December CTF Challenge: Chaining XS leaks and postMessage XSS
https://www.intigriti.com/researchers/blog/hacking-tools/december-ctf-challenge-xs-leaks-postmessage-xss
https://www.intigriti.com/researchers/blog/hacking-tools/december-ctf-challenge-xs-leaks-postmessage-xss
❤7
CSRF Protection without Tokens or Hidden Form Fields
https://blog.miguelgrinberg.com/post/csrf-protection-without-tokens-or-hidden-form-fields
https://blog.miguelgrinberg.com/post/csrf-protection-without-tokens-or-hidden-form-fields
Miguelgrinberg
CSRF Protection without Tokens or Hidden Form Fields
A couple of months ago, I received a request from a random Internet user to add CSRF protection to my little web framework Microdot, and I thought it was a fantastic idea.When I set off to do this…
❤8
Introducing Sonar Foundation Agent | Sonar
https://www.sonarsource.com/blog/introducing-sonar-foundation-agent/
https://www.sonarsource.com/blog/introducing-sonar-foundation-agent/
Sonarsource
Introducing Sonar Foundation Agent | Sonar
Sonar Foundation Agent is a coding agent for general software issues, developed at Sonar by the former AutoCodeRover team. As of November 3, 2025, Sonar Foundation Agent scores 75% on SWE-bench Verified, while maintaining a low average cost of $1.26 and a…
❤4
Server-Side Request Forgery (SSRF): Detection, Impact, and Defense Bypass Techniques
https://seclak07.medium.com/server-side-request-forgery-ssrf-detection-impact-and-defense-bypass-techniques-71787fe52db1
https://seclak07.medium.com/server-side-request-forgery-ssrf-detection-impact-and-defense-bypass-techniques-71787fe52db1
Medium
Server-Side Request Forgery (SSRF): Detection, Impact, and Defense Bypass Techniques
Server-Side Request Forgery (SSRF) is a critical web application vulnerability that is frequently misunderstood but highly impactful when…
👎4❤2
Blind trust: what is hidden behind the process of creating your PDF file?
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
PT SWARM
Blind trust: what is hidden behind the process of creating your PDF file?
Every day, thousands of web services generate PDF (Portable Document Format) files—bills, contracts, reports. This step is often treated as a technical routine, “just convert the HTML,” but in practice it’s exactly where a trust boundary is crossed. The renderer…
❤5
Turning a harmless XSS behind a WAF into a realistic phishing vector
https://blog.hackcommander.com/posts/2025/12/28/turning-a-harmless-xss-behind-a-waf-into-a-realistic-phishing-vector/
https://blog.hackcommander.com/posts/2025/12/28/turning-a-harmless-xss-behind-a-waf-into-a-realistic-phishing-vector/
hackcommander.github.io
Turning a harmless XSS behind a WAF into a realistic phishing vector
Partial disclosure of a bug bounty report: turning a harmless XSS behind a WAF into a realistic phishing vector.
❤7
Grafana CVE-2025-6023 Bypass: A Technical Deep Dive
https://blog.ethiack.com/blog/grafana-cve-2025-6023-bypass-a-technical-deep-dive
https://blog.ethiack.com/blog/grafana-cve-2025-6023-bypass-a-technical-deep-dive
Ethiack
Grafana CVE-2025-6023 Bypass: A Technical Deep Dive
How do you secure one of Europe’s largest universities against endless cyber threats? Discover how Universidade do Porto and Ethiack turned a sprawling, exposed attack surface into a controlled and proactive cybersecurity stronghold.
❤4
Detect Go’s silent arithmetic bugs with go-panikint
https://blog.trailofbits.com/2025/12/31/detect-gos-silent-arithmetic-bugs-with-go-panikint/
https://blog.trailofbits.com/2025/12/31/detect-gos-silent-arithmetic-bugs-with-go-panikint/
The Trail of Bits Blog
Detect Go’s silent arithmetic bugs with go-panikint
We’re releasing go-panikint, a modified Go compiler that turns silent integer overflows into explicit panics. We used it to find a live integer overflow in the Cosmos SDK’s RPC pagination logic, showing how this approach eliminates a major blind spot for…
❤2
Release v3.6.2 · projectdiscovery/nuclei
https://github.com/projectdiscovery/nuclei/releases/tag/v3.6.2
https://github.com/projectdiscovery/nuclei/releases/tag/v3.6.2
GitHub
Release v3.6.2 · projectdiscovery/nuclei
What's Changed
✨ New Features
Enabled TLS session caching in the client pool to improve connection reuse and reduce handshake overhead (internal) by @dwisiswant0 in #6713
Added support for pro...
✨ New Features
Enabled TLS session caching in the client pool to improve connection reuse and reduce handshake overhead (internal) by @dwisiswant0 in #6713
Added support for pro...
❤4
MongoBleed: CVE-2025-14847 Memory Corruption in MongoDB. Your Database Talks Back
https://phoenix.security/mongobleed-vulnerability-cve-2025-14847/
https://phoenix.security/mongobleed-vulnerability-cve-2025-14847/
Phoenix Security
MongoBleed: CVE-2025-14847 Memory Corruption in MongoDB. Your Database Talks Back
MongoBleed vulnerability (CVE-2025-14847) leaks MongoDB heap memory without auth via zlib. See affected versions, exposure, and fixes.
❤5
CVE-2025-61922: Zero-Click Account Takeover on Prestashop
https://dhakal-ananda.com.np/blogs/cve-2025-61922-analysis/
https://dhakal-ananda.com.np/blogs/cve-2025-61922-analysis/
Dhakal's Infosec Blog
CVE-2025-61922: Zero-Click Account Takeover on Prestashop
Technical analysis of CVE-2025-61922 leading to zero-click account takeover in PrestaShop Checkout < 5.0.5
❤5
Top 10 web hacking techniques of 2025: call for nominations
https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open
https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open
PortSwigger Research
Top 10 web hacking techniques of 2025: call for nominations
Over the last year, security researchers have shared a huge amount of work with the community through blog posts, presentations, and whitepapers. This is great, but it also means genuinely reusable te
❤4
Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters
https://blog.nns.ee/2026/01/06/aike-ble/
https://blog.nns.ee/2026/01/06/aike-ble/
blog.nns.ee
Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters
Ethical Hacking and Cybersecurity Blog
👍6❤1
Top 10 web hacking techniques of 2025: call for nominations
https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open
https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open
PortSwigger Research
Top 10 web hacking techniques of 2025: call for nominations
Over the last year, security researchers have shared a huge amount of work with the community through blog posts, presentations, and whitepapers. This is great, but it also means genuinely reusable te
❤3💯2🤔1
Predator iOS Malware: Building a Surveillance Framework - Part 1 | Reverse Society
https://blog.reversesociety.co/blog/2025/predator-ios-malware-surveillance-framework-part-1
https://blog.reversesociety.co/blog/2025/predator-ios-malware-surveillance-framework-part-1
blog.reversesociety.co
Predator iOS Malware: Building a Surveillance Framework - Part 1 | Reverse Society
How does Predator spyware transform from running code into active surveillance? This technical deep-dive reverse-engineers the internal factory architecture that dynamically creates camera monitoring, VoIP interception, and keylogging modules through Unix…
❤2👎1🔥1
GitHub - Chocapikk/CVE-2026-21858: n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0)
https://github.com/Chocapikk/CVE-2026-21858
https://github.com/Chocapikk/CVE-2026-21858
GitHub
GitHub - Chocapikk/CVE-2026-21858: n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0)
n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0) - Chocapikk/CVE-2026-21858
❤3
Seahawk Media Partners with Patchstack to Strengthen WordPress Security - Patchstack
https://patchstack.com/articles/seahawk-media-partners-with-patchstack-to-strengthen-wordpress-security/
https://patchstack.com/articles/seahawk-media-partners-with-patchstack-to-strengthen-wordpress-security/
Patchstack
Seahawk Media Partners with Patchstack to Strengthen WordPress Security - Patchstack
Discover how Patchstack helps secure Seahawk Media users with real-time protection.
❤1
Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691)
https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/
https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/
watchTowr Labs
Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691)
Welcome to 2026!
While we are all waiting for the scheduled SSLVPN ITW exploitation programming that occurs every January, we’re back from Christmas and idle hands, idle minds, yada yada.
In December, we were alerted to a vulnerability in SmarterTools’…
While we are all waiting for the scheduled SSLVPN ITW exploitation programming that occurs every January, we’re back from Christmas and idle hands, idle minds, yada yada.
In December, we were alerted to a vulnerability in SmarterTools’…
😁4❤1