SonarQube Named a Leader and Fast Mover in GigaOm
https://www.sonarsource.com/blog/sonarqube-named-leader-in-gigaom-application-security-testing/
https://www.sonarsource.com/blog/sonarqube-named-leader-in-gigaom-application-security-testing/
Sonarsource
SonarQube Named a Leader and Fast Mover in GigaOm's Application Security Testing Radar
We are excited to share that Sonar has been named a Leader and Fast-Mover in the latest GigaOm Radar for Application Security Testing (AST). Following an in-depth evaluation of 27 vendors, GigaOm positioned Sonar in the top-tier ‘Maturity/Platform Play’ quadrant…
❤2
Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101)
https://labs.watchtowr.com/is-it-citrixbleed4-well-no-is-it-good-also-no-citrix-netscalers-memory-leak-rxss-cve-2025-12101/
https://labs.watchtowr.com/is-it-citrixbleed4-well-no-is-it-good-also-no-citrix-netscalers-memory-leak-rxss-cve-2025-12101/
watchTowr Labs
Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101)
There’s an elegance to vulnerability research that feels almost poetic - the quiet dance between chaos and control. It’s the art of peeling back the layers of complexity, not to destroy but to understand; to trace the fragile threads that hold systems together…
❤3
Critical: Remote Code Execution via Malicious Obfuscated Malware in Imunify360 AV (AI-bolit)
https://patchstack.com/articles/remote-code-execution-vulnerability-found-in-imunify360/
https://patchstack.com/articles/remote-code-execution-vulnerability-found-in-imunify360/
Patchstack
Critical: Remote Code Execution via Malicious Obfuscated Malware in Imunify360 AV (AI-bolit)
A critical RCE vulnerability has been patched in Imunify360 AV. Hosting companies should patch the issue immediately & check servers for signs of compromise.
❤2
Building checksec without boundaries with Checksec Anywhere
https://blog.trailofbits.com/2025/11/13/building-checksec-without-boundaries-with-checksec-anywhere/
https://blog.trailofbits.com/2025/11/13/building-checksec-without-boundaries-with-checksec-anywhere/
The Trail of Bits Blog
Building checksec without boundaries with Checksec Anywhere
Checksec Anywhere consolidates fragmented binary security analysis tools into a browser-based platform that analyzes ELF, PE, and Mach-O formats locally without compromising privacy or performance.
❤3
Rust in Android: move fast and fix things
http://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html
http://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html
Google Online Security Blog
Rust in Android: move fast and fix things
Posted by Jeff Vander Stoep, Android Last year, we wrote about why a memory safety strategy that focuses on vulnerability prevention in ...
❤2
SonarQube Named a Leader and Fast Mover in GigaOm
https://www.sonarsource.com/blog/sonarqube-named-leader-in-gigaom-application-security-testing/
https://www.sonarsource.com/blog/sonarqube-named-leader-in-gigaom-application-security-testing/
Sonarsource
SonarQube Named a Leader and Fast Mover in GigaOm's Application Security Testing Radar
We are excited to share that Sonar has been named a Leader and Fast-Mover in the latest GigaOm Radar for Application Security Testing (AST). Following an in-depth evaluation of 27 vendors, GigaOm positioned Sonar in the top-tier ‘Maturity/Platform Play’ quadrant…
❤2
How we avoided side-channels in our new post-quantum Go cryptography libraries
https://blog.trailofbits.com/2025/11/14/how-we-avoided-side-channels-in-our-new-post-quantum-go-cryptography-libraries/
https://blog.trailofbits.com/2025/11/14/how-we-avoided-side-channels-in-our-new-post-quantum-go-cryptography-libraries/
The Trail of Bits Blog
How we avoided side-channels in our new post-quantum Go cryptography libraries
We’ve released open-source Go implementations of ML-DSA and SLH-DSA.
❤2
Hacking with Burp AI in the Chesspocalypse: API expert Corey Ball showcases how Burp AI can support pentesters.
https://portswigger.net/blog/hacking-with-burp-ai-in-the-chesspocalypse-api-expert-corey-ball-showcases-how-burp-ai-can-support-pentesters
https://portswigger.net/blog/hacking-with-burp-ai-in-the-chesspocalypse-api-expert-corey-ball-showcases-how-burp-ai-can-support-pentesters
👎10❤1
Release v3.5.0 · projectdiscovery/nuclei
https://github.com/projectdiscovery/nuclei/releases/tag/v3.5.0
https://github.com/projectdiscovery/nuclei/releases/tag/v3.5.0
GitHub
Release v3.5.0 · projectdiscovery/nuclei
What's Changed
🎉 New Features
Adding json + xpath headless extractors by @Mzack9999 in #6559
Adding VNC auth by @Mzack9999 in #6413
Feat(templating): add vars templating into yaml inputs (ytt)...
