botM to Security DiscussionsEnglish · 6 hours agoUncovering .NET Malware Obfuscated by Encryption and Virtualizationplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUncovering .NET Malware Obfuscated by Encryption and Virtualizationplus-squareunit42.paloaltonetworks.combotM to Security DiscussionsEnglish · 6 hours agomessage-square0fedilink
botM to Security DiscussionsEnglish · 6 hours agoEvilLoader: Yesterday was published PoC for unpatched Vulnerability affecting Telegram for Androidplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEvilLoader: Yesterday was published PoC for unpatched Vulnerability affecting Telegram for Androidplus-squarewww.mobile-hacker.combotM to Security DiscussionsEnglish · 6 hours agomessage-square0fedilink
botM to Security DiscussionsEnglish · 18 hours agoCase Study: Traditional CVSS scoring missed this actively exploited vulnerability (CVE-2024-50302)plus-squarekston83.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCase Study: Traditional CVSS scoring missed this actively exploited vulnerability (CVE-2024-50302)plus-squarekston83.github.iobotM to Security DiscussionsEnglish · 18 hours agomessage-square0fedilink
botM to Security DiscussionsEnglish · 1 day agoNew Method to Leverage Unsafe Reflection and Deserialisation to RCE on Railsplus-squarewww.elttam.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Method to Leverage Unsafe Reflection and Deserialisation to RCE on Railsplus-squarewww.elttam.combotM to Security DiscussionsEnglish · 1 day agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days ago!exploitable Episode Two - Enter the Matrix. SSHD exploit used by Trinity in the movie The Matrix Reloadedplus-squareblog.doyensec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link!exploitable Episode Two - Enter the Matrix. SSHD exploit used by Trinity in the movie The Matrix Reloadedplus-squareblog.doyensec.combotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 2 days agoTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inbotM to Security DiscussionsEnglish · 2 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 3 days agoHybrid Analysis Deep Dive Into Allegedly AI-Generated FunkSec Ransomwareplus-squarehybrid-analysis.blogspot.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHybrid Analysis Deep Dive Into Allegedly AI-Generated FunkSec Ransomwareplus-squarehybrid-analysis.blogspot.combotM to Security DiscussionsEnglish · 3 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 3 days agoWe Deliberately Exposed AWS Keys on Developer Forums: Attackers Exploited One in 10 Hoursplus-squarewww.clutch.securityexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWe Deliberately Exposed AWS Keys on Developer Forums: Attackers Exploited One in 10 Hoursplus-squarewww.clutch.securitybotM to Security DiscussionsEnglish · 3 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 4 days agoDocusnap Inventory Files Encrypted With Static Keyplus-squarewww.redteam-pentesting.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDocusnap Inventory Files Encrypted With Static Keyplus-squarewww.redteam-pentesting.debotM to Security DiscussionsEnglish · 4 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 5 days agoClient-Side Path Traversal - Penetesting guide | @VeryLazyTechplus-squarewww.verylazytech.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClient-Side Path Traversal - Penetesting guide | @VeryLazyTechplus-squarewww.verylazytech.combotM to Security DiscussionsEnglish · 5 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 6 days agoEvading Detection with Payload Pipelinesplus-squarepracticalsecurityanalytics.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEvading Detection with Payload Pipelinesplus-squarepracticalsecurityanalytics.combotM to Security DiscussionsEnglish · 6 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 6 days agoBurp Variables: a Burp extension that lets you store and reuse variables in outgoing requests, similar to functionality in Postman/Insomnia/other API testing clientsplus-squareportswigger.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBurp Variables: a Burp extension that lets you store and reuse variables in outgoing requests, similar to functionality in Postman/Insomnia/other API testing clientsplus-squareportswigger.netbotM to Security DiscussionsEnglish · 6 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 7 days agoMitM attack against OpenSSH's VerifyHostKeyDNS-enabled clientplus-squareseclists.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMitM attack against OpenSSH's VerifyHostKeyDNS-enabled clientplus-squareseclists.orgbotM to Security DiscussionsEnglish · 7 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 7 days agoSubstack Domain Takeoverplus-squareblog.nietaanraken.nlexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSubstack Domain Takeoverplus-squareblog.nietaanraken.nlbotM to Security DiscussionsEnglish · 7 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 8 days agoWallbleed: A Memory Disclosure Vulnerability in the Great Firewall of Chinaplus-squaregfw.reportexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWallbleed: A Memory Disclosure Vulnerability in the Great Firewall of Chinaplus-squaregfw.reportbotM to Security DiscussionsEnglish · 8 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 8 days agoBybit $1.5b hack was a Safe Wallet web app JS payload injectionplus-squaredocsend.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBybit $1.5b hack was a Safe Wallet web app JS payload injectionplus-squaredocsend.combotM to Security DiscussionsEnglish · 8 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 9 days agoBypass AMSI in 2025plus-squarewww.r-tec.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBypass AMSI in 2025plus-squarewww.r-tec.netbotM to Security DiscussionsEnglish · 9 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 9 days agoGithub scam investigation: Thousands of "mods" and "cracks" stealing your dataplus-squaretimsh.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGithub scam investigation: Thousands of "mods" and "cracks" stealing your dataplus-squaretimsh.orgbotM to Security DiscussionsEnglish · 9 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 10 days agoHow to Find More IDORs - @verylazytechplus-squarewww.verylazytech.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Find More IDORs - @verylazytechplus-squarewww.verylazytech.combotM to Security DiscussionsEnglish · 10 days agomessage-square0fedilink
botM to Security DiscussionsEnglish · 11 days agoResearch: Using Stylometry & Topic Modeling to Attribute State-Sponsored Hacktivist Groupsplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearch: Using Stylometry & Topic Modeling to Attribute State-Sponsored Hacktivist Groupsplus-squareresearch.checkpoint.combotM to Security DiscussionsEnglish · 11 days agomessage-square0fedilink