
reverseame
@reverseame
Followers
21K
Following
2
Media
58
Statuses
5K
RME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
Zaragoza, Spain
Joined January 2016
Scanning for Post-Quantum Cryptographic Support #AnvilSecure #PostQuantumCrypto #PQCscan #OpenSource #CryptoCompliance
anvilsecure.com
CTO Vincent Berg introduces PQCscan, a free tool that checks SSH and TLS servers for post-quantum cryptography support.
0
0
4
Opossum Attack: Application Layer Desynchronization using Opportunistic TLS #OpossumAttack #TLSDedesynchronization #OpportunisticTLS #PiTMAttack #ApplicationLayer
0
0
3
Revisiting Cross Session Activation Attacks #CrossSessionActivation #DCOMAttacks #LateralMovement #ActiveDirectory #PrivilegeEscalation
r-tec.net
This blog post revisits Cross Session Activation attacks
0
2
4
.Shellcode injection using MessageBox #ShellcodeInjection #MessageBoxCallback #WindowsAPI #AVEvasion #RedTeaming
ghostline.neocities.org
0
4
10
Tiki Wiki CMS Groupware <= 28.3 Two Server-Side Template Injection Vulnerabilities #TikiWiki #SSTI #RemoteCodeExecution #CVE202532461 #CMSVulnerability
0
0
0
RedirectionGuard: Mitigating unsafe junction traversal in Windows #RedirectionGuard #WindowsSecurity #PrivilegeEscalation #Junctions #SecurityMitigation
1
1
1
Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke) #DNNExploit #UnicodeNormalization #NTLMCredentials #DotNetVulnerability #SMBAttack
slcyber.io
A pre-authentication vulnerability exists within DotNetNuke versions 6.0 to 10.0.1, assigned CVE-2025-52488, that allows attackers to steal NTLM hashes.
0
3
8
The GPS Leak No One Talked About: Uffizio’s Silent Exposure #GPSLeak #DataExposure #Uffizio #CyberSecurityFailure #SupplyChainRisk
reporter.deepspecter.com
Executive Summary
0
0
3
Delete Yourself from the Internet: Why You Must—and Exactly How to Do It #DigitalFootprint #OnlinePrivacy #DataProtection #DeleteYourself #InternetSecurity
esstnews.com
Note on Paid Data Removal ServicesServices like DeleteMe, PrivacyBee, and Mozilla Monitor offer automated data removal from broker sites and people-search
0
0
5
How I Discovered a Libpng Vulnerability 11 Years After It Was Patched #Libpng #Vulnerability #IntegerOverflow #CodeReview #LearningExperience
blog.himanshuanand.com
A beginner's journey into secure code review, and how I accidentally rediscovered an 11-year-old vulnerability in libpng.
0
6
24
CVE-2025-5777: CitrixBleed 2 Write-Up… Maybe? #CVE20255777 #CitrixBleed2 #NetScaler #MemoryLeak #SessionHijacking
0
4
6
This overlooked Linux boot flaw defeats Secure Boot heres how to fix it #LinuxSecurity #SecureBootBypass #InitramfsFlaw #PhysicalAccess #BootVulnerability
nerds.xyz
A Linux researcher at ERNW has demonstrated how attackers can bypass Secure Boot protections by modifying an unsigned initramfs. But a few kernel tweaks are all it takes to lock things down.
0
0
3
How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777) #CitrixBleed2 #NetScaler #MemoryDisclosure #CVE20255777 #InTheWild
labs.watchtowr.com
Before you dive into our latest diatribe, indulge us and join us on a journey. Sit in your chair, stand at your desk, lick your phone screen - close your eyes and imagine a world in which things are...
0
4
2
Siguen abiertas las inscripciones para la segunda edición del título propio de la Universidad de Zaragoza: Experto Universitario en la Gestión y Respuesta a Ciberincidentes. ¡No te quedes sin tu plaza!. #PlanDeRecuperación #NextGenerationEU #CátedrasCiber.
es.linkedin.com
✅ ¿Tienes ya tu plaza? Siguen abiertas las inscripciones para la segunda edición del título propio de la Universidad de Zaragoza: Experto Universitario en la Gestión y Respuesta a Ciberincidentes. En...
0
0
0
Applocker bypass on Lenovo machines – The curious case of #AppLockerBypass #LenovoSecurity #MFGSTATzip #WindowsVulnerability #SecurityResearch
oddvar.moe
This blogpost is about a minor discovery I made regarding a writeable file inside the Windows folder that is present on Lenovo machines. Initially when I found it I thought it was only a handful of…
0
1
5
GitPhish: Automating Enterprise GitHub Device Code Phishing
praetorian.com
Introducing GitPhish: An open-source tool for automating GitHub Device Code phishing attacks with dynamic code generation and professional landing pages for red teams.
0
1
3
EscapeRoute: Breaking the Scope of Anthropic’s Filesystem MCP Server(CVE-2025-53109 & CVE-2025-53110) #AnthropicMCP #SandboxEscape #CodeExecution #LLMSecurity #Cymulate
cymulate.com
Two critical flaws in Anthropic’s Filesystem MCP Server enable sandbox escapes, unrestricted file access, and even code execution, no binaries required
0
2
4
Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596 #CriticalRCE #AnthropicMCP #CVE202549596 #AIDeveloperTools #BrowserExploit
oligo.security
A critical Remote Code Execution flaw (CVSS 9.4) in Anthropic’s MCP Inspector exposes AI developers to browser-based attacks via 0.0.0.0 and DNS rebinding. Learn how CVE-2025-49596 was exploited from...
0
4
12