Rosecurify

Seclog - #95

Project Zero: Effective Fuzzing: A Dav1d Case Study - Exploring effective fuzzing techniques using Dav1d as a case study. Read More

Google Online Security Blog: Using Chrome's accessibility APIs to find security bugs - How Chrome's accessibility APIs can be leveraged to uncover security vulnerabilities. Read More

Internet Archive Hacked (probably) - Analysis of a potential hack on the Internet Archive. Read More

Security Awareness Month: 5 Attack Trends in 2024!- Overview of key attack trends in 2024 for Security Awareness Month. Read More

Palo Alto Expedition: From N-Day to Full Compromise - Detailed analysis of a compromise involving Palo Alto networks. Read More

~200GB Free Cloud for Your files - Guide on obtaining 200GB of free cloud storage. Read More

1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies - Revealing a significant security flaw in Zendesk affecting major companies. Read More

Bypassing noexec and executing arbitrary binaries - Technical guide on bypassing noexec restrictions. Read More

3 ways to get Remote Code Execution in Kafka UI - Exploring RCE vulnerabilities in Kafka UI. Read More

OffSec Exam HTB Lists | 0xdf hacks stuff - Useful cheat sheets for OffSec exams and Hack The Box. Read More

Why Code Security Matters - Even in Hardened Environments - The importance of code security in all environments. Read More

๐Ÿฆ SecX #

Haifei Li on X: "When the fuzzer crashed itself.." - Interesting observation about a fuzzer crashing itself. Watch Here

๐ŸŽฅ SecVideo #

REAL Ransomware Chat Logs - Analysis of actual ransomware chat logs. Watch Here

Project Zero: Ten Years of 'Make 0-Day Hard' - Reflection on a decade of Project Zero's efforts to make zero-day exploits harder. Watch Here

๐Ÿ’ป SecGit #

ring0-c0d3-br34k3r/Stuxnet-Rootkit: Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis - Repository containing extracted Stuxnet binaries and analysis of the Stuxnet rootkit. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog