Seclog - #149
"Guard your data as you would a fortress; for once breached, all defenses crumble." - The Art of Cyber War
π SecMisc #
CTFtime Points Calculation Tool β The CTFtime Points Calculator is a utility designed to help participants determine their scores and standings in Capture The Flag competitions. It provides a convenient way to track progress. ctfpoints-calculator.me
Detective Wiki: Cyber Security Resources β The Detective Wiki serves as a comprehensive resource for cybersecurity information, tools, and methodologies. It aims to assist security professionals and enthusiasts in their investigations. detective.wiki
π° SecLinks #
Progress Telerik UI Unsafe Reflection β A detailed analysis of Progress Telerik UI for ASP.NET AJAX Unsafe Reflection (CVE-2025-3600) reveals vulnerabilities extending beyond typical DoS attacks. This research explores critical implications. Read More
LLM Poisoning: Transformer's Thoughts β This first part of a series explores LLM Poisoning, focusing on methods for "reading the Transformer's thoughts." It delves into initial techniques for understanding and manipulating large language models. Read More
Agentic AI Red Teaming Playbook β A comprehensive Agentic AI Red Teaming Playbook is presented, offering strategies and methodologies for effectively testing and securing AI agents against adversarial attacks. Read More
WSUS Unauthenticated RCE Vulnerability β HawkTrace details CVE-2025-59287, an unauthenticated RCE vulnerability impacting WSUS. The report provides technical insights into the exploit and potential mitigation strategies. Read More
Cisco Talos Intelligence Report β Cisco Talos Intelligence Group releases TALOS-2025-2243, a comprehensive threat intelligence report detailing a specific vulnerability. This advisory provides critical security information. Read More
Microsoft Copilot Data Exfiltration β Adam Logue details how Microsoft 365 Copilot could be vulnerable to arbitrary data exfiltration through Mermaid diagrams. The issue has since been fixed, highlighting critical AI security concerns. Read More
Stealing Microsoft Teams Access Tokens β This article explores methods for stealing Microsoft Teams access tokens in 2025, detailing current attack vectors and implications. It provides insights into the persistent challenges of securing collaboration platforms. Read More
Unseeable Prompt Injections in AI Browsers β Brave's research uncovers unseeable prompt injections via screenshots, revealing more vulnerabilities in Comet and other AI browsers. This highlights new adversarial methods targeting AI-driven interfaces. Read More
Prompt Injection to AI Agents RCE β Trail of Bits details how prompt injection can escalate to Remote Code Execution (RCE) in AI agents. This analysis demonstrates a critical attack vector against intelligent systems. Read More
Pwn2Own Ireland 2025 Results β The Zero Day Initiative reports on the Pwn2Own Ireland 2025 event, covering results from Day One, Day Two, and Day Three, culminating in the crowning of the Master of Pwn. This provides a comprehensive overview of successful exploits. Read More
Hacking Formula 1: FIA PII Access β A report on hacking Formula 1 reveals vulnerabilities in FIA systems allowing access to Max Verstappen's passport and PII. This highlights critical data breaches in high-profile organizations. Read More
Chromium DevTools XSS Vulnerabilities β A Chromium security issue (402791076) details how DevTools XSS vulnerabilities can lead to sandbox escape, UXSS, and CDP access. This impacts browser security significantly. Read More
LLM Poisoning with Small Samples β Anthropic research demonstrates that even a small number of samples can poison LLMs of any size. This study underscores the fragility of large language models to data manipulation. Read More
Burp Suite Extension for gRPC-Web β Compass Security introduces bRPC-Web, a new Burp Suite extension specifically designed for testing gRPC-Web applications. This tool enhances the capabilities of security professionals for API analysis. Read More
π¦ SecX #
AI Browser Jailbreak Alert β An AI browser jailbreak alert on X reveals a successful "LSD jailbreak" against GPT-5, resulting in an "Atlas-Browser" liberation. This highlights significant vulnerabilities in new AI browsers. Watch Here
π₯ SecVideo #
Automating Network Exploits with NetExec β Dale Hobbs presents on automating network exploits using NetExec. This video provides insights and techniques for enhancing exploit capabilities. Watch Here
π» SecGit #
Caddy C2 Profile Request Filter β Caddy v2 module for filtering requests based on C2 profiles, enhancing detection evasion capabilities. Explore on GitHub
Enhanced Captcha Killer for Burp β Modified captcha-killer supporting base64 image recognition and free OCR libraries for verification codeηη ΄. Explore on GitHub
MCP Server Vulnerability Scanner β Scanner for Model Context Protocol servers identifying vulnerabilities in AI infrastructure components. Explore on GitHub
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at: [email protected]Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.