Rosecurify

Seclog - #148

"Great results can be achieved by small teams focused on the correct actions" - The Art of Cyber War

๐Ÿ“š SecMisc #

KDE End-of-Year Fundraiser Celebration โ€“ KDE celebrates its birthday with a year-end fundraiser campaign, highlighting community support for the open-source project. KDE

Go's Traversal-Resistant File APIs โ€“ The Go programming language introduces new traversal-resistant file APIs to enhance security by mitigating directory traversal vulnerabilities. Go

Introducing DASVS: Desktop Application Security Standard โ€“ AFINE has introduced the Desktop Application Security Standard (DASVS). This new standard provides comprehensive guidelines for digitally securing desktop applications. afine.com

LOOBins Security Tool Resource โ€“ LOOBins provides information on living-off-the-land binaries and scripts for security testing and red teaming. Read More

Apple Security Bounty Program Evolution โ€“ Apple announces a major evolution of its Security Bounty program, offering top awards for the most advanced research. Read More

Checkmk Path Traversal Vulnerability Disclosed โ€“ A full disclosure advisory details CVE-2025-39664, a path traversal vulnerability in Checkmk. This security flaw, identified as SBA-ADV-20250730-01, poses a risk of unauthorized access. Read More

Critical Adobe Experience Manager Bugs โ€“ Assetnote security research details finding critical vulnerabilities in Adobe Experience Manager, emphasizing common pitfalls. Read More

Hacking ClubWPT Gold Back Office โ€“ Sam Curry exposes vulnerabilities in the World Poker Tour's ClubWPT Gold back office system, revealing security flaws. Read More

Frida 17.4.0 Release Announcement โ€“ Frida 17.4.0 released with new features and improvements for dynamic instrumentation on various platforms. Read More

PolarEdge Backdoor Analysis for QNAP โ€“ Analysis of the PolarEdge backdoor used in QNAP devices, referencing CVE-2023-20118 and its capabilities. Read More

Bypassing WAFs with Oversized Requests โ€“ This article explores techniques for bypassing WAFs (Web Application Firewalls) by utilizing oversized requests. It delves into both application and cloud-based attack vectors. Read More

Zscaler Advisory on F5 Security Incident โ€“ Zscaler provides an advisory on the recent F5 security incident, offering recommendations and details. Read More

WatchGuard Fireware OS IKEv2 Out-of-Bounds Write โ€“ WatchTowr Labs discloses "yIKEs," an IKEv2 Out-of-Bounds Write vulnerability (CVE-2025-9242) affecting WatchGuard Fireware OS. The advisory provides technical details and impact analysis. Read More

SF2 Framework Security Testing Tool โ€“ SF2 framework provides tools for security testing and analysis, aiding in vulnerability assessment. Read More

Spring Cloud Gateway SPEL Vulnerability โ€“ CVE-2025-41243 in Spring Cloud Gateway involves complicated evaluation context leading to security issues. Read More

How Indonesia Broke Kotlin โ€“ Analysis of how Indonesia's regulations impacted Kotlin programming language usage and security implications. Read More

File Creation via SQLite Injection โ€“ Exploitation technique for creating files through SQLite injection vulnerabilities, demonstrating code execution risks. Read More

Pixnapping Attack on Digital Images โ€“ Pixnapping attack exploits vulnerabilities in digital image processing, affecting integrity and security. Read More

CrowdStrike Blocks Git Vulnerability โ€“ CrowdStrike Falcon prevents exploitation of CVE-2025-48384 in Git, highlighting endpoint protection efficacy. Read More

Email Bombs Target Zendesk Authentication โ€“ Email bombs exploit lax authentication in Zendesk support platform, causing service disruption. Read More

WireTap Attack on Server SGX โ€“ WireTap breaks server SGX security via DRAM bus interposition, compromising confidential computing. Read More

Nearly Hacked by Fake Job Interview โ€“ Personal account of almost being hacked through a fraudulent job interview process, emphasizing social engineering risks. Read More

F5 Security Incident Details โ€“ F5 provides details on a recent security incident affecting their systems and response measures. Read More

Hacking Nokia Beacon Router with UART โ€“ Exploiting UART, command injection, and password generation on Nokia Beacon 1 router using Qiling framework. Read More

Strapi Software Vulnerability Advisory โ€“ CERT PL discloses CVE-2025-3930, a vulnerability in Strapi software, urging updates. Read More

GitHub Copilot Vulnerability Leaks Code โ€“ CamoLeak critical vulnerability in GitHub Copilot exposes private source code, raising data security concerns. Read More

Pwning Nix Ecosystem via Actions โ€“ Abuse of Nixpkgs actions leads to compromising the entire Nix ecosystem, highlighting supply chain risks. Read More

Redis CVSS 10.0 Vulnerability Response โ€“ CVE-2025-49844 in Redis with CVSS 10.0 and how the community responded to mitigate risks. Read More

Botnet Coordinated RDP Attacks on US โ€“ 100,000+ IP botnet launches coordinated RDP attack wave against US infrastructure, emphasizing threat landscape. Read More

Diffing 7-Zip for CVE-2025-11001 โ€“ Technical analysis through diffing to find CVE-2025-11001 in 7-Zip software, revealing patching methods. Read More

๐Ÿฆ SecX #

Frida 17.4 with Simmy for Simulators โ€“ Frida 17.4 introduces Simmy, a new backend for Apple's Simulators on macOS. This allows users to spawn, attach, and instrument apps on simulators just like on a real device. Watch Here

Conti Target Alexey Kurashov Identified โ€“ GangExposed RU identifies Alexey Kurashov (BLOODRUSH) as a TARGET (CONTI) member, offering a $10M reward. Stylometry, travel, and chat data confirm his link to the CONTI core. Watch Here

FuzzingLabs Accuses GeckoSec of CVE Theft โ€“ FuzzingLabs publicly accuses GeckoSec of stealing two CVEs found on Ollama and Gradio. They claim GeckoSec copied PoCs, claimed CVE IDs, and back-dated blog posts. Watch Here

US Court Bans NSO from Hacking WhatsApp โ€“ John Scott-Railton reports that a US court permanently bans Pegasus spyware maker NSO Group from hacking WhatsApp. NSO must delete exploits, a significant blow to the company and a win for WhatsApp. Watch Here

X Post by Koryodynasty โ€“ An X post by koryodynasty is linked. Further details require viewing the post directly. Watch Here

๐ŸŽฅ SecVideo #

Mobile Networks: Old Bugs Never Die? โ€“ Dr. Altaf Shaik discusses "Unveiling the Ghosts of Mobile Networks," exploring how old bugs persist. This talk questions when these vulnerabilities will finally die out in mobile network infrastructures. Watch Here

Episode 8: Mohammed Bagha "MB" โ€“ This YouTube video features Episode 8 of a series, focusing on Mohammed Bagha, also known as "MB." Viewers can watch the full discussion or interview here. Watch Here

OWASP GenAI Security Project Insights โ€“ Steve Wilson discusses "Inside the OWASP GenAI Security Project" in ASW #352. This video provides valuable insights into securing generative AI applications. Watch Here

๐Ÿ’ป SecGit #

Lenovo Driver PoC for System Shell โ€“ This GitHub repository contains a PoC for popping a system shell against the LnvMSRIO.sys driver. It demonstrates a vulnerability (CVE-2025-8061) affecting Lenovo systems. Explore on GitHub

JADX Plugin for MCP Server Integration โ€“ This GitHub project introduces a plugin for JADX to integrate with an MCP server. It aims to enhance JADX functionality by connecting to the MCP server. Explore on GitHub

SockTail GitHub Repository โ€“ The SockTail GitHub repository by Yeeb1 is available, with its readme file highlighted. It provides insights into the project's purpose and functionality. Explore on GitHub

Archive of 0day.today Exploits โ€“ This GitHub repository, 0day.today.archive, by vulncheck-oss, serves as an archive of exploits previously found on 0day.today. It provides a historical collection of known vulnerabilities. Explore on GitHub

Vulnerability Scoring Systems Repository โ€“ This GitHub repository, vulnerability-scoring-systems by patrickmgarrity, compiles information and resources on various methods for scoring vulnerabilities. It serves as a comprehensive reference. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog