The Ultimate Guide to Windows Coercion Techniques in 2025
https://ift.tt/vNcxikJ
Submitted June 04, 2025 at 01:51PM by RedTeamPentesting
via reddit https://ift.tt/q5iYUBJ
https://ift.tt/vNcxikJ
Submitted June 04, 2025 at 01:51PM by RedTeamPentesting
via reddit https://ift.tt/q5iYUBJ
RedTeam Pentesting - Blog
The Ultimate Guide to Windows Coercion Techniques in 2025
Windows authentication coercion often feels like a magic bullet against the average Active Directory. With any old low-privileged account, it usually allows us to gain full administrative access to almost arbitrary Windows workstations and servers, …
So you want to rapidly run a BOF? Let's look at this 'cli4bofs' thing then
https://ift.tt/fxE9Z4j
Submitted June 04, 2025 at 05:15PM by mzet-
via reddit https://ift.tt/QwA13tG
https://ift.tt/fxE9Z4j
Submitted June 04, 2025 at 05:15PM by mzet-
via reddit https://ift.tt/QwA13tG
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
https://ift.tt/ypstm7q
Submitted June 04, 2025 at 09:52PM by hackers_and_builders
via reddit https://ift.tt/pS2g7Ch
https://ift.tt/ypstm7q
Submitted June 04, 2025 at 09:52PM by hackers_and_builders
via reddit https://ift.tt/pS2g7Ch
Rhino Security Labs
Multiple CVEs in Infoblox NetMRI: RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
While performing research on Infoblox's NetMRI network automation and configuration management solution, we discovered 5 vulnerabilities.
Detailed research for Roundcube ≤ 1.6.10 Post-Auth RCE is out
https://ift.tt/lwBNyJ8
Submitted June 05, 2025 at 07:54AM by xIsis
via reddit https://ift.tt/5oDZxFk
https://ift.tt/lwBNyJ8
Submitted June 05, 2025 at 07:54AM by xIsis
via reddit https://ift.tt/5oDZxFk
fearsoff.org
Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization [CVE-2025-49113]
A deep technical breakdown of CVE-2025-49113, a critical Roundcube vulnerability involving PHP session serialization. Learn how the bug was discovered, exploited, and responsibly disclosed with full PoC and recommendations for defenders and developers. Kirill…
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
https://ift.tt/R0ALECw
Submitted June 05, 2025 at 01:41PM by barakadua131
via reddit https://ift.tt/n6pHbe4
https://ift.tt/R0ALECw
Submitted June 05, 2025 at 01:41PM by barakadua131
via reddit https://ift.tt/n6pHbe4
Mobile Hacker
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
This case demonstrates that effective smartphone espionage doesn't always require expensive zero-day exploits or the development of sophisticated, custom and undetected spyware. Instead, attackers can achieve significant intelligence gains using older, off…
The state of cloud runtime security - 2025 edition
https://ift.tt/dx51KRk
Submitted June 05, 2025 at 05:46PM by Swimming_Version_605
via reddit https://ift.tt/v1NBpUY
https://ift.tt/dx51KRk
Submitted June 05, 2025 at 05:46PM by Swimming_Version_605
via reddit https://ift.tt/v1NBpUY
ARMO
The State of Cloud Runtime Security 2025 - ARMO
Discover key challenges and the path forward. Learn about alert overload, tool sprawl, and the need for unified runtime security solutions.
Vulnerabilities in Anthropic’s MCP: Full-Schema Poisoning + Secret-Leaking Tool Attacks (PoC Inside)
https://ift.tt/idjo0RM
Submitted June 05, 2025 at 09:45PM by jat0369
via reddit https://ift.tt/cD7wpSL
https://ift.tt/idjo0RM
Submitted June 05, 2025 at 09:45PM by jat0369
via reddit https://ift.tt/cD7wpSL
Cyberark
Poison everywhere: No output from your MCP server is safe
The Model Context Protocol (MCP) is an open standard and open-source project from Anthropic that makes it quick and easy for developers to add real-world functionality — like sending emails or...
