Parrot 7.0 Beta swaps out the MATE desktop for using Plasma by default
https://ift.tt/yhrXIjg
Submitted December 10, 2025 at 04:19PM by Little-Season-3433
via reddit https://ift.tt/XnVAP45
https://ift.tt/yhrXIjg
Submitted December 10, 2025 at 04:19PM by Little-Season-3433
via reddit https://ift.tt/XnVAP45
Infostealer has entered the chat
https://ift.tt/LlGWf8m
Submitted December 10, 2025 at 10:20PM by Fit_Wing3352
via reddit https://ift.tt/IrOj4l8
https://ift.tt/LlGWf8m
Submitted December 10, 2025 at 10:20PM by Fit_Wing3352
via reddit https://ift.tt/IrOj4l8
Kaspersky official blog
The AMOS infostealer is piggybacking ChatGPT's chat-sharing feature
We break down a new infostealer attack that combines the ClickFix technique with a shared chat containing malicious user guides on the official ChatGPT website.
SOAPwn: Pwning .NET Framework Applications Through HTTP Client Proxies And WSDL - watchTowr Labs
https://ift.tt/HLgCqdQ
Submitted December 10, 2025 at 10:42PM by dx7r__
via reddit https://ift.tt/hj39kia
https://ift.tt/HLgCqdQ
Submitted December 10, 2025 at 10:42PM by dx7r__
via reddit https://ift.tt/hj39kia
watchTowr Labs
SOAPwn: Pwning .NET Framework Applications Through HTTP Client Proxies And WSDL
Welcome back! As we near the end of 2025, we are, of course, waiting for the next round of SSLVPN exploitation to occur in January (as it did in 2024 and 2025).
Weeeeeeeee. Before then, we want to clear the decks and see how much research we can publish.…
Weeeeeeeee. Before then, we want to clear the decks and see how much research we can publish.…
Covert red team phishing
https://phishing.club/blog/covert-red-team-phishing-with-phishing-club/
Submitted December 10, 2025 at 11:54PM by hackeronni
via reddit https://ift.tt/gGFrC9S
https://phishing.club/blog/covert-red-team-phishing-with-phishing-club/
Submitted December 10, 2025 at 11:54PM by hackeronni
via reddit https://ift.tt/gGFrC9S
Phishing Club
Phishing Club - Professional Self-Hosted Phishing Platform
Professional self-hosted phishing platform built for enterprises, red teams, and security providers. Deploy locally for complete control over campaigns, data, and infrastructure with unlimited simulations and full privacy.
How widespread is the impact of Critical Security Vulnerability in React Server Components(CVE-2025-55182)
https://ift.tt/En96Z50
Submitted December 11, 2025 at 08:28AM by Fit_Wing3352
via reddit https://ift.tt/kjoUcgq
https://ift.tt/En96Z50
Submitted December 11, 2025 at 08:28AM by Fit_Wing3352
via reddit https://ift.tt/kjoUcgq
Empirical Analysis: Non-Linear Token Consumption in AI Security Agents
https://ift.tt/w53KWth
Submitted December 11, 2025 at 10:41PM by Obvious-Language4462
via reddit https://ift.tt/8yUOFmw
https://ift.tt/w53KWth
Submitted December 11, 2025 at 10:41PM by Obvious-Language4462
via reddit https://ift.tt/8yUOFmw
Aliasrobotics
Case Study - CAI delivers unlimited security automation
Learn why Alias Robotics transitioned from CAI ONE to CAI PRO. Real-world usage revealed that token-based models are incompatible with AI security workflows. CAI PRO delivers unlimited, enterprise-grade autonomous security performance.
A modern tale of blinkenlights
https://ift.tt/Pg2eiA9
Submitted December 11, 2025 at 11:38PM by smaury
via reddit https://ift.tt/t9aAlST
https://ift.tt/Pg2eiA9
Submitted December 11, 2025 at 11:38PM by smaury
via reddit https://ift.tt/t9aAlST
Quarkslab
A modern tale of blinkenlights - Quarkslab's blog
This blog post demonstrates how a modern variant of an hardware attack found in the 2000's allowed the extraction of a €12 smartwatch's firmware using only cheap and robust hardware. Damien and Thomas (introduced later in this post) gave a talk on this subject…
Require Google to Remove One-Click Full Logout URLs
https://c.org/9wTs4xPztQ
Submitted December 12, 2025 at 05:50AM by Redstoneriot234
via reddit https://ift.tt/XUGcRxt
https://c.org/9wTs4xPztQ
Submitted December 12, 2025 at 05:50AM by Redstoneriot234
via reddit https://ift.tt/XUGcRxt
Change.org
Sign the Petition
Require Google to Remove One-Click Full Logout URLs
The FreePBX Rabbit Hole: CVE-2025-66039 & More
https://ift.tt/vbsQwUg
Submitted December 12, 2025 at 07:26PM by scopedsecurity
via reddit https://ift.tt/6yGkABn
https://ift.tt/vbsQwUg
Submitted December 12, 2025 at 07:26PM by scopedsecurity
via reddit https://ift.tt/6yGkABn
Horizon3.ai
The FreePBX Rabbit Hole: CVE-2025-66039 & More
Horizon3.ai uncovers FreePBX flaws, including CVE-2025-66039 auth bypass, SQL injection, and file upload RCE—and shows how NodeZero detects them.
Building an Open-Source AI-Powered Auto-Exploiter with a 1.7B Parameter Model
https://ift.tt/2QHnVtK
Submitted December 13, 2025 at 01:24PM by beyonderdabas
via reddit https://ift.tt/FeMOxqc
https://ift.tt/2QHnVtK
Submitted December 13, 2025 at 01:24PM by beyonderdabas
via reddit https://ift.tt/FeMOxqc
Mohit Dabas's Blog
Building an Open-Source AI-Powered Auto-Exploiter with a 1.7B Parameter Model: No Paid APIs Required
Offline Decryption Messenger: Concept Proposal and Request for Constructive Feedback
https://ift.tt/U39fnLQ
Submitted December 13, 2025 at 09:31PM by calzone_rivoluzione
via reddit https://ift.tt/WcjGz7Z
https://ift.tt/U39fnLQ
Submitted December 13, 2025 at 09:31PM by calzone_rivoluzione
via reddit https://ift.tt/WcjGz7Z
Nextcloud
concept.pdf
Nextcloud - a safe home for all your data
How we got hit by Shai-Hulud: A complete post-mortem | Trigger.dev
https://ift.tt/y3TL6gv
Submitted December 14, 2025 at 11:11PM by alt69785
via reddit https://ift.tt/O19Hq8R
https://ift.tt/y3TL6gv
Submitted December 14, 2025 at 11:11PM by alt69785
via reddit https://ift.tt/O19Hq8R
trigger.dev
How we got hit by Shai-Hulud: A complete post-mortem | Trigger.dev
On November 25th, one of our engineers was compromised by the Shai-Hulud npm supply chain worm. Here's what happened, how we responded, and what we've changed.
Capabilities Are the Only Way to Secure Agent Delegation
https://ift.tt/pMUyO1D
Submitted December 15, 2025 at 03:43AM by Impossible_Ant1595
via reddit https://ift.tt/0E9pPF5
https://ift.tt/pMUyO1D
Submitted December 15, 2025 at 03:43AM by Impossible_Ant1595
via reddit https://ift.tt/0E9pPF5
Next.js: 59k servers compromised in 48h - I breached the attackers' C2 and here's what I found
https://ift.tt/HP5X8aN
Submitted December 15, 2025 at 05:37PM by mario_candela
via reddit https://ift.tt/bNq5y92
https://ift.tt/HP5X8aN
Submitted December 15, 2025 at 05:37PM by mario_candela
via reddit https://ift.tt/bNq5y92
Beelzebub
Operation PCPcat: Hunting a Next.js Credential Stealer That's Already Compromised 59K Servers | AI deception platform
AI deception platform: Deceive, Detect, Respond. “You can’t defend. You can’t prevent. The only thing you can do is detect and respond.” Bruce Schneier. We turn that hard truth into your tactical advantage. Our AI-based decoys, built using our open-source…
The Fragile Lock: Novel Bypasses For SAML Authentication
https://ift.tt/TM9cEZr
Submitted December 15, 2025 at 09:21PM by albinowax
via reddit https://ift.tt/upyDmCG
https://ift.tt/TM9cEZr
Submitted December 15, 2025 at 09:21PM by albinowax
via reddit https://ift.tt/upyDmCG
PortSwigger Research
The Fragile Lock: Novel Bypasses For SAML Authentication
TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi
CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center
https://ift.tt/lv2FpAJ
Submitted December 15, 2025 at 10:43PM by Fun_Preference1113
via reddit https://ift.tt/Ur4epuw
https://ift.tt/lv2FpAJ
Submitted December 15, 2025 at 10:43PM by Fun_Preference1113
via reddit https://ift.tt/Ur4epuw
Cymulate
CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center
Cymulate Research Labs discovered CVE-2025-64669, a local privilege escalation flaw in Windows Admin Center enabling SYSTEM-level compromise.
Makop ransomware: GuLoader and privilege escalation in attacks against Indian businesses
https://ift.tt/dKatBzj
Submitted December 16, 2025 at 02:40AM by bagaudin
via reddit https://ift.tt/L7KhFfO
https://ift.tt/dKatBzj
Submitted December 16, 2025 at 02:40AM by bagaudin
via reddit https://ift.tt/L7KhFfO
Acronis
Makop ransomware: GuLoader and privilege escalation in attacks against Indian businesses
Makop, a ransomware strain derived from Phobos, continues to exploit exposed RDP systems while adding new components such as local privilege escalation exploits and loader malware to its traditional toolkit.
Autonomous code analyzer beats all human teams at OSS zero-day competition
https://ift.tt/Tsb1DBZ
Submitted December 16, 2025 at 06:27AM by tjbecker
via reddit https://ift.tt/KgaqP50
https://ift.tt/Tsb1DBZ
Submitted December 16, 2025 at 06:27AM by tjbecker
via reddit https://ift.tt/KgaqP50
theori.io
Announcing Xint Code - Theori BLOG
Real Vulnerabilities. Actionable Results. | AI for Security, Vulnerability Research
Autonomous AppSec via Chrome DevTools (MCP): 600 min → 3.5 min on OWASP Juice Shop
https://ift.tt/Kb1J0gL
Submitted December 16, 2025 at 01:41PM by Obvious-Language4462
via reddit https://ift.tt/Pqbrf5Y
https://ift.tt/Kb1J0gL
Submitted December 16, 2025 at 01:41PM by Obvious-Language4462
via reddit https://ift.tt/Pqbrf5Y
Aliasrobotics
Case Study - CAI with MCP enables AI-assisted web application security testing on OWASP Juice Shop
CAI integrated with Chrome via MCP delivers AI-assisted web application security assessments, demonstrated on OWASP Juice Shop with 171x faster vulnerability discovery
Temenos OFS String Injection: Revealing a Hidden Financial Attack Vector
https://ift.tt/hKu5NCL
Submitted December 15, 2025 at 04:38AM by DarKnight______
via reddit https://ift.tt/bcVaCTt
https://ift.tt/hKu5NCL
Submitted December 15, 2025 at 04:38AM by DarKnight______
via reddit https://ift.tt/bcVaCTt
Medium
Temenos OFS Field Injection: Revealing a Hidden Financial Attack Vector
Pentesting an API revealed an undocumented OFS Field Injection flaw that enables poisoned transactions without proper input validation.
TL;DR: Hide your headless bot by mimicking a WebView (Sec-Fetch and Client Hints inconsistencies)
https://ift.tt/wDqPFnW
Submitted December 16, 2025 at 07:15PM by theMiddleBlue
via reddit https://ift.tt/82qxhVO
https://ift.tt/wDqPFnW
Submitted December 16, 2025 at 07:15PM by theMiddleBlue
via reddit https://ift.tt/82qxhVO
Sicuranext Blog
Fight bad bot with Sec Fetch and Client Hints inconsistencies in headless browsers
For many of our e-commerce customers the problem of bad bots it's a everyday problem and has evolved a lot in the last few years. A common approach is to "block" automated traffic with a JavaScript challenge, basically a small noscript that the browser must…