Hacking India's largest automaker: Tata Motors
https://ift.tt/NDUxYXz
Submitted October 29, 2025 at 07:01AM by EatonZ
via reddit https://ift.tt/73YhzSi
https://ift.tt/NDUxYXz
Submitted October 29, 2025 at 07:01AM by EatonZ
via reddit https://ift.tt/73YhzSi
Eaton-Works
Hacking India’s largest automaker: Tata Motors
Tata Motors gave away the keys to their infrastructure and customer data on their public websites.
Attacker Target VSCode Extension Marketplace, IDE Plugins Face Higher Supply Chain Attack Risks
https://ift.tt/bPY5gFW
Submitted October 29, 2025 at 10:38AM by Fit_Wing3352
via reddit https://ift.tt/YK6GMm7
https://ift.tt/bPY5gFW
Submitted October 29, 2025 at 10:38AM by Fit_Wing3352
via reddit https://ift.tt/YK6GMm7
How we found +2k vulns, 400+ secrets and 175 PII instances in publicly exposed apps built on vibe-coded platforms (Research methodology)
https://ift.tt/ryHzQxN
Submitted October 30, 2025 at 09:23PM by PriorPuzzleheaded880
via reddit https://ift.tt/obEeD8u
https://ift.tt/ryHzQxN
Submitted October 30, 2025 at 09:23PM by PriorPuzzleheaded880
via reddit https://ift.tt/obEeD8u
Escape DAST - Application Security Blog
Methodology: 2k+ Vulnerabilities in Vibe-Coded Apps
Discover the security risks in vibe-coded applications as we uncover over 2,000 vulnerabilities, exposed secrets, and PII
A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities
https://ift.tt/yYGnt1U
Submitted October 30, 2025 at 09:08PM by CyberMasterV
via reddit https://ift.tt/dcxUL9t
https://ift.tt/yYGnt1U
Submitted October 30, 2025 at 09:08PM by CyberMasterV
via reddit https://ift.tt/dcxUL9t
Blogspot
A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities
Author(s): Vlad Pasca Warlock ransomware was deployed by exploiting the SharePoint vulnerabilities CVE-2025-53770 and CVE-2025-53771 The ma...
Can you break our pickle sandbox? Blog + exploit challenge inside
https://ift.tt/NQH3th7
Submitted October 30, 2025 at 11:17PM by valmarelox
via reddit https://ift.tt/dimlytY
https://ift.tt/NQH3th7
Submitted October 30, 2025 at 11:17PM by valmarelox
via reddit https://ift.tt/dimlytY
Substack
We May Have Finally Fixed Python’s 25-Year-Old Vulnerability
A Context Tainting Approach to Mitigate Python Deserialization Attacks
Automating COM/DCOM vulnerability research
https://ift.tt/CDhRQ0a
Submitted October 31, 2025 at 01:54AM by TangeloPublic9554
via reddit https://ift.tt/LsFI53a
https://ift.tt/CDhRQ0a
Submitted October 31, 2025 at 01:54AM by TangeloPublic9554
via reddit https://ift.tt/LsFI53a
Remco van der Meer
Automating COM/DCOM vulnerability research
Diving into COM/DCOM and how to automate vulnerability research using a fuzzing approach.
EDR-Redir V2: Blind EDR With Fake "Program Files"
https://ift.tt/ayZC9JY
Submitted November 01, 2025 at 04:22PM by Cold-Dinosaur
via reddit https://ift.tt/QhTemIz
https://ift.tt/ayZC9JY
Submitted November 01, 2025 at 04:22PM by Cold-Dinosaur
via reddit https://ift.tt/QhTemIz
Zerosalarium
EDR-Redir V2: Blind EDR With Fake Program Files
EDR-Redir V2 uses bind link technique with Program Files folder. Create bind link for folder points to itself to break, bypass, block Antivirus, EDRs
open source CVE scanner for project dependencies. VSCode extension.
