reverseame
@reverseame
Followers
21K
Following
2
Media
68
Statuses
5K
RME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
Zaragoza, Spain
Joined January 2016
The One Where We Just Steal The Vulnerabilities (CrushFTP CVE-2025-54309) #CrushFTP #CVE202554309 #RaceCondition #AdminBypass #ExploitedInWild
labs.watchtowr.com
On July 18, 2025, users of CrushFTP woke up to an announcement: As we’ve all experienced in 2025, 2025 has been the year of vendors burying their heads in the sand with regard to in-the-wild exploi...
0
1
1
This House is Haunted: a decade old RCE in the AION client #AIONRCE #LuaExploit #HousingSystem #LegacyVulnerability #PrivateServers
appsec.space
TL;DR I found a RCE in the AION client starting from 3.0 (not confirmed the latest version vulnerable) using the built-in housing system. Private servers are still vulnerable. Important Note In the...
0
0
4
IPv4/IPv6 Packet Fragmentation: Detection & Reassembly #IPFragmentation #PacketReassembly #PacketSmith #IPv4IPv6 #NetworkAnalysis
packetsmith.ca
IPv4/IPv6 Packet Fragmentation: Detection & Reassembly Introduction A packet can be broken into smaller pieces, or fragments, at the network layer (by the IPv4 and IPv6 protocols) to fit within a...
0
5
13
Magecart Skimmer Analysis: From One Tweet to a Campaign #Magecart #WebSkimming #JavaScriptMalware #ThreatHunting #ECommerceSecurity
blog.himanshuanand.com
Starting Point It all began with a tweet: sdcyberresearch on X This tweet hinted at a Magecart-style campaign involving malicious JavaScript injection to skim payment data. Initial Sample The script...
0
3
10
Security Alert | NX Compromised to Steal Wallets and Credentials #NXCompromise #CredentialTheft #SupplyChainAttack #SecurityAdvisory #Semgrep
semgrep.dev
What is s1ngularity-repository? Nx is compromised and the malware steals wallets and API keys using Claude CLI or Gemini.
0
0
1
⏳ Últimas plazas en Análisis Forense Digital (empieza la semana del 12/01). 🐛 Malware y 🤖 IA también disponibles. 👉 https://t.co/lyWLcAU4aC
#PlanDeRecuperación #NextGenerationEU #CátedrasCiber
ciberseguridad.unizar.es
Presentación# Esta es la página principal de todos los cursos formativos con microcredenciales de ciberseguridad ofertados desde la Universidad de Zaragoza, bajo el auspicio de la Cátedra Internaci...
0
0
3
Malware Analysis, Phishing, and Email Scams #PhishingEvolution #AIEvasion #PromptInjection #AIDefenses #EmailSecurity
malwr-analysis.com
Phishing has always been about deceiving people. But in this campaign, I discovered something new. The attackers weren’t only targeting users, they also attempted to manipulate AI-based defences. T…
0
0
9
Countering EDRs With The Backing Of Protected Process Light (PPL) #PPL #EDREvasion #DefenderBypass #ProcessProtection #RedTeaming
zerosalarium.com
Abusing the Clipup.exe program by using the CreateProcessAsPPL.exe tool to destroy the executable file of the EDRs, Antivirus.
2
12
65
Silent Harvest: Extracting Windows Secrets Under the Radar #SilentHarvest #EDREvasion #WindowsSecrets #RegistryHacking #RedTeaming
sud0ru.ghost.io
Once you gain a foothold on a Windows host, the next objective is often to compromise additional machines. The fastest way to achieve this is by harvesting credentials and other secrets for reuse....
0
3
21
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074) #DockerEscape #CVE20259074 #SSRF #UnauthenticatedAPI #WindowsDocker
0
1
2
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers
socket.dev
Hacker Demonstrates How Easy It Is To Steal Data From Popular Password Managers
0
0
2
📢 Microcredenciales UNIZAR (empiezan la semana del 12/01): 🐛 Malware y 🔍 Forense → últimas plazas 🤖 IA → aún disponible 👉 https://t.co/lyWLcAU4aC
#PlanDeRecuperación #NextGenerationEU #CátedrasCiber
ciberseguridad.unizar.es
Presentación# Esta es la página principal de todos los cursos formativos con microcredenciales de ciberseguridad ofertados desde la Universidad de Zaragoza, bajo el auspicio de la Cátedra Internaci...
0
0
0
how i found a https://t.co/220HM8O2tz compromise (thanks to cricket) #SEOPoisoning #EuropaEU #DevServerSecurity #IncidentResponse #BugReporting
blog.himanshuanand.com
TLDR While looking for a way to stream the India vs Pakistan cricket match on 14th September 2025, I stumbled across a suspicious search result on a europa.eu dev subdomain. It was being abused for...
0
3
2
Guess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault #Commvault #RCE #PreAuth #Vulnerabilities #DataProtection
labs.watchtowr.com
We’re back, and we’ve finished telling everyone that our name was on the back of Phrack!!!!1111 Whatever, nerds. Today, we're back to scheduled content. Like our friendly neighbourhood ransomware...
0
3
5
Copilot Broke Your Audit Log, but Microsoft Won’t Tell You #CopilotSecurityFlaw #MicrosoftAuditLog #DataIntegrityRisk #VendorTransparency #CybersecurityAlert
pistachioapp.com
Copilot Broke Your Audit Log, but Microsoft Won’t Tell You
0
0
2
Enumerating AWS the quiet way: CloudTrail-free discovery with Resource Explorer #AWSResourceExplorer #CloudTrail #StealthyEnumeration #APILogging #CloudSecurity
securitylabs.datadoghq.com
Discover how attackers could quietly enumerate AWS resources via Resource Explorer, and how Datadog and AWS worked together to close the visibility gap.
0
2
5