Gmail Phishing Campaign Analysis – “New Voicemail” Email with Dynamics Redirect + Captcha
https://ift.tt/XOozl4W
Submitted August 16, 2025 at 01:23PM by anuraggawande
via reddit https://ift.tt/SI7FpbG
https://ift.tt/XOozl4W
Submitted August 16, 2025 at 01:23PM by anuraggawande
via reddit https://ift.tt/SI7FpbG
Malware Analysis, Phishing, and Email Scams
Watch Out for This Gmail Scam
This week, I received an email claiming I had a “New Voice Notification”. The email included a big “Listen to Voicemail” button: Looking at the email headers revealed even more: The email was sent …
Elastic EDR 0-day: Microsoft-signed driver can be weaponized to attack its own host
https://ift.tt/A5xqo6P
Submitted August 16, 2025 at 09:00PM by Minimum_Call_3677
via reddit https://ift.tt/TBYicr0
https://ift.tt/A5xqo6P
Submitted August 16, 2025 at 09:00PM by Minimum_Call_3677
via reddit https://ift.tt/TBYicr0
How Exposed TeslaMate Instances Leak Sensitive Tesla Data
https://ift.tt/4eSMOPc
Submitted August 17, 2025 at 07:31PM by s3yfullah
via reddit https://ift.tt/ce8m2Vt
https://ift.tt/4eSMOPc
Submitted August 17, 2025 at 07:31PM by s3yfullah
via reddit https://ift.tt/ce8m2Vt
Medium
How Exposed TeslaMate Instances Leak Sensitive Tesla Data
Introduction
How attackers can execute arbitrary code at the kernel level: A critical Linux Kernel netfilter: ipset: Missing Range Check LPE
https://ift.tt/u1vazjc
Submitted August 18, 2025 at 02:56PM by SSDisclosure
via reddit https://ift.tt/JBExqDy
https://ift.tt/u1vazjc
Submitted August 18, 2025 at 02:56PM by SSDisclosure
via reddit https://ift.tt/JBExqDy
SSD Secure Disclosure
Linux Kernel netfilter: ipset: Missing Range Check LPE - SSD Secure Disclosure
Affected Versions Vendor Response Linux kernel release the patch (https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35f56c554eb1b56b77b3cf197a6b00922d49033d) Background The ipset subsystem in the Linux kernel is a framework used…
Intel Outside: Hacking every Intel employee and various internal websites
https://ift.tt/h3nWDqe
Submitted August 18, 2025 at 08:03PM by EatonZ
via reddit https://ift.tt/vK8iYb1
https://ift.tt/h3nWDqe
Submitted August 18, 2025 at 08:03PM by EatonZ
via reddit https://ift.tt/vK8iYb1
Eaton-Works
Intel Outside: Hacking every Intel employee and various internal websites
Hardcoded credentials, pointless encryption, and generous APIs exposed details of every employee and made it possible to break into internal websites.
“Vibe Hacking”: Abusing Developer Trust in Cursor and VS Code Remote Development
https://ift.tt/IEARJ1z
Submitted August 18, 2025 at 09:21PM by thaidn_
via reddit https://ift.tt/ylAO02D
https://ift.tt/IEARJ1z
Submitted August 18, 2025 at 09:21PM by thaidn_
via reddit https://ift.tt/ylAO02D
blog.calif.io
“Vibe Hacking”: Abusing Developer Trust in Cursor and VS Code Remote Development
Update: Mauro Soria pointed out that this attack vector can be easily adapted for phishing scenarios:
CTF stats, mobile wallet attacks & magstripe demos – Payment Village @ DEF CON 33
https://ift.tt/3Ld2I5q
Submitted August 19, 2025 at 01:08AM by alexlash
via reddit https://ift.tt/2Z8k1rT
https://ift.tt/3Ld2I5q
Submitted August 19, 2025 at 01:08AM by alexlash
via reddit https://ift.tt/2Z8k1rT
Substack
DEF CON 33 Wrap-Up: What Happened at Payment Village
A hands-on, community-powered look at payment system security — from ferrofluid and feature phones to CTF stats and future challenges.
Live Q&A with an Author of the NIST Security Guidelines (SP 800-115)
https://ift.tt/13sdbSX
Submitted August 19, 2025 at 05:06AM by _cybersecurity_
via reddit https://ift.tt/21wtgOS
https://ift.tt/13sdbSX
Submitted August 19, 2025 at 05:06AM by _cybersecurity_
via reddit https://ift.tt/21wtgOS
Substack
Live Q&A with an Author of the NIST Security Guidelines (SP 800-115)
Join us for a LIVE Q&A discussion in the Cybersecurity Club on Discord featuring Karen Scarfone, co-author of the NIST Security Guidelines (SP 800-115).
Phrack 72
https://ift.tt/UwKuD3f
Submitted August 19, 2025 at 07:34AM by mateusnr
via reddit https://ift.tt/VHe7vZO
https://ift.tt/UwKuD3f
Submitted August 19, 2025 at 07:34AM by mateusnr
via reddit https://ift.tt/VHe7vZO
phrack.org
.:: Phrack Magazine ::.
Phrack staff website.
Trivial C# Random Exploitation
https://ift.tt/UMpmnlg
Submitted August 19, 2025 at 04:22PM by nibblesec
via reddit https://ift.tt/u9LrM1A
https://ift.tt/UMpmnlg
Submitted August 19, 2025 at 04:22PM by nibblesec
via reddit https://ift.tt/u9LrM1A
Doyensec
Trivial C# Random Exploitation
Exploiting random number generators requires math, right? Thanks to C#’s Random, that is not necessarily the case! I ran into an HTTP 2.0 web service issuing password reset tokens from a custom encoding of (new Random()).Next(min, max) output. This led to…
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
https://portswigger.net/research/how-to-distinguish-http-pipelining-from-request-smuggling
Submitted August 19, 2025 at 08:13PM by albinowax
via reddit https://ift.tt/VMKFJ86
https://portswigger.net/research/how-to-distinguish-http-pipelining-from-request-smuggling
Submitted August 19, 2025 at 08:13PM by albinowax
via reddit https://ift.tt/VMKFJ86
PortSwigger Research
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
Sometimes people think they've found HTTP request smuggling, when they're actually just observing HTTP keep-alive or pipelining. This is usually a false positive, but sometimes there's actually a real
Git 2.51: Preparing for the future with SHA-256
https://ift.tt/9ClWmzQ
Submitted August 19, 2025 at 08:08PM by woltan_4
via reddit https://ift.tt/BDSRxIq
https://ift.tt/9ClWmzQ
Submitted August 19, 2025 at 08:08PM by woltan_4
via reddit https://ift.tt/BDSRxIq
Help Net Security
Git 2.51: Preparing for the future with SHA-256
Git 2.51 is out, and the release continues the long process of modernizing the version control system. It includes several technical changes.
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
https://ift.tt/hlVdIFG
Submitted August 19, 2025 at 09:20PM by tmlxs
via reddit https://ift.tt/g5JxLZQ
https://ift.tt/hlVdIFG
Submitted August 19, 2025 at 09:20PM by tmlxs
via reddit https://ift.tt/g5JxLZQ
Kudelskisecurity
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories - Kudelski Security Research Center
Aug 19, 2025 - Nils Amiet -
GrapheneOS: Another contributor attacked & banned by Daniel Micay
https://ift.tt/D9KXqug
Submitted August 19, 2025 at 09:17PM by maltfield
via reddit https://ift.tt/qn1HOSQ
https://ift.tt/D9KXqug
Submitted August 19, 2025 at 09:17PM by maltfield
via reddit https://ift.tt/qn1HOSQ
Michael Altfield's Tech Blog
Why I was banned from GrapheneOS by Daniel Micay - Michael Altfield's Tech Blog
Daniel Micay banned me from GrapheneOS. Why? It was for the silliest reason...
