Seclog - #113


"In cyber warfare, deception is the strongest firewall." - The Art of Cyber War
📚 SecMisc
PeerAuth - A decentralized peer authentication protocol that enhances security and privacy. Read More
Ransomware.live - Last ransom claims - A live tracker of recent ransomware attacks and claims. Read More
HackCurio: Decoding the Cultures of Hacking - A curated collection of hacking culture resources and insights. Read More
📰 SecLinks
Leaking the email of any YouTube user for $10,000 - A deep dive into a vulnerability that exposed YouTube user emails. Read More
Millions of Accounts Vulnerable due to Google’s OAuth Flaw - How a flaw in Google OAuth left millions of accounts at risk. Read More
Fragility of The Internet: DNS Hijacking of 1.6+ Million Domains - How sacrificial nameservers exposed millions of domains to hijacking. Read More
Saying Goodbye to my Favorite 5 Minute P1 - A researcher bids farewell to a favorite bug bounty exploit. Read More
Zero-day in Sign in with Apple - A zero-day flaw in Apple’s authentication system exposed user accounts. Read More
U.K. asks to backdoor iCloud Backup encryption - The UK government pushes for access to encrypted backups. Read More
whoAMI: A cloud image name confusion attack - A novel attack exploiting cloud image naming confusion. Read More
CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) - A critical SQL injection vulnerability in PostgreSQL. Read More
🐦 SecX
DOGE Website Hosted by Outburst Data - Investigation into the hosting and security of the DOGE website. Read More
Token Bomb Method - Encoding Data in Emojis - Exploiting Unicode variation selectors to embed data in emojis. Read More
Phrack 71 PDF Release & 40th Anniversary - Celebrating Phrack’s 40th anniversary with a new issue release. Read More
🎥 SecVideo
Hacking the 22€ BLE Smart Ring - Reverse engineering and security analysis of a budget BLE smart ring. Watch Here
cloudflare.bat - Exploring Cloudflare’s security features and potential attack vectors. Watch Here
Backdooring Local Git Repositories - Techniques for inserting stealthy backdoors in local Git repositories. Watch Here
💻 SecGit
monasticacademy/httptap - A tool for monitoring HTTP/HTTPS requests made by Linux programs. Read More
synacktiv/laravel-crypto-killer - A tool to exploit weak decryption implementations in Laravel. Read More
CRED-CLUB/DIAL - A security misconfiguration detection framework for AWS. Read More
For suggestions and feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
