An Evening with Claude (Code)
#specterops
TL;DR – A new vulnerability was found one evening in Claude Code (CVE-2025-64755). I’d love to start this blog post with something really click-baity (“How I pwn3d Claude Code using ChatGPT Codex” or something similar to bring some interest) but, alas, it was not meant to be. This blog post explores a bug I found […]
via SpecterOps Blog (author: Adam Chester)
#specterops
TL;DR – A new vulnerability was found one evening in Claude Code (CVE-2025-64755). I’d love to start this blog post with something really click-baity (“How I pwn3d Claude Code using ChatGPT Codex” or something similar to bring some interest) but, alas, it was not meant to be. This blog post explores a bug I found […]
via SpecterOps Blog (author: Adam Chester)
Reflecting Your Authentication: When Windows Ends Up Talking to Itself
#decoder
Authentication reflection has been around for more than 20 years, but its implications in modern Windows networks are far from obsolete. Even after all the patches Microsoft has rolled out over the years, reflection attacks are still very much exploitable 😉 This post walks through what authentication reflection actually is, why it remains dangerous today,…
via Decoder's Blog
#decoder
Authentication reflection has been around for more than 20 years, but its implications in modern Windows networks are far from obsolete. Even after all the patches Microsoft has rolled out over the years, reflection attacks are still very much exploitable 😉 This post walks through what authentication reflection actually is, why it remains dangerous today,…
via Decoder's Blog
Restoring Reflective Code Loading on macOS (Part II)
#objectivesee
Let's continue our research into fully restoring reflective code loading on macOS — now with support for macOS 26 and in-memory Objective-C payloads. And what about detection? We cover that too!
via Objective-See Blog
#objectivesee
Let's continue our research into fully restoring reflective code loading on macOS — now with support for macOS 26 and in-memory Objective-C payloads. And what about detection? We cover that too!
via Objective-See Blog
Cobalt Strike 4.12: Fix Up, Look Sharp!
#cobaltstrike
Cobalt Strike 4.12 is now available. We are excited to introduce a new look and feel for the Cobalt Strike GUI, a REST API, User Defined Command and Control (UDC2), new process injection options, new UAC bypasses, a new BOF API BeaconDownload for in-memory buffers, and new drip loading Malleable C2 options. Additionally, we have overhauled pivot Beacons so that they now support the novel Sleepmask introduced in 4.11, fixed [...]
via Cobalt Strike Blog (author: William Burgess)
#cobaltstrike
Cobalt Strike 4.12 is now available. We are excited to introduce a new look and feel for the Cobalt Strike GUI, a REST API, User Defined Command and Control (UDC2), new process injection options, new UAC bypasses, a new BOF API BeaconDownload for in-memory buffers, and new drip loading Malleable C2 options. Additionally, we have overhauled pivot Beacons so that they now support the novel Sleepmask introduced in 4.11, fixed [...]
via Cobalt Strike Blog (author: William Burgess)
❤1
A Note on AI from Christie Terrill, CISO, Bishop Fox
#bishopfox
After a month of conferences and CISO conversations, one thing is clear: AI is reshaping security—fast. But the excitement comes with uncertainty, risk, and big unanswered questions. Here’s what leaders are really saying.
via BishopFox Blog
#bishopfox
After a month of conferences and CISO conversations, one thing is clear: AI is reshaping security—fast. But the excitement comes with uncertainty, risk, and big unanswered questions. Here’s what leaders are really saying.
via BishopFox Blog
Evilginx Pro 4.3 - Event Notifications & Proxies Overhaul
#kgretzky
The newest 4.3 update delivers real-time event notifications, an overhaul of the tunnelling proxy system and a new CSS canary token evasion.
via BREAKDEV Blog (author: Kuba Gretzky)
#kgretzky
The newest 4.3 update delivers real-time event notifications, an overhaul of the tunnelling proxy system and a new CSS canary token evasion.
via BREAKDEV Blog (author: Kuba Gretzky)
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey
#synacktiv
via Synacktiv Blog (author: Webmaster)
#synacktiv
via Synacktiv Blog (author: Webmaster)
An Evening with Claude (Code)
#xpn
A deep dive into discovering CVE-2025-64755, a vulnerability in Claude Code v2.0.25. This post walks through the process of reversing the obfuscated Claude Code JavaScript, and exploiting weak regex expressions to achieve code execution unprompted.
via XPN InfoSec Blog
#xpn
A deep dive into discovering CVE-2025-64755, a vulnerability in Claude Code v2.0.25. This post walks through the process of reversing the obfuscated Claude Code JavaScript, and exploiting weak regex expressions to achieve code execution unprompted.
via XPN InfoSec Blog
Cracking the Crystal Palace
#rastamouse
If you follow this blog, you'll know I've been posting about Crystal Palace a LOT recently, mostly from an attack perspective. Today, I thought I'd channel my blue-teamer alter ego and look at Crystal Palace from a defence perspective. That is, are there any
via Rasta Mouse Blog
#rastamouse
If you follow this blog, you'll know I've been posting about Crystal Palace a LOT recently, mostly from an attack perspective. Today, I thought I'd channel my blue-teamer alter ego and look at Crystal Palace from a defence perspective. That is, are there any
via Rasta Mouse Blog
Less Praying More Relaying – Enumerating EPA Enforcement for MSSQL and HTTPS
#specterops
Identifying EPA enforcement for more popular rel
via SpecterOps Blog (author: Nick Powers)
#specterops
Identifying EPA enforcement for more popular rel
via SpecterOps Blog (author: Nick Powers)
PortSwigger x TryHackMe: Supporting Advent of Cyber
#portswigger
Every December, TryHackMe’s Advent of Cyber brings the security community together around a simple idea: learn something new by getting hands-on. Each day during the festive season reveals a beginner-
via PortSwigger Blog
#portswigger
Every December, TryHackMe’s Advent of Cyber brings the security community together around a simple idea: learn something new by getting hands-on. Each day during the festive season reveals a beginner-
via PortSwigger Blog
Release Out: Finally, Some REST
#cobaltstrike
The REST API was a major feature of the 4.12 release and forms part of a broader ongoing change in the Cobalt Strike ecosystem. Therefore, we wanted to dedicate a blog post to explain the rationale behind it, discuss the architecture, and provide hands-on examples to get our customers up and running. In addition to [...]
via Cobalt Strike Blog (author: Pieter Ceelen)
#cobaltstrike
The REST API was a major feature of the 4.12 release and forms part of a broader ongoing change in the Cobalt Strike ecosystem. Therefore, we wanted to dedicate a blog post to explain the rationale behind it, discuss the architecture, and provide hands-on examples to get our customers up and running. In addition to [...]
via Cobalt Strike Blog (author: Pieter Ceelen)
PIC Symphony
#rastamouse
Raffi just released another update to Crystal Palace, which serves to improve the way specification files are handled by making them more modular.
Tradecraft Orchestration in the Garden
What’s more relaxing than a beautiful fall day, a crisp breeze, a glass of Sangria, and music from the local
via Rasta Mouse Blog
#rastamouse
Raffi just released another update to Crystal Palace, which serves to improve the way specification files are handled by making them more modular.
Tradecraft Orchestration in the Garden
What’s more relaxing than a beautiful fall day, a crisp breeze, a glass of Sangria, and music from the local
via Rasta Mouse Blog
What Will Shape Cybersecurity in 2026: AI Speed, Expanding Attack Surfaces, and Specialized Red Teams
#bishopfox
2026 will hit cybersecurity like a fast-forward button: AI moves quicker than governance, attack surfaces sprawl into the physical world, and red teams get hyper-specialized. Here’s what’s coming—and how to stay ahead before “optional” becomes “too late.”
via BishopFox Blog
#bishopfox
2026 will hit cybersecurity like a fast-forward button: AI moves quicker than governance, attack surfaces sprawl into the physical world, and red teams get hyper-specialized. Here’s what’s coming—and how to stay ahead before “optional” becomes “too late.”
via BishopFox Blog
What is a TrustedSec Program Maturity Assessment (PMA)?
#trustedsec
The TrustedSec PMA is a tactical approach to evaluating the components, efficiency, and overall maturity of an organization’s Information Security program.Unlike a traditional compliance audit, the PMA is designed as a…
via TrustedSec Blog (author: Jonathan White)
#trustedsec
The TrustedSec PMA is a tactical approach to evaluating the components, efficiency, and overall maturity of an organization’s Information Security program.Unlike a traditional compliance audit, the PMA is designed as a…
via TrustedSec Blog (author: Jonathan White)
Arista NextGen Firewall XSS to RCE Chain
#bishopfox
Arista flagged three NG Firewall bugs as “limited.” Our researchers proved otherwise: real-world remote code execution is possible, and current patches don’t fully fix the root issues. Here’s what’s vulnerable, what we validated, and the steps to cut exposure now.
via BishopFox Blog
#bishopfox
Arista flagged three NG Firewall bugs as “limited.” Our researchers proved otherwise: real-world remote code execution is possible, and current patches don’t fully fix the root issues. Here’s what’s vulnerable, what we validated, and the steps to cut exposure now.
via BishopFox Blog
How to detect React2Shell with Burp Suite
#portswigger
Detecting React2Shell with Burp Suite React2Shell vulnerabilities in Next.js applications are now scannable across Burp Suite, making it fast to validate your exposure and begin automated coverage usi
via PortSwigger Blog
#portswigger
Detecting React2Shell with Burp Suite React2Shell vulnerabilities in Next.js applications are now scannable across Burp Suite, making it fast to validate your exposure and begin automated coverage usi
via PortSwigger Blog
Ghostwriter v6.1 — Playing Fetch with BloodHound
#specterops
Ghostwriter v6.1 introduces a full-featured BloodHound integration that lets you import BloodHound data and findings directly within your projects, alongside new collaborative project notes, upgraded caption editor objects, and a collection of usability, SSO/MFA, and template improvements. This release streamlines workflows, enhances team collaboration, and tightens the connection between assessment tooling and reporting.
via SpecterOps Blog (author: Christopher Maddalena)
#specterops
Ghostwriter v6.1 introduces a full-featured BloodHound integration that lets you import BloodHound data and findings directly within your projects, alongside new collaborative project notes, upgraded caption editor objects, and a collection of usability, SSO/MFA, and template improvements. This release streamlines workflows, enhances team collaboration, and tightens the connection between assessment tooling and reporting.
via SpecterOps Blog (author: Christopher Maddalena)
A Remote Pre-Authentication Overflow in LLDB's debugserver
#objectivesee
In this guest blog post, Nathaniel Oh, details a recent bug he discovered and reported to Apple: a remote pre-authentication buffer overflow in LLDB’s debugserver, now patched as CVE-2025-43504.
via Objective-See Blog
#objectivesee
In this guest blog post, Nathaniel Oh, details a recent bug he discovered and reported to Apple: a remote pre-authentication buffer overflow in LLDB’s debugserver, now patched as CVE-2025-43504.
via Objective-See Blog
The Fragile Lock: Novel Bypasses For SAML Authentication
#portswigger
TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi
via PortSwigger Research
#portswigger
TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi
via PortSwigger Research