Seclog - #97
📰 SecLinks
Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More
Against /tmp - An analysis of temporary directory security considerations. Read More
Lose your device, but keep your keys - Exploring threshold signatures for key security. Read More
Bluetooth Low Energy GATT Fuzzing - Deep dive into BLE security testing. Read More
Using Nix to Fuzz Test a PDF Parser - Tutorial on implementing fuzz testing with Nix. Read More
Reconnaissance: Azure Cloud - Guide to Azure cloud reconnaissance techniques. Read More
LLM Penetration Testing Checklist - Comprehensive guide for testing LLM security. Read More
Company forced to change name that could be used to hack websites - Interesting case of security implications in company naming. Read More
🎥 SecVideo
- DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Insights on defending against deception tactics. Watch Here
💻 SecGit
vulnhuntr - Zero shot vulnerability discovery tool using LLMs. Explore on GitHub
AuthzAI - Authorization testing tool using AI. Explore on GitHub
rfhunter - Device for detecting hidden cameras in rental properties. Explore on GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by