted June 05, 2025 at 01:41PM by barakadua131
via reddit https://ift.tt/n6pHbe4
Mobile Hacker
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
This case demonstrates that effective smartphone espionage doesn't always require expensive zero-day exploits or the development of sophisticated, custom and undetected spyware. Instead, attackers can achieve significant intelligence gains using older, off…
The state of cloud runtime security - 2025 edition
https://ift.tt/dx51KRk
Submitted June 05, 2025 at 05:46PM by Swimming_Version_605
via reddit https://ift.tt/v1NBpUY
https://ift.tt/dx51KRk
Submitted June 05, 2025 at 05:46PM by Swimming_Version_605
via reddit https://ift.tt/v1NBpUY
ARMO
The State of Cloud Runtime Security 2025 - ARMO
Discover key challenges and the path forward. Learn about alert overload, tool sprawl, and the need for unified runtime security solutions.
Vulnerabilities in Anthropic’s MCP: Full-Schema Poisoning + Secret-Leaking Tool Attacks (PoC Inside)
https://ift.tt/idjo0RM
Submitted June 05, 2025 at 09:45PM by jat0369
via reddit https://ift.tt/cD7wpSL
https://ift.tt/idjo0RM
Submitted June 05, 2025 at 09:45PM by jat0369
via reddit https://ift.tt/cD7wpSL
Cyberark
Poison everywhere: No output from your MCP server is safe
The Model Context Protocol (MCP) is an open standard and open-source project from Anthropic that makes it quick and easy for developers to add real-world functionality — like sending emails or...
Tnok - Next Generation Port Security
https://ift.tt/CJrS5YO
Submitted June 05, 2025 at 11:37PM by Glad_Chest934
via reddit https://ift.tt/GNdBh3y
https://ift.tt/CJrS5YO
Submitted June 05, 2025 at 11:37PM by Glad_Chest934
via reddit https://ift.tt/GNdBh3y
Cards Are Still the Weakest Link
https://ift.tt/53lcbOr
Submitted June 06, 2025 at 03:23AM by alexlash
via reddit https://ift.tt/h1wR8Qk
https://ift.tt/53lcbOr
Submitted June 06, 2025 at 03:23AM by alexlash
via reddit https://ift.tt/h1wR8Qk
Substack
Cards Are Still the Weakest Link
Still Using Cards? You’re the Weakest Link in the Payment Chain