Seclog - #138
"A wise warrior knows that every click is a potential weapon in the digital battlefield." - The Art of Cyber War
๐ย SecMisc #
Attacker File Extensions Database for Threat Intel โ Filesec.io provides a database of file extensions used by attackers, helping you stay up-to-date with threat intelligence. You can contribute to expand this valuable resource. Filesec.io
Red-Teaming AI Models for Vulnerabilities โ A Kaggle competition challenges participants to find previously undiscovered flaws and vulnerabilities in the gpt-oss-20b model. This aims to improve AI security through community red-teaming efforts. Kaggle
Vulnerability Vibes: Network, Learn, Connect โ Vulnerability Vibes offers an opportunity to network and make new connections within the security industry. Attendees can learn from the hackers themselves, understanding both industry trends and attacker tactics. Vulnerabilityvibes.com
๐ฐ SecLinks #
HTTP/1.1 Desynchronization Endgame โ Protocol deemed inherently insecure. Read More
AWS SAR IAM Action Nuances โ AWS Service Authorization References (SAR) and IAM action risks. Read More
AWS Account Termination Without Warning โ 10-year-old AWS account deleted without recovery. Read More
ORM Injection Crypto Theft Exploit โ Cryptocurrency theft via ORM injection in online game. Read More
CVE-2025-29891 Apache Camel RCE โ Header injection RCE via misconfiguration. Read More
Squid Proxy Critical RCE Vulnerability โ SQUID-2025:1 flaw enables remote code execution. Read More
Adobe Experience Manager Pre-Auth Flaws โ Critical vulnerabilities in AEM Forms via Struts DevMode. Read More
Jenkins RCE via Git Parameter Plugin โ CVE-2025-53652 allows unauthenticated RCE. Read More
Fastly HTTP/1.1 Attack Resilience โ Parser robustness protects against desync. Read More
1Panel Agent Certificate Bypass โ GHSA-8j63-96wh-wh3j allows arbitrary code execution. Read More
Buttercup Open-Source Release โ AI Cyber Challenge runner-up CRS open-sourced. Read More
Blind SSRF to File Reading Oracle โ Turning SSRF into a file oracle. Read More
Copilot Studio AIjacking Data Theft โ Prompt injection leads to full data exfiltration. Read More
Security Products and Human Psychology โ Security tools linked to 7 deadly sins. Read More
HashiCorp Vault Auth Flaws Exposed โ Zero-day in authentication & authorization. Read More
Safari PermissionJacking Privacy Risk โ Permission hijacking in Safari. Read More
Zscaler SAML Auth Bypass Advisory โ CVE-2025-54982 missing signature verification. Read More
Confluence Auth Bypass via XSS โ iOS-specific XSS leads to auth bypass. Read More
FileJacking Initial Access with File System API โ Experimental API allows direct file editing. Read More
Introducing AI-powered Exploit Verification and Triage โ AI to triage vulnerabilities. Read More
Cursor IDE's MCP Vulnerability Discovery โ MCP flaw in AI IDE allows local command execution. Read More
๐ฆ SecX #
Brave HTML Serialization Vulnerability โ Demo shows broken serialization. Watch Here
๐ป SecGit #
Quack PHP Deserialization Protector โ Runtime validation against PHP deserialization attacks. Explore on GitHub
Finch TLS Fingerprint-Aware Proxy โ Reverse proxy blocks/reroutes traffic using JA3/JA4 fingerprints. Explore on GitHub
Kwcmd Hidden Linux Backdoor โ Persistent access via disguised commands. Explore on GitHub
Beelzebub AI Honeypot Framework โ AI for virtualization deception environments. Explore on GitHub
Signal Key Transparency Auditor โ Audits Signal's Merkle^2-style logs. Explore on GitHub
Claude-Powered Security Code Review โ Uses Claude AI to analyze commits for vulnerabilities. Explore on GitHub
ECSpace AWS ECS Credential Theft โ IAM credential theft in EC2 launch mode. Explore on GitHub
Viper AI Red Teaming Platform โ AI-powered adversary simulation. Explore on GitHub
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.