Newly allocated CVEs on an ICS 5G modem
https://ift.tt/RQv1Kfa
Submitted December 03, 2025 at 07:42AM by Salt-Consequence3647
via reddit https://ift.tt/bPWgmQ1
https://ift.tt/RQv1Kfa
Submitted December 03, 2025 at 07:42AM by Salt-Consequence3647
via reddit https://ift.tt/bPWgmQ1
Medium
Discovery of two Two Critical Vulnerabilities in RUT22GW Industrial LTE Cellular Routers
RUT22GW Industrial LTE Cellular Routers contain critical RCE and backdoor flaws allowing attackers full get remote control.
PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities
https://ift.tt/t6hZf3J
Submitted December 03, 2025 at 03:30PM by SRMish3
via reddit https://ift.tt/JtPQCvA
https://ift.tt/t6hZf3J
Submitted December 03, 2025 at 03:30PM by SRMish3
via reddit https://ift.tt/JtPQCvA
JFrog
PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities
Learn how 3 critical zero-days (CVSS 9.3) found by JFrog in PickleScan, allow bypassing the PyTorch ML model scanner resulting in malicious models hiding & executing code.
Security research in the age of AI tools
https://ift.tt/y35BuJj
Submitted December 03, 2025 at 08:07PM by Ok_Information1453
via reddit https://ift.tt/zESvrWu
https://ift.tt/y35BuJj
Submitted December 03, 2025 at 08:07PM by Ok_Information1453
via reddit https://ift.tt/zESvrWu
Invicti
Security Research in the Age of AI Tools
Learn how AI tools can support security researchers in investigating vulnerabilities and designing security checks to detect them.
From Zero to SYSTEM: Building PrintSpoofer from Scratch
https://bl4ckarch.github.io/posts/PrintSpoofer_from_scratch/
Submitted December 03, 2025 at 07:43PM by AlmondOffSec
via reddit https://ift.tt/Xc0hNBS
https://bl4ckarch.github.io/posts/PrintSpoofer_from_scratch/
Submitted December 03, 2025 at 07:43PM by AlmondOffSec
via reddit https://ift.tt/Xc0hNBS
bl4ckarch
From Zero to SYSTEM: Building PrintSpoofer from Scratch
A complete journey from understanding Named Pipes to building an undetectable PrintSpoofer learning Windows internals, token impersonation, RPC, and evasion techniques along the way.
Critical Security Vulnerability in React Server Components – React
https://ift.tt/2pX8rVq
Submitted December 03, 2025 at 09:53PM by unknownhad
via reddit https://ift.tt/pbiCEmx
https://ift.tt/2pX8rVq
Submitted December 03, 2025 at 09:53PM by unknownhad
via reddit https://ift.tt/pbiCEmx
react.dev
Critical Security Vulnerability in React Server Components – React
The library for web and native user interfaces
Using ClickHouse for Real-Time L7 DDoS & Bot Traffic Analytics with Tempesta FW
https://ift.tt/btv5s2w
Submitted December 04, 2025 at 12:33AM by krizhanovsky
via reddit https://ift.tt/24rbkOt
https://ift.tt/btv5s2w
Submitted December 04, 2025 at 12:33AM by krizhanovsky
via reddit https://ift.tt/24rbkOt
Tempesta Technologies
Defending Against L7 DDoS and Web Bots with Tempesta FW - Tempesta Technologies
Tempesta FW 0.8 introduces a zero-copy per-CPU access logs streaming to a ClickHouse database. This article discusses how to analyse that data for L7 DDoS mitigation and bot management. Finally, we introduce our new open-source project, WebShield, which automatically…
68% Of Phishing Websites Are Protected by CloudFlare
https://ift.tt/mk0bZ6g
Submitted December 04, 2025 at 12:25AM by theMiddleBlue
via reddit https://ift.tt/HmMXs7j
https://ift.tt/mk0bZ6g
Submitted December 04, 2025 at 12:25AM by theMiddleBlue
via reddit https://ift.tt/HmMXs7j
Sicuranext Blog
68% Of Phishing Websites Are Protected by CloudFlare
Earlier this year, our CTI team set out to build something we'd been thinking about for a while: a phishing intelligence pipeline that could actually keep up with the threat. We combined feeds from hundreds of independent sources with our own real-time hunt…
Hunting the hidden gems in libraries
https://ift.tt/1lRV7sN
Submitted December 04, 2025 at 08:20AM by Salt-Consequence3647
via reddit https://ift.tt/1POEzUM
https://ift.tt/1lRV7sN
Submitted December 04, 2025 at 08:20AM by Salt-Consequence3647
via reddit https://ift.tt/1POEzUM
How I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
https://ift.tt/XVBcKk2
Submitted December 04, 2025 at 09:25AM by alt69785
via reddit https://ift.tt/TNg6kWB
https://ift.tt/XVBcKk2
Submitted December 04, 2025 at 09:25AM by alt69785
via reddit https://ift.tt/TNg6kWB
Alex Schapiro
How I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
Update: This post received a large amount of attention on Hacker News — see the discussion thread.
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
https://ift.tt/o1jPstD
Submitted December 04, 2025 at 12:34PM by Mempodipper
via reddit https://ift.tt/Jhf4StZ
https://ift.tt/o1jPstD
Submitted December 04, 2025 at 12:34PM by Mempodipper
via reddit https://ift.tt/Jhf4StZ
Searchlight Cyber
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) › Searchlight Cyber
This morning, an advisory was released for Next.js about a vulnerability that leads to RCE in default configurations, with no prerequisites. The root cause of this issue lies in React Server Components, which Next.js utilizes. Over the last day, we have noticed…
CVE PoC Search
https://ift.tt/VJSMfUN
Submitted December 04, 2025 at 06:22PM by JS-Labs
via reddit https://ift.tt/dL76UN2
https://ift.tt/VJSMfUN
Submitted December 04, 2025 at 06:22PM by JS-Labs
via reddit https://ift.tt/dL76UN2
labs.jamessawyer.co.uk
CVE PoC Search
Searchable index of CVE proof-of-concept links collected from GitHub.
SVG Clickjacking: A novel and powerful twist on an old classic
https://ift.tt/qtMu3dJ
Submitted December 04, 2025 at 08:44PM by rebane2001
via reddit https://ift.tt/yDzmOTi
https://ift.tt/qtMu3dJ
Submitted December 04, 2025 at 08:44PM by rebane2001
via reddit https://ift.tt/yDzmOTi
lyra's epic blog
SVG Filters - Clickjacking 2.0
A novel and powerful twist on an old classic.
Second order prompt injection attacks on ServiceNow Now Assist
https://ift.tt/AfEN2Ul
Submitted December 04, 2025 at 11:22PM by smode21
via reddit https://ift.tt/BWVS934
https://ift.tt/AfEN2Ul
Submitted December 04, 2025 at 11:22PM by smode21
via reddit https://ift.tt/BWVS934
AppOmni
When AI Turns on Its Team: Exploiting Agent-to-Agent Discovery via Prompt Injection
See how prompt injection attacks work in ServiceNow to perform unauthorized actions, and how to defend against it with AppOmni AgentGuard.
Prompt Injection Inside GitHub Actions
https://ift.tt/n1yMbEJ
Submitted December 05, 2025 at 12:53AM by ScottContini
via reddit https://ift.tt/qeUnFw8
https://ift.tt/n1yMbEJ
Submitted December 05, 2025 at 12:53AM by ScottContini
via reddit https://ift.tt/qeUnFw8
www.aikido.dev
Prompt Injection Inside GitHub Actions: The New Frontier of Supply Chain Attacks
AI-driven GitHub Actions expose new prompt-injection supply chain vulnerabilities.
Scam Telegram: Uncovering a network of groups spreading crypto drainers
https://ift.tt/XwpzrEi
Submitted December 05, 2025 at 05:45AM by WesternBest
via reddit https://ift.tt/9v1xyXT
https://ift.tt/XwpzrEi
Submitted December 05, 2025 at 05:45AM by WesternBest
via reddit https://ift.tt/9v1xyXT
tim.sh
Scam Telegram: Investigation
How I found a large network of fake support groups spreading crypto stealers and drainers.
Privilege escalation with SageMaker and there's more hiding in execution roles
https://ift.tt/FZ8jJiz
Submitted December 05, 2025 at 09:51AM by alt69785
via reddit https://ift.tt/j09bnsO
https://ift.tt/FZ8jJiz
Submitted December 05, 2025 at 09:51AM by alt69785
via reddit https://ift.tt/j09bnsO
Plerion
Privilege escalation with SageMaker and there's more hiding in execution roles
A subtle AWS privesc hiding in SageMaker lifecycle configs, and what it reveals about execution roles.
Whitebox (simulation) vs. blackbox (red team) phishing
https://phishing.club/blog/white-box-vs-black-box-phishing/
Submitted December 05, 2025 at 05:25PM by hackeronni
via reddit https://ift.tt/SJqfp2Y
https://phishing.club/blog/white-box-vs-black-box-phishing/
Submitted December 05, 2025 at 05:25PM by hackeronni
via reddit https://ift.tt/SJqfp2Y
Phishing Club
Phishing Club - Professional Self-Hosted Phishing Platform
Professional self-hosted phishing platform built for enterprises, red teams, and security providers. Deploy locally for complete control over campaigns, data, and infrastructure with unlimited simulations and full privacy.
AI/LLM Red Team Handbook and Field Manual
https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual
Submitted December 05, 2025 at 06:05PM by esmurf
via reddit https://ift.tt/5hVeFQH
https://cph-sec.gitbook.io/ai-llm-red-team-handbook-and-field-manual
Submitted December 05, 2025 at 06:05PM by esmurf
via reddit https://ift.tt/5hVeFQH
Reddit
[Mature Content] From the netsec community on Reddit: AI/LLM Red Team Handbook and Field Manual
Posted by esmurf - 39 votes and 9 comments
SSRF Payload Generator for fuzzing PDF Generators etc...
https://ift.tt/rQUzgp0
Submitted December 05, 2025 at 06:56PM by robbanrobbin
via reddit https://ift.tt/duJWM20
https://ift.tt/rQUzgp0
Submitted December 05, 2025 at 06:56PM by robbanrobbin
via reddit https://ift.tt/duJWM20
Shelltrail
SSRF Payload Generator | Shelltrail - Swedish Experts in Pentesting
Generate HTML/SVG payloads for testing Server-Side Request Forgery vulnerabilities.
Tracing JavaScript Value Origins in Modern SPAs: Breakpoint-Driven Heap Search (BDHS)
https://fcavallarin.github.io/wirebrowser/BDHS-Origin-Trace
Submitted December 05, 2025 at 08:18PM by filippo_cavallarin
via reddit https://ift.tt/izkBmFt
https://fcavallarin.github.io/wirebrowser/BDHS-Origin-Trace
Submitted December 05, 2025 at 08:18PM by filippo_cavallarin
via reddit https://ift.tt/izkBmFt
Reddit
From the netsec community on Reddit: Tracing JavaScript Value Origins in Modern SPAs: Breakpoint-Driven Heap Search (BDHS)
Posted by filippo_cavallarin - 17 votes and 0 comments
Stillepost - Or: How to Proxy your C2s HTTP-Traffic through Chromium | mischief
https://ift.tt/aHb4Tsd
Submitted December 07, 2025 at 01:02PM by S3cur3Th1sSh1t
via reddit https://ift.tt/wXH94RD
https://ift.tt/aHb4Tsd
Submitted December 07, 2025 at 01:02PM by S3cur3Th1sSh1t
via reddit https://ift.tt/wXH94RD
mischief
Stillepost - Or: How to Proxy your C2s HTTP-Traffic through Chromium
Utilizing the Chrome DevTools Protocol to delegate C2 HTTP-traffic.