Copy-Paste Pitfalls: Revealing the AppLocker Bypass Risks in The Suggested Block-list Policy
https://ift.tt/KEXA305
Submitted July 20, 2025 at 07:25PM by lohacker0
via reddit https://ift.tt/45ZeBcy
https://ift.tt/KEXA305
Submitted July 20, 2025 at 07:25PM by lohacker0
via reddit https://ift.tt/45ZeBcy
Varonis
Copy-Paste Pitfalls: Revealing the AppLocker Bypass Risks in The Suggested Block-list Policy
A subtle versioning error in Microsoft’s AppLocker block list exposes a bypass risk — learn how to spot and fix this overlooked security gap.
WebSecDojo - Free Web Application Challenges
https://websecdojo.com/
Submitted July 20, 2025 at 10:49PM by bubblehack3r
via reddit https://ift.tt/mEhu97d
https://websecdojo.com/
Submitted July 20, 2025 at 10:49PM by bubblehack3r
via reddit https://ift.tt/mEhu97d
Websecdojo
WebSecDojo - Learn web security through hands-on CTF challenges
Learn web security through hands-on CTF challenges. Practice your skills and earn points.
Your Loyalty Card is a Liability: Lessons from the Co-op Attack
https://ift.tt/ZL4K0Ql
Submitted July 21, 2025 at 12:42AM by AlexanderDan10-Alger
via reddit https://ift.tt/GavRf3T
https://ift.tt/ZL4K0Ql
Submitted July 21, 2025 at 12:42AM by AlexanderDan10-Alger
via reddit https://ift.tt/GavRf3T
Substack
Your Loyalty Card is a Liability: Lessons from the Co-op Hack
The Hidden Cost of Supermarket Loyalty: Data, Dependence, and Risk
Code Interpreter Open Ports
http://Amidumb.com
Submitted July 21, 2025 at 01:34AM by Porcelainbee12-
via reddit https://ift.tt/Gnd2sa6
http://Amidumb.com
Submitted July 21, 2025 at 01:34AM by Porcelainbee12-
via reddit https://ift.tt/Gnd2sa6
Reddit
Code Interpreter Open Ports : r/netsec
530K subscribers in the netsec community. /r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers…
Path traversal in vim (tar archive) CVE-2025-53905
https://ift.tt/TuLJp2r
Submitted July 21, 2025 at 01:26AM by Happy_Youth_1970
via reddit https://ift.tt/OhGCKbw
https://ift.tt/TuLJp2r
Submitted July 21, 2025 at 01:26AM by Happy_Youth_1970
via reddit https://ift.tt/OhGCKbw
Path traversal in vim (zip archive) CVE-2025-53906
https://ift.tt/Yq7Vpdr
Submitted July 21, 2025 at 01:23AM by Happy_Youth_1970
via reddit https://ift.tt/oRp4miX
https://ift.tt/Yq7Vpdr
Submitted July 21, 2025 at 01:23AM by Happy_Youth_1970
via reddit https://ift.tt/oRp4miX
Tips on detecting suspicious sign in activity from phishing attack (AiTM)! (Using Entra ID & M365 as example)
https://ift.tt/bOMdJ0C
Submitted July 21, 2025 at 01:09AM by Apprehensive_Pay614
via reddit https://ift.tt/8WchCRJ
https://ift.tt/bOMdJ0C
Submitted July 21, 2025 at 01:09AM by Apprehensive_Pay614
via reddit https://ift.tt/8WchCRJ
Proofpoint
What Is an Adversary-in-the-Middle Attack? AiTM Attacks Explained | Proofpoint US
An Adversary-in-the-Middle (AiTM) is a form of data eavesdropping and theft. Learn what it is, how it works, how to prevent attacks, and more.
A Novel Technique for SQL Injection in PDO’s Prepared Statements
https://ift.tt/CO50xZ7
Submitted July 21, 2025 at 03:16PM by AlmondOffSec
via reddit https://ift.tt/vSXGzV6
https://ift.tt/CO50xZ7
Submitted July 21, 2025 at 03:16PM by AlmondOffSec
via reddit https://ift.tt/vSXGzV6
Searchlight Cyber
A Novel Technique for SQL Injection in PDO’s Prepared Statements › Searchlight Cyber
Searchlight Cyber's Security Research team details a Novel Technique for SQL Injection in PDO's Prepared Statements.
The Internet Red Button: a 2016 Bug Still Lets Anyone Kill Solar Farms in 3 Clicks
https://ift.tt/QxjLIYS
Submitted July 21, 2025 at 04:44PM by Disscom
via reddit https://ift.tt/l4hug8S
https://ift.tt/QxjLIYS
Submitted July 21, 2025 at 04:44PM by Disscom
via reddit https://ift.tt/l4hug8S
Medium
The Internet Red Button: a 2016 Bug Still Lets Anyone Kill Solar Farms in 3 Clicks
Spain’s April 2025 blackout cost €1.6 B. Keep ignoring firmware updates and you’re volunteering to be the sequel.
Quick-Skoping through Netskope SWG Tenants - CVE-2024-7401
https://quickskope.com/
Submitted July 21, 2025 at 07:39PM by TJ_Null
via reddit https://ift.tt/3THjt96
https://quickskope.com/
Submitted July 21, 2025 at 07:39PM by TJ_Null
via reddit https://ift.tt/3THjt96
QuickSkope
Quick-Skoping through Netskope SWG Tenants - CVE-2024-7401
## Table of Contents1. [Introduction](#introduction)2. [Understanding How Netskope Client Works](#understanding-how-netskope-client-works)3. [Scraping for Ne...
Learn how to fix a PCAP generated by FakeNet/-NG using PacketSmith
https://ift.tt/sqwC8iF
Submitted July 22, 2025 at 12:45AM by MFMokbel
via reddit https://ift.tt/fwd764D
https://ift.tt/sqwC8iF
Submitted July 22, 2025 at 12:45AM by MFMokbel
via reddit https://ift.tt/fwd764D
PacketSmith
Fixing FakeNet-NG - PacketSmith
Fixing A FakeNet/-NG PCAP Introduction In this tutorial, we’ll demonstrate some of PacketSmith’s capabilities by using a pcap file generated by FakeNet-NG. FakeNet-NG is an open-source, next-generation dynamic network analysis tool developed by Mandiant,…
How much time do security teams really spend on manual tasks? I built a fun calculator app based on industry research we did.
https://ift.tt/FgDl8wX
Submitted July 22, 2025 at 02:26PM by Afraid_Geologist_396
via reddit https://ift.tt/CQZljU1
https://ift.tt/FgDl8wX
Submitted July 22, 2025 at 02:26PM by Afraid_Geologist_396
via reddit https://ift.tt/CQZljU1
hero.reclaim.security
Security Burnout Meter
Assess your daily workload burnout with our humorous and engaging quiz. Discover your Security Persona Badge and learn how Reclaim Security can help reduce your stress.
How We Accidentally Discovered a Remote Code Execution Vulnerability in ETQ Reliance
https://ift.tt/CnfmDaw
Submitted July 22, 2025 at 01:47PM by Mempodipper
via reddit https://ift.tt/Z0irlGP
https://ift.tt/CnfmDaw
Submitted July 22, 2025 at 01:47PM by Mempodipper
via reddit https://ift.tt/Z0irlGP
Searchlight Cyber
RCE Vulnerability Discovered in ETQ Reliance | Searchlight Cyber
Note: In correspondence with Hexagon while disclosing the bugs below, they informed us that any sharing of source code would be considered a violation of their terms and license. The Java code has been replaced with similar code that illustrates the flow…
Autofill Phishing: The Silent Scam That Nobody Warned You About
https://ift.tt/06Jd2Bz
Submitted July 22, 2025 at 08:46PM by AlexanderDan10-Alger
via reddit https://ift.tt/cyhRiB0
https://ift.tt/06Jd2Bz
Submitted July 22, 2025 at 08:46PM by AlexanderDan10-Alger
via reddit https://ift.tt/cyhRiB0
Substack
CyberInsights (@getcyberinsights)
Do you use Autofill?
Are you aware of the Risks?
Check out this article below to learn more
👇👇👇
Are you aware of the Risks?
Check out this article below to learn more
👇👇👇
"Reverse Engineering Security Products: Developing an Advanced Tamper Tradecraft" held in BlackHat MEA 2024
https://ift.tt/FgD1YTW
Submitted July 22, 2025 at 07:03PM by Zealousideal-Bug3632
via reddit https://ift.tt/UqCFwIm
https://ift.tt/FgD1YTW
Submitted July 22, 2025 at 07:03PM by Zealousideal-Bug3632
via reddit https://ift.tt/UqCFwIm
GitHub
BlackHat-MEA-2024-slides/BH MEA 2024 - Reverse Engineering of Security Products_ Defender.pdf at main · emcalv/BlackHat-MEA-2024…
"Reverse Engineering of Security Products" slides of the talk at BlackHat MEA 2024 - emcalv/BlackHat-MEA-2024-slides
Coyote in the Wild: First-Ever Malware That Abuses UI Automation
https://ift.tt/dRi4Sgj
Submitted July 23, 2025 at 10:44AM by oridavid1231
via reddit https://ift.tt/P1sDFu7
https://ift.tt/dRi4Sgj
Submitted July 23, 2025 at 10:44AM by oridavid1231
via reddit https://ift.tt/P1sDFu7
Akamai
Coyote in the Wild: First-Ever Malware That Abuses UI Automation | Akamai
Learn about the latest Coyote malware variant: The first malware that abuses UI Automation.
x86-64 GetPC: SYSCALL
https://ift.tt/GfvKJDg
Submitted July 23, 2025 at 02:22PM by 5yn74x
via reddit https://ift.tt/DCpdAtB
https://ift.tt/GfvKJDg
Submitted July 23, 2025 at 02:22PM by 5yn74x
via reddit https://ift.tt/DCpdAtB
Medium
x86-64 GetPC: SYSCALL
A look at how SYSCALL can be used to retrieve RIP for shellcode positioning.
Usurpation d’Identités managées dans Azure
https://ift.tt/6miC5q9
Submitted July 23, 2025 at 02:19PM by MobetaSec
via reddit https://ift.tt/AaZlnFb
https://ift.tt/6miC5q9
Submitted July 23, 2025 at 02:19PM by MobetaSec
via reddit https://ift.tt/AaZlnFb
Mobeta
Usurpation d’Identités managées dans Azure | Mobeta
Pentest Azure : exploitez une identité managée après RCE sur App Service, récupérez un jeton JWT et accédez aux secrets d’un Key Vault.
[CVE-2025-48933] Invision Community <= 5.0.7 (oauth/callback) Reflected Cross-Site Scripting Vulnerability
https://ift.tt/7t8SiRl
Submitted July 23, 2025 at 03:32PM by eg1x
via reddit https://ift.tt/o6xvR0i
https://ift.tt/7t8SiRl
Submitted July 23, 2025 at 03:32PM by eg1x
via reddit https://ift.tt/o6xvR0i
Karmainsecurity
Invision Community <= 5.0.7 (oauth/callback) Reflected Cross-Site Scripting Vulnerability | Karma(In)Security
This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.
[CVE-2025-48932] Invision Community <= 4.7.20 (calendar/view.php) SQL Injection Vulnerability
https://ift.tt/qJvkEHT
Submitted July 23, 2025 at 03:33PM by eg1x
via reddit https://ift.tt/wqr16Xs
https://ift.tt/qJvkEHT
Submitted July 23, 2025 at 03:33PM by eg1x
via reddit https://ift.tt/wqr16Xs
Karmainsecurity
Invision Community <= 4.7.20 (calendar/view.php) SQL Injection Vulnerability | Karma(In)Security
This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.
The Guest Who Could: Exploiting LPE in VMWare Tools
https://ift.tt/6zHWkR4
Submitted July 23, 2025 at 05:19PM by AlmondOffSec
via reddit https://ift.tt/kDqY5eX
https://ift.tt/6zHWkR4
Submitted July 23, 2025 at 05:19PM by AlmondOffSec
via reddit https://ift.tt/kDqY5eX
PT SWARM
The Guest Who Could: Exploiting LPE in VMWare Tools
VMWare Tools provides a rich set of drivers and services that enhance manageability of virtual machines and enable guest-host communication. While the host-to-guest RPC mechanisms have long been attractive targets for vulnerability research due to their potential…