Rosecurify

Seclog - #138

"A wise warrior knows that every click is a potential weapon in the digital battlefield." - The Art of Cyber War

๐Ÿ“šย SecMisc #

Attacker File Extensions Database for Threat Intel โ€“ Filesec.io provides a database of file extensions used by attackers, helping you stay up-to-date with threat intelligence. You can contribute to expand this valuable resource. Filesec.io

Red-Teaming AI Models for Vulnerabilities โ€“ A Kaggle competition challenges participants to find previously undiscovered flaws and vulnerabilities in the gpt-oss-20b model. This aims to improve AI security through community red-teaming efforts. Kaggle

Vulnerability Vibes: Network, Learn, Connect โ€“ Vulnerability Vibes offers an opportunity to network and make new connections within the security industry. Attendees can learn from the hackers themselves, understanding both industry trends and attacker tactics. Vulnerabilityvibes.com

HTTP/1.1 Desynchronization Endgame โ€“ Protocol deemed inherently insecure. Read More

AWS SAR IAM Action Nuances โ€“ AWS Service Authorization References (SAR) and IAM action risks. Read More

AWS Account Termination Without Warning โ€“ 10-year-old AWS account deleted without recovery. Read More

ORM Injection Crypto Theft Exploit โ€“ Cryptocurrency theft via ORM injection in online game. Read More

CVE-2025-29891 Apache Camel RCE โ€“ Header injection RCE via misconfiguration. Read More

Squid Proxy Critical RCE Vulnerability โ€“ SQUID-2025:1 flaw enables remote code execution. Read More

Adobe Experience Manager Pre-Auth Flaws โ€“ Critical vulnerabilities in AEM Forms via Struts DevMode. Read More

Jenkins RCE via Git Parameter Plugin โ€“ CVE-2025-53652 allows unauthenticated RCE. Read More

Fastly HTTP/1.1 Attack Resilience โ€“ Parser robustness protects against desync. Read More

1Panel Agent Certificate Bypass โ€“ GHSA-8j63-96wh-wh3j allows arbitrary code execution. Read More

Buttercup Open-Source Release โ€“ AI Cyber Challenge runner-up CRS open-sourced. Read More

Blind SSRF to File Reading Oracle โ€“ Turning SSRF into a file oracle. Read More

Copilot Studio AIjacking Data Theft โ€“ Prompt injection leads to full data exfiltration. Read More

Security Products and Human Psychology โ€“ Security tools linked to 7 deadly sins. Read More

HashiCorp Vault Auth Flaws Exposed โ€“ Zero-day in authentication & authorization. Read More

Safari PermissionJacking Privacy Risk โ€“ Permission hijacking in Safari. Read More

Zscaler SAML Auth Bypass Advisory โ€“ CVE-2025-54982 missing signature verification. Read More

Confluence Auth Bypass via XSS โ€“ iOS-specific XSS leads to auth bypass. Read More

FileJacking Initial Access with File System API โ€“ Experimental API allows direct file editing. Read More

Introducing AI-powered Exploit Verification and Triage โ€“ AI to triage vulnerabilities. Read More

Cursor IDE's MCP Vulnerability Discovery โ€“ MCP flaw in AI IDE allows local command execution. Read More

๐Ÿฆ SecX #

Brave HTML Serialization Vulnerability โ€“ Demo shows broken serialization. Watch Here

๐Ÿ’ป SecGit #

Quack PHP Deserialization Protector โ€“ Runtime validation against PHP deserialization attacks. Explore on GitHub

Finch TLS Fingerprint-Aware Proxy โ€“ Reverse proxy blocks/reroutes traffic using JA3/JA4 fingerprints. Explore on GitHub

Kwcmd Hidden Linux Backdoor โ€“ Persistent access via disguised commands. Explore on GitHub

Beelzebub AI Honeypot Framework โ€“ AI for virtualization deception environments. Explore on GitHub

Signal Key Transparency Auditor โ€“ Audits Signal's Merkle^2-style logs. Explore on GitHub

Claude-Powered Security Code Review โ€“ Uses Claude AI to analyze commits for vulnerabilities. Explore on GitHub

ECSpace AWS ECS Credential Theft โ€“ IAM credential theft in EC2 launch mode. Explore on GitHub

Viper AI Red Teaming Platform โ€“ AI-powered adversary simulation. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog