Intel Outside: Hacking every Intel employee and various internal websites
https://ift.tt/h3nWDqe
Submitted August 18, 2025 at 08:03PM by EatonZ
via reddit https://ift.tt/vK8iYb1
https://ift.tt/h3nWDqe
Submitted August 18, 2025 at 08:03PM by EatonZ
via reddit https://ift.tt/vK8iYb1
Eaton-Works
Intel Outside: Hacking every Intel employee and various internal websites
Hardcoded credentials, pointless encryption, and generous APIs exposed details of every employee and made it possible to break into internal websites.
“Vibe Hacking”: Abusing Developer Trust in Cursor and VS Code Remote Development
https://ift.tt/IEARJ1z
Submitted August 18, 2025 at 09:21PM by thaidn_
via reddit https://ift.tt/ylAO02D
https://ift.tt/IEARJ1z
Submitted August 18, 2025 at 09:21PM by thaidn_
via reddit https://ift.tt/ylAO02D
blog.calif.io
“Vibe Hacking”: Abusing Developer Trust in Cursor and VS Code Remote Development
Update: Mauro Soria pointed out that this attack vector can be easily adapted for phishing scenarios:
CTF stats, mobile wallet attacks & magstripe demos – Payment Village @ DEF CON 33
https://ift.tt/3Ld2I5q
Submitted August 19, 2025 at 01:08AM by alexlash
via reddit https://ift.tt/2Z8k1rT
https://ift.tt/3Ld2I5q
Submitted August 19, 2025 at 01:08AM by alexlash
via reddit https://ift.tt/2Z8k1rT
Substack
DEF CON 33 Wrap-Up: What Happened at Payment Village
A hands-on, community-powered look at payment system security — from ferrofluid and feature phones to CTF stats and future challenges.
Live Q&A with an Author of the NIST Security Guidelines (SP 800-115)
https://ift.tt/13sdbSX
Submitted August 19, 2025 at 05:06AM by _cybersecurity_
via reddit https://ift.tt/21wtgOS
https://ift.tt/13sdbSX
Submitted August 19, 2025 at 05:06AM by _cybersecurity_
via reddit https://ift.tt/21wtgOS
Substack
Live Q&A with an Author of the NIST Security Guidelines (SP 800-115)
Join us for a LIVE Q&A discussion in the Cybersecurity Club on Discord featuring Karen Scarfone, co-author of the NIST Security Guidelines (SP 800-115).
Phrack 72
https://ift.tt/UwKuD3f
Submitted August 19, 2025 at 07:34AM by mateusnr
via reddit https://ift.tt/VHe7vZO
https://ift.tt/UwKuD3f
Submitted August 19, 2025 at 07:34AM by mateusnr
via reddit https://ift.tt/VHe7vZO
phrack.org
.:: Phrack Magazine ::.
Phrack staff website.
Trivial C# Random Exploitation
https://ift.tt/UMpmnlg
Submitted August 19, 2025 at 04:22PM by nibblesec
via reddit https://ift.tt/u9LrM1A
https://ift.tt/UMpmnlg
Submitted August 19, 2025 at 04:22PM by nibblesec
via reddit https://ift.tt/u9LrM1A
Doyensec
Trivial C# Random Exploitation
Exploiting random number generators requires math, right? Thanks to C#’s Random, that is not necessarily the case! I ran into an HTTP 2.0 web service issuing password reset tokens from a custom encoding of (new Random()).Next(min, max) output. This led to…
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
https://portswigger.net/research/how-to-distinguish-http-pipelining-from-request-smuggling
Submitted August 19, 2025 at 08:13PM by albinowax
via reddit https://ift.tt/VMKFJ86
https://portswigger.net/research/how-to-distinguish-http-pipelining-from-request-smuggling
Submitted August 19, 2025 at 08:13PM by albinowax
via reddit https://ift.tt/VMKFJ86
PortSwigger Research
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
Sometimes people think they've found HTTP request smuggling, when they're actually just observing HTTP keep-alive or pipelining. This is usually a false positive, but sometimes there's actually a real
Git 2.51: Preparing for the future with SHA-256
https://ift.tt/9ClWmzQ
Submitted August 19, 2025 at 08:08PM by woltan_4
via reddit https://ift.tt/BDSRxIq
https://ift.tt/9ClWmzQ
Submitted August 19, 2025 at 08:08PM by woltan_4
via reddit https://ift.tt/BDSRxIq
Help Net Security
Git 2.51: Preparing for the future with SHA-256
Git 2.51 is out, and the release continues the long process of modernizing the version control system. It includes several technical changes.
