Seclog - #144
"A single unpatched vulnerability can bring down even the most fortified network." - The Art of Cyber War
๐ SecMisc #
Global Identity Records Data Leak โ Seven nations impacted as 252 million identity records leak online. Cybernews
Post-Quantum Cryptography Use Explored โ Adoption of PQC across sites as of September 2025. Read More
๐ฐ SecLinks #
APT28 Phantom Net Voxel Operation โ Analysis of APT28's latest campaign. Read More
Phrack Leak APT Workstation Analysis โ Examining an APT's workstation from the Phrack leak. Read More
PlayStation 5 Usermode ELF Injection โ Achieving usermode ELF injection on PS5. Read More
PQC Adoption Sites September 2025 โ Tracking PQC migration. Read More
Firebase Project Hacking Enumeration Misconfigurations โ Exploiting Firebase misconfigurations. Read More
Dangling Markup Exploit with Strict CSP โ Exploit even with strict CSP. Read More
XSS Without Parentheses and Semi-colons โ XSS tricks bypassing filters. Read More
DOM-based Extension Clickjacking Risk โ Risks to password manager data. Read More
TP-Link Tapo Camera Security Investigation โ Vulnerability in smart cameras. Read More
Apache HugeGraph Server RCE Bypass โ Two RCE vulnerabilities bypassed. Read More
Windows Docker Desktop Full Escape โ SSRF โ Docker Escape (CVE-2025-9074). Read More
AI Weaponizing New CVEs Quickly โ Can AI weaponize CVEs in 15 minutes? Read More
Microsoft Partner Leak Employee PII โ Microsoft partner & employee data exposed. Read More
Thorchain Founder Exploited for Millions โ $1.35M crypto exploit. Read More
NPM Supply Chain Worm Delivering Malware โ Shai-Hulud npm worm. Read More
๐ฅ SecVideo #
Massive NPM Self-Replicating Malware Worm โ Video breakdown of npm worm. Watch Here
Block Microsoft Tracking Techniques โ Guide to block tracking. Watch Here
๐ป SecGit #
Kyverno Security Best Practices Policies โ Kyverno policies for Kubernetes. Explore
Chrome App-Bound Encryption Decryption Tool โ Decrypt Chromium ABE data. Explore
Malicious PDF Generation with Phone-Home โ Create malicious PDFs with phone-home. Explore
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.