bOt@zerobytes.monsterM · 10 hours agoTwo Google employees installed malware on their colleague's computerplus-squareyesatgoogle.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTwo Google employees installed malware on their colleague's computerplus-squareyesatgoogle.combOt@zerobytes.monsterM · 10 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 10 hours agoUnsafe at Any Speed: Abusing Python Exec for Unauth RCE in Langflow AIplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnsafe at Any Speed: Abusing Python Exec for Unauth RCE in Langflow AIplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 10 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 10 hours agoOne Bug Wasn’t Enough: Escalating Twice Through SAP’s Setuid Landscapeplus-squarewww.anvilsecure.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOne Bug Wasn’t Enough: Escalating Twice Through SAP’s Setuid Landscapeplus-squarewww.anvilsecure.combOt@zerobytes.monsterM · 10 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 10 hours agoVibeScamming — From Prompt to Phish: Benchmarking Popular AI Agents’ Resistance to the Dark Sideplus-squarelabs.guard.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVibeScamming — From Prompt to Phish: Benchmarking Popular AI Agents’ Resistance to the Dark Sideplus-squarelabs.guard.iobOt@zerobytes.monsterM · 10 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 10 hours agoMalware hiding in plain sight: Spying on North Korean Hackersplus-squarewww.aikido.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalware hiding in plain sight: Spying on North Korean Hackersplus-squarewww.aikido.devbOt@zerobytes.monsterM · 10 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 19 hours agoOpenSSL prepares for a quantum future with 3.5.0 releaseplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpenSSL prepares for a quantum future with 3.5.0 releaseplus-squarewww.helpnetsecurity.combOt@zerobytes.monsterM · 19 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 19 hours agoHardening the Firefox Frontend with Content Security Policiesplus-squareattackanddefense.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHardening the Firefox Frontend with Content Security Policiesplus-squareattackanddefense.devbOt@zerobytes.monsterM · 19 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 19 hours agoWindows Defender antivirus bypass in 2025plus-squarewww.hackmosphere.frexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows Defender antivirus bypass in 2025plus-squarewww.hackmosphere.frbOt@zerobytes.monsterM · 19 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 19 hours agoThe Evolution of HTTPS Adoption in Firefoxplus-squareattackanddefense.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Evolution of HTTPS Adoption in Firefoxplus-squareattackanddefense.devbOt@zerobytes.monsterM · 19 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoPath Traversal Vulnerability in AWS SSM Agent's Plugin ID Validationplus-squarecymulate.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPath Traversal Vulnerability in AWS SSM Agent's Plugin ID Validationplus-squarecymulate.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoIn- Person CTFplus-squarewww.eventbrite.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIn- Person CTFplus-squarewww.eventbrite.co.ukbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoSQL injections in MachForm v24 allow authenticated backend users to access unauthorized form entries and perform privescplus-squarewww.dsecbypass.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSQL injections in MachForm v24 allow authenticated backend users to access unauthorized form entries and perform privescplus-squarewww.dsecbypass.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoShopware Unfixed SQL Injection in Security Plugin 6plus-squarewww.redteam-pentesting.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkShopware Unfixed SQL Injection in Security Plugin 6plus-squarewww.redteam-pentesting.debOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoDependency Injection for Artificial Intelligence (DI4AI)plus-squaregideonite.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDependency Injection for Artificial Intelligence (DI4AI)plus-squaregideonite.infobOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days ago[CVE-2025-32101] UNA CMS <= 14.0.0-RC4 PHP Object Injectionplus-squarekarmainsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link[CVE-2025-32101] UNA CMS <= 14.0.0-RC4 PHP Object Injectionplus-squarekarmainsecurity.combOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoNew attack vector on AI toolchains: Tool Poisoning in MCPs (Machine Code Models)plus-squareinvariantlabs.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew attack vector on AI toolchains: Tool Poisoning in MCPs (Machine Code Models)plus-squareinvariantlabs.aibOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoServiceRadar 1.0.28 - Open Source Network Monitoring and Observabilityplus-squareserviceradar.cloudexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkServiceRadar 1.0.28 - Open Source Network Monitoring and Observabilityplus-squareserviceradar.cloudbOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 months agoKerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Part 2 : AS REP Roastingplus-squarewww.intrinsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Part 2 : AS REP Roastingplus-squarewww.intrinsec.combOt@zerobytes.monsterM · 8 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 months agoCTI Researchplus-squarewarwickwmg.eu.qualtrics.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCTI Researchplus-squarewarwickwmg.eu.qualtrics.combOt@zerobytes.monsterM · 8 months agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 months agoWhy You Should Treat Large Language Models as Potential Attackersplus-squarewww.cyberark.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhy You Should Treat Large Language Models as Potential Attackersplus-squarewww.cyberark.combOt@zerobytes.monsterM · 8 months agomessage-square0fedilink