Rosecurify

Seclog - #144

"A single unpatched vulnerability can bring down even the most fortified network." - The Art of Cyber War

๐Ÿ“š SecMisc #

Global Identity Records Data Leak โ€“ Seven nations impacted as 252 million identity records leak online. Cybernews

Post-Quantum Cryptography Use Explored โ€“ Adoption of PQC across sites as of September 2025. Read More


APT28 Phantom Net Voxel Operation โ€“ Analysis of APT28's latest campaign. Read More

Phrack Leak APT Workstation Analysis โ€“ Examining an APT's workstation from the Phrack leak. Read More

PlayStation 5 Usermode ELF Injection โ€“ Achieving usermode ELF injection on PS5. Read More

PQC Adoption Sites September 2025 โ€“ Tracking PQC migration. Read More

Firebase Project Hacking Enumeration Misconfigurations โ€“ Exploiting Firebase misconfigurations. Read More

Dangling Markup Exploit with Strict CSP โ€“ Exploit even with strict CSP. Read More

XSS Without Parentheses and Semi-colons โ€“ XSS tricks bypassing filters. Read More

DOM-based Extension Clickjacking Risk โ€“ Risks to password manager data. Read More

TP-Link Tapo Camera Security Investigation โ€“ Vulnerability in smart cameras. Read More

Apache HugeGraph Server RCE Bypass โ€“ Two RCE vulnerabilities bypassed. Read More

Windows Docker Desktop Full Escape โ€“ SSRF โ†’ Docker Escape (CVE-2025-9074). Read More

AI Weaponizing New CVEs Quickly โ€“ Can AI weaponize CVEs in 15 minutes? Read More

Microsoft Partner Leak Employee PII โ€“ Microsoft partner & employee data exposed. Read More

Thorchain Founder Exploited for Millions โ€“ $1.35M crypto exploit. Read More

NPM Supply Chain Worm Delivering Malware โ€“ Shai-Hulud npm worm. Read More


๐ŸŽฅ SecVideo #

Massive NPM Self-Replicating Malware Worm โ€“ Video breakdown of npm worm. Watch Here

Block Microsoft Tracking Techniques โ€“ Guide to block tracking. Watch Here


๐Ÿ’ป SecGit #

Kyverno Security Best Practices Policies โ€“ Kyverno policies for Kubernetes. Explore

Chrome App-Bound Encryption Decryption Tool โ€“ Decrypt Chromium ABE data. Explore

Malicious PDF Generation with Phone-Home โ€“ Create malicious PDFs with phone-home. Explore


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog