Toots for _r_netsec@infosec.exchange account

Written by /r/netsec on 2025-02-07 at 02:58

CVE-2024-55957: Local Privilege Escalation Vulnerability in Thermo Scientific™ Xcalibur™ and Foundation software https://tierzerosecurity.co.nz/2025/02/07/cve-2024-55957.html

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-07 at 01:43

A Missed Opportunity: Weak Password Hashing in VxWorks 6.9 and 7 https://sec-consult.com/blog/detail/a-missed-opportunity-addressing-weak-password-hashing-in-vxworks/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-07 at 01:28

Very new to OSINT, could someone help me find the original post about this guy? If not allowed, sorry. Thank you https://tineye.com/search/53a9ebd9d87e421e9f6a859b4db00c2560dd7b58?sort=score&order=desc&page=1

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-06 at 22:58

How to prove false statements? (Part 2) https://blog.cryptographyengineering.com/2025/02/06/how-to-prove-false-statements-part-2/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-06 at 20:28

ArgFuscator.net - generate obfuscated command lines https://argfuscator.net/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-06 at 14:58

Get FortiRekt, I am the Super_Admin Now - FortiOS Authentication Bypass CVE-2024-55591 - watchTowr Labs https://labs.watchtowr.com/get-fortirekt-i-am-the-super_admin-now-fortios-authentication-bypass-cve-2024-55591/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-06 at 14:58

New way to exploit BYOVD exploits with symbolic links. https://www.zerosalarium.com/2025/01/byovd%20next%20level%20blind%20EDR%20windows%20symbolic%20link.html?m=1

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-06 at 12:58

A Missed Opportunity: Weak Password Hashing in VxWorks 6.9 and 7 https://sec-consult.com/blog/detail/a-missed-opportunity-addressing-weak-password-hashing-in-vxworks/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-06 at 12:43

How to crack gmail id's password (No RANTING pls) http://gmail.com

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-05 at 03:58

Certificate Transparency is now enforced in Firefox on desktop platforms starting with version 135 https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/OagRKpVirsA/m/Q4c89XG-EAAJ

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 22:43

How to prove false statements? (Part 1) http://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 22:13

Replacing a Space Heater Firmware over WiFi https://blog.includesecurity.com/2025/02/replacing-a-space-heater-firmware-over-wifi/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 21:58

How to prove false statements? (Part 1) https://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 16:43

Now live: Our Global InfoSec Salary Index for 2025 - with full dataset in the Public Domain :) https://isecjobs.com/insights/our-global-salary-index-2025-is-now-live/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 16:13

Top 10 (new) web hacking techniques of 2024 https://portswigger.net/research/top-10-web-hacking-techniques-of-2024

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 15:13

Collabfiltrator 4.0.1 Plugin released! New SQLi DNS exfiltration capabilities available in BurpSuite. Download it from the BApp Store. https://www.adamlogue.com/collabfiltrator-4-0-1-released-with-sqli-exfiltration-support-burp-pluginupdated/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 11:13

8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur - watchTowr Labs https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 03:13

Masquerade the Windows "Program Files" path with Unicode "En Quad" character. https://www.zerosalarium.com/2025/01/path-masquerading-hide-in-plain-sight.html?m=1

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-04 at 00:43

Introduction to Fuzzing Android Native Components: Strategies for Harness Creation https://blog.convisoappsec.com/en/introduction-to-fuzzing-android-native-components-strategies-for-harness-creation/

=> More informations about this toot | View the thread

Written by /r/netsec on 2025-02-03 at 18:58

Ransomware Groups Exploiting Microsoft Teams https://gosecure.ai/blog/2025/01/22/ransomware-groups-exploiting-microsoft-teams/

=> More informations about this toot | View the thread

=> This profile with reblog | Go to _r_netsec@infosec.exchange account

Proxy Information
Original URL
gemini://mastogem.picasoft.net/profile/109441190302147473
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
410.038186 milliseconds
Gemini-to-HTML Time
5.076529 milliseconds

This content has been proxied by September (3851b).