Seclog - #91

"Build your network as you would a fortress; with layers, deception, and traps for the unwary." - The Art of Cyber War

📚 SecMisc

  • GAZEploit - Description not provided - Read More

  • OR 1=1 -- is Dying - Exploring the decline of a common SQL injection technique - Read More

  • OpenAI o1-preview vs Claude 3.5 Sonnet comparison - A comparative analysis of AI models - Read More

  • We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - An unexpected cybersecurity discovery - Read More

  • Scorecarding Security - A method for evaluating security measures - Read More

  • Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information - Exploring vulnerabilities in AI assistants - Read More

  • Cracking OneDrive's Personal Vault - Investigating security measures of cloud storage - Read More

  • htmx ~ Web Security Basics (with htmx) - Web security fundamentals for htmx users - Read More

  • Browser Stored Credentials – Purple Team - Exploring browser security from a Purple Team perspective - Read More

  • Security has too many tools - by Frank Wang - Discussing the overabundance of security tools - Read More

  • Exploiting JavaScript Interface for Unauthorized Access in a 'global' cryptocurrency exchange android app - A case study in mobile app security - Read More

  • SSH Keystroke Obfuscation Bypass - Techniques for bypassing SSH security measures - Read More

  • Defend against vampires with 10 gbps network encryption - High-speed network security solutions - Read More

🐦 SecX

  • Ryan Naraine on X: "An Ivanti 0day story in two parts 😰" - Discussing a newly discovered vulnerability - Read More

🎥 SecVideo

  • Fuzzing from First Principles with Alisa Esage - An introduction to fuzzing techniques - Watch Here

  • [D24] Have U Been Invited (episode 2) - MacOS Logic Bugs - Mikko Kenttälä - Exploring MacOS vulnerabilities - Watch Here

💻 SecGit

For suggestions and any feedback, please contact: securify@rosecurify.com