Hazard Researchers

20 posts

Hazard Researchers

Hazard Researchers

@hazardres

Germany เข้าร่วม Aralık 2023
86 กำลังติดตาม6 ผู้ติดตาม
Hazard Researchers รีทวีตแล้ว
HADESS
HADESS@Hadess_security·
Cloud Security Engineer is not "DevOps plus a firewall." You write SCPs blocking rogue regions. You build Terraform modules with encryption guardrails. You hunt IMDS credential theft across 200 accounts. $90K to $300K+. 33% growth through 2032. career.hadess.io/career-path/cl…
HADESS tweet media
English
1
1
2
111
Hazard Researchers รีทวีตแล้ว
HADESS
HADESS@Hadess_security·
DevOps City Your DevOps infrastructure is a city. Everything runs smooth until an incident hits. You're the mayor. Find what broke, fix it. This round: CI/CD pipeline security. #scenario=devops-pipeline" target="_blank" rel="nofollow noopener">hadess.io/games/devops-c… #game #devops #cicd #devsecops
HADESS tweet media
English
0
1
7
198
Hazard Researchers รีทวีตแล้ว
JFrog Security
JFrog Security@JFrogSecurity·
⚡ Potentially Critical RCE Vulnerability in OpenSSL - CVE-2025-15467 ⚡ The JFrog Security Research team is tracking a newly disclosed OpenSSL stack overflow vulnerability rated as High by OpenSSL, that may lead to remote code execution (RCE). This vulnerability was patched with other 11 moderate and low severity vulnerabilities. The stack overflow can be triggered by sending a crafted CMS AuthEnvelopedData message with malicious AEAD parameters. While no official CVSS score has been assigned yet, based on its characteristics, we assess it may be rated at least High or even Critical by NVD. Our team reproduced the issue by invoking the CMS_decrypt API directly, confirming that OpenSSL applications parsing untrusted CMS data via this API are vulnerable. Exploitation is also possible when using the `openssl cms` CLI to decrypt untrusted input. A contextual analysis scanner for this CVE is now available for JFrog Advanced Security customers:
JFrog Security tweet media
English
1
6
34
4.2K
Hazard Researchers รีทวีตแล้ว
Security Bug Aggregator
Security Bug Aggregator@BugsAggregator·
[453094710][reward: $250000] Out-of-bound read in the jmp table of ActiveMediaSessionController leads to sandbox escape. crbug.com/453094710
English
9
88
651
283.4K
Hazard Researchers รีทวีตแล้ว
Ryan Barnett (B0N3)
Ryan Barnett (B0N3)@ryancbarnett·
We (@akamai_research) have seen more than 500K of these attack patterns in the past week with the most popular payload being:
Ryan Barnett (B0N3) tweet media
Kirill Firsov@k_firsov

@FearsOff @Cloudflare This write‑up tells the story of how traffic aimed at that certificate path could reach origins behind Cloudflare even when the rest of the application was blocked by customer rules. Enjoy the reading here fearsoff.org/research/cloud…

English
6
31
226
39.2K
Hazard Researchers รีทวีตแล้ว
Muqsit 𝕏
Muqsit 𝕏@mqst_·
🔀 Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) Blog: 0x44.cc/reversing/2021… #infosec
Muqsit 𝕏 tweet mediaMuqsit 𝕏 tweet mediaMuqsit 𝕏 tweet media
English
5
129
747
32.5K
Hazard Researchers รีทวีตแล้ว
silentwarble
silentwarble@silentwarble·
I wrote a C2 agent in pure PIC C (minus one constexpr). I'd love to hear any suggestions on how to handle memory management better or reduce the output size. Cheers! github.com/MythicAgents/H…
English
0
37
148
7K
Hazard Researchers รีทวีตแล้ว
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! 🐈‍
English
15
223
782
170.1K
Hazard Researchers รีทวีตแล้ว
Vulmon Vulnerability Feed
Vulmon Vulnerability Feed@VulmonFeeds·
CVE-2024-23780 CVE-2024-23780 Exploit for Netbox This script exploits CVE-2024-23780, which allows remote code execution (RCE) on Netbox instances. Usage python netbox_exploit.py --url --username --password vulmon.com/vulnerabilityd…
English
0
2
6
820