Rosecurify

Seclog - #141

๐Ÿ“š SecMisc #

InfoconDB Security Information Database โ€“ InfoconDB is a database and resource for security information and conference data. Explore

Bypassing CSP with JSONP Exploits โ€“ Introducing JSONPeek and CSP B Gone tools to bypass Content Security Policies using JSONP endpoints, demonstrating a novel exploitation technique. Read More

Zendesk Android App Mass Account Takeover โ€“ Details a 0-click exploit granting access to all Zendesk tickets via the Android app, a critical account takeover vulnerability. Read More

Malicious ghrc.io Domain Analysis โ€“ Investigation reveals the ghrc.io domain appears to be malicious, posing a potential supply chain threat to developers. Read More

Apple DNG Vulnerability and Threat Detection โ€“ Deep dive into CVE-2025-43300's DNG processing flaw and detecting the ELEGANTBOUNCER threat without samples, highlighting advanced forensic techniques. msuiche.com

AI-Powered Ransomware Proof-of-Concept Emerges โ€“ First spotted AI-powered ransomware PoC uses automated targeting and negotiation, marking a new evolution in cyber threats. Read More

Microsoft Partner Leak Exposes Employee PII โ€“ A leak from a Microsoft partner exposed employee PII and over 700 million partner records, a massive data exposure. Read More

Vtenext 25.02 Multiple RCE Paths โ€“ Analysis reveals a three-way path to remote code execution in Vtenext 25.02, a critical software vulnerability. Read More

s1ngularity Supply Chain Attack on GitHub โ€“ The s1ngularity attack leaked secrets on GitHub, a significant supply chain incident affecting numerous projects. Read More

PyPI Prevents Domain Resurrection Attacks โ€“ The Python Package Index implements measures for preventing domain resurrection attacks, enhancing ecosystem security. Read More

RubyGems.org OSS Infrastructure Protection โ€“ How RubyGems.org protects critical open-source infrastructure, detailing their security response and community safeguards. Read More

Hunting postMessage Vulnerabilities Guide โ€“ First part of a guide on hunting postMessage vulnerabilities, a common client-side attack vector. Read More

How to Rob a Hotel Physical Pentest โ€“ A story and analysis from a physical penetration test, illustrating how to rob a hotel. Read More

SANS Notes Increase in ZIP File Searches โ€“ The SANS Internet Storm Center diaries note an increasing searches for ZIP files, a potential malware distribution trend. Read More

Claude Code WebSocket Auth Bypass โ€“ CVE-2025-52882 details a WebSocket authentication bypass in Claude Code extensions, a critical MCP vulnerability. Read More

Anthropic Detects and Counters AI Misuse โ€“ August 2025 update on detecting and countering misuse of AI, outlining new threats and mitigation strategies from Anthropic. Read More

Agentic Browser Indirect Prompt Injection โ€“ Investigate Agentic Browser Security vulnerabilities, specifically indirect prompt injection in Perplexity Comet. This highlights how AI agents can be manipulated through external content. Read More

Perplexity Comet Indirect Prompt Injection โ€“ Brave Security Labs discusses Agentic Browser Security, focusing on indirect prompt injection in Perplexity Comet. This vulnerability allows for manipulation of AI agents via embedded content. Read More

๐Ÿฆ SecX #

Chrome Logic Sandbox Escape $250k Bounty โ€“ Bug spotlight on a Chrome Ipcz cross-process handle spoofing issue, a severe sandbox escape earning a $250,000 bounty. Watch Here

PromptLock Ransomware Uses Lua Scripts โ€“ ESET Research details how PromptLock leverages cross-platform Lua scripts to enumerate, exfiltrate, and encrypt data on Windows, Linux, and macOS. Watch Here

Novel LLM System Prompt Insertion Jailbreak โ€“ A novel jailbreak using prompt insertion, not injection, into the actual system prompt, making defenses nearly impossible. Watch Here

YubiKey OATH App as File Storage โ€“ The YubiKey OATH app allows naming accounts with base64, turning it into a tiny covert file storage for red teams. Watch Here

๐ŸŽฅ SecVideo #

Hacking Google to Delete Search Results โ€“ A video demonstrating a method for hacking Google to delete ANY search result, a significant SEO and reputation manipulation vulnerability. Watch Here

๐Ÿ’ป SecGit #

Exotic XSS Techniques Repository โ€“ A GitHub repository dedicated to exotic XSS techniques, a resource for advanced web application security testing. Explore on GitHub

Phishing Template Workbench on GitHub โ€“ The phishingclub/templates repo provides a phishing template workbench for security testing and awareness simulations. Explore on GitHub

CVE-2025-57752 GitHub Advisory โ€“ GitHub Advisory for CVE-2025-57752, detailing a specific security vulnerability and its patches. Explore on GitHub

Inline Style Exfiltration Research โ€“ PortSwigger research on leaking data with chained CSS conditionals, a novel inline style exfiltration technique. Explore on GitHub

Phrack CTF Binary Exploitation Challenge โ€“ The chompie1337/PhrackCTF repo contains a binary exploitation challenge from Phrack CTF. Explore on GitHub

Legba Multiprotocol Credentials Bruteforcer โ€“ The evilsocket/legba tool is a fast multiprotocol credentials bruteforcer, password sprayer, and enumerator. Explore on GitHub

ChatGPT Dan Jailbreak Gist โ€“ A gist containing the ChatGPT-Dan-Jailbreak, a known method for bypassing AI content restrictions. Explore on GitHub


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: securify@rosecurify.com

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog