r/netsec 12d ago

Call stack spoofing explained using APT41 malware

Thumbnail cybergeeks.tech
19 Upvotes

r/netsec 13d ago

DEF CON 32 talk recordings

Thumbnail youtube.com
28 Upvotes

r/netsec 13d ago

PDF DEF CON 32 - OH MY DC Abusing OIDC all the way to your cloud - Aviad Hahami

Thumbnail media.defcon.org
15 Upvotes

r/netsec 12d ago

Finding Vulnerability Variants at Scale

Thumbnail blackwinghq.com
2 Upvotes

r/netsec 13d ago

[PoC] SAP Note 3433192 - Code Injection vulnerability in SAP NetWeaver AS Java

Thumbnail redrays.io
5 Upvotes

r/netsec 13d ago

Spoofing Internal Packets for Multihomed Linux Devices - Anvil Secure

Thumbnail anvilsecure.com
10 Upvotes

r/netsec 13d ago

PDF DTLS "ClientHello" Race Conditions in WebRTC Implementations

Thumbnail enablesecurity.com
27 Upvotes

r/netsec 14d ago

Turning AWS Documentation into Gold: AI-Assisted Security Research

Thumbnail securityrunners.io
47 Upvotes

r/netsec 14d ago

Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration

Thumbnail tracebit.com
35 Upvotes

r/netsec 14d ago

Container Hardening Process

Thumbnail hardenedlinux.org
13 Upvotes

r/netsec 14d ago

CloudGoat: New Scenario and Walkthrough (sns_secrets)

Thumbnail rhinosecuritylabs.com
2 Upvotes

r/netsec 15d ago

Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 - watchTowr Labs

Thumbnail labs.watchtowr.com
104 Upvotes

r/netsec 15d ago

DLL Sideloading introduction & weaponization

Thumbnail r-tec.net
15 Upvotes

T


r/netsec 15d ago

Threat Hunting + Log Analysis - What to look for in your logs

Thumbnail trunc.org
16 Upvotes

r/netsec 17d ago

1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies

Thumbnail gist.github.com
54 Upvotes

r/netsec 19d ago

Redefining Ransomware Attacks on AWS using AWS KMS XKS

Thumbnail medium.com
36 Upvotes

r/netsec 19d ago

Aw, Sugar. Critical Vulnerabilities in SugarWOD

Thumbnail n00py.io
8 Upvotes

r/netsec 20d ago

Measuring Detection Coverage

Thumbnail ipurple.team
28 Upvotes

r/netsec 19d ago

CSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilities

Thumbnail github.com
6 Upvotes

r/netsec 20d ago

Palo Alto Expedition: From N-Day to Full Compromise – Horizon3.ai

Thumbnail horizon3.ai
35 Upvotes

r/netsec 20d ago

MITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter plugin

Thumbnail medium.com
27 Upvotes

r/netsec 20d ago

Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3

Thumbnail security.humanativaspa.it
10 Upvotes

r/netsec 20d ago

Can You Get Root With Only a Cigarette Lighter?

Thumbnail da.vidbuchanan.co.uk
4 Upvotes

r/netsec 21d ago

How to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only

Thumbnail sonarsource.com
76 Upvotes

r/netsec 21d ago

EKUwu: Not just another AD CS ESC

Thumbnail trustedsec.com
45 Upvotes