Tnok - Next Generation Port Security
https://ift.tt/CJrS5YO
Submitted June 05, 2025 at 11:37PM by Glad_Chest934
via reddit https://ift.tt/GNdBh3y
https://ift.tt/CJrS5YO
Submitted June 05, 2025 at 11:37PM by Glad_Chest934
via reddit https://ift.tt/GNdBh3y
Cards Are Still the Weakest Link
https://ift.tt/53lcbOr
Submitted June 06, 2025 at 03:23AM by alexlash
via reddit https://ift.tt/h1wR8Qk
https://ift.tt/53lcbOr
Submitted June 06, 2025 at 03:23AM by alexlash
via reddit https://ift.tt/h1wR8Qk
Substack
Cards Are Still the Weakest Link
Still Using Cards? You’re the Weakest Link in the Payment Chain
DroidGround: Elevate your Android CTF Challenges
https://ift.tt/4Rt7zLn
Submitted June 06, 2025 at 02:35AM by deleee
via reddit https://ift.tt/L4MCTkV
https://ift.tt/4Rt7zLn
Submitted June 06, 2025 at 02:35AM by deleee
via reddit https://ift.tt/L4MCTkV
Medium
DroidGround: Elevate your Android CTF Challenges
Ever felt that Android CTF challenges are too focused on reverse engineering, leaving out the thrill of real-world exploitation? I did too…
Transform Your Old Smartphone into a Pocket Palmtop-style Cyberdeck with Kali NetHunter
https://ift.tt/AyxwgJZ
Submitted June 06, 2025 at 12:14PM by barakadua131
via reddit https://ift.tt/zdL5WwO
https://ift.tt/AyxwgJZ
Submitted June 06, 2025 at 12:14PM by barakadua131
via reddit https://ift.tt/zdL5WwO
Mobile Hacker
Transform Your Old Smartphone into a Pocket Cyberdeck with Kali NetHunter
This setup serves as a convenient alternative to carrying a full-sized laptop or struggling with a smartphone’s virtual keyboard for complex technical tasks. It offers comfortable typing and an efficient portability.
Possible Malware in Official MicroDicom Installer (PDF + Hashes + Scan Results Included)
https://ift.tt/aMELwB3
Submitted June 07, 2025 at 02:14AM by Deeeee737
via reddit https://ift.tt/zj1lFd0
https://ift.tt/aMELwB3
Submitted June 07, 2025 at 02:14AM by Deeeee737
via reddit https://ift.tt/zj1lFd0
GitHub
GitHub - darnas11/MicroDicom-Incident-Report: Analysis of a suspicious binary found in MicroDicom Viewer installer
Analysis of a suspicious binary found in MicroDicom Viewer installer - darnas11/MicroDicom-Incident-Report
Riding The Time Machine: Journey Through An Old vBulletin PHP Object Injection
https://ift.tt/tgfC3Ha
Submitted June 07, 2025 at 07:31PM by eg1x
via reddit https://ift.tt/KSmv2zJ
https://ift.tt/tgfC3Ha
Submitted June 07, 2025 at 07:31PM by eg1x
via reddit https://ift.tt/KSmv2zJ
Karmainsecurity
Riding The Time Machine: Journey Through An Old vBulletin PHP Object Injection | Karma(In)Security
This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.
HMAS Canberra accidentally blocks wireless internet and radio services in New Zealand
https://ift.tt/z6ecYwC
Submitted June 09, 2025 at 04:27AM by feint_of_heart
via reddit https://ift.tt/ao4mDyF
https://ift.tt/z6ecYwC
Submitted June 09, 2025 at 04:27AM by feint_of_heart
via reddit https://ift.tt/ao4mDyF
RNZ
HMAS Canberra accidentally blocks wireless internet and radio services in New Zealand
It happened earlier this week during a visit intended to celebrate the sister city relationship between Canberra and Wellington.
