Finding vulnerabilities in Claude code
https://cymulate.com/blog/cve-2025-547954-54795-claude-inverseprompt/
Submitted August 04, 2025 at 10:29PM by Fun_Preference1113
via reddit https://ift.tt/07IGcFw
https://cymulate.com/blog/cve-2025-547954-54795-claude-inverseprompt/
Submitted August 04, 2025 at 10:29PM by Fun_Preference1113
via reddit https://ift.tt/07IGcFw
Cymulate
InversePrompt: Turning Claude Against Itself, One Prompt at a Time (CVE-2025-54794 & CVE-2025-54795)
Discovered flaws in Claude Code expose path restriction bypass and command injection risks - turning AI inward with inverse prompting
Lateral Movement – BitLocker
https://ift.tt/ymYExGt
Submitted August 05, 2025 at 12:42PM by netbiosX
via reddit https://ift.tt/36CcoxJ
https://ift.tt/ymYExGt
Submitted August 05, 2025 at 12:42PM by netbiosX
via reddit https://ift.tt/36CcoxJ
Purple Team
Lateral Movement – BitLocker
BitLocker is a full disk encryption feature which was designed to protect data by providing encryption to entire volumes. In Windows endpoints (workstations, laptop devices etc.), BitLocker is typi…
OdooMap - A Pentesting Tool for Odoo Applications
https://ift.tt/DGz1OHC
Submitted August 05, 2025 at 09:17PM by Fluid-Profit-164
via reddit https://ift.tt/3xmHZW0
https://ift.tt/DGz1OHC
Submitted August 05, 2025 at 09:17PM by Fluid-Profit-164
via reddit https://ift.tt/3xmHZW0
GitHub
GitHub - MohamedKarrab/odoomap: A penetration testing tool for odoo applications.
A penetration testing tool for odoo applications. Contribute to MohamedKarrab/odoomap development by creating an account on GitHub.
HTTP/1.1 must die: the desync endgame (whitepaper)
https://ift.tt/P3GRgVz
Submitted August 07, 2025 at 05:19AM by albinowax
via reddit https://ift.tt/1IgjNOu
https://ift.tt/P3GRgVz
Submitted August 07, 2025 at 05:19AM by albinowax
via reddit https://ift.tt/1IgjNOu
Http1Mustdie
HTTP/1.1 Must Die
Upstream HTTP/1.1 is inherently insecure, and routinely exposes millions of websites to hostile takeover. Join the mission to kill HTTP/1.1 now
See 694201 POST requests to /aura in a pentest? It's probably Salesforce - run this tool against it.
https://ift.tt/tWybfNp
Submitted August 07, 2025 at 04:44PM by ezzzzz
via reddit https://ift.tt/241LdQN
https://ift.tt/tWybfNp
Submitted August 07, 2025 at 04:44PM by ezzzzz
via reddit https://ift.tt/241LdQN
Research Blog | Project Black
Salesforce Penetration Testing Fundamentals
This blog walks you through using our noscript to audit a Salesforce environment, uncovering excessive permissions and platform-specific risks like SOQL injection.
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault
https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/
Submitted August 07, 2025 at 06:37PM by moviuro
via reddit https://ift.tt/bvaZyXr
https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/
Submitted August 07, 2025 at 06:37PM by moviuro
via reddit https://ift.tt/bvaZyXr
Cyata | The Control Plane for Agentic Identity
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyata | The…
Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust…
New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
https://unit42.paloaltonetworks.com/new-darkcloud-stealer-infection-chain
Submitted August 07, 2025 at 08:08PM by Super_Weather3575
via reddit https://ift.tt/j0dAMDK
https://unit42.paloaltonetworks.com/new-darkcloud-stealer-infection-chain
Submitted August 07, 2025 at 08:08PM by Super_Weather3575
via reddit https://ift.tt/j0dAMDK
Unit 42
New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
DarkCloud Stealer's delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in Visual Basic 6.
Greedy Bear —Massive Crypto Wallet Attack Spans Across Multiple Vectors
https://ift.tt/QI0boBV
Submitted August 07, 2025 at 07:47PM by Ok-Inflation-4706
via reddit https://ift.tt/jnIDC5i
https://ift.tt/QI0boBV
Submitted August 07, 2025 at 07:47PM by Ok-Inflation-4706
via reddit https://ift.tt/jnIDC5i
Medium
GreedyBear: 650 Attack Tools, One Coordinated Campaign
Today Koi exposes one of the most notorious attack groups we’ve yet to encounter — Greedy Bear. The group lunched a coordinated attack…
We replaced passwords with something worse
https://blog.danielh.cc/blog/passwords
Submitted August 08, 2025 at 01:06AM by innpattag
via reddit https://ift.tt/giaApKY
https://blog.danielh.cc/blog/passwords
Submitted August 08, 2025 at 01:06AM by innpattag
via reddit https://ift.tt/giaApKY
blog.danielh.cc
We replaced passwords with something worse | Blog - Daniel Huang
where my words occasionally escape /dev/null
CVE-2024-12718: Path Escape via Python’s tarfile Extraction Filters
https://ift.tt/v86YEiC
Submitted August 08, 2025 at 01:05AM by innpattag
via reddit https://ift.tt/FoMTqXC
https://ift.tt/v86YEiC
Submitted August 08, 2025 at 01:05AM by innpattag
via reddit https://ift.tt/FoMTqXC
Upwind | Cloud Security Happens at Runtime
CVE-2024-12718: Path Escape via Python’s tarfile Extraction Filters - Upwind
A newly disclosed vulnerability in Python’s standard library, CVE-2024-12718, allows attackers to modify file metadata or file permissions outside the
Prompt injection engineering for attackers: Exploiting GitHub Copilot
https://ift.tt/bRdJVBy
Submitted August 08, 2025 at 02:14AM by rkhunter_
via reddit https://ift.tt/Qc84XLS
https://ift.tt/bRdJVBy
Submitted August 08, 2025 at 02:14AM by rkhunter_
via reddit https://ift.tt/Qc84XLS
The Trail of Bits Blog
Prompt injection engineering for attackers: Exploiting GitHub Copilot
Prompt injection pervades discussions about security for LLMs and AI agents. But there is little public information on how to write powerful, discreet, and reliable prompt injection exploits. In this post, we will design and implement a prompt injection exploit…
Blog: Exploiting Retbleed in the real world
https://ift.tt/MtCPWj0
Submitted August 08, 2025 at 03:07AM by sirdarckcat
via reddit https://ift.tt/DVtsg5i
https://ift.tt/MtCPWj0
Submitted August 08, 2025 at 03:07AM by sirdarckcat
via reddit https://ift.tt/DVtsg5i
Google
Blog: Exploiting Retbleed in the real world
Curious to hear about our experience exploiting Retbleed (a security vulnerability affecting modern CPUs)? Then check out this post to see how we pushed the boundaries of Retbleed exploitation and understand more about the security implications of this exploit…
Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
https://ift.tt/m57jsPZ
Submitted August 08, 2025 at 03:00AM by vaizor
via reddit https://ift.tt/bZGd8Jr
https://ift.tt/m57jsPZ
Submitted August 08, 2025 at 03:00AM by vaizor
via reddit https://ift.tt/bZGd8Jr
Eye Research
Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
The Eye Security Research team has uncovered a new critical misconfiguration that exposed sensitive data at internal Microsoft applications.
SquareX launches open-source toolkits to defend browsers
https://ift.tt/Llpy691
Submitted August 08, 2025 at 11:20AM by shadowlurker_6
via reddit https://ift.tt/jfr7iDS
https://ift.tt/Llpy691
Submitted August 08, 2025 at 11:20AM by shadowlurker_6
via reddit https://ift.tt/jfr7iDS
ChannelLife Australia
SquareX launches open-source toolkits to defend browsers
SquareX launches two open-source toolkits to help security teams simulate and defend against browser-based attacks that evade traditional enterprise defences.
The Mental Material Revolution: Why Engineers Need to Become Cognitive Architects
https://ift.tt/0j47F1p
Submitted August 08, 2025 at 07:25PM by gabibeyo
via reddit https://ift.tt/Qak3LOr
https://ift.tt/0j47F1p
Submitted August 08, 2025 at 07:25PM by gabibeyo
via reddit https://ift.tt/Qak3LOr
Medium
The Mental Material Revolution: Why Engineers Need to Become Cognitive Architects
How context engineering is reshaping the future of AI development — and why your emotional intelligence might be your most valuable asset
The Silent Security Crisis: How AI Coding Assistants Are Creating Perfect Attack Blueprints
https://ift.tt/oXWnCqt
Submitted August 08, 2025 at 07:21PM by gabibeyo
via reddit https://ift.tt/CPYwmqe
https://ift.tt/oXWnCqt
Submitted August 08, 2025 at 07:21PM by gabibeyo
via reddit https://ift.tt/CPYwmqe
Medium
The Silent Security Crisis: How AI Coding Assistants Are Creating Perfect Attack Blueprints
The era of patient, methodical reconnaissance is over. Your AI coding assistant has already done all the work for attackers.
Unclaimed Google Play Store package
http://example.com
Submitted August 08, 2025 at 10:11PM by Accomplished-Dig4025
via reddit https://ift.tt/L1dEeqv
http://example.com
Submitted August 08, 2025 at 10:11PM by Accomplished-Dig4025
via reddit https://ift.tt/L1dEeqv
Reddit
[ Removed by moderator ] : r/netsec
540K subscribers in the netsec community. /r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers…
Theori AIxCC writeup , 0day in sqlite + more
https://ift.tt/8rpl0gc
Submitted August 09, 2025 at 02:13AM by supernetworks
via reddit https://ift.tt/KhQl19s
https://ift.tt/8rpl0gc
Submitted August 09, 2025 at 02:13AM by supernetworks
via reddit https://ift.tt/KhQl19s
theori.io
Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge - Theori BLOG
Agent trajectory walkthroughs of a fully autonomous hacking system | AI for Security, AIxCC
Vulnerability Management Program - How to implement SLA and its processes
https://ift.tt/iQsASVb
Submitted August 09, 2025 at 08:58PM by pathetiq
via reddit https://ift.tt/TsGP3iu
https://ift.tt/iQsASVb
Submitted August 09, 2025 at 08:58PM by pathetiq
via reddit https://ift.tt/TsGP3iu
Security Autopsy
Vulnerability Management Program - How to implement SLA and its processes
Defining good SLAs is a tough challenge, but it’s at the heart of any solid vulnerability management program. This article helps internal security teams set clear SLAs, define the right metrics, and adjust their ticketing system to build a successful vulnerability…
Pentest Trick: Out of sight, out of mind with Windows Long File Names
https://ift.tt/MaSXfIN
Submitted August 10, 2025 at 07:58AM by Cold-Dinosaur
via reddit https://ift.tt/UgCuXF2
https://ift.tt/MaSXfIN
Submitted August 10, 2025 at 07:58AM by Cold-Dinosaur
via reddit https://ift.tt/UgCuXF2
Zerosalarium
Pentest Trick: Out of sight, out of mind with Windows Long File Names
Abusing Windows file names that exceed 260 characters to bypass the EDR's sample collection tool by the pentester. Redteam trick
AI-Powered Code Security Reviews for DevSecOps with Claude
https://ift.tt/MYoLzbf
Submitted August 11, 2025 at 12:33PM by mostafahussein
via reddit https://ift.tt/VbwtpKH
https://ift.tt/MYoLzbf
Submitted August 11, 2025 at 12:33PM by mostafahussein
via reddit https://ift.tt/VbwtpKH
Medium
AI-Powered Code Security Reviews for DevSecOps with Claude
Software is being built faster than ever, and that makes it easier for security issues to slip through. That’s why catching flaws early in…