Seclog - #140

RosecurifyRosecurify
3 min read

"In the realm of cyber, victory belongs not to the swiftest click, but to the most strategic mind." - The Art of Cyber War

๐Ÿ“š SecMisc

  • Torflow Network Analysis Tool โ€“ Torflow provides network analysis and visualization for Tor relays, offering insights into network performance and security monitoring. uncharted.software

  • Interim Computer Museum Digital Archive โ€“ The Interim Computer Museum showcases historical computing devices and preservation efforts, serving as a digital archive for technology enthusiasts. icm.museum

  • Phrack Magazine Latest Issue โ€“ Explore the latest issue of Phrack Magazine, a long-standing publication for security research and hacking culture. Phrack Magazine

  • Multi-Agent Hijacks, Ruby Deserialization, Image Scaling Attacks โ€“ Hijacking multi-agent systems, Ruby deserialization exploits, and weaponizing image scaling against production AI systems. Read More

  • Marshal Madness: Ruby Deserialization History โ€“ Brief history of Ruby deserialization exploits. Read More

  • Weaponizing Image Scaling โ€“ New Trail of Bits research on production AI image scaling attacks. Read More

  • 0-Click Account Takeover and Security Demo โ€“ Exploitation via CaMeL. Read More

  • Azure Weakest Link: Cross-Tenant and API Secrets โ€“ Misconfigurations leading to cross-tenant compromise. Read More

  • Azure API Connections Secrets Leak โ€“ API connections spilling secrets. Read More

  • ECC.Fail Cryptography Insights โ€“ ECC vulnerabilities & failures. Read More

  • MCP Security: Network-Exposed Servers Backdoors โ€“ Cloud misconfiguration risks. Read More

  • Gumroad Security Report โ€“ Findings & recommendations. Read More

  • Automate Cloud Security with AWS Step Functions โ€“ Security workflows automation. Read More

  • Intel Outside: Hacking Every Employee โ€“ Hacking Intel staff & internal sites. Read More

  • OSINT of Cuba Analysis โ€“ Intelligence insights. Read More

  • Malicious PyPI and npm Packages โ€“ Supply chain attacks. Read More

  • Cache Deception + CSPT Account Takeover โ€“ Turning low-severity bugs into account takeover. Read More

  • Trivial C# Random Exploitation โ€“ RNG exploitation. Read More

  • Zero-Day Startup Offers $20M for Smartphone Hacks โ€“ New vulnerability market. Read More

  • Exploiting CodeRabbit: PR to RCE on 1M Repos โ€“ Pull request โ†’ RCE. Read More

  • Hallucinated Package Attack: Slopsquatting โ€“ Supply chain risks. Read More

  • How Brands Downplay Security Breaches โ€“ Case study: Orange. Read More

  • Missing Semester of AI: LLM Security โ€“ AI vulns & best practices. Read More

  • Request Collapsing Demystified โ€“ CDN security implications. Read More

  • DOM-Based Extension Clickjacking Risks โ€“ Browser extension exploit. Read More

  • AWS IAM Privilege Escalation Techniques โ€“ Exploiting IAM misconfigs. Read More

  • A Fuzzy Escape: Hypervisor Vulnerability Research โ€“ Hypervisor exploit. Read More

  • AI Assisted Dev aka Vibecoding โ€“ AI in dev workflows. Read More

  • Windsurf: Memory-Persistent Data Exfiltration โ€“ SpAIware exploit. Read More

๐Ÿฆ SecX

  • XBOW Unleashes GPT-5โ€™s Hidden Hacking Power โ€“ GPT-5 cyber capabilities revealed. Watch Here

๐ŸŽฅ SecVideo

  • CSRF Exploits, Deserialization Insights, AI Fraud Detection โ€“ Client-side path traversal, CSRF, deserialization, AI-based fraud detection. Watch Here

  • DEF CON 33 VPN Cloud Breach โ€“ Cloud VPN bug exploitation. Watch Here

  • Deserialization: what, how and why [not] - Alexei Kojenov - AppSecUSA 2018 (YouTube) โ€“ Additional session. Watch Here

  • AI & Security Demo (YouTube) โ€“ Watch Here

๐Ÿ’ป SecGit

  • OAuth Phishing, TOCTOU Attacks, AI Security Tools โ€“ Azure OAuth phishing, OpenAI TOCTOU, iOS privacy vulns, prompt injection. Explore

  • Google Security Advisory GHSA-mp56-7vrw-qxvf โ€“ TOCTOU attack. Explore

  • Anthropic Claude Code Security Review โ€“ AI code analysis tool. Explore

  • NineSunsInc Mighty Security โ€“ Security tooling repo. Explore

  • iOS 18.5 Bluetooth Privacy Vuln โ€“ Exploit PoC. Explore

  • Git Authors 0.2.0 โ€“ Git commit authorship tracking. Explore

  • Trail of Bits Anamorpher โ€“ Security visualization tool. Explore

  • MCP Guardian โ€“ Cloud MCP security guardian tool. Explore

For suggestions and any feedback, please contact: securify@rosecurify.com

0
Subscribe to my newsletter

Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Rosecurify
Rosecurify