Preventing Prompt Injection Attacks at Scale
https://ift.tt/qSIuKTE
Submitted June 09, 2025 at 10:22PM by mazen160
via reddit https://ift.tt/fhR0cxs
https://ift.tt/qSIuKTE
Submitted June 09, 2025 at 10:22PM by mazen160
via reddit https://ift.tt/fhR0cxs
Mazin Ahmed
Preventing Prompt Injection Attacks at Scale
A bit more on Twitter/X’s new encrypted messaging
https://ift.tt/AphfZiQ
Submitted June 10, 2025 at 12:00AM by feross
via reddit https://ift.tt/dm1nboI
https://ift.tt/AphfZiQ
Submitted June 10, 2025 at 12:00AM by feross
via reddit https://ift.tt/dm1nboI
A Few Thoughts on Cryptographic Engineering
A bit more on Twitter/X’s new encrypted messaging
Update 6/10: Based on a short conversation with an engineering lead at X, some of the devices used at X are claimed to be using HSMs. See more further below. Matthew Garrett has a nice post about T…
Bruteforcing the phone number of any Google user
https://ift.tt/Wl0jKMv
Submitted June 10, 2025 at 01:08AM by _vavkamil_
via reddit https://ift.tt/ULmfpZa
https://ift.tt/Wl0jKMv
Submitted June 10, 2025 at 01:08AM by _vavkamil_
via reddit https://ift.tt/ULmfpZa
brutecat.com
Bruteforcing the phone number of any Google user
From rate limits to no limits: How IPv6's massive address space and a crafty botguard bypass left every Google user's phone number vulnerable
Why Open Source ≠ Secure Code
https://ift.tt/CWbic4j
Submitted June 10, 2025 at 03:29PM by kobsoN
via reddit https://ift.tt/zuqCdhr
https://ift.tt/CWbic4j
Submitted June 10, 2025 at 03:29PM by kobsoN
via reddit https://ift.tt/zuqCdhr
New ISPConfig Authenticated Remote Code Execution Vulnerability
https://ift.tt/0CiHfBy
Submitted June 10, 2025 at 04:28PM by SSDisclosure
via reddit https://ift.tt/jMfE5K3
https://ift.tt/0CiHfBy
Submitted June 10, 2025 at 04:28PM by SSDisclosure
via reddit https://ift.tt/jMfE5K3
SSD Secure Disclosure
SSD Advisory - ISPConfig Authenticated Remote Code Execution - SSD Secure Disclosure
Summary The analysis conducted on the product: ISPConfig version: 3.2 build: 12p1 was carried out using the official installation package. The analysis identified primarily design flaws in the user creation/edit functionality, which allow a client user to…
CVE-2025-47934 - Spoofing OpenPGP.js signature verification
https://ift.tt/h6ZlTMc
Submitted June 10, 2025 at 07:21PM by ThomasRinsma
via reddit https://ift.tt/pw0feqU
https://ift.tt/h6ZlTMc
Submitted June 10, 2025 at 07:21PM by ThomasRinsma
via reddit https://ift.tt/pw0feqU
codeanlabs
CVE-2025-47934 - Spoofing OpenPGP.js signature verification - Codean Labs
CVE-2025-47934 allows attackers to spoof arbitrary signatures and encrypted emails that appear as valid in OpenPGP.js. The only requirement is access to a single valid signed message from the target author ("Alice"). Since this undermines the core principle…
Feedback - new secure doc sharing platform GetSafeDocs.com
https://getsafedocs.com
Submitted June 10, 2025 at 10:05PM by New-Arrival414
via reddit https://ift.tt/7VOKM8d
https://getsafedocs.com
Submitted June 10, 2025 at 10:05PM by New-Arrival414
via reddit https://ift.tt/7VOKM8d
Reddit
From the netsec community on Reddit: [ Removed by moderator ]
Posted by New-Arrival414 - 3 votes and 0 comments