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
https://ift.tt/hlVdIFG
Submitted August 19, 2025 at 09:20PM by tmlxs
via reddit https://ift.tt/g5JxLZQ
https://ift.tt/hlVdIFG
Submitted August 19, 2025 at 09:20PM by tmlxs
via reddit https://ift.tt/g5JxLZQ
Kudelskisecurity
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories - Kudelski Security Research Center
Aug 19, 2025 - Nils Amiet -
GrapheneOS: Another contributor attacked & banned by Daniel Micay
https://ift.tt/D9KXqug
Submitted August 19, 2025 at 09:17PM by maltfield
via reddit https://ift.tt/qn1HOSQ
https://ift.tt/D9KXqug
Submitted August 19, 2025 at 09:17PM by maltfield
via reddit https://ift.tt/qn1HOSQ
Michael Altfield's Tech Blog
Why I was banned from GrapheneOS by Daniel Micay - Michael Altfield's Tech Blog
Daniel Micay banned me from GrapheneOS. Why? It was for the silliest reason...
Deep learning with leagues championship algorithm based intrusion detection
https://ift.tt/uP3VzXg
Submitted August 19, 2025 at 09:09PM by pinpepnet
via reddit https://ift.tt/LRmKDb9
https://ift.tt/uP3VzXg
Submitted August 19, 2025 at 09:09PM by pinpepnet
via reddit https://ift.tt/LRmKDb9
Nature
Deep learning with leagues championship algorithm based intrusion detection on cybersecurity driven industrial IoT systems
Scientific Reports - Deep learning with leagues championship algorithm based intrusion detection on cybersecurity driven industrial IoT systems
pyghidra-mcp: Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysis
https://clearbluejar.github.io/posts/pyghidra-mcp-headless-ghidra-mcp-server-for-project-wide-multi-binary-analysis/
Submitted August 19, 2025 at 10:33PM by onlinereadme
via reddit https://ift.tt/cCMHRZi
https://clearbluejar.github.io/posts/pyghidra-mcp-headless-ghidra-mcp-server-for-project-wide-multi-binary-analysis/
Submitted August 19, 2025 at 10:33PM by onlinereadme
via reddit https://ift.tt/cCMHRZi
clearbluejar
pyghidra-mcp: Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysis
Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.
Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer | Datadog Security Labs
https://ift.tt/56BepXi
Submitted August 19, 2025 at 09:42PM by RedTermSession
via reddit https://ift.tt/j7QDlhc
https://ift.tt/56BepXi
Submitted August 19, 2025 at 09:42PM by RedTermSession
via reddit https://ift.tt/j7QDlhc
Datadoghq
Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer
Discover how attackers could quietly enumerate AWS resources via Resource Explorer, and how Datadog and AWS worked together to close the visibility gap.
Try to remember the stuff on here
https://ift.tt/9nVvSD8
Submitted August 19, 2025 at 11:33PM by babuloseo
via reddit https://ift.tt/IEePgoA
https://ift.tt/9nVvSD8
Submitted August 19, 2025 at 11:33PM by babuloseo
via reddit https://ift.tt/IEePgoA
United Nations
Universal Declaration of Human Rights | United Nations
A milestone document in the history of human rights, the Universal Declaration of Human Rights set out, for the first time, fundamental human rights to be universally protected. It has been translated into over 500 languages.
