Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs #Ransomware #CyberIntrusion #ThreatActor #MalwareAnalysis #DFIRReport https://thedfirreport.com/2025/09/08/blurring-the-lines-intrusion-shows-connection-with-three-major-ransomware-gangs/
The DFIR Report
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
Key Takeaways The intrusion began when a user downloaded and executed a malicious file impersonating DeskSoft’s EarthTime application but instead dropped SectopRAT malware. The threat actor d…
You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819) #FreePBX #ZeroDay #CVE202557819 #SQLInjection #VoIPSecurity https://labs.watchtowr.com/you-already-have-our-personal-data-take-our-phone-calls-too-freepbx-cve-2025-57819/
watchTowr Labs
You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
We’re back - it’s a day, in a month, in a year - and once again, something has happened.
In this week’s episode of “the Internet is made of string and there is literally no evidence to suggest otherwise”, we present even further evidence that as a
In this week’s episode of “the Internet is made of string and there is literally no evidence to suggest otherwise”, we present even further evidence that as a
NT OS Kernel Information Disclosure Vulnerability – CVE-2025-53136 #CVE202553136 #KernelLeak #WindowsVulnerability #RaceCondition #KASLRBypass https://www.crowdfense.com/nt-os-kernel-information-disclosure-vulnerability-cve-2025-53136/
Crowdfense
NT OS Kernel Information Disclosure Vulnerability - CVE-2025-53136 - Crowdfense
Bidding farewell to one of the last kernel address leaks, CVE-2025-53136. Even patches can open new doors for exploitation.
Fine-grained HTTP filtering for Claude Code #AIAgentSecurity #HTTPFiltering #EgressControl #DevToolSecurity #NetworkIsolation https://ammar.io/blog/httpjail
ammar.io
Fine-grained HTTP filtering for Claude Code
Default‑deny HTTP(S) for dev tools and AI agents. Script rules in JS or shell, log every request, and keep egress within your policy.
Old But Gold, Dumping LSASS With Windows Error Reporting On Modern Windows 11 #LSASSDumping #WerFaultSecure #PPLBypass #Windows11 #RedTeam https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html
Zerosalarium
Old But Gold, Dumping LSASS With Windows Error Reporting On Modern Windows 11
Use the offensive tool WSASS to dump the LSASS memory area by exploiting the vulnerability in WerFaultSecure.exe
pyLDAPGui - How It was Born #pyLDAPGui #LDAPBrowser #PythonGUI #RedTeaming #ActiveDirectory https://blog.zsec.uk/pyldapgui/
ZephrSec - Adventures In Information Security
pyLDAPGui - How It was Born
Python-based LDAP browser with GUI for AD pentesting & red teaming. Cross-platform PoC tool for exporting, searching & BloodHound integration.
Building a Scanner in Go #HTTP2CONNECT #Multiplexing #PortScanning #ProxyTunneling #NetworkSecurity https://blog.flomb.net/posts/http2connect/
blog.flomb.net
Playing with HTTP/2 CONNECT
In HTTP/1, the CONNECT method instructs a proxy to establish a TCP tunnel to a requested target. Once the tunnel is up, the proxy blindly forwards raw traffic in both directions. This mechanism is most commonly used to tunnel TLS traffic through forwarding…
PureVPN IPv6 leak #PureVPN #IPv6Leak #LinuxClients #FirewallBug #VPNSecurity https://anagogistis.com/posts/purevpn-ipv6-leak/
Anagogistis
PureVPN IPv6 leak
I discovered two issues while using PureVPN’s Linux clients (GUI v2.10.0, CLI v2.0.1) on Ubuntu 24.04.3 LTS (kernel 6.8.0, iptables-nft)1. One affects IPv6 traffic, the other the system firewall.
