Normal view
-
/r/netsec - Information Security News & Discussion
- Billion-Dollar Bait & Switch: Exploiting a Race Condition in Blockchain Infrastructure
Engaging Cisco Talos Incident Response is just the beginning
Cloudflare Zero-day: Accessing Any Host Globally
-
/r/netsec - Information Security News & Discussion
- Frida 17.6.0 released β major Android stability improvements, Android 16 support
Frida 17.6.0 released β major Android stability improvements, Android 16 support
-
/r/netsec - Information Security News & Discussion
- After the Takedown: Excavating Abuse Infrastructure with DNS Sinkholes
After the Takedown: Excavating Abuse Infrastructure with DNS Sinkholes
-
/r/netsec - Information Security News & Discussion
- Successful Errors: New Code Injection and SSTI Techniques
Successful Errors: New Code Injection and SSTI Techniques
Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Account Takeover in Facebook mobile app due to usage of cryptographically unsecure random number generator and XSS in Facebook JS SDK
Weekly Update 487
I thought Scott would cop it first when he posted about what his solar system really cost him last year. "You're so gonna get that stupid AI-slop response from some people", I joked. But no, he got other stupid responses instead! And I got the AI-slop responses! Draw your own conclusions on those comments, but I find it fascinating that the one thing people would take away from a thoughtful blog post I spent many hours writing to explain how much work I put into privacy is that the illustration was computer-generated. That such feedback aligns with the political leanings of folks on Mastodon is also fascinating, and probably something I should have seen coming. But hey, there's nothing new about folks popping their heads up to make inane comments where none were needed, and I have a special blog post for just such occasions: If You Don't Want Guitar Lessons, Stop Following Me.
-
/r/netsec - Information Security News & Discussion
- StackWarp: Exploiting Stack Layout Vulnerabilities in Modern Processors
StackWarp: Exploiting Stack Layout Vulnerabilities in Modern Processors
-
/r/netsec - Information Security News & Discussion
- Multiple cross-site leaks disclosing Facebook users in third-party websites
Multiple cross-site leaks disclosing Facebook users in third-party websites
-
/r/netsec - Information Security News & Discussion
- Instagram account takeover via Meta Pixel script abuse
Instagram account takeover via Meta Pixel script abuse
-
/r/netsec - Information Security News & Discussion
- Leaking Meta FXAuth Token leading to 2 click Account Takeover
Leaking Meta FXAuth Token leading to 2 click Account Takeover
Weekly Update 486
Iβm in Oslo! Flighty is telling me Iβve flown in or out of here 43 times since a visit in 2014 set me on a new path professionally and, many years later, personally. Itβs special here, like a second home that just feelsβ¦ right. This week, the business end of things is about the WhiteDate data breach. Seeking a partner along common racial lines isnβt unusual, butβ¦ wellβ¦ WhiteDate is anything but usual. And, just for fun, see if you can pick the thing that garnered the most negative feedback about that blog post this week, Iβll feature the discussion in the next vid.
WinBoat: Drive by Client RCE + Sandbox escape.
Winboat lets you "Run Windows apps on π§ Linux with β¨ seamless integration"
I chained together an unauthenticated file upload to an "update" route and a command injection in the host election app to active full "drive by" host takeover in winboat.
[link] [comments]
Elon Muskβs Grok βUndressingβ Problem Isnβt Fixed
-
/r/netsec - Information Security News & Discussion
- Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation
-
/r/netsec - Information Security News & Discussion
- Demonstration: prompt-injection failures in a simulated help-desk LLM
Demonstration: prompt-injection failures in a simulated help-desk LLM
I built this as a small demonstration to explore prompt-injection and instruction-override failure modes in help-desk-style LLM deployments.
The setup mirrors common production patterns (role instructions, refusal logic, bounded data access) and is intended to show how those controls can be bypassed through context manipulation and instruction override.
Iβm interested in feedback on realism, missing attack paths, and whether these failure modes align with what others are seeing in deployed systems.
This isnβt intended as marketing - just a concrete artefact to support discussion.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center
CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center
Found a new Azure vulnerability -
CVE-2026-2096, a high-severity flaw in the Azure SSO implementation of Windows Admin Center that allows a local administrator on a single machine to break out of the VM and achieve tenant-wide remote code execution.
[link] [comments]