Tea continued - Unauthenticated access to 150+ Firebase databases, storage buckets and secrets
https://ift.tt/5D06Evc
Submitted September 24, 2025 at 12:14AM by Woowowow91
via reddit https://ift.tt/CQHYdku
https://ift.tt/5D06Evc
Submitted September 24, 2025 at 12:14AM by Woowowow91
via reddit https://ift.tt/CQHYdku
ice0.blog
Tea continued - Unauthenticated access to 150+ Firebase databases, storage buckets and secrets
Introducing OpenFirebase - Time to clean up the Firebase mess
Learn to hack
https://ift.tt/AhVFp2o
Submitted September 24, 2025 at 03:07AM by wxnnerjx
via reddit https://ift.tt/aIp3jkL
https://ift.tt/AhVFp2o
Submitted September 24, 2025 at 03:07AM by wxnnerjx
via reddit https://ift.tt/aIp3jkL
Tiantong-1 and satphone security: Part 2
https://ift.tt/W2sVg6G
Submitted September 24, 2025 at 03:08PM by 2ROT13
via reddit https://ift.tt/JB4WvVK
https://ift.tt/W2sVg6G
Submitted September 24, 2025 at 03:08PM by 2ROT13
via reddit https://ift.tt/JB4WvVK
www.midnightblue.nl
Tiantong-1 and satphone security: part 2
We will delve into general satphone SIGINT capabilities, supply chain security, and security aspects of the latest Huawei Mate Tiantong-enabled smartphones.
New macOS threat abuses ads and social media to spread malware
https://ift.tt/L0k3E9O
Submitted September 24, 2025 at 07:09PM by Individual-Gas5276
via reddit https://ift.tt/MHdDOvV
https://ift.tt/L0k3E9O
Submitted September 24, 2025 at 07:09PM by Individual-Gas5276
via reddit https://ift.tt/MHdDOvV
Moonlock
Apple's new anti-spyware feature is out
Built-into all iPhone Air, iPhone 17 and 17 Pro.
Is This Bad? This Feels Bad. (GoAnywhere CVE-2025-10035) - watchTowr Labs
https://ift.tt/n1KOgue
Submitted September 24, 2025 at 06:34PM by dx7r__
via reddit https://ift.tt/Jm0KtVE
https://ift.tt/n1KOgue
Submitted September 24, 2025 at 06:34PM by dx7r__
via reddit https://ift.tt/Jm0KtVE
watchTowr Labs
Is This Bad? This Feels Bad. (Fortra GoAnywhere CVE-2025-10035)
File transfer used to be simple fun - fire up your favourite FTP client, log in to a glFTPd site, and you were done.
Fast forward to 2025, and the same act requires a procurement team, a web interface, and a vendor proudly waving their Secure by Design pledge.…
Fast forward to 2025, and the same act requires a procurement team, a web interface, and a vendor proudly waving their Secure by Design pledge.…
ReDisclosure: New technique for exploiting Full-Text Search in MySQL (myBB case study)
https://ift.tt/sx5qGjf
Submitted September 25, 2025 at 02:42AM by Difficult-Catch9885
via reddit https://ift.tt/HS4jQvY
https://ift.tt/sx5qGjf
Submitted September 25, 2025 at 02:42AM by Difficult-Catch9885
via reddit https://ift.tt/HS4jQvY
Exploit Azerbaijan
ReDisclosure: New technique for exploiting Full-Text Search in MySQL (myBB case study)
"Even a small key can open a big lock" Azerbaijani Proverb ---[ Index 1 - Introduction 2 - Tradition 2.1 - ReDoS, not the OS 2.2 - REGEXP, RLIKE and others 3 - How insecure, secure implementations are? 4 - Study Case: myBB 4.1 - Identification 4.2 - Perfect…
Why “contained” doesn’t mean “safe” in modern SOCs
https://ift.tt/9FYygKq
Submitted September 25, 2025 at 02:42PM by SuccessfulMountain64
via reddit https://ift.tt/i30ETMP
https://ift.tt/9FYygKq
Submitted September 25, 2025 at 02:42PM by SuccessfulMountain64
via reddit https://ift.tt/i30ETMP
Yet Another Random Story. VBScript's Randomize Internals.
https://ift.tt/23RTENl
Submitted September 25, 2025 at 04:20PM by nibblesec
via reddit https://ift.tt/1KeaW5q
https://ift.tt/23RTENl
Submitted September 25, 2025 at 04:20PM by nibblesec
via reddit https://ift.tt/1KeaW5q
Doyensec
Yet Another Random Story: VBScript's Randomize Internals
In one of our recent posts, Dennis shared an interesting case study of C# exploitation that rode on Random-based password-reset tokens. He demonstrated how to use the single-packet attack, or a bit of old-school math, to beat the game. Recently, I performed…
Hacking Furbo - A Hardware Research Project – Part 5: Exploiting BLE
https://ift.tt/Nc6SVbM
Submitted September 25, 2025 at 04:01PM by duduywn
via reddit https://ift.tt/ZXq9HLC
https://ift.tt/Nc6SVbM
Submitted September 25, 2025 at 04:01PM by duduywn
via reddit https://ift.tt/ZXq9HLC
Softwaresecured
Hacking Furbo - A Hardware Hacking Research Project – Part 5: Exploiting BLE
This post analyzes Furbo’s BLE communication, uncovering flaws that expose Wi-Fi credentials, allow device resets, and reveal hidden GATT data.
It Is Bad (Exploitation of Fortra GoAnywhere MFT CVE-2025-10035) - Part 2 - watchTowr Labs
https://ift.tt/xCi8NsZ
Submitted September 26, 2025 at 01:05AM by dx7r__
via reddit https://ift.tt/aqS7XoL
https://ift.tt/xCi8NsZ
Submitted September 26, 2025 at 01:05AM by dx7r__
via reddit https://ift.tt/aqS7XoL
watchTowr Labs
It Is Bad (Exploitation of Fortra GoAnywhere MFT CVE-2025-10035) - Part 2
We’re back, just over 24 hours later, to share our evolving understanding of CVE-2025-10035.
Thanks to everyone who reached out after Part 1, and especially to the individual who shared credible intel that informed this update.
In Part 1 we laid out an…
Thanks to everyone who reached out after Part 1, and especially to the individual who shared credible intel that informed this update.
In Part 1 we laid out an…
Supply-Chain Guardrails for npm, pnpm, and Yarn
https://ift.tt/ErFZu5L
Submitted September 26, 2025 at 10:41PM by coinspect
via reddit https://ift.tt/49YHvCq
https://ift.tt/ErFZu5L
Submitted September 26, 2025 at 10:41PM by coinspect
via reddit https://ift.tt/49YHvCq
Coinspect Security
Supply-Chain Guardrails for npm, pnpm, and Yarn
Recent NPM breaches show how fast supply chain attacks spread. Learn how to lock dependencies and harden workflows to before attackers reach your projects.
The Phantom Extension: Backdooring chrome through uncharted pathways
https://ift.tt/rFEhlen
Submitted September 27, 2025 at 12:09AM by rkhunter_
via reddit https://ift.tt/rxitvs4
https://ift.tt/rFEhlen
Submitted September 27, 2025 at 12:09AM by rkhunter_
via reddit https://ift.tt/rxitvs4
Synacktiv
The Phantom Extension: Backdooring chrome through uncharted pathways
The only JWT security testing guide you will need!
https://ift.tt/DxY6T0d
Submitted September 27, 2025 at 02:00PM by Altrntiv-to-security
via reddit https://ift.tt/1GmW2In
https://ift.tt/DxY6T0d
Submitted September 27, 2025 at 02:00PM by Altrntiv-to-security
via reddit https://ift.tt/1GmW2In
DarkRelay
The Only JWT Security Guide You Will Ever Need
The Ultimate guide to Breaking JWT, JWT are primarily used for authentication & authorization almost everywhere in modern web. JWTs can possess security vulnerabilities if configured and implemented improperly, potentially causing havoc. Thus, understanding…
This is the first time I've ever found chicken in a public (storage) bucket. You're not ready for this masterpiece.
http://ncsc-gov.co.uk.s3.amazonaws.com/chicken.html
Submitted September 28, 2025 at 01:49AM by schizoduckie
via reddit https://ift.tt/TQ8XH3O
http://ncsc-gov.co.uk.s3.amazonaws.com/chicken.html
Submitted September 28, 2025 at 01:49AM by schizoduckie
via reddit https://ift.tt/TQ8XH3O
Github - Phishcan/phishcan-data: Canadian threat feeds updated every 12 hours.
https://phishcan.com
Submitted September 28, 2025 at 06:46PM by Additional_Swan_9280
via reddit https://ift.tt/RZtOYIw
https://phishcan.com
Submitted September 28, 2025 at 06:46PM by Additional_Swan_9280
via reddit https://ift.tt/RZtOYIw
PhishCan
PhishCan – Free Canadian Phishing Feed
Download phishing domain data targeting Canadian sectors. Updated twice daily. Available in TXT, CSV, and JSON.
Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W
https://mrt4ntr4.github.io/Windows-Heap-Exploitation-dadadb/
Submitted September 28, 2025 at 09:48PM by rkhunter_
via reddit https://ift.tt/IebRG3l
https://mrt4ntr4.github.io/Windows-Heap-Exploitation-dadadb/
Submitted September 28, 2025 at 09:48PM by rkhunter_
via reddit https://ift.tt/IebRG3l
mrT4ntr4's Blog
Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W
TLDR I was unable to find some good writeups/blogposts on Windows user mode heap exploitation which inspired me to write an introductory but practical post on Windows heap internals and exploitati
FullHunt 💜 Open-Source: 39,408 Exploits from 0day.today is Back Online
https://ift.tt/wWv51aY
Submitted September 29, 2025 at 06:12AM by mazen160
via reddit https://ift.tt/1XCEVMw
https://ift.tt/wWv51aY
Submitted September 29, 2025 at 06:12AM by mazen160
via reddit https://ift.tt/1XCEVMw
FullHunt Blog
FullHunt 💜 Open-Source: 39,408 Exploits from 0day.today is Back Online
Discover, monitor, and secure your attack surface. FullHunt delivers the best platform in the market for attack surface security.
An In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzer
https://ift.tt/wuFHgj9
Submitted September 30, 2025 at 01:39PM by thnew_mammoth
via reddit https://ift.tt/omsK3aU
https://ift.tt/wuFHgj9
Submitted September 30, 2025 at 01:39PM by thnew_mammoth
via reddit https://ift.tt/omsK3aU
Cybervelia
An In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzer
Do you think the battle with ULVs is over? Think again.
Klopatra: exposing a new Android banking trojan operation with roots in Turkey | Cleafy LABS
https://ift.tt/lagFizk
Submitted September 30, 2025 at 02:41PM by f3d_0x0
via reddit https://ift.tt/XJNgdax
https://ift.tt/lagFizk
Submitted September 30, 2025 at 02:41PM by f3d_0x0
via reddit https://ift.tt/XJNgdax
Cleafy
Klopatra: exposing a new Android banking trojan operation with roots in Turkey | Cleafy LABS
In late August 2025, Cleafy's Threat Intelligence team discovered Klopatra, a new, highly sophisticated Android malware currently targeting banking users primarily in Spain and Italy. The number of compromised devices has already exceeded 1,000. Read the…
You name it, VMware elevates it (CVE-2025-41244)
https://ift.tt/yoQJXTS
Submitted September 30, 2025 at 04:08PM by rkhunter_
via reddit https://ift.tt/L43EBFJ
https://ift.tt/yoQJXTS
Submitted September 30, 2025 at 04:08PM by rkhunter_
via reddit https://ift.tt/L43EBFJ
NVISO Labs
You name it, VMware elevates it (CVE-2025-41244)
NVISO has identified zero-day exploitation of CVE-2025-41244, a local privilege escalation vulnerability impacting VMware's guest service discovery features.
ZeroDay Cloud: The first open-source cloud hacking competition
https://zeroday.cloud
Submitted October 01, 2025 at 12:27AM by geekydeveloper
via reddit https://ift.tt/CZdKRNP
https://zeroday.cloud
Submitted October 01, 2025 at 12:27AM by geekydeveloper
via reddit https://ift.tt/CZdKRNP
ZeroDay Cloud
ZeroDay Cloud: Cloud Security Hacking Competition
Join the world's top researchers in a competition to find zero-day vulnerabilities in core open-source software powering the cloud. Over $5M prize pool!