1. IPv6 leak after reconnect After a network transition (e.g.…
1. IPv6 leak after reconnect After a network transition (e.g.…
Linux Kernel Runtime Guard (LKRG) 1.0 #LKRG #LinuxKernel #KernelSecurity #ExploitDetection #RuntimeIntegrity https://www.openwall.com/presentations/NullconBerlin2025-LKRG/
How An Authorization Flaw Reveals A Common Security Blind Spot: CVE-2025-59305 Case Study #AuthorizationFlaw #CVE202559305 #DataCorruption #DepthFirstSecurity #SecurityBlindSpot https://depthfirst.com/post/how-an-authorization-flaw-reveals-a-common-security-blind-spot-cve-2025-59305-case-study
Depthfirst
depthfirst | How An Authorization Flaw Reveals A Common Security Blind Spot: CVE-2025-59305 Case Study
We recently discovered a textbook example of this in Langfuse, a leading open-source LLM engineering platform with 16k stars on Github. A subtle flaw in its background job controls allowed any authenticated user to access highly sensitive administrative functions…
Remote Code Execution and Authentication Bypass in Materialise OrthoView (CVE-2025-23049) #OrthoView #RCE #AuthBypass #DICOMsecurity #CommandInjection https://outurnate.com/remote-code-execution-and-authentication-bypass-in-materialise-orthoview-cve-2025-23049
Outurnate
Remote Code Execution and Authentication Bypass in Materialise OrthoView (CVE-2025-23049)
Personal projects, research, and other things I find worth sharing
Hacking Furbo - A Hardware Research Project – Part 2: Mobile and P2P Exploits #FurboHacking #MobileAppSecurity #P2PExploits #SSRF #Frida https://www.softwaresecured.com/post/hacking-furbo-a-hardware-research-project-part-2-mobile-and-p2p-exploits
Softwaresecured
Hacking Furbo 2: Mobile App and P2P Exploits
We reverse the Android app, hook TUTK Kalay P2P with Frida, capture commands, find token remnants in memory, trigger SSRF to custom.wav, and show a treat-toss DoS.
IPv4/IPv6 Packet Fragmentation: Implementation Details #PacketFragmentation #IPv4IPv6 #PacketSmith #Networking #ProtocolImplementation https://packetsmith.ca/ipv4-ipv6-packet-fragmentation/
PacketSmith
IPv4/IPv6 Packet Fragmentation: Implementation Details - PacketSmith
IPv4/IPv6 Packet Fragmentation: Implementation Details Introduction In release v2.0, we’ve shipped PacketSmith with support for IPv4/IPv6 fragmentation detection and reassembly. Additionally, we’ve detailed some of the implementation details in the public…
CVE-2025-59489: Arbitrary Code Execution in Unity Runtime #UnityVulnerability #ArbitraryCodeExecution #CVE202559489 #GameSecurity #PatchNow https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/
GMO Flatt Security Research
CVE-2025-59489: Arbitrary Code Execution in Unity Runtime
Introduction
Hello, I’m RyotaK
(@ryotkak
), a security engineer at GMO Flatt Security Inc.
In May 2025, I participated in the Meta Bug Bounty Researcher Conference 2025.
During this event, I discovered a vulnerability (CVE-2025-59489) in the Unity Runtime…
Hello, I’m RyotaK
(@ryotkak
), a security engineer at GMO Flatt Security Inc.
In May 2025, I participated in the Meta Bug Bounty Researcher Conference 2025.
During this event, I discovered a vulnerability (CVE-2025-59489) in the Unity Runtime…
It's Never Simple Until It Is (Dell UnityVSA Pre-Auth Command Injection CVE-2025-36604) #DellUnityVSA #CommandInjection #CVE202536604 #PreAuth #watchTowr https://labs.watchtowr.com/its-never-simple-until-it-is-dell-unityvsa-pre-auth-command-injection-cve-2025-36604/
watchTowr Labs
It's Never Simple Until It Is (Dell UnityVSA Pre-Auth Command Injection CVE-2025-36604)
Welcome back, and what a week! We’re glad that happened for you and/or sorry that happened to you. It will get better and/or worse, and you will likely survive.
Today, we’re walking down the garden path and digging into the archives, publishing our analysis…
Today, we’re walking down the garden path and digging into the archives, publishing our analysis…
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control https://medium.com/@dhiraj_mishra/ghost-in-the-cloud-weaponizing-aws-x-ray-for-command-control-7539d60f1d77
Medium
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control
Summary & Background
LLM Code Review vs Deterministic SAST Security Tools #LLMCodeReview #SASTvsAI #IntentBasedSecurity #SecurityAutomation #FraimAI https://blog.fraim.dev/ai_eval_vs_rules/
blog.fraim.dev
LLM Code Review vs Deterministic SAST Security Tools
How do the latest models stack up against traditional code scanners?
Taking remote control over industrial generators #APISecurity #IndustrialGenerators #RemoteControl #Vulnerability #BrokenAuthorization https://eaton-works.com/2025/10/06/industrial-generator-hack/
Eaton-Works
Taking remote control over industrial generators
Industrial generator smart platform had insecure APIs that could enable remote control by anyone.
Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984) #SSH #RCE #ProxyCommand #ShellExploit #GitSubmodules https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984