Rosecurify

Seclog - #47

Friendship is an arrangement by which we undertake to exchange small favors for big ones. — Montesquieu


secmics #

sshx

The Everything App

Scapy

GPTs & Assistants API - Code Interpreter Data Exfiltration

Scaling Detection and Response Operations at Coinbase

Google’s AI Security Framework

Terraform Security Best Practices – Sysdig

Key Takeaways from the 2023 Kubernetes Security Report

Our Pwn2Own journey against time and randomness (part 1)

Atlassian Confluence Data Center and Server Authentication Bypass - CVE-2023-22515

[REL] A Journey Into Hacking Google Search Appliance

[" 31m"?! ANSI Terminal security in 2023 and finding 10 CVEs

Post-exploiting a compromised etcd – Full control over the cluster and its nodes

Hacking into Toyota’s global supplier management network

Hacking Google Bard - From Prompt Injection to Data Exfiltration · Embrace The Red

Remote Code Execution in Tutanota Desktop due to Code Flaw | Sonar

Race Conditions with pipelining

Exploiting ASP.NET TemplateParser

Adding build provenance to Homebrew | Trail of Bits Blog

Office Documents Poisoning in SHVE

Your printer is not your printer ! - Hacking Printers at Pwn2Own Part I | DEVCORE

Report #2180521 - Google Docs link in JS files allows editing & reading survey information

A Pentester’s Approach to Kubernetes Security — Part 1

PRTG Remote Code Execution - CVE-2023-32782

Introducing Advanced Vulnerability Insights for GKE

50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability Disclosures

secX #

Wiz on X: "🚨 BREAKING: Wiz Research just released a groundbreaking #Kubernetes security report. Analyzing over 200,000 cloud accounts revealed:" / X

secgit #

GitHub - xaitax/PatchaPalooza

GitHub - pwnwriter/haylxon

GitHub - projectdiscovery/nuclei-ai-extension

GitHub - vishalgarg-sec/Software-Supply-Chain-Security

GitHub - UnaPibaGeek/honeypots-detection

GitHub - nxenon/h2spacex

GitHub - redcanaryco/mac-monitor

GitHub - Enelg52/OffensiveGo

GitHub - c0dejump/HExHTTP

GitHub - doyensec/Session-Hijacking-Visual-Exploitation


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog