Seclog - #139
"A swift attack in the cyber world is unseen; its effects, devastating." - The Art of Cyber War
π SecMisc #
Searchlight Cyber Threat Intelligence Tools β Comprehensive suite for digital risk monitoring and dark web investigations. SLCyber
Monero Network 51% Attack Incident β Blockchain security compromised through majority hash-rate manipulation. Web3IsGoingGreat
Zigot Ransomware Reverse Challenge β CTF exercise focused on ransomware binary analysis and decryption techniques. VX-Zone
Wiz Emoji Security Cheat Sheets β Visual guides for cloud security concepts using custom "Wizmoji" icons. Wiz
Debian 100K Milestone Celebration β Historic project anniversary reflecting on open-source longevity. Debian
Anthropic Red Team Research Portal β AI safety testing resources and adversarial research findings. Anthropic
π° SecLinks #
Lessons from Building an AI Hacker (AIxCC) β Theori's insights from participating in DARPAβs AI Cyber Challenge. Theori
GitHub Copilot: Remote Code Execution via Prompt Injection β Demonstration of how prompt injection in GitHub Copilot could lead to RCE scenarios. EmbraceTheRed
Data Exfiltration via Image Rendering Fixed in Amp Coded β Explains a vulnerability allowing exfiltration via maliciously rendered images. EmbraceTheRed
From Support Ticket to Zero Day β Real-world exploit chain research from Horizon3.ai showcasing how simple bugs evolve into zero-days. Horizon3.ai
Cracking the Vault: HashiCorp Vault 0-days β Discovery of critical zero-day vulnerabilities in authentication and identity mechanisms of HashiCorp Vault. Cyata
Ostorlab: Signal Arbitrary File Read Vulnerability β Detailed analysis of an arbitrary file read vulnerability in Signal, discovered via mobile app testing. Ostorlab
LLM Reward Hacking Exploits β Manipulating model incentives to bypass alignment safeguards. Medium
Veeam CVEs and Bounty Disclosures β Critical vulnerabilities revealing $30K bounties in backup systems. Voorivex
Gmail Phishing Scam Analysis β Emerging credential theft campaign using deceptive forwarding rules. Malwr
Python Wheel Archive Confusion Fix β Mitigating malicious ZIP parser exploitation in installers. PyPI
LLM-Powered Patch Diffing Research β AI-assisted vulnerability discovery through commit analysis. BishopFox
Autonomous Pentesting with Hacktron β AI agent conducting full security audits without human intervention. Hacktron
FortiSIEM Pre-Auth RCE Exploit β CVE-2025-25256 exposing critical command injection flaw. WatchTowr
Demystifying Burp AI Functionality β Gain insight into How Burp AI Works through this detailed blog post. Parsiya
π¦ SecX #
Malicious Cursor AI Extension Attack β Crypto wallet drained via compromised VS Code plugin. X.com
π₯ SecVideo #
Deserialization Vulnerability Deep Dive β Exploiting insecure object serialization in web apps. YouTube
π» SecGit #
Spotter: Kubernetes Security Scanner β CEL-powered scanner for Kubernetes clusters, manifests, and CI/CD environments. GitHub
Cybersecurity Simulation Handbook β Red team tactics and adversary emulation playbooks. GitHub
Black Hat USA 2025 Presentations β Conference slides for offensive security research. GitHub
GitLab Attack Toolkit (GLATO) β Framework for auditing GitLab instance security. GitHub
CI/CD Pipeline Sentinel Scanner β Detecting misconfigurations in DevOps workflows. GitHub
Burp Suite Recursive Request Exploit β DEFCON tool for chained vulnerability exploitation. GitHub
Google's Camel Anti-Injection Framework β Prompt injection countermeasures for LLMs. GitHub
OSINT Footprint Search Tool β Cross-platform username reconnaissance across 300+ sites. GitHub
Pentest Reporting ZSH Theme β Custom terminal with integrated command logging. GitHub
AI-Driven AD Password Sprayer β Targeted credential attacks using user intelligence. GitHub
HexStrike AI Pentesting Agents β Autonomous cybersecurity tools orchestration via LLMs. GitHub
DNS Takeover Methodology Guide β Provider-specific techniques for domain reclamation. GitHub
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.