Deep learning with leagues championship algorithm based intrusion detection
https://ift.tt/uP3VzXg
Submitted August 19, 2025 at 09:09PM by pinpepnet
via reddit https://ift.tt/LRmKDb9
https://ift.tt/uP3VzXg
Submitted August 19, 2025 at 09:09PM by pinpepnet
via reddit https://ift.tt/LRmKDb9
Nature
Deep learning with leagues championship algorithm based intrusion detection on cybersecurity driven industrial IoT systems
Scientific Reports - Deep learning with leagues championship algorithm based intrusion detection on cybersecurity driven industrial IoT systems
pyghidra-mcp: Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysis
https://clearbluejar.github.io/posts/pyghidra-mcp-headless-ghidra-mcp-server-for-project-wide-multi-binary-analysis/
Submitted August 19, 2025 at 10:33PM by onlinereadme
via reddit https://ift.tt/cCMHRZi
https://clearbluejar.github.io/posts/pyghidra-mcp-headless-ghidra-mcp-server-for-project-wide-multi-binary-analysis/
Submitted August 19, 2025 at 10:33PM by onlinereadme
via reddit https://ift.tt/cCMHRZi
clearbluejar
pyghidra-mcp: Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysis
Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.
Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer | Datadog Security Labs
https://ift.tt/56BepXi
Submitted August 19, 2025 at 09:42PM by RedTermSession
via reddit https://ift.tt/j7QDlhc
https://ift.tt/56BepXi
Submitted August 19, 2025 at 09:42PM by RedTermSession
via reddit https://ift.tt/j7QDlhc
Datadoghq
Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer
Discover how attackers could quietly enumerate AWS resources via Resource Explorer, and how Datadog and AWS worked together to close the visibility gap.
Try to remember the stuff on here
https://ift.tt/9nVvSD8
Submitted August 19, 2025 at 11:33PM by babuloseo
via reddit https://ift.tt/IEePgoA
https://ift.tt/9nVvSD8
Submitted August 19, 2025 at 11:33PM by babuloseo
via reddit https://ift.tt/IEePgoA
United Nations
Universal Declaration of Human Rights | United Nations
A milestone document in the history of human rights, the Universal Declaration of Human Rights set out, for the first time, fundamental human rights to be universally protected. It has been translated into over 500 languages.
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers
https://socket.dev/blog/password-manager-clickjacking
Submitted August 20, 2025 at 03:59AM by JLLeitschuh
via reddit https://ift.tt/rP9HXZm
https://socket.dev/blog/password-manager-clickjacking
Submitted August 20, 2025 at 03:59AM by JLLeitschuh
via reddit https://ift.tt/rP9HXZm
Socket
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in ...
Hacker Demonstrates How Easy It Is To Steal Data From Popular Password Managers
Copilot Broke Your Audit Log, but Microsoft Won’t Tell You
https://ift.tt/jQsGYe6
Submitted August 20, 2025 at 02:24PM by moviuro
via reddit https://ift.tt/vcyAgDY
https://ift.tt/jQsGYe6
Submitted August 20, 2025 at 02:24PM by moviuro
via reddit https://ift.tt/vcyAgDY
Pistachio
Copilot Broke Your Audit Log, but Microsoft Won’t Tell You
Guess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault - watchTowr Labs
https://ift.tt/oJ4aZ9l
Submitted August 20, 2025 at 04:05PM by dx7r__
via reddit https://ift.tt/8Sfvn5q
https://ift.tt/oJ4aZ9l
Submitted August 20, 2025 at 04:05PM by dx7r__
via reddit https://ift.tt/8Sfvn5q
watchTowr Labs
Guess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault
We’re back, and we’ve finished telling everyone that our name was on the back of Phrack!!!!1111
Whatever, nerds.
Today, we're back to scheduled content. Like our friendly neighbourhood ransomware gangs and APT groups, we've continued to spend irrational…
Whatever, nerds.
Today, we're back to scheduled content. Like our friendly neighbourhood ransomware gangs and APT groups, we've continued to spend irrational…