Rosecurify

Seclog - #65

We can change our lives. We can do, have, and be exactly what we wish. — Tony Robbins

📚 SecMisc

Timelock Encryption: Send a secret into the future - Encrypt messages to be opened only after a set period. Read More

findsecuritycontacts.com - top sites - Find security contacts for top websites. Read More

ZafiyetAI | Yapay Zeka Güvenlik Atlası | Anasayfa - AI security insights and research in Turkish. Read More

📰 SecLinks

Tool of First Resort: Israel-Hamas War in Cyber - Dynamics of cyber warfare between Israel and Hamas. Read More

Manipulating LLMs – How to confuse ChatGPT – Compass Security Blog - Techniques to challenge and confuse ChatGPT. Read More

I figured out how DMARC works, and it almost broke me | Simon Andrews - Deep dive into setting up SPF, DKIM, DMARC for email security. Read More

Product security: barking up the wrong tree - Critical perspective on current product security practices. Read More

Insecurity and Python pickles [LWN.net] - Security vulnerabilities in Python's pickle module. Read More

2024 OSSRA Report - Insights from the Open Source Security and Risk Analysis Report. Read More

Reverse engineering a car key fob signal (Part 1) · 0x44.cc - Process and techniques of reverse engineering car key fob signals. Read More

How to find the AWS Account ID of any S3 Bucket - Identifying the AWS Account ID for any S3 bucket. Read More

Hiding in plain sight: Introducing WebTunnel | The Tor Project - Evading censorship with WebTunnel by the Tor Project. Read More

Devin, the first AI software engineer - Discussing the development and capabilities of Devin, an AI software engineer. Read More

Remote code execution in a billion-dollar publicly traded company · tedmdelacruz - Analysis of a remote code execution vulnerability. Read More

Picus-The-Complete-Active-Directory-Security-Handbook.v1 - Guide to securing Active Directory environments. Read More

What a Cluster: Local Volumes Vulnerability in Kubernetes | Akamai - Command injection vulnerability in Kubernetes. Read More

HackerOne | Report #2040756 - Vulnerability in Pentest Opportunity status alteration. Read More

Salt Labs research finds security flaws within ChatGPT Ecosystem (Remediated) Security flaws in the ChatGPT ecosystem. Read More

How I Exposed Instagram's Private Posts by Blocking Users · Cyber Security & Software Development - Exploiting a vulnerability on Instagram. Read More

Building an AITM attack tool in Cloudflare Workers (174 LOC) – Zolder B.V. - Building an attack tool using Cloudflare Workers. Read More

Security.txt in the wild – Gonçalo Valério - Analysis of the adoption and implementation of security.txt. Read More

🐦 SecTweet

Joseph Cox on X - New from 404 Media: Issue with safe lock manufacturers having backdoor codes. View Tweet

🎥 SecVideo

Fuzz Everything, Everywhere, All at Once - media.ccc.de - Insights into the applications of fuzzing in security. Watch Here

eBPF: Unlocking the Kernel [OFFICIAL DOCUMENTARY] - YouTube - Exploring eBPF technology in the Linux kernel. Watch Here

💻 SecGit

WRFan/jailbreak10.3.3 - Downgrading, jailbreaking, and setting up iOS 10.3.3 on an iPhone 5s. Explore on GitHub

anasfik/flutter-spy - Analyze and extract data from reverse-engineered Flutter apps. Explore on GitHub

gchq/CyberChef - A web app for encryption, encoding, compression, and data analysis. Explore on GitHub

BishopFox/llm-testing-findings - Templates for testing large language models (LLMs). Explore on GitHub

h4x0r-dz/CVE-2024-21762 - An out-of-bounds write vulnerability in Fortinet FortiOS. Explore on GitHub

piaolin/DetectDee - A tool to find social media accounts by username, email, or phone. Explore on GitHub

c2links/NoWhere2Hide - A project related to online privacy and security. Explore on GitHub


I've now added all your links to the template. If you need any further adjustments, please let me know!


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog