FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Good and well-renowned Universities Worldwide for Master’s in Infosec (Preferably Europe - Public Universities; Open to Other countries/continents)

By: /u/bhavsec381 — November 24th 2025 at 01:12

Greetings everyone,

I was looking for Top Universities for Masters in Cybersecurity. For my Background, I have done Bachelor’s in Computer Science and i have 2.5 years of Industry experience in Application Security, Cloud Security and Product Security.

I was not a Top student at my Bachelor's and neither my university is highly ranked. CGPA: 8.5 Hence getting Admission into the ETHz MS Cyber program seems tough Thou i would still apply.

I know a couple of other universities In Europe which are well know but not sure how respected is the curriculum. I have done my research but i wouldn't want to miss out on any hidden gem.

Looking for: 1. Well-recognized and reputable universities (Preferably public but can consider private)

  1. Strong Practical cybersecurity curriculum practical

  2. Would be great if the University has Hacking group which is doing well in CTF Competitions

USA and UK could have been great options but they are crazy expensive, the post study laws, migrations and Job search is pretty bad out there. Please correct me if i am wrong.

I would really appreciate your recommendations from your Experience and Knowledge.

Thanks in advance.

submitted by /u/bhavsec381
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

NocturneNotes — Secure Rust + GTK4 note‑taking with AES‑256‑GCM

By: /u/reallylonguserthing — November 23rd 2025 at 11:04

I’ve built NocturneNotes, a secure note‑taking app written in Rust with GTK4.

🔐 Features:

AES‑256‑GCM encryption for all notes Argon2 password‑based key derivation Clean GTK4 interface Reproducible Debian packaging for easy install 

It’s designed for people who want a privacy‑first notebook without the bloat.

Repo: https://github.com/globalcve/NocturneNotes

submitted by /u/reallylonguserthing
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

[Tool] Native JSONL viewer for analyzing massive security logs (Suricata, Zeek, EDR) without infrastructure overhead

By: /u/hilti — November 23rd 2025 at 06:47

Got tired of your log analysis workflow being: export logs → wait for jq → try different filter → wait again → eventually load into ELK → wait for indexing.

Built JSONL Viewer Pro to solve this. Native desktop app (Mac) that handles the log analysis I do daily without needing infrastructure.

Technical details:

  • Multi-threaded simdjson parser - opens 5GB files in ~10 seconds
  • Automatic nested JSON flattening (alert.signature, flow.bytes_toserver, etc.)
  • Advanced filtering with operators: alert.severity <= 2, flow.bytes > 100000
  • Handles 10M+ rows in memory
  • C++ native implementation (6MB binary, not Electron)
  • Supports .jsonl and .jsonl.gz

Supported formats:

  • Suricata EVE JSON logs
  • Zeek (Bro) JSON logs
  • EDR logs (CrowdStrike, SentinelOne, etc.)
  • Cloud audit trails (CloudTrail, Azure, GCP)
  • Any JSONL-formatted security data

Workflow improvements:

  • Daily log review: Load overnight alerts, filter by severity, export indicators
  • Threat hunting: Quick pivots on IPs, domains, hashes across millions of records
  • Incident response: Rapidly filter timeline data without waiting for SIEM queries
  • IOC extraction: Filter and export specific fields for threat intel

Privacy/Security:

  • Zero telemetry
  • No internet connection required
  • Data never leaves your machine
  • Good for analyzing sensitive logs on air-gapped systems

Launch pricing: $49 (normally $79)
https://iotdata.systems/jsonlviewerpro/

Built this for my own workflow but would love feedback from other analysts. What log formats or features would make this more useful?

submitted by /u/hilti
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Sliver C2 vulnerability enables attack on C2 operators through insecure Wireguard network

By: /u/catmandx — November 21st 2025 at 13:19

Depending on configuration and timing, a Sliver C2 user's machine (operator) could be exposed to defenders through the beacon connection. In this blog post, I elaborate on some of the reverse-attack scenarios. Including attacking the operators and piggybacking to attack other victims.

You could potentially gain persistence inside the C2 network as well, but I haven't found the time to write about it in depth.

submitted by /u/catmandx
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

HelixGuard uncovers malicious "spellchecker" packages on PyPI using multi-layer encryption to steal crypto wallets.

By: /u/Fit_Wing3352 — November 20th 2025 at 03:36

HelixGuard has released analysis on a new campaign found in the Python Package Index (PyPI).

The actors published packages spellcheckers which contain a heavily obfuscated, multi-layer encrypted backdoor to steal crypto wallets.

submitted by /u/Fit_Wing3352
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Required Founding Expertise:

By: /u/RicanNative80 — November 19th 2025 at 16:58

We are building a foundational technology that is a bloom dollar IP. We need three key pillars of engineering talent to formalize this system:

Mathematical Proof Architect: Expertise in formal assurance and engineering deterministic systems to mathematically verify code correctness.

Trust Architect (Advanced Distributed Systems): Deep experience in cryptography, immutability, and creating trust architectures that are legally non-repudiable.

Critical Systems Engineer: Mastery of low-level, high-assurance security engineering in performance-critical or regulated environments.

If you possess these specific skills and want to get in on the ground floor of a billion-dollar IP and secure significant stake shares and profits, DM me ASAP. Preferred location is the U.S., but we will enthusiastically consider exceptional talent globally.

submitted by /u/RicanNative80
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

request suggestions to detect bgp hijack events

By: /u/Gloomy-Initiative-80 — November 19th 2025 at 02:27

hi folks, I tried to detect bgp hijack, my way is pretty straitforward as below:

I downloaded IP/ASN data set from IRR(ripe/arin/apnic) and store them in search engine(support partial/prefix query), then I crawled bgp stream data from routeviews, if I found the original asn was different than IRR, then the

hijack event would be caught.

My result can be found here ipiphistory.com

submitted by /u/Gloomy-Initiative-80
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

I analyzed Python packages that can be abused to build surveillance tools — here’s what I found

By: /u/kryakrya_it — November 19th 2025 at 00:26

I published a breakdown of several Python packages that can be repurposed for building surveillance/spyware-style tooling.
The write-up focuses on:

  • which packages enable keylogging, screen capture, webcam access, browser data extraction, etc
  • how attackers combine these packages for full-scope monitoring
  • why these libraries are so easy to misuse
  • practical mitigations for developers and defenders

No drama, no “hacking tutorial” garbage — just an audit-style analysis showing how legitimate packages become building blocks for malicious tooling.

Full post:
https://audits.blockhacks.io/audit/python-packages-to-create-spy-program

Would appreciate feedback from people who deal with Python malware, IR, or supply-chain issues.

submitted by /u/kryakrya_it
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Threat Actor "888" Claims LG Electronics Data Breach - Source Code and Hardcoded Credentials Allegedly Leaked [Unconfirmed]

By: /u/bagguheroine — November 18th 2025 at 17:12

A threat actor known as "888" has allegedly dumped sensitive LG Electronics data on ThreatMon (November 16, 2025). LG has not yet confirmed or denied these claims.

Alleged Leaked Data: • Source code repositories • Configuration files and SQL databases
• Hardcoded authentication credentials • SMTP server credentials

Attack Vector: The leak reportedly originated from a contractor access point, suggesting a supply chain compromise rather than direct breach of LG systems.

Threat Actor Profile: "888" has previously targeted Microsoft, BMW Hong Kong, Decathlon, and Shell. Typically monetizes through ransomware or selling data on breach forums. No public ransom demand in this case yet.

Technical Concerns: - Hardcoded credentials enable persistence and lateral movement - SMTP access could facilitate convincing phishing campaigns - Source code exposure may reveal vulnerabilities in LG IoT devices affecting millions of users globally

Related Context: LG Uplus (LG's telecom division) confirmed a separate breach in October 2025 during a wave of South Korean telecom attacks.

Verification Status: UNCONFIRMED - Awaiting official statement from LG Electronics.

Source: https://cyberupdates365.com/lg-data-leak-claim-threat-a/

Thoughts on supply chain attack vectors and contractor access management?

submitted by /u/bagguheroine
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

PacketSmith X.509 Certificate Extractor (TLS over TCP and DTLS) - How To

By: /u/MFMokbel — November 17th 2025 at 15:22

PacketSmith v4.0 is shipped with an X.509 certificate extractor designed for use with TLS/SSL over TCP and DTLS over UDP streams. You can now either export these certificates to disk or dissect their attributes and output them as JSON objects and arrays.

submitted by /u/MFMokbel
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Trying to make CCNA learning more engaging for students

By: /u/Sorry_Flatworm_521 — November 16th 2025 at 17:30

Hi everyone,

My best friend and I have been working on a project after going through CCNA → CCNP ENCOR → CCNP ENARSI together. We realised that for most people (including us), the hardest part of the CCNA journey isn’t the technical content. It’s staying motivated through the long PDFs, the repetitive labs, and the feeling of studying alone.

We wanted to take some of that pain away and make learning networking feel more structured, more guided, and more rewarding. So we started building something based on short lessons, clear diagrams, and a gamification system that helps you actually feel your improvement.

The idea is to help learners stay consistent, avoid feeling lost, and have a more enjoyable path through the CCNA topics.

We’re currently sharing this with CCNA learners and mentors to see if it actually helps, and we’d definitely welcome any feedback or questions :)

submitted by /u/Sorry_Flatworm_521
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Claude AI ran autonomous espionage operations

By: /u/YouCanDoIt749 — November 16th 2025 at 10:51

Anthropic just published a case study where threat actors jailbroke Claude and used it to run entire attack campaigns autonomously.

submitted by /u/YouCanDoIt749
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

NPMScan - Malicious NPM Package Detection & Security Scanner

By: /u/kryakrya_it — November 15th 2025 at 20:14

I built npmscan.com because npm has become a minefield. Too many packages look safe on the surface but hide obfuscated code, weird postinstall scripts, abandoned maintainers, or straight-up malware. Most devs don’t have time to manually read source every time they install something — so I made a tool that does the dirty work instantly.

What npmscan.com does:

  • Scans any npm package in seconds
  • Detects malicious patterns, hidden scripts, obfuscation, and shady network calls
  • Highlights abandoned or suspicious maintainers
  • Shows full file structure + dependency tree
  • Assigns a risk score based on real security signals
  • No install needed — just search and inspect

The goal is simple:
👉 Make it obvious when a package is trustworthy — and when it’s not.

If you want to quickly “x-ray” your dependencies before you add them to your codebase, you can try it here:

https://npmscan.com

Let me know what features you’d want next.

submitted by /u/kryakrya_it
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

CyberRecon project

By: /u/Sufficient_Air5988 — November 15th 2025 at 16:24

I recently completed a project on “Scanning and Enumeration with Nmap” using Kali Linux and Metasploitable2. The project includes network discovery, port scanning, service enumeration, NSE scripting, and vulnerability detection. I’ve documented all findings, screenshots, and results in a structured report. I’m sharing it here to get feedback and suggestions to improve my methodology and reporting style.

#DevTown #nmap #cybersecurity

submitted by /u/Sufficient_Air5988
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Face Scrapper Ai like faceSeek -netsec analysis

By: /u/Few_Extension6813 — November 15th 2025 at 13:17

FaceSeek is like Google Images but mostly for faces. It uses facial photos and reverse photo finding method to recognition and detect a face even if it’s cropped or filtered. Plus it also ad modify those faaces to some body and make videos out of them. This could be useful for OSINT or threat hunting, but it also means attackers could find out our digital footprints by photo. Is it a threat? Or not? Considering that there are already a lot Ai tools like these, But Ai is alvo improving daily.

submitted by /u/Few_Extension6813
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

🚨 FIRST PUBLIC EVIDENCE: RedTail Cryptominer Targets Docker APIs

By: /u/mario_candela — November 14th 2025 at 07:54

So my honeypot just caught something interesting: RedTail malware hitting exposed Docker APIs on port 2375/tcp.

For context, RedTail is typically known for exploiting PHP vulnerabilities, PAN-OS, and Ivanti, but not a single vendor mentions Docker in their threat reports.

I did a pretty extensive research dive across:

  • Threat intel reports (Akamai, Forescout, Trend Micro, Kaspersky)
  • SANS ISC, VirusTotal, Malpedia
  • GitHub repos and academic papers
  • Various community discussions

What I confirmed:

  • C2 IP: 178[.]16[.]55[.]224 (AS214943)
  • User-Agent: "libredtail-http" (consistent with RedTail)
  • Absolutely zero public documentation of RedTail targeting Docker

Two theories:

  1. This is a blind spot in threat intelligence reporting
  2. We're seeing a new tactical evolution of RedTail (as of Nov 2025)

Has anyone else seen similar activity?

submitted by /u/mario_candela
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Milvus Proxy Authentication Bypass Vulnerability(CVE-2025-64513)

By: /u/Fit_Wing3352 — November 14th 2025 at 04:13

Analysis of the Milvus Proxy Authentication Bypass Vulnerability(CVE-2025-64513)

submitted by /u/Fit_Wing3352
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Dehashed alternative for pentesters/red teamers

By: /u/Pleasant-Drawer729 — November 13th 2025 at 10:33

After we launched SysReptor a few years ago, we now published the data leak service "SysLeaks for Attackers". We're still refining the service and kindly ask for your feedback. You can use SysLeaks quite extensively during the BETA phase, which will remain open in November.

How it works:
You search for domain names and receive usernames/email addresses, plaintext passwords and (in some cases) the platform the account was used for.

Limitations:

  • Users must sign up with their company email address (we approve offensive security companies only to prevent abuse).
  • We don't disclose the leaks of the last 14 days as a grace period for affected companies.
  • Free 50 credits for up to 2.500 leaked accounts per week (during the BETA phase)
submitted by /u/Pleasant-Drawer729
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Breaking mPDF with regex and logic

By: /u/ZoltyLis — November 12th 2025 at 23:24

Hello! Earlier this year I found an interesting logic quirk in an open source library, and now I wrote a medium article about it.

