Seclog - #95

ยท

2 min read

Seclog - #95

Photo by Hillie Chan on Unsplash

  • Project Zero: Effective Fuzzing: A Dav1d Case Study - Exploring effective fuzzing techniques using Dav1d as a case study. Read More

  • Google Online Security Blog: Using Chrome's accessibility APIs to find security bugs - How Chrome's accessibility APIs can be leveraged to uncover security vulnerabilities. Read More

  • Internet Archive Hacked (probably) - Analysis of a potential hack on the Internet Archive. Read More

  • Security Awareness Month: 5 Attack Trends in 2024!- Overview of key attack trends in 2024 for Security Awareness Month. Read More

  • Palo Alto Expedition: From N-Day to Full Compromise - Detailed analysis of a compromise involving Palo Alto networks. Read More

  • ~200GB Free Cloud for Your files - Guide on obtaining 200GB of free cloud storage. Read More

  • 1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies - Revealing a significant security flaw in Zendesk affecting major companies. Read More

  • Bypassing noexec and executing arbitrary binaries - Technical guide on bypassing noexec restrictions. Read More

  • 3 ways to get Remote Code Execution in Kafka UI - Exploring RCE vulnerabilities in Kafka UI. Read More

  • OffSec Exam HTB Lists | 0xdf hacks stuff - Useful cheat sheets for OffSec exams and Hack The Box. Read More

  • Why Code Security Matters - Even in Hardened Environments - The importance of code security in all environments. Read More

๐Ÿฆ SecX

  • Haifei Li on X: "When the fuzzer crashed itself.." - Interesting observation about a fuzzer crashing itself. Watch Here

๐ŸŽฅ SecVideo

  • REAL Ransomware Chat Logs - Analysis of actual ransomware chat logs. Watch Here

  • Project Zero: Ten Years of 'Make 0-Day Hard' - Reflection on a decade of Project Zero's efforts to make zero-day exploits harder. Watch Here

๐Ÿ’ป SecGit

  • ring0-c0d3-br34k3r/Stuxnet-Rootkit: Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis - Repository containing extracted Stuxnet binaries and analysis of the Stuxnet rootkit. Explore on GitHub

For suggestions and any feedback, please contact: securify@rosecurify.com

ย