Friendship is an arrangement by which we undertake to exchange small favors for big ones. — Montesquieu
secmics
sshx
The Everything App
Scapy
seclinks
GPTs & Assistants API - Code Interpreter Data Exfiltration
Scaling Detection and Response Operations at Coinbase
Google’s AI Security Framework
Terraform Security Best Practices – Sysdig
Key Takeaways from the 2023 Kubernetes Security Report
Our Pwn2Own journey against time and randomness (part 1)
Atlassian Confluence Data Center and Server Authentication Bypass - CVE-2023-22515
[REL] A Journey Into Hacking Google Search Appliance
[" 31m"?! ANSI Terminal security in 2023 and finding 10 CVEs
Post-exploiting a compromised etcd – Full control over the cluster and its nodes
Hacking into Toyota’s global supplier management network
Hacking Google Bard - From Prompt Injection to Data Exfiltration · Embrace The Red
Remote Code Execution in Tutanota Desktop due to Code Flaw | Sonar
Race Conditions with pipelining
Exploiting ASP.NET TemplateParser
Adding build provenance to Homebrew | Trail of Bits Blog
Office Documents Poisoning in SHVE
Your printer is not your printer ! - Hacking Printers at Pwn2Own Part I | DEVCORE
Report #2180521 - Google Docs link in JS files allows editing & reading survey information
A Pentester’s Approach to Kubernetes Security — Part 1
PRTG Remote Code Execution - CVE-2023-32782
Introducing Advanced Vulnerability Insights for GKE
50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability Disclosures
secX
Wiz on X: "🚨 BREAKING: Wiz Research just released a groundbreaking #Kubernetes security report. Analyzing over 200,000 cloud accounts revealed:" / X
secgit
GitHub - xaitax/PatchaPalooza
GitHub - pwnwriter/haylxon
GitHub - projectdiscovery/nuclei-ai-extension
GitHub - vishalgarg-sec/Software-Supply-Chain-Security
GitHub - UnaPibaGeek/honeypots-detection
GitHub - nxenon/h2spacex
GitHub - redcanaryco/mac-monitor
GitHub - Enelg52/OffensiveGo
GitHub - c0dejump/HExHTTP
GitHub - doyensec/Session-Hijacking-Visual-Exploitation
Suggestions & Feedback
Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.
For any suggestions or feedback, please contact us at:
[email protected]
Subscribe to Seclog
Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.
No spam. Only high-security insights. Unsubscribe at any time.
← Back to Seclog