botM to NetSecEnglish · 4 hours agoTaking remote control over industrial generatorsplus-squareeaton-works.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTaking remote control over industrial generatorsplus-squareeaton-works.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoUpcoming Technical Security Talks Workshops at BsidesNoVA Oct 1011 Arlington VAbsidesnova.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUpcoming Technical Security Talks Workshops at BsidesNoVA Oct 1011 Arlington VAbsidesnova.orgbotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoVED 2026 after CFI - data onlyplus-squarehardenedvault.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVED 2026 after CFI - data onlyplus-squarehardenedvault.netbotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoMy experience with LLM Code Review vs Deterministic SAST Security Toolsplus-squareblog.fraim.devexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMy experience with LLM Code Review vs Deterministic SAST Security Toolsplus-squareblog.fraim.devbotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoGhost in the Cloud Weaponizing AWS X-Ray for Command Controlplus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGhost in the Cloud Weaponizing AWS X-Ray for Command Controlplus-squaremedium.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoIts Never Simple Until It Is Dell UnityVSA Pre-Auth Command Injection CVE-2025-36604 - watchTowr Labslabs.watchtowr.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIts Never Simple Until It Is Dell UnityVSA Pre-Auth Command Injection CVE-2025-36604 - watchTowr Labslabs.watchtowr.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoCVE-2025-59489 Arbitrary Code Execution in Unity Runtimeflatt.techexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2025-59489 Arbitrary Code Execution in Unity Runtimeflatt.techbotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoNuclei Templates for Detecting AMI MegaRAC BMC Vulnerabilitiesplus-squareeclypsium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNuclei Templates for Detecting AMI MegaRAC BMC Vulnerabilitiesplus-squareeclypsium.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agornetsec monthly discussion tool threadwww.reddit.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkrnetsec monthly discussion tool threadwww.reddit.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoIPv4IPv6 Packet Fragmentation Implementation Details - PacketSmithplus-squarepacketsmith.caexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIPv4IPv6 Packet Fragmentation Implementation Details - PacketSmithplus-squarepacketsmith.cabotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoSoftware Secured Hacking Furbo 2 Mobile App and P2P Exploits USAplus-squarewww.softwaresecured.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSoftware Secured Hacking Furbo 2 Mobile App and P2P Exploits USAplus-squarewww.softwaresecured.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoRemote Code Execution and Authentication Bypass in Materialise OrthoView CVE-2025-23049plus-squareouturnate.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRemote Code Execution and Authentication Bypass in Materialise OrthoView CVE-2025-23049plus-squareouturnate.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoZeroDay Cloud The first open-source cloud hacking competitionplus-squarezeroday.cloudexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZeroDay Cloud The first open-source cloud hacking competitionplus-squarezeroday.cloudbotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoWhen Audits Fail Four Critical Pre-Auth Vulnerabilities in TRUfusion Enterpriseplus-squarewww.rcesecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen Audits Fail Four Critical Pre-Auth Vulnerabilities in TRUfusion Enterpriseplus-squarewww.rcesecurity.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoYou name it, VMware elevates it CVE-2025-41244plus-squareblog.nviso.euexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkYou name it, VMware elevates it CVE-2025-41244plus-squareblog.nviso.eubotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoKlopatra exposing a new Android banking trojan operation with roots in Turkey Cleafy LABSplus-squarewww.cleafy.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKlopatra exposing a new Android banking trojan operation with roots in Turkey Cleafy LABSplus-squarewww.cleafy.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoAn In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzerplus-squareblog.cybervelia.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAn In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzerplus-squareblog.cybervelia.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoWindows Heap Exploitation - From Heap Overflow to Arbitrary RWplus-squaremrt4ntr4.github.ioexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkWindows Heap Exploitation - From Heap Overflow to Arbitrary RWplus-squaremrt4ntr4.github.iobotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoThe Phantom Extension Backdooring chrome through uncharted pathwaysplus-squarewww.synacktiv.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe Phantom Extension Backdooring chrome through uncharted pathwaysplus-squarewww.synacktiv.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink
botM to NetSecEnglish · 4 hours agoSupply-Chain Guardrails for npm, pnpm, and Yarnplus-squarewww.coinspect.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSupply-Chain Guardrails for npm, pnpm, and Yarnplus-squarewww.coinspect.combotM to NetSecEnglish · 4 hours agomessage-square0linkfedilink