https://marketplace.visualstudio.com/items?itemName=abhishekrai43.vulscan-mcp-vscode
Submitted November 01, 2025 at 08:02PM by FeelingResolution806
via reddit https://ift.tt/iwqeOR2
https://marketplace.visualstudio.com/items?itemName=abhishekrai43.vulscan-mcp-vscode
Submitted November 01, 2025 at 08:02PM by FeelingResolution806
via reddit https://ift.tt/iwqeOR2
Visualstudio
VulScan-MCP Security Scanner - Visual Studio Marketplace
Extension for Visual Studio Code - Security vulnerability scanner for dependencies. Checks CVEs from NVD/OSV databases and provides remediation steps. Supports npm, pip, Maven, Go, and more.
r/netsec monthly discussion & tool thread
Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on r/netsec.As always, the content & discussion guidelines should also be observed on r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted November 01, 2025 at 07:59PM by albinowax
via reddit https://ift.tt/Ljlo2DQ
Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on r/netsec.As always, the content & discussion guidelines should also be observed on r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted November 01, 2025 at 07:59PM by albinowax
via reddit https://ift.tt/Ljlo2DQ
Reddit
From the netsec community on Reddit
Explore this post and more from the netsec community
Quantifying Swiss Cheese, the Bayesian Way
https://ift.tt/xLdo1JV
Submitted November 01, 2025 at 11:50PM by t0sche
via reddit https://ift.tt/IYANgtD
https://ift.tt/xLdo1JV
Submitted November 01, 2025 at 11:50PM by t0sche
via reddit https://ift.tt/IYANgtD
Medium
Updating Exploit Likelihood with Control Effectiveness
Updating Exploitation Likelihood with Control Effectiveness
/r/netsec's Q4 2025 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted November 02, 2025 at 09:42PM by netsec_burn
via reddit https://ift.tt/0BRhrWm
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted November 02, 2025 at 09:42PM by netsec_burn
via reddit https://ift.tt/0BRhrWm
Reddit
From the netsec community on Reddit
Explore this post and more from the netsec community
Steal MS Teams app cookies
https://ift.tt/qDA3Xvn
Submitted November 03, 2025 at 04:01AM by clod81
via reddit https://ift.tt/5iPN42l
https://ift.tt/qDA3Xvn
Submitted November 03, 2025 at 04:01AM by clod81
via reddit https://ift.tt/5iPN42l
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
Breaking Down 8 Open Source AI Security Tools at Black Hat Europe 2025 Arsenal
https://ift.tt/qpjoEWt
Submitted November 03, 2025 at 03:17PM by No-Emotion9668
via reddit https://ift.tt/jspmFgP
https://ift.tt/qpjoEWt
Submitted November 03, 2025 at 03:17PM by No-Emotion9668
via reddit https://ift.tt/jspmFgP
Medium
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity
Introduction
Quick writeup for what to check when you see Firebase in a pentest
https://ift.tt/d82OJYT
Submitted November 03, 2025 at 02:34PM by ezzzzz
via reddit https://ift.tt/7AVJe6P
https://ift.tt/d82OJYT
Submitted November 03, 2025 at 02:34PM by ezzzzz
via reddit https://ift.tt/7AVJe6P
Research Blog | Project Black
Firebase Security Fundamentals
Every application built on Firebase that we've looked at has had the same vulnerabilities. These common vulnerabilities aren’t hard to prevent but they're easy to overlook.
