We found cryptography bugs in the elliptic library using Wycheproof
https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/
https://blog.trailofbits.com/2025/11/18/we-found-cryptography-bugs-in-the-elliptic-library-using-wycheproof/
The Trail of Bits Blog
We found cryptography bugs in the elliptic library using Wycheproof
Trail of Bits discovered and disclosed two vulnerabilities in the widely used elliptic JavaScript library that could allow signature forgery or prevent valid signature verification, with one vulnerability still unfixed after the 90-day disclosure window.
❤3
Securing GitHub Actions With SonarQube: Real-World Examples
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
Sonarsource
Securing GitHub Actions With SonarQube: Real-World Examples
This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.
❤3
Black Friday and Cyber Monday price distortion identification
https://www.intigriti.com/blog/business-insights/black-friday-and-cyber-monday-price-distortion-identification
https://www.intigriti.com/blog/business-insights/black-friday-and-cyber-monday-price-distortion-identification
Intigriti
Black Friday and Cyber Monday price distortion identification
Three types of price manipulation techniques threat actors are using this Black Friday and Cyber Monday
❤6
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
http://security.googleblog.com/2025/11/android-quick-share-support-for-airdrop-security.html
http://security.googleblog.com/2025/11/android-quick-share-support-for-airdrop-security.html
Google Online Security Blog
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
Posted by Dave Kleidermacher, VP, Platforms Security & Privacy, Google Technology should bring people closer together, not create walls. ...
❤7
Securing GitHub Actions With SonarQube: Real-World Examples
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
https://www.sonarsource.com/blog/securing-github-actions-with-sonarqube-real-world-examples/
Sonarsource
Securing GitHub Actions With SonarQube: Real-World Examples
This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.
❤1
From Token to Takeover: Exploiting Weak HS256 Secrets (POC)
https://medium.com/@1998satheesh/from-token-to-takeover-exploiting-weak-hs256-secrets-poc-c53afb9a75a0
https://medium.com/@1998satheesh/from-token-to-takeover-exploiting-weak-hs256-secrets-poc-c53afb9a75a0
Medium
From Token to Takeover: Exploiting Weak HS256 Secrets (POC)
🔓 Cracking a Weak HS256 JWT: How I Forged a Token and Retrieved the Masterkey
❤7👎1
Intigriti Bug Bytes #230 - November 2025 🚀
https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-230-november-2025
https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-230-november-2025
Intigriti
Intigriti Bug Bytes #230 - November 2025 🚀
Hi hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring: Finding an RCE using AI in GitHub CORS exploitation cheat sheet Scanning codebases with AI Bypass...
❤8
Sonar honored in Fast Company
https://www.sonarsource.com/blog/sonar-honored-in-fast-company-next-big-things-in-tech/
https://www.sonarsource.com/blog/sonar-honored-in-fast-company-next-big-things-in-tech/
Sonarsource
Sonar honored in Fast Company's Next Big Things in Tech — Bringing trust to AI-driven development
We’re excited to announce that Sonar has been named a Fast Company Next Big Things in Tech honoree for Applied AI! This prestigious award honors technology breakthroughs poised to define the future of their industries.
❤3
Announcing SonarSweep: Improving training data quality for coding LLMs
https://www.sonarsource.com/blog/announcing-sonarsweep-improving-training-data-quality-for-coding-llms/
https://www.sonarsource.com/blog/announcing-sonarsweep-improving-training-data-quality-for-coding-llms/
Sonarsource
Announcing SonarSweep: Improving training data quality for coding LLMs
The promise of AI-assisted coding is immense, but it rests on a simple, fundamental reality: the quality and security of the code generated by a Large Language Model (LLM) depends on the quality of the data that it was trained on.
❤4👍1
Understanding signal-to-noise for vulnerability management success
https://www.intigriti.com/blog/business-insights/understanding-signal-to-noise-for-vulnerability-management-success
https://www.intigriti.com/blog/business-insights/understanding-signal-to-noise-for-vulnerability-management-success
Intigriti
Understanding signal-to-noise for vulnerability management success
Turn your signal-to-noise ratio into a key metric, learn how to score it, and identify challenges regarding scope, policy, staff, rewards, researchers, and processes.
❤1👎1
Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)
https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/
https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/
watchTowr Labs
Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)
Welcome to watchTowr vs the Internet, part 68.
That feeling you’re experiencing? Dread. You should be used to it by now.
As is fast becoming an unofficial and, apparently, frowned upon tradition - we identified incredible amounts of publicly exposed passwords…
That feeling you’re experiencing? Dread. You should be used to it by now.
As is fast becoming an unofficial and, apparently, frowned upon tradition - we identified incredible amounts of publicly exposed passwords…
❤1👍1
Constant-time support lands in LLVM: Protecting cryptographic code at the compiler level
https://blog.trailofbits.com/2025/11/25/constant-time-support-lands-in-llvm-protecting-cryptographic-code-at-the-compiler-level/
https://blog.trailofbits.com/2025/11/25/constant-time-support-lands-in-llvm-protecting-cryptographic-code-at-the-compiler-level/
❤1
🔥 Intigriti Challenge 1125 — JWT Confusion to SSTI → RCE (My Fastest CTF Solve Ever)
https://savi0r.medium.com/intigriti-challenge-1125-jwt-confusion-to-ssti-rce-my-fastest-ctf-solve-ever-43d43df4182c
https://savi0r.medium.com/intigriti-challenge-1125-jwt-confusion-to-ssti-rce-my-fastest-ctf-solve-ever-43d43df4182c
Medium
🔥 Intigriti Challenge 1125 — JWT Confusion to SSTI → RCE (My Fastest CTF Solve Ever)
By: savi0r Date: November 2025 Duration: ~3 hours Result: Full Solve (JWT Admin Takeover → SSTI → RCE → Flag) Status: ✅ Completed
🔥5❤1
An Evening with Claude (Code) - SpecterOps
https://specterops.io/blog/2025/11/21/an-evening-with-claude-code/
https://specterops.io/blog/2025/11/21/an-evening-with-claude-code/
SpecterOps
An Evening with Claude (Code) - SpecterOps
This blog post explores a bug, (CVE-2025-64755), I found while trying to find a command execution primitive within Claude Code to demonstrate the risks of web-hosted MCP to a client.
👍3❤2
November CTF Challenge: Exploiting JWT vulnerabilities to achieve RCE
https://www.intigriti.com/researchers/blog/hacking-tools/november-ctf-challenge-exploiting-jwt-vulnerabilities
https://www.intigriti.com/researchers/blog/hacking-tools/november-ctf-challenge-exploiting-jwt-vulnerabilities
Intigriti
November CTF Challenge: Exploiting JWT vulnerabilities to achieve RCE
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security research community. This month, we've decided to take on a challenge ourselves as a way t...
❤1
Sonar launches integration program to unify code governance across the SDLC
https://www.sonarsource.com/blog/sonar-launches-integration-program/
https://www.sonarsource.com/blog/sonar-launches-integration-program/
Sonarsource
Sonar launches integration program to unify code governance across the SDLC
We are thrilled to announce the launch of the Sonar Integration Program. This strategic initiative formalizes and expands our partner ecosystem, unifying SonarQube's integrations with leading technology partners under a single, comprehensive program.
❤1
How to Research & Reverse Web Vulnerabilities 101 — ProjectDiscovery Blog
https://projectdiscovery.io/blog/how-to-research-web-vulnerabilities
https://projectdiscovery.io/blog/how-to-research-web-vulnerabilities
ProjectDiscovery
How to Research & Reverse Web Vulnerabilities 101 — ProjectDiscovery Blog
Introduction
This blog serves as a detailed methodology guide for analyzing, reversing, and researching web vulnerabilities, particularly those with CVEs assigned. The content outlines repeatable processes used to evaluate vague advisories, analyze vulnerable…
This blog serves as a detailed methodology guide for analyzing, reversing, and researching web vulnerabilities, particularly those with CVEs assigned. The content outlines repeatable processes used to evaluate vague advisories, analyze vulnerable…
❤6
Apple Developer Stored XSS — $5,000 Bounty | Writeup 2025
https://medium.com/@ZombieHack/apple-developer-stored-xss-5-000-bounty-writeup-2025-cc34a030a5bf
https://medium.com/@ZombieHack/apple-developer-stored-xss-5-000-bounty-writeup-2025-cc34a030a5bf
Medium
Apple Developer Stored XSS — $5,000 Bounty | Writeup 2025
Hello Security Researchers & Bug Bounty Community,
❤5👍2
⏳ Time is ticking! Black Friday is your chance to get 𝗕𝘂𝗿𝗽 𝗕𝗼𝘂𝗻𝘁𝘆 𝗣𝗿𝗼 and 𝗕𝘂𝗿𝗽 𝗕𝗼𝘂𝗻𝘁𝘆 𝗚𝗼 with 40% OFF!
🎯Advanced customization, faster audits, and the power to detect vulnerabilities with less effort.
🔗Don’t wait! bountysecurity.ai
🎯Advanced customization, faster audits, and the power to detect vulnerabilities with less effort.
🔗Don’t wait! bountysecurity.ai
👎4❤3
Sonar launches integration program to unify code governance across the SDLC
https://www.sonarsource.com/blog/sonar-launches-integration-program/
https://www.sonarsource.com/blog/sonar-launches-integration-program/
Sonarsource
Sonar launches integration program to unify code governance across the SDLC
We are thrilled to announce the launch of the Sonar Integration Program. This strategic initiative formalizes and expands our partner ecosystem, unifying SonarQube's integrations with leading technology partners under a single, comprehensive program.
❤3