CVE-2024-55957: Local Privilege Escalation Vulnerability in Thermo Scientific™ Xcalibur™ and Foundation software https://tierzerosecurity.co.nz/2025/02/07/cve-2024-55957.html
=> More informations about this toot | View the thread
A Missed Opportunity: Weak Password Hashing in VxWorks 6.9 and 7 https://sec-consult.com/blog/detail/a-missed-opportunity-addressing-weak-password-hashing-in-vxworks/
=> More informations about this toot | View the thread
Very new to OSINT, could someone help me find the original post about this guy? If not allowed, sorry. Thank you https://tineye.com/search/53a9ebd9d87e421e9f6a859b4db00c2560dd7b58?sort=score&order=desc&page=1
=> More informations about this toot | View the thread
How to prove false statements? (Part 2) https://blog.cryptographyengineering.com/2025/02/06/how-to-prove-false-statements-part-2/
=> More informations about this toot | View the thread
ArgFuscator.net - generate obfuscated command lines https://argfuscator.net/
=> More informations about this toot | View the thread
Get FortiRekt, I am the Super_Admin Now - FortiOS Authentication Bypass CVE-2024-55591 - watchTowr Labs https://labs.watchtowr.com/get-fortirekt-i-am-the-super_admin-now-fortios-authentication-bypass-cve-2024-55591/
=> More informations about this toot | View the thread
New way to exploit BYOVD exploits with symbolic links. https://www.zerosalarium.com/2025/01/byovd%20next%20level%20blind%20EDR%20windows%20symbolic%20link.html?m=1
=> More informations about this toot | View the thread
A Missed Opportunity: Weak Password Hashing in VxWorks 6.9 and 7 https://sec-consult.com/blog/detail/a-missed-opportunity-addressing-weak-password-hashing-in-vxworks/
=> More informations about this toot | View the thread
How to crack gmail id's password (No RANTING pls) http://gmail.com
=> More informations about this toot | View the thread
Certificate Transparency is now enforced in Firefox on desktop platforms starting with version 135 https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/OagRKpVirsA/m/Q4c89XG-EAAJ
=> More informations about this toot | View the thread
How to prove false statements? (Part 1) http://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/
=> More informations about this toot | View the thread
Replacing a Space Heater Firmware over WiFi https://blog.includesecurity.com/2025/02/replacing-a-space-heater-firmware-over-wifi/
=> More informations about this toot | View the thread
How to prove false statements? (Part 1) https://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/
=> More informations about this toot | View the thread
Now live: Our Global InfoSec Salary Index for 2025 - with full dataset in the Public Domain :) https://isecjobs.com/insights/our-global-salary-index-2025-is-now-live/
=> More informations about this toot | View the thread
Top 10 (new) web hacking techniques of 2024 https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
=> More informations about this toot | View the thread
Collabfiltrator 4.0.1 Plugin released! New SQLi DNS exfiltration capabilities available in BurpSuite. Download it from the BApp Store. https://www.adamlogue.com/collabfiltrator-4-0-1-released-with-sqli-exfiltration-support-burp-pluginupdated/
=> More informations about this toot | View the thread
8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur - watchTowr Labs https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
=> More informations about this toot | View the thread
Masquerade the Windows "Program Files" path with Unicode "En Quad" character. https://www.zerosalarium.com/2025/01/path-masquerading-hide-in-plain-sight.html?m=1
=> More informations about this toot | View the thread
Introduction to Fuzzing Android Native Components: Strategies for Harness Creation https://blog.convisoappsec.com/en/introduction-to-fuzzing-android-native-components-strategies-for-harness-creation/
=> More informations about this toot | View the thread
Ransomware Groups Exploiting Microsoft Teams https://gosecure.ai/blog/2025/01/22/ransomware-groups-exploiting-microsoft-teams/
=> More informations about this toot | View the thread
=> This profile with reblog | Go to _r_netsec@infosec.exchange account This content has been proxied by September (3851b).Proxy Information
text/gemini