botM to netsecEnglish · 14 hours agoReverse engineering my cloud-connected e-scooter and finding the master key to unlock all scootersplus-squareblog.nns.eeexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReverse engineering my cloud-connected e-scooter and finding the master key to unlock all scootersplus-squareblog.nns.eebotM to netsecEnglish · 14 hours agomessage-square0linkfedilink
botM to netsecEnglish · 14 hours agoProxying Flutter Traffic on Android with Claudeplus-squarerandywestergren.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkProxying Flutter Traffic on Android with Claudeplus-squarerandywestergren.combotM to netsecEnglish · 14 hours agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoA practical guide to finding soundness bugs in ZK circuitsplus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA practical guide to finding soundness bugs in ZK circuitsplus-squaremedium.combotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agotailsnitch A security auditor and configuration checklist for Tailscale configurationsplus-squarewww.adversis.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linktailsnitch A security auditor and configuration checklist for Tailscale configurationsplus-squarewww.adversis.iobotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 4 days agoHardBit 4.0 Ransomware Evolutionlabs.jamessawyer.co.ukexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHardBit 4.0 Ransomware Evolutionlabs.jamessawyer.co.ukbotM to netsecEnglish · 4 days agomessage-square0linkfedilink
botM to netsecEnglish · 5 days agoWindows Registry Persistence Techniques without Registry Callbacksdeceptiq.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows Registry Persistence Techniques without Registry Callbacksdeceptiq.combotM to netsecEnglish · 5 days agomessage-square0linkfedilink
botM to netsecEnglish · 5 days agoTechnical Analysis - MongoBleed CVE-2025-14847 Memory Corruption in MongoDBplus-squarephoenix.securityexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTechnical Analysis - MongoBleed CVE-2025-14847 Memory Corruption in MongoDBplus-squarephoenix.securitybotM to netsecEnglish · 5 days agomessage-square0linkfedilink
botM to netsecEnglish · 5 days agoLooking for fitting mystery guest certificationplus-squareanti-crime-academy.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLooking for fitting mystery guest certificationplus-squareanti-crime-academy.combotM to netsecEnglish · 5 days agomessage-square0linkfedilink
botM to netsecEnglish · 6 days agobuilt an SSRF prevention libraryplus-squarewww.npmjs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkbuilt an SSRF prevention libraryplus-squarewww.npmjs.combotM to netsecEnglish · 6 days agomessage-square0linkfedilink
botM to netsecEnglish · 6 days agornetsec monthly discussion tool threadwww.reddit.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkrnetsec monthly discussion tool threadwww.reddit.combotM to netsecEnglish · 6 days agomessage-square0linkfedilink
botM to netsecEnglish · 6 days agoThe Story of a Perfect Exploit Chain Six Bugs That Looked Harmless Until They Became Pre-Auth RCE in a Security Applianceplus-squaremehmetince.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Story of a Perfect Exploit Chain Six Bugs That Looked Harmless Until They Became Pre-Auth RCE in a Security Applianceplus-squaremehmetince.netbotM to netsecEnglish · 6 days agomessage-square0linkfedilink
botM to netsecEnglish · 8 days agoRMM Abuse in a Crypto Wallet Distribution Campaignplus-squaremalwr-analysis.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRMM Abuse in a Crypto Wallet Distribution Campaignplus-squaremalwr-analysis.combotM to netsecEnglish · 8 days agomessage-square0linkfedilink
botM to netsecEnglish · 9 days ago39C3 Multiple vulnerabilities in GnuPG and other cryptographic toolsplus-squarewww.heise.deexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link39C3 Multiple vulnerabilities in GnuPG and other cryptographic toolsplus-squarewww.heise.debotM to netsecEnglish · 9 days agomessage-square0linkfedilink
botM to netsecEnglish · 10 days agoIdentity misuse that looks completely normalplus-squarewww.armosec.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIdentity misuse that looks completely normalplus-squarewww.armosec.iobotM to netsecEnglish · 10 days agomessage-square0linkfedilink
botM to netsecEnglish · 11 days agoMongobleed - CVE-2025-14847plus-squaredoublepulsar.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMongobleed - CVE-2025-14847plus-squaredoublepulsar.combotM to netsecEnglish · 11 days agomessage-square0linkfedilink
botM to netsecEnglish · 11 days agoEarly warning signs of runtime compromiseplus-squarewww.armosec.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEarly warning signs of runtime compromiseplus-squarewww.armosec.iobotM to netsecEnglish · 11 days agomessage-square0linkfedilink
botM to netsecEnglish · 11 days agoImplicit execution authority is the real failure mode behind prompt injectionplus-squarezenodo.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImplicit execution authority is the real failure mode behind prompt injectionplus-squarezenodo.orgbotM to netsecEnglish · 11 days agomessage-square0linkfedilink
botM to netsecEnglish · 11 days agoPetlibro Your Pet Feeder Is Feeding Data To Anyone Who Asksplus-squarebobdahacker.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPetlibro Your Pet Feeder Is Feeding Data To Anyone Who Asksplus-squarebobdahacker.combotM to netsecEnglish · 11 days agomessage-square0linkfedilink
botM to netsecEnglish · 12 days agoHow do you handle daily news fatigue? Looking for feedback on a curation project.plus-squarethreatroad.substack.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow do you handle daily news fatigue? Looking for feedback on a curation project.plus-squarethreatroad.substack.combotM to netsecEnglish · 12 days agomessage-square0linkfedilink
botM to netsecEnglish · 12 days agoLangGrinch A Bug in the Library, A Lesson for the Architectureplus-squareamlalabs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLangGrinch A Bug in the Library, A Lesson for the Architectureplus-squareamlalabs.combotM to netsecEnglish · 12 days agomessage-square0linkfedilink