Rosecurify

Seclog - #43

Spotlight: KeepnetLabs's Partnership with Pentesters, The novel HTTP/2 ‘Rapid Reset’ DDoS attack, CURL (CVE-2023-38545), New PyPI Malware Campaign, ZAP 2.14.0, etc.

Partnership with Pentesters

9 Ways You’re Doing MFA All Wrong

Python 3.12.0 from a supply chain security perspective

25 Hard-Hitting Lessons from 17 Years in Cybersecurity

Yet More Unauth Remote Command Execution Vulns in Firewalls

How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack | Google Cloud Blog

curl - SOCKS5 heap buffer overflow - CVE-2023-38545

AI Engineer Summit - Building Blocks for LLM Systems & Products

Cloud Provider Credentials Targeted in New PyPI Malware Campaign

ZAP – ZAP 2.14.0

Exploiting the Looney Tunables vulnerability on HTB (CVE-2023-4911)

The sky has not yet fallen - Curl (CVE-2023-38545)

Following attackers’ (Cloud)trail in AWS: Methodology and findings in the wild | Datadog Security Labs

Enhancing Security and Developer Productivity: LinkedIn's Journey with Implementing Content Security Policy | LinkedIn Engineering

Much ado about Curl

secgits #

risinek/esp32-wifi-penetration-tool: Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.

secvideos #

Attacking Secondary Contexts in Web Applications - Sam Curry


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog