Rosecurify

Seclog - #19

My Cloud Desktop

Tips For Securing CI/CD Pipelines

PHP filter chains: file read from error-based oracle

Parallels Desktop Toolgate Vulnerability

Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace

JMX Exploitation Revisited

[CVE-2022-44268] Arbitrary Remote Leak via ImageMagick

EJS - Server Side Prototype Pollution gadgets to RCE

How Your NFTs Could Have Been Stolen in Just One Click

Privacy Violations Shutdown OpenAI ChatGPT and Beg Investigation

A guided tour of the 2023 Threat Detection Report

C4 Audit Report - The Graph

C4 Audit Report - Trader Joe v2

Harvesting Logs for Fun and Profit

Attack Surface Management

Practical Introduction to BLE GATT Reverse Engineering: Hacking the Domyos EL500

Telegram & Discord Security Best Practices

OpenAI (ChatGPT) Vulnerability Remediation Concept Work

sectweet #

GitHub Says: "Security tip of the day: fuzz your code."

"holy FUCK. Windows Snipping Tool is vulnerable to Acropalypse tool"

secvideo #

Client-side path traversal vulnerability class explained - $6,580 GitLab bug bounty

secgit #

Zeus-Labs/ZeusCloud

netsecurity-as/recon365

archanchoudhury/SOC-OpenSource

BishopFox/Imperva_gzip_WAF_Bypass


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog