Seclog - #145
"All warfare is based on deception and cyber attribution is a shit show" - Sun Tzu, The Art of Cyber War
๐ SecMisc #
Essential Principles for Security Professionals โ Explore fundamental Hacker Laws and principles, offering insights for cybersecurity professionals. This resource provides a succinct collection of guidelines often applied in the security domain. hacker-laws.com
Visualize Web Site and Cookie Scopes โ A handy visualizer for understanding web site, origin, and cookie scopes. This interactive tool helps illustrate how different domains and paths affect cookie access and security. ukusormus.github.io
InfoSec and Hacker Memorial Site โ This site serves as an InfoSec and Hacker Memorial Site, honoring individuals from the cybersecurity community. It provides a dedicated space to remember and celebrate their contributions. restincode.com
๐ฐ SecLinks #
delete-from-users-where-location-iran.md โ A GitHub Gist likely related to data privacy or compliance concerning user data based on geographical location. Read More
CISA Incident Response Lessons Learned โ CISA Shares Lessons Learned from a recent incident response engagement, providing valuable insights. This advisory outlines key takeaways to help organizations improve their cybersecurity posture. Read More
Malicious Crates on crates.io Alert โ The Rust Blog warns about malicious crates
faster_logandasync_printlnfound on crates.io. Users are advised to check their dependencies and update immediately to avoid potential supply-chain attacks. Read More
Hacking Misconfigured Supabase Instances at Scale โ A report detailing how thousands of misconfigured Supabase instances were exploited. This highlights the widespread risks of insecure configurations in cloud-hosted databases and the importance of proper hardening. Read More
Apache Druid SSRF Vulnerability via URL Parsing โ XBOW reports CVE-2025-27888, a Server-Side Request Forgery vulnerability in Apache Druid's proxy endpoint. The flaw stems from URL parsing confusion, allowing attackers to bypass controls. Read More
Hunting SSRF Vulnerabilities in Next.js โ A guide to hunting for SSRF vulnerabilities specifically in Next.js targets. This research explores common patterns and techniques to identify and exploit server-side request forgery flaws in modern web applications. Read More
Postmark Backdoor Steals Emails โ Discovery of a malicious MCP in the wild, specifically a Postmark backdoor designed to steal emails. This incident underscores the ongoing threat of supply chain attacks targeting popular platforms. Read More
Apache Vulnerabilities That Don't Count โ This analysis delves into Apache Vulnerabilities That Don't Count, exploring nuances in how certain flaws are assessed. It examines scenarios where issues might be overlooked or miscategorized. Read More
Hacking High-Profile Bug Bounty Targets โ A deep dive into Hacking High-Profile Bug Bounty Targets through a client-side chain. This detailed write-up shares techniques and insights for chaining vulnerabilities in complex applications. Read More
Hacking Furbo: Exploiting BLE in Hardware โ Part 5 of a hardware research project, detailing Hacking Furbo by exploiting Bluetooth Low Energy (BLE). This segment focuses on practical vulnerabilities found in IoT devices. Read More
NCSC CTO Summary & SIM Swapping Threat โ The CTO at NCSC provides a weekly summary covering key cybersecurity events. This also includes a critical threat model on SIM Swapping and how individuals can protect themselves from this attack vector. Read More
Threat Model: SIM Swapping - A discussion on threat modeling for SIM swapping attacks and how to protect against them. Read More
Unauthenticated Access to Firebase Databases โ Report on unauthenticated access to 150+ Firebase databases, storage buckets, and secrets. This highlights critical misconfigurations exposing sensitive data in numerous applications. Read More
๐ฅ SecVideo #
Covert Operations and Bot Farms: Russia/Ukraine Case Study โ This video explores Covert Operations and Bot Farms in the Russia/Ukraine case study. Watch Here
Operation BlackEcho: Voice Phishing โ Details on "Operation BlackEcho" describing voice phishing using fake financial and vaccine apps. Watch Here
๐ป SecGit #
DataDog/supply-chain-firewall โ A tool for preventing the installation of malicious npm and PyPI packages. Explore on GitHub
flareprox - Use Cloudflare to create HTTP pass-through proxies for unique IP rotation. Explore on GitHub
SSH3 - Faster and rich secure shell using HTTP/3. Explore on GitHub
oauth2-proxy - A reverse proxy that provides authentication with various identity providers. Explore on GitHub
force-push-scanner - Scan for secrets in dangling commits on GitHub. Explore on GitHub
advisories/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md - An advisory regarding a dangling S3 bucket and signature verification bypass. Explore on GitHub
google-redirector - A lightweight redirector for Google Cloud Run, enabling domain fronting. Explore on GitHub
CISO Assistant Community - A one-stop-shop for GRC (Governance, Risk, and Compliance). Explore on GitHub
Git Coin Community SPAM - A GitHub discussion related to community spam. Explore on GitHub
APTs-Adversary-Simulation/Russian APT/Ember-Bear-APT - Resources on Russian APT (Advanced Persistent Threat) group Ember Bear for adversary simulation. Explore on GitHub
OmniProx - IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare. Explore on GitHub
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.