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers
https://socket.dev/blog/password-manager-clickjacking
Submitted August 20, 2025 at 03:59AM by JLLeitschuh
via reddit https://ift.tt/rP9HXZm
https://socket.dev/blog/password-manager-clickjacking
Submitted August 20, 2025 at 03:59AM by JLLeitschuh
via reddit https://ift.tt/rP9HXZm
Socket
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in ...
Hacker Demonstrates How Easy It Is To Steal Data From Popular Password Managers
Copilot Broke Your Audit Log, but Microsoft Won’t Tell You
https://ift.tt/jQsGYe6
Submitted August 20, 2025 at 02:24PM by moviuro
via reddit https://ift.tt/vcyAgDY
https://ift.tt/jQsGYe6
Submitted August 20, 2025 at 02:24PM by moviuro
via reddit https://ift.tt/vcyAgDY
Pistachio
Copilot Broke Your Audit Log, but Microsoft Won’t Tell You
Guess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault - watchTowr Labs
https://ift.tt/oJ4aZ9l
Submitted August 20, 2025 at 04:05PM by dx7r__
via reddit https://ift.tt/8Sfvn5q
https://ift.tt/oJ4aZ9l
Submitted August 20, 2025 at 04:05PM by dx7r__
via reddit https://ift.tt/8Sfvn5q
watchTowr Labs
Guess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault
We’re back, and we’ve finished telling everyone that our name was on the back of Phrack!!!!1111
Whatever, nerds.
Today, we're back to scheduled content. Like our friendly neighbourhood ransomware gangs and APT groups, we've continued to spend irrational…
Whatever, nerds.
Today, we're back to scheduled content. Like our friendly neighbourhood ransomware gangs and APT groups, we've continued to spend irrational…
Engineered to Fail: The DNA of Negligent Defenses Operations
https://ift.tt/9okCsdH
Submitted August 20, 2025 at 09:18PM by Disscom
via reddit https://ift.tt/E1mgo7z
https://ift.tt/9okCsdH
Submitted August 20, 2025 at 09:18PM by Disscom
via reddit https://ift.tt/E1mgo7z
Medium
Engineered to Fail: The DNA of Negligent Cyber Defenses
Intro
Commvault plugs holes in backup suite that allow remote code executio
https://ift.tt/58K2LE6
Submitted August 20, 2025 at 11:31PM by Emotional-Plum-5970
via reddit https://ift.tt/9apN0ud
https://ift.tt/58K2LE6
Submitted August 20, 2025 at 11:31PM by Emotional-Plum-5970
via reddit https://ift.tt/9apN0ud
Help Net Security
Commvault plugs holes in backup suite that allow remote code execution
Commvault has fixed vulnerabilities that may allow attackers to compromise on-premises deployments of its flagship backup solution.
Google Unveils Enhanced Tools to Empower Defenders and Safeguard AI Progress
https://cyberpress.org/google-enhanced-tools/
Submitted August 21, 2025 at 01:21AM by innpattag
via reddit https://ift.tt/eL3hPiC
https://cyberpress.org/google-enhanced-tools/
Submitted August 21, 2025 at 01:21AM by innpattag
via reddit https://ift.tt/eL3hPiC
Cyber Security News
Google Unveils Enhanced Tools to Empower Defenders and Safeguard AI Progress
Google Enhanced Tools - Google announced a comprehensive suite of AI-powered security enhancements at the Google Cloud Security Summit.
New AI prompt/data-leak scanner — try to break it (PrivGuard)
https://privguard.io
Submitted August 21, 2025 at 05:56AM by Cold_Respond_7656
via reddit https://ift.tt/clL3uJv
https://privguard.io
Submitted August 21, 2025 at 05:56AM by Cold_Respond_7656
via reddit https://ift.tt/clL3uJv
PrivGuard
PrivGuard - Elite AI Security & Threat Intelligence Platform
Advanced AI security platform with real-time threat detection, prompt injection defense, and comprehensive monitoring. Protect your AI infrastructure from data leaks and security risks.