Rosecurify

Seclog - #145

"All warfare is based on deception and cyber attribution is a shit show" - Sun Tzu, The Art of Cyber War

๐Ÿ“š SecMisc #

Essential Principles for Security Professionals โ€“ Explore fundamental Hacker Laws and principles, offering insights for cybersecurity professionals. This resource provides a succinct collection of guidelines often applied in the security domain. hacker-laws.com

Visualize Web Site and Cookie Scopes โ€“ A handy visualizer for understanding web site, origin, and cookie scopes. This interactive tool helps illustrate how different domains and paths affect cookie access and security. ukusormus.github.io

InfoSec and Hacker Memorial Site โ€“ This site serves as an InfoSec and Hacker Memorial Site, honoring individuals from the cybersecurity community. It provides a dedicated space to remember and celebrate their contributions. restincode.com

delete-from-users-where-location-iran.md โ€“ A GitHub Gist likely related to data privacy or compliance concerning user data based on geographical location. Read More

CISA Incident Response Lessons Learned โ€“ CISA Shares Lessons Learned from a recent incident response engagement, providing valuable insights. This advisory outlines key takeaways to help organizations improve their cybersecurity posture. Read More

Malicious Crates on crates.io Alert โ€“ The Rust Blog warns about malicious crates faster_log and async_println found on crates.io. Users are advised to check their dependencies and update immediately to avoid potential supply-chain attacks. Read More

Hacking Misconfigured Supabase Instances at Scale โ€“ A report detailing how thousands of misconfigured Supabase instances were exploited. This highlights the widespread risks of insecure configurations in cloud-hosted databases and the importance of proper hardening. Read More

Apache Druid SSRF Vulnerability via URL Parsing โ€“ XBOW reports CVE-2025-27888, a Server-Side Request Forgery vulnerability in Apache Druid's proxy endpoint. The flaw stems from URL parsing confusion, allowing attackers to bypass controls. Read More

Hunting SSRF Vulnerabilities in Next.js โ€“ A guide to hunting for SSRF vulnerabilities specifically in Next.js targets. This research explores common patterns and techniques to identify and exploit server-side request forgery flaws in modern web applications. Read More

Postmark Backdoor Steals Emails โ€“ Discovery of a malicious MCP in the wild, specifically a Postmark backdoor designed to steal emails. This incident underscores the ongoing threat of supply chain attacks targeting popular platforms. Read More

Apache Vulnerabilities That Don't Count โ€“ This analysis delves into Apache Vulnerabilities That Don't Count, exploring nuances in how certain flaws are assessed. It examines scenarios where issues might be overlooked or miscategorized. Read More

Hacking High-Profile Bug Bounty Targets โ€“ A deep dive into Hacking High-Profile Bug Bounty Targets through a client-side chain. This detailed write-up shares techniques and insights for chaining vulnerabilities in complex applications. Read More

Hacking Furbo: Exploiting BLE in Hardware โ€“ Part 5 of a hardware research project, detailing Hacking Furbo by exploiting Bluetooth Low Energy (BLE). This segment focuses on practical vulnerabilities found in IoT devices. Read More

NCSC CTO Summary & SIM Swapping Threat โ€“ The CTO at NCSC provides a weekly summary covering key cybersecurity events. This also includes a critical threat model on SIM Swapping and how individuals can protect themselves from this attack vector. Read More

Threat Model: SIM Swapping - A discussion on threat modeling for SIM swapping attacks and how to protect against them. Read More

Unauthenticated Access to Firebase Databases โ€“ Report on unauthenticated access to 150+ Firebase databases, storage buckets, and secrets. This highlights critical misconfigurations exposing sensitive data in numerous applications. Read More

๐ŸŽฅ SecVideo #

Covert Operations and Bot Farms: Russia/Ukraine Case Study โ€“ This video explores Covert Operations and Bot Farms in the Russia/Ukraine case study. Watch Here

Operation BlackEcho: Voice Phishing โ€“ Details on "Operation BlackEcho" describing voice phishing using fake financial and vaccine apps. Watch Here

๐Ÿ’ป SecGit #

DataDog/supply-chain-firewall โ€“ A tool for preventing the installation of malicious npm and PyPI packages. Explore on GitHub

flareprox - Use Cloudflare to create HTTP pass-through proxies for unique IP rotation. Explore on GitHub

SSH3 - Faster and rich secure shell using HTTP/3. Explore on GitHub

oauth2-proxy - A reverse proxy that provides authentication with various identity providers. Explore on GitHub

force-push-scanner - Scan for secrets in dangling commits on GitHub. Explore on GitHub

advisories/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md - An advisory regarding a dangling S3 bucket and signature verification bypass. Explore on GitHub

google-redirector - A lightweight redirector for Google Cloud Run, enabling domain fronting. Explore on GitHub

CISO Assistant Community - A one-stop-shop for GRC (Governance, Risk, and Compliance). Explore on GitHub

Git Coin Community SPAM - A GitHub discussion related to community spam. Explore on GitHub

APTs-Adversary-Simulation/Russian APT/Ember-Bear-APT - Resources on Russian APT (Advanced Persistent Threat) group Ember Bear for adversary simulation. Explore on GitHub

OmniProx - IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog