Rosecurify

Seclog - #140

"In the realm of cyber, victory belongs not to the swiftest click, but to the most strategic mind." - The Art of Cyber War

๐Ÿ“š SecMisc #

Torflow Network Analysis Tool โ€“ Torflow provides network analysis and visualization for Tor relays, offering insights into network performance and security monitoring. uncharted.software

Interim Computer Museum Digital Archive โ€“ The Interim Computer Museum showcases historical computing devices and preservation efforts, serving as a digital archive for technology enthusiasts. icm.museum

Phrack Magazine Latest Issue โ€“ Explore the latest issue of Phrack Magazine, a long-standing publication for security research and hacking culture. Phrack Magazine

Multi-Agent Hijacks, Ruby Deserialization, Image Scaling Attacks โ€“ Hijacking multi-agent systems, Ruby deserialization exploits, and weaponizing image scaling against production AI systems. Read More

Marshal Madness: Ruby Deserialization History โ€“ Brief history of Ruby deserialization exploits. Read More

Weaponizing Image Scaling โ€“ New Trail of Bits research on production AI image scaling attacks. Read More

0-Click Account Takeover and Security Demo โ€“ Exploitation via CaMeL. Read More

Azure Weakest Link: Cross-Tenant and API Secrets โ€“ Misconfigurations leading to cross-tenant compromise. Read More

Azure API Connections Secrets Leak โ€“ API connections spilling secrets. Read More

ECC.Fail Cryptography Insights โ€“ ECC vulnerabilities & failures. Read More

MCP Security: Network-Exposed Servers Backdoors โ€“ Cloud misconfiguration risks. Read More

Gumroad Security Report โ€“ Findings & recommendations. Read More

Automate Cloud Security with AWS Step Functions โ€“ Security workflows automation. Read More

Intel Outside: Hacking Every Employee โ€“ Hacking Intel staff & internal sites. Read More

OSINT of Cuba Analysis โ€“ Intelligence insights. Read More

Malicious PyPI and npm Packages โ€“ Supply chain attacks. Read More

Cache Deception + CSPT Account Takeover โ€“ Turning low-severity bugs into account takeover. Read More

Trivial C# Random Exploitation โ€“ RNG exploitation. Read More

Zero-Day Startup Offers $20M for Smartphone Hacks โ€“ New vulnerability market. Read More

Exploiting CodeRabbit: PR to RCE on 1M Repos โ€“ Pull request โ†’ RCE. Read More

Hallucinated Package Attack: Slopsquatting โ€“ Supply chain risks. Read More

How Brands Downplay Security Breaches โ€“ Case study: Orange. Read More

Missing Semester of AI: LLM Security โ€“ AI vulns & best practices. Read More

Request Collapsing Demystified โ€“ CDN security implications. Read More

DOM-Based Extension Clickjacking Risks โ€“ Browser extension exploit. Read More

AWS IAM Privilege Escalation Techniques โ€“ Exploiting IAM misconfigs. Read More

A Fuzzy Escape: Hypervisor Vulnerability Research โ€“ Hypervisor exploit. Read More

AI Assisted Dev aka Vibecoding โ€“ AI in dev workflows. Read More

Windsurf: Memory-Persistent Data Exfiltration โ€“ SpAIware exploit. Read More

๐Ÿฆ SecX #

XBOW Unleashes GPT-5โ€™s Hidden Hacking Power โ€“ GPT-5 cyber capabilities revealed. Watch Here

๐ŸŽฅ SecVideo #

CSRF Exploits, Deserialization Insights, AI Fraud Detection โ€“ Client-side path traversal, CSRF, deserialization, AI-based fraud detection. Watch Here

DEF CON 33 VPN Cloud Breach โ€“ Cloud VPN bug exploitation. Watch Here

Deserialization: what, how and why [not] - Alexei Kojenov - AppSecUSA 2018 (YouTube) โ€“ Additional session. Watch Here

AI & Security Demo (YouTube) โ€“ Watch Here

๐Ÿ’ป SecGit #

OAuth Phishing, TOCTOU Attacks, AI Security Tools โ€“ Azure OAuth phishing, OpenAI TOCTOU, iOS privacy vulns, prompt injection. Explore

Google Security Advisory GHSA-mp56-7vrw-qxvf โ€“ TOCTOU attack. Explore

Anthropic Claude Code Security Review โ€“ AI code analysis tool. Explore

NineSunsInc Mighty Security โ€“ Security tooling repo. Explore

iOS 18.5 Bluetooth Privacy Vuln โ€“ Exploit PoC. Explore

Git Authors 0.2.0 โ€“ Git commit authorship tracking. Explore

Trail of Bits Anamorpher โ€“ Security visualization tool. Explore

MCP Guardian โ€“ Cloud MCP security guardian tool. Explore


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog