Rosecurify

Seclog - #52

Speak only endearing speech, speech that is welcomed. Speech, when it brings no evil to others, is a pleasant thing. — The Buddha


secmisc #

Home | endoflife.date

The Art of Influencing - 7 Steps

Google OAuth is broken (sort of)

Solidity Security: Comprehensive list of known attack vectors and common anti-patterns

NCC Group’s 2022 & 2023 Research Report

Introducing wrapwrap: using PHP filters to wrap a file with a prefix and suffix

Analysis of CVE-2023-22518 Authentication Bypass in Confluence

Hi, My Name Is Keyboard

Get ready for 2024 with Google Cloud Security Talks | Google Cloud Blog

The Act | EU Artificial Intelligence Act

SyzGPT: When the fuzzer meets the LLM | Erin Avllazagaj

Achieving Remote Code Execution in Steam: a journey into the Remote Play protocol

Blog - Advancing iMessage security: iMessage Contact Key Verification

Silverpeas App: Multiple CVEs leading to File Read on Server - Rhino Security Labs

I scanned every package on PyPi and found 57 live AWS keys

ASSET Research Group: 5Ghoul

Apache Struts2 文件上传漏洞分析(CVE-2023-50164) - 先知社区

Cloudflare 2023 Year in Review

Malicious ChatGPT Agents: How GPTs Can Quietly Grab Your Data (Demo) · Embrace The Red

Supply Chain Attack on Ledger Connect Kit: Analyzing the Impact and Preventive Measures

One Box To Rule Them All

npm search RCE? - Escape Sequence Injection

secvideo #

Learn to Hack AWS & Kubernetes Clusters

secgit #

laiyer-ai/llm-guard

ast-grep/ast-grep

unknownhad/AWSAttacks

pruzko/hakuin

francoismichel/ssh3

dwisiswant0/cve-2023-50164-poc

ron-imperva/CVE-2023-22524


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog