Can't help but notice that all the CTI vendors that were waving their arms like carwash inflatables about increased activity from Iran have little to say about the lack of increased activity from Iran, which was the reasonable expectation from the jump.
📁🫷🚧Can't control the extension of a file upload, but you want an XSS?
Read more on how we overcame this obstacle to further exploit entire organizations using Fortinet endpoint protection:
Had a coworker tell me "Don't let infosec get in the way of hacking" which feels like an intense bit of wisdom underneath it all.
#grsecurity users are unaffected by CVE-2025-32463 (sudo chroot option privesc) when a feature available since 2021 is enabled. Customers can view our KB article on an earlier vulnerability this year, CVE-2025-4802 for glibc, to see how exploitation is prevented in the same way.
Updates for the Linux kernel exploitation collection 😋
https://github.com/xairy/linux-kernel-exploitation/commit/e4d394cff8b58c236721bca7f28a355775e556bc
Chrome patched a sev:HIGH
CVE with an ITW exploit.
Google is aware that an exploit for CVE-2025-6554 exists in the wild.
https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html
Unveiled at #TROOPERS25 - Hexagon fuzzing unlocked
Hexagon is the architecture in Qualcomm basebands - they power most of the world's leading smartphones.
Until now, this baseband was out of reach.
We released the first open-source toolchain for system-mode Hexagon fuzzing, presented by Luca Glockow (@luglo), Rachna Shriwas, and Bruno Produit (@bruno) at @WEareTROOPERS
Full post: https://www.srlabs.de/blog-post/hexagon-fuzz-full-system-emulated-fuzzing-of-qualcomm-basebands
How we opened up mobile firmware in 3 steps:
1. Boot real iPhone basebands with a custom QEMU fork
2. Rust-powered fuzzer controls execution via JSON configs
3. Ghidra integration maps coverage across threads
This brings full visibility to Qualcomm’s 4G/5G/GPS stacks.
Reproducible. Extendable. Open source.
Hexagon’s no longer off-limits - mobile security just got a lot more transparent.
🔗 Try it yourself: https://github.com/srlabs/hexagon_fuzz
📚 Docs: https://github.com/srlabs/hexagon_fuzz/blob/main/docs/reverse_engineering.md
🖥️ Slides from Troopers25: https://github.com/srlabs/hexagon_fuzz/blob/main/docs/talk/hexagon_fuzz_troopers2025.pdf
🛠️ Issues, ideas, or contributions? PRs welcome.
💻 Have you read our recent publications?
ISPConfig Authenticated Remote Code Execution:
https://ssd-disclosure.com/ssd-advisory-ispconfig-authenticated-remote-code-execution/
Kerio Control Authentication Bypass and RCE:
https://ssd-disclosure.com/ssd-advisory-kerio-control-authentication-bypass-and-rce/
Today we celebrate #curl having been part of OSS-fuzz for eight years. Imagine the amount of junk libcurl APIs have received in this time...
If case there was any doubt, Fediverse account are prefered over X mirror bots. Considering how poorly reliable X bridges are, the amount of api restrictions and the lack of interop for boostings and replies, consider posting here if you are a casual visitor!
It has gone zero days since the latest slop
Wikipedia has a cheat sheet of well-known tells for identifying generated text. (With an appropriate warning not to over-index on minor ones as absolute proof) https://en.m.wikipedia.org/wiki/Wikipedia:WikiProject_AI_Cleanup/AI_catchphrases
Thanks for celebrating our anniversary with us, REcon! Enjoy the special release.
What the NULL?! Wing FTP Server RCE (CVE-2025-47812) https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/