Seclog - #93
๐ SecMisc
Open Source Insights - A tool for analyzing open-source dependencies - Read More
sigmalite - A lightweight security analysis tool - Read More
๐ฐ SecLinks
Insecurity through Censorship - Vulnerabilities Caused by The Great Firewall - Read More
Hacking Kia: Remotely Controlling Cars With Just a License Plate - An exploration of vulnerabilities in Kia's systems - Read More
Attacking UNIX Systems via CUPS, Part I - A detailed look at exploiting CUPS vulnerabilities - Read More
Using YouTube to steal your files - An innovative exploit leveraging YouTube's platform - Read More
Default 404 Pages - A comprehensive guide to default 404 pages and their security implications - Read More
Discovering Domains via a Time-Correlation Attack on Certificate Transparency - A novel approach to domain discovery - Read More
Applying Security Engineering to Make Phishing Harder - A Case Study - Practical strategies to combat phishing - Read More
Open to Exploitation: The Security Risks of Unauthenticated Pager Networks - Exploring vulnerabilities in pager systems - Read More
Israel's Pager Attacks and Supply Chain Vulnerabilities - Analysis of recent security incidents - Read More
Google Cache Is Now Fully Dead - Implications for web archiving and SEO - Read More
Earn $200K by fuzzing for a weekend: Part 1 - A guide to profitable bug hunting - Read More
Understanding Apple's On-Device and Server Foundation Models release - Analysis of Apple's AI models - Read More
Ethena website compromised - Details of a recent crypto platform breach - Read More
Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information - Exploring vulnerabilities in AI assistants - Read More
The real slim shady || Ivanti Endpoint Manager (EPM) Pre-Auth RCE - Analysis of a critical vulnerability - Read More
๐ฆ SecX
Machine Learning Humor - A humorous take on machine learning capabilities - View Tweet
0day Market Insights - Commentary on the thriving 0day vulnerability market - View Tweet
Cloudflare's Security.txt Creator - Troy Hunt highlights a new tool for creating security.txt files - View Tweet
๐ป SecGit
nicholasaleks/Damn-Vulnerable-Drone - An intentionally vulnerable drone hacking simulator - Explore on GitHub
RickdeJager/cupshax - Tools related to the CUPS vulnerability - Explore on GitHub
tomasz-lisowski/simurai - A project focused on AI and simulation - Explore on GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by