This is my first article ever, so any feedback is appreciated.

TLDR: mPDF is an open source PHP library for generating PDFs from HTML. Because of some logic quirks, it is possible to trigger web requests by providing it with a crafted input, even in cases where it is sanitized.

This post is not about a vulnerability! Just an unexpected behavior I found when researching an open source lib. (It was rejected by MITRE for a CVE)

submitted by /u/ZoltyLis
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

[DISCLOSURE] DoorDash Enabled 5-Year XSS/HTML Injection Flaw via Official Email; VDP Misclassified Report for 15 Months

By: /u/east0n12 — November 10th 2025 at 16:30

The vulnerability was a critical stored HTML Injection that allowed any free account to send zero-barrier phishing emails from the trusted [no-reply@doordash.com](mailto:no-reply@doordash.com) domain. The flaw existed for 5 years and was kept out of DoorDash's hands for 15 months by a misclassification in the HackerOne VDP process.

submitted by /u/east0n12
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

One Simple Mistake, Thousands at Risk - How Common Misconfigurations Could Lead to Massive Data Exposure

By: /u/we-we-we — November 10th 2025 at 11:26

This blogpost covering one of the most popular agentic workflow development platforms — Dify.
It covers how simple misconfigurations can lead to the theft of critical enterprise assets, and just how common these misconfigurations actually are.

submitted by /u/we-we-we
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

How much latency does a Throwing Star LAN Tap add to packet capture? (practical numbers appreciated)

By: /u/JMarkG — November 8th 2025 at 21:19

Hey folks — I’ve got a Throwing Star LAN Tap (replica) and I’m using it for passively capturing traffic for lab troubleshooting and packet analysis. I’m curious about real-world experience: how much latency did you actually measure when inserting a tap like this into a gigabit link? Any numbers (µs/ms) from hardware vs. inline solutions, or tips on test methodology you recommend?

For context: I’m planning to use it for troubleshooting, capturing brief bursts for analysis, and teaching/demoing packet flows — so low added latency is important but I’m not running production workloads through it. Appreciate any real measurements, test setups, or pitfall warnings.

submitted by /u/JMarkG
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Arbitrary App Installation on Intune Managed Android Enterprise BYOD in Work Profile

By: /u/Jessner10247 — November 8th 2025 at 13:57

I wrote a short blog post about a bug I discovered in late 2023 affecting Android Enterprise BYOD devices managed through Microsoft Intune, which lets the user install arbitrary apps in the dedicated Work Profile. The issue still exists today and Android considered this not a security risk: https://jgnr.ch/sites/android_enterprise.html

If you’re using this setup, you might find it interesting.

submitted by /u/Jessner10247
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Another one of those!!

By: /u/bi6o — November 8th 2025 at 00:36

Yes, I know I know... But believe me, when I started it I thought I was a genius.

"Oh I can do that", I thought to myself in that moment of 'inspiration', "I bet nobody thought of it yet, have they?".

And like any self-proclaimed good developer, I started hacking at it. I never thought to ask the Internet if it's a good idea. I was convinced!

Boy, was I wrong!

All of this to say, I am proud of my tech newsletter 🙈 I worked hard on the concept, I manually edit and pick the articles that go our every (work) day, and the close beta testers have expressed it brings great value to them.

I publish five newsletters everyday, covering Platform, Tech, AI, Web Development, and Crypto. I also publish the Top Headlines narrated on the landing page of the website.

Would you give me some feedback about my baby? It is unique to me, even if it's actually not 🙈

https://www.mergeconflictdigest.com

submitted by /u/bi6o
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New 'Landfall' spyware exploited a Samsung 0-day delivered through WhatsApp messages

By: /u/Megabeets — November 7th 2025 at 22:15

LANDFALL — a commercial-grade Android spyware exploiting a now-patched Samsung zero-day (CVE-2025-21042) through weaponized DNG images sent via WhatsApp, enabling zero-click compromise of Samsung Galaxy devices.

This isn't an isolated incident. LANDFALL is part of a larger DNG exploitation wave. Within months, attackers weaponized image parsing vulnerabilities across Samsung (CVE-2025-21042, CVE-2025-21043) and Apple (CVE-2025-43300 chained with WhatsApp CVE-2025-55177 for delivery)

It seems like DNG image processing libraries became a new attack vector of choice – suspiciously consistent across campaigns. Samsung had two zero-days in the same library, while a parallel campaign hit iOS - all exploiting the same file format. Should we expect more?

submitted by /u/Megabeets
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Free IOC tool

By: /u/Cute_Leading_3759 — November 7th 2025 at 19:39

Developed a tool that parses IOCs and creates relationships with known threat reporting

submitted by /u/Cute_Leading_3759
[link] [comments]
❌