RondoDox v2: When an IoT Botnet Goes Enterprise-Ready
https://ift.tt/SGxT1Hg
Submitted November 03, 2025 at 07:46PM by mario_candela
via reddit https://ift.tt/RSL6T5W
https://ift.tt/SGxT1Hg
Submitted November 03, 2025 at 07:46PM by mario_candela
via reddit https://ift.tt/RSL6T5W
Beelzebub
RondoDox v2: Evolution of RondoDox Botnet with 650% More Exploits | AI deception platform
AI deception platform: Deceive, Detect, Respond. “You can’t defend. You can’t prevent. The only thing you can do is detect and respond.” Bruce Schneier. We turn that hard truth into your tactical advantage. Our AI-based decoys, built using our open-source…
Sniffing established BLE connections with HackRF One
https://ift.tt/73wntWZ
Submitted November 03, 2025 at 10:44PM by uBaze
via reddit https://ift.tt/dvMINxQ
https://ift.tt/73wntWZ
Submitted November 03, 2025 at 10:44PM by uBaze
via reddit https://ift.tt/dvMINxQ
blog.lexfo.fr
Sniffing established BLE connections with HackRF One
<p>Tracking already-established BLE connections using SDR has its own challenges. With custom firmware and multi-channel listening, the presented approach quickly deduces the hidden hopping parameters needed to follow the connection.</p>
MSSQL Exploitation - Run Commands Like A Pro
https://ift.tt/lHdezua
Submitted November 04, 2025 at 12:14AM by S3cur3Th1sSh1t
via reddit https://ift.tt/LC8r7cW
https://ift.tt/lHdezua
Submitted November 04, 2025 at 12:14AM by S3cur3Th1sSh1t
via reddit https://ift.tt/LC8r7cW
www.r-tec.net
r-tec Blog | MSSQL Exploitation - Run Commands Like A Pro
This blog post takes a deep dive into the offensive side of MSSQL security, exploring the quantities of attack vectors that can be exploited.
[Research] Unvalidated Trust: Cross-Stage Failure Modes in LLM/agent pipelines arXiv
https://ift.tt/YFIOsTn
Submitted November 04, 2025 at 05:29AM by Solid-Tomorrow6548
via reddit https://ift.tt/uLEntXj
https://ift.tt/YFIOsTn
Submitted November 04, 2025 at 05:29AM by Solid-Tomorrow6548
via reddit https://ift.tt/uLEntXj
arXiv.org
Unvalidated Trust: Cross-Stage Vulnerabilities in Large Language...
As Large Language Models (LLMs) are increasingly integrated into automated, multi-stage pipelines, risk patterns that arise from unvalidated trust between processing stages become a practical...
New Research: RondoDox v2, a 650% Expansion in Exploits
https://ift.tt/SGxT1Hg
Submitted November 04, 2025 at 02:38PM by mario_candela
via reddit https://ift.tt/hVFKuYn
https://ift.tt/SGxT1Hg
Submitted November 04, 2025 at 02:38PM by mario_candela
via reddit https://ift.tt/hVFKuYn
Beelzebub
RondoDox v2: Evolution of RondoDox Botnet with 650% More Exploits | AI deception platform
AI deception platform: Deceive, Detect, Respond. “You can’t defend. You can’t prevent. The only thing you can do is detect and respond.” Bruce Schneier. We turn that hard truth into your tactical advantage. Our AI-based decoys, built using our open-source…
Linux kernel Bluetooth RCE
https://ift.tt/KnXtgdD
Submitted November 04, 2025 at 06:10PM by elatllat
via reddit https://ift.tt/S5KOERn
https://ift.tt/KnXtgdD
Submitted November 04, 2025 at 06:10PM by elatllat
via reddit https://ift.tt/S5KOERn
Critical RCE Vulnerability CVE-2025-11953 Puts React Native Developers at Risk
https://ift.tt/JF4YnSz
Submitted November 04, 2025 at 08:34PM by SRMish3
via reddit https://ift.tt/2C1ph6l
https://ift.tt/JF4YnSz
Submitted November 04, 2025 at 08:34PM by SRMish3
via reddit https://ift.tt/2C1ph6l
JFrog
Critical RCE Vulnerability CVE-2025-11953 Puts React Native Developers at Risk
Learn how the JFrog Security research team discovered and disclosed CVE-2025-11953 which poses a threat to developers using the popular React Native CLI.