Seclog - #140


"In the realm of cyber, victory belongs not to the swiftest click, but to the most strategic mind." - The Art of Cyber War
๐ SecMisc
Torflow Network Analysis Tool โ Torflow provides network analysis and visualization for Tor relays, offering insights into network performance and security monitoring. uncharted.software
Interim Computer Museum Digital Archive โ The Interim Computer Museum showcases historical computing devices and preservation efforts, serving as a digital archive for technology enthusiasts. icm.museum
Phrack Magazine Latest Issue โ Explore the latest issue of Phrack Magazine, a long-standing publication for security research and hacking culture. Phrack Magazine
๐ฐ SecLinks
Multi-Agent Hijacks, Ruby Deserialization, Image Scaling Attacks โ Hijacking multi-agent systems, Ruby deserialization exploits, and weaponizing image scaling against production AI systems. Read More
Marshal Madness: Ruby Deserialization History โ Brief history of Ruby deserialization exploits. Read More
Weaponizing Image Scaling โ New Trail of Bits research on production AI image scaling attacks. Read More
0-Click Account Takeover and Security Demo โ Exploitation via CaMeL. Read More
Azure Weakest Link: Cross-Tenant and API Secrets โ Misconfigurations leading to cross-tenant compromise. Read More
Azure API Connections Secrets Leak โ API connections spilling secrets. Read More
ECC.Fail Cryptography Insights โ ECC vulnerabilities & failures. Read More
MCP Security: Network-Exposed Servers Backdoors โ Cloud misconfiguration risks. Read More
Gumroad Security Report โ Findings & recommendations. Read More
Automate Cloud Security with AWS Step Functions โ Security workflows automation. Read More
Intel Outside: Hacking Every Employee โ Hacking Intel staff & internal sites. Read More
OSINT of Cuba Analysis โ Intelligence insights. Read More
Malicious PyPI and npm Packages โ Supply chain attacks. Read More
Cache Deception + CSPT Account Takeover โ Turning low-severity bugs into account takeover. Read More
Trivial C# Random Exploitation โ RNG exploitation. Read More
Zero-Day Startup Offers $20M for Smartphone Hacks โ New vulnerability market. Read More
Exploiting CodeRabbit: PR to RCE on 1M Repos โ Pull request โ RCE. Read More
Hallucinated Package Attack: Slopsquatting โ Supply chain risks. Read More
How Brands Downplay Security Breaches โ Case study: Orange. Read More
Missing Semester of AI: LLM Security โ AI vulns & best practices. Read More
Request Collapsing Demystified โ CDN security implications. Read More
DOM-Based Extension Clickjacking Risks โ Browser extension exploit. Read More
AWS IAM Privilege Escalation Techniques โ Exploiting IAM misconfigs. Read More
A Fuzzy Escape: Hypervisor Vulnerability Research โ Hypervisor exploit. Read More
AI Assisted Dev aka Vibecoding โ AI in dev workflows. Read More
Windsurf: Memory-Persistent Data Exfiltration โ SpAIware exploit. Read More
๐ฆ SecX
- XBOW Unleashes GPT-5โs Hidden Hacking Power โ GPT-5 cyber capabilities revealed. Watch Here
๐ฅ SecVideo
CSRF Exploits, Deserialization Insights, AI Fraud Detection โ Client-side path traversal, CSRF, deserialization, AI-based fraud detection. Watch Here
DEF CON 33 VPN Cloud Breach โ Cloud VPN bug exploitation. Watch Here
Deserialization: what, how and why [not] - Alexei Kojenov - AppSecUSA 2018 (YouTube) โ Additional session. Watch Here
AI & Security Demo (YouTube) โ Watch Here
๐ป SecGit
OAuth Phishing, TOCTOU Attacks, AI Security Tools โ Azure OAuth phishing, OpenAI TOCTOU, iOS privacy vulns, prompt injection. Explore
Google Security Advisory GHSA-mp56-7vrw-qxvf โ TOCTOU attack. Explore
Anthropic Claude Code Security Review โ AI code analysis tool. Explore
NineSunsInc Mighty Security โ Security tooling repo. Explore
iOS 18.5 Bluetooth Privacy Vuln โ Exploit PoC. Explore
Git Authors 0.2.0 โ Git commit authorship tracking. Explore
Trail of Bits Anamorpher โ Security visualization tool. Explore
MCP Guardian โ Cloud MCP security guardian tool. Explore
For suggestions and any feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
