Seclog - #141


๐ SecMisc
- InfoconDB Security Information Database โ InfoconDB is a database and resource for security information and conference data. Explore
๐ฐ SecLinks
Bypassing CSP with JSONP Exploits โ Introducing JSONPeek and CSP B Gone tools to bypass Content Security Policies using JSONP endpoints, demonstrating a novel exploitation technique. Read More
Zendesk Android App Mass Account Takeover โ Details a 0-click exploit granting access to all Zendesk tickets via the Android app, a critical account takeover vulnerability. Read More
Malicious ghrc.io Domain Analysis โ Investigation reveals the ghrc.io domain appears to be malicious, posing a potential supply chain threat to developers. Read More
Apple DNG Vulnerability and Threat Detection โ Deep dive into CVE-2025-43300's DNG processing flaw and detecting the ELEGANTBOUNCER threat without samples, highlighting advanced forensic techniques. msuiche.com
AI-Powered Ransomware Proof-of-Concept Emerges โ First spotted AI-powered ransomware PoC uses automated targeting and negotiation, marking a new evolution in cyber threats. Read More
Microsoft Partner Leak Exposes Employee PII โ A leak from a Microsoft partner exposed employee PII and over 700 million partner records, a massive data exposure. Read More
Vtenext 25.02 Multiple RCE Paths โ Analysis reveals a three-way path to remote code execution in Vtenext 25.02, a critical software vulnerability. Read More
s1ngularity Supply Chain Attack on GitHub โ The s1ngularity attack leaked secrets on GitHub, a significant supply chain incident affecting numerous projects. Read More
PyPI Prevents Domain Resurrection Attacks โ The Python Package Index implements measures for preventing domain resurrection attacks, enhancing ecosystem security. Read More
RubyGems.org OSS Infrastructure Protection โ How RubyGems.org protects critical open-source infrastructure, detailing their security response and community safeguards. Read More
Hunting postMessage Vulnerabilities Guide โ First part of a guide on hunting postMessage vulnerabilities, a common client-side attack vector. Read More
How to Rob a Hotel Physical Pentest โ A story and analysis from a physical penetration test, illustrating how to rob a hotel. Read More
SANS Notes Increase in ZIP File Searches โ The SANS Internet Storm Center diaries note an increasing searches for ZIP files, a potential malware distribution trend. Read More
Claude Code WebSocket Auth Bypass โ CVE-2025-52882 details a WebSocket authentication bypass in Claude Code extensions, a critical MCP vulnerability. Read More
Anthropic Detects and Counters AI Misuse โ August 2025 update on detecting and countering misuse of AI, outlining new threats and mitigation strategies from Anthropic. Read More
Agentic Browser Indirect Prompt Injection โ Investigate Agentic Browser Security vulnerabilities, specifically indirect prompt injection in Perplexity Comet. This highlights how AI agents can be manipulated through external content. Read More
Perplexity Comet Indirect Prompt Injection โ Brave Security Labs discusses Agentic Browser Security, focusing on indirect prompt injection in Perplexity Comet. This vulnerability allows for manipulation of AI agents via embedded content. Read More
๐ฆ SecX
Chrome Logic Sandbox Escape $250k Bounty โ Bug spotlight on a Chrome Ipcz cross-process handle spoofing issue, a severe sandbox escape earning a $250,000 bounty. Watch Here
PromptLock Ransomware Uses Lua Scripts โ ESET Research details how PromptLock leverages cross-platform Lua scripts to enumerate, exfiltrate, and encrypt data on Windows, Linux, and macOS. Watch Here
Novel LLM System Prompt Insertion Jailbreak โ A novel jailbreak using prompt insertion, not injection, into the actual system prompt, making defenses nearly impossible. Watch Here
YubiKey OATH App as File Storage โ The YubiKey OATH app allows naming accounts with base64, turning it into a tiny covert file storage for red teams. Watch Here
๐ฅ SecVideo
- Hacking Google to Delete Search Results โ A video demonstrating a method for hacking Google to delete ANY search result, a significant SEO and reputation manipulation vulnerability. Watch Here
๐ป SecGit
Exotic XSS Techniques Repository โ A GitHub repository dedicated to exotic XSS techniques, a resource for advanced web application security testing. Explore on GitHub
Phishing Template Workbench on GitHub โ The phishingclub/templates repo provides a phishing template workbench for security testing and awareness simulations. Explore on GitHub
CVE-2025-57752 GitHub Advisory โ GitHub Advisory for CVE-2025-57752, detailing a specific security vulnerability and its patches. Explore on GitHub
Inline Style Exfiltration Research โ PortSwigger research on leaking data with chained CSS conditionals, a novel inline style exfiltration technique. Explore on GitHub
Phrack CTF Binary Exploitation Challenge โ The chompie1337/PhrackCTF repo contains a binary exploitation challenge from Phrack CTF. Explore on GitHub
Legba Multiprotocol Credentials Bruteforcer โ The evilsocket/legba tool is a fast multiprotocol credentials bruteforcer, password sprayer, and enumerator. Explore on GitHub
ChatGPT Dan Jailbreak Gist โ A gist containing the ChatGPT-Dan-Jailbreak, a known method for bypassing AI content restrictions. Explore on GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