🎉 New Features
Adding json + xpath headless extractors by @Mzack9999 in #6559
Adding VNC auth by @Mzack9999 in #6413
Feat(templating): add vars templating into yaml inputs (ytt)...
❤6👎2
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb Auth. Bypass CVE-2025-64446)
https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/
https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/
watchTowr Labs
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb Auth. Bypass CVE-2025-64446)
The Internet is ablaze, and once again we all have a front-row seat - a bad person, if you can believe it, is doing a bad thing!
The first warning of such behaviour came from the great team at Defused:
As many are now aware, an unnamed (and potentially…
The first warning of such behaviour came from the great team at Defused:
As many are now aware, an unnamed (and potentially…
❤4
Level up your Solidity LLM tooling with Slither-MCP
https://blog.trailofbits.com/2025/11/15/level-up-your-solidity-llm-tooling-with-slither-mcp/
https://blog.trailofbits.com/2025/11/15/level-up-your-solidity-llm-tooling-with-slither-mcp/
The Trail of Bits Blog
Level up your Solidity LLM tooling with Slither-MCP
We’re releasing Slither-MCP, a new tool that augments LLMs with Slither’s unmatched static analysis engine.
❤3
Forwarded from Android Security & Malware
Flutter SSL Bypass: How to Intercept HTTPS Traffic When all other Frida Scripts Fail
https://m4kr0x.medium.com/flutter-tls-bypass-how-to-intercept-https-traffic-when-all-other-frida-scripts-fail-bd3d04489088
https://m4kr0x.medium.com/flutter-tls-bypass-how-to-intercept-https-traffic-when-all-other-frida-scripts-fail-bd3d04489088
Medium
Flutter SSL Bypass: How to Intercept HTTPS Traffic When all other Frida Scripts Fail
In this article, I’ll walk you through my journey in intercepting HTTPS traffic from a APK based on Flutter during a pentesting engagement…
❤21👎3🤔1
Securing GitHub Actions With SonarQube: Real-World Examples
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
Sonarsource
Securing GitHub Actions With SonarQube: Real-World Examples
This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.
❤2🔥1
Intigriti wins ‘Security Innovation of the Year’ at the 2025 UK IT Industry Awards
https://www.intigriti.com/blog/awards/intigriti-wins-security-innovation-of-the-year-at-the-2025-uk-it-industry-awards
https://www.intigriti.com/blog/awards/intigriti-wins-security-innovation-of-the-year-at-the-2025-uk-it-industry-awards
Intigriti
Intigriti wins ‘Security Innovation of the Year’ at the 2025 UK IT Industry Awards
Intigriti has won Security Innovation of the Year at the UK IT Industry Awards 2025.
❤4
We found cryptography bugs in the elliptic library using Wycheproof
https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/
https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/
The Trail of Bits Blog
We found cryptography bugs in the elliptic library using Wycheproof
Trail of Bits discovered and disclosed two vulnerabilities in the widely used elliptic JavaScript library that could allow signature forgery or prevent valid signature verification, with one vulnerability still unfixed after the 90-day disclosure window.
❤3
Securing GitHub Actions With SonarQube: Real-World Examples
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
Sonarsource
Securing GitHub Actions With SonarQube: Real-World Examples
This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.
❤3
Black Friday and Cyber Monday price distortion identification
https://www.intigriti.com/blog/business-insights/black-friday-and-cyber-monday-price-distortion-identification
https://www.intigriti.com/blog/business-insights/black-friday-and-cyber-monday-price-distortion-identification
Intigriti
Black Friday and Cyber Monday price distortion identification
Three types of price manipulation techniques threat actors are using this Black Friday and Cyber Monday
❤6
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
http://security.googleblog.com/2025/11/android-quick-share-support-for-airdrop-security.html
http://security.googleblog.com/2025/11/android-quick-share-support-for-airdrop-security.html
Google Online Security Blog
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
Posted by Dave Kleidermacher, VP, Platforms Security & Privacy, Google Technology should bring people closer together, not create walls. ...
❤7
Securing GitHub Actions With SonarQube: Real-World Examples
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
Sonarsource
Securing GitHub Actions With SonarQube: Real-World Examples
This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.
❤1