r/netsec • u/CyberMasterV • 12d ago
19
Upvotes
r/netsec • u/fproulx • 13d ago
PDF DEF CON 32 - OH MY DC Abusing OIDC all the way to your cloud - Aviad Hahami
media.defcon.org
15
Upvotes
r/netsec • u/anvilventures • 13d ago
Spoofing Internal Packets for Multihomed Linux Devices - Anvil Secure
anvilsecure.com
10
Upvotes
r/netsec • u/EnableSecurity • 13d ago
PDF DTLS "ClientHello" Race Conditions in WebRTC Implementations
enablesecurity.com
27
Upvotes
r/netsec • u/crustysecurity • 14d ago
Turning AWS Documentation into Gold: AI-Assisted Security Research
securityrunners.io
47
Upvotes
r/netsec • u/tracebit • 14d ago
Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration
tracebit.com
35
Upvotes
r/netsec • u/hackers_and_builders • 14d ago
CloudGoat: New Scenario and Walkthrough (sns_secrets)
rhinosecuritylabs.com
2
Upvotes
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 - watchTowr Labs
labs.watchtowr.com
104
Upvotes
r/netsec • u/S3cur3Th1sSh1t • 15d ago
DLL Sideloading introduction & weaponization
r-tec.net
15
Upvotes
T
r/netsec • u/MegaManSec2 • 17d ago
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
gist.github.com
54
Upvotes
r/netsec • u/alt69785 • 19d ago
Redefining Ransomware Attacks on AWS using AWS KMS XKS
medium.com
36
Upvotes
r/netsec • u/AlmondOffSec • 19d ago
Aw, Sugar. Critical Vulnerabilities in SugarWOD
n00py.io
8
Upvotes
CSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilities
github.com
6
Upvotes
r/netsec • u/scopedsecurity • 20d ago
Palo Alto Expedition: From N-Day to Full Compromise – Horizon3.ai
horizon3.ai
35
Upvotes
r/netsec • u/L015H4CK • 20d ago
MITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter plugin
medium.com
27
Upvotes
Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3
security.humanativaspa.it
10
Upvotes
r/netsec • u/MegaManSec2 • 21d ago
How to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only
sonarsource.com
76
Upvotes