reverseame
@reverseame
Followers
21K
Following
2
Media
64
Statuses
5K
RME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
Zaragoza, Spain
Joined January 2016
Remember, remember the 5th of November, gunpowder, treason and plot; for there is a reason why gunpowder and treason should ne'er be forgot
0
1
1
@dankitan @RicardoJRdez Y tras la teoría llega la práctica. Vamos a inspeccionar el código fuente y entender cómo funciona "por debajo" esa web tan bonita ;) #NextGenerationEU #CyberCampUNIZAR #PlanDeRecuperación #EscuelaCTFsUNIZAR
0
0
0
La sesión de hoy de la Escuela CTFs versa sobre aplicaciones web, las vulnerabilidades más típicas, y cómo detectarlas y explotarlas 😈💻🌐 con @dankitan y @RicardoJRdez. #NextGenerationEU #CyberCampUNIZAR #PlanDeRecuperación #EscuelaCTFsUNIZAR
1
0
0
Attacking GenAI applications and LLMs – Sometimes all it takes is to ask nicely!
hnsecurity.it
Real-world attack examples against GenAI and LLMs, highlighting attack techniques and often-overlooked security risks.
0
5
8
Stack Overflows, Heap Overflows, and Existential Dread (SonicWall SMA100 CVE-2025-40596, CVE-2025-40597 and CVE-2025-40598)
labs.watchtowr.com
It’s 2025, and at this point, we’re convinced there’s a secret industry-wide pledge: every network appliance must include at least one trivially avoidable HTTP header parsing bug - preferably...
0
1
12
30 statistics about data breaches
ooma.com
Data breaches remain a massive concern and have seemed to shift from rare occurrences to disturbingly common ones. Here is what you need to know.
0
0
3
SharePoint ToolShell – One Request PreAuth RCE Chain Please provide the text you would like me to summarize! I need the content to create the 5 hashtags.
0
0
1
Seguimos con la competición. Nuestros participantes están luchando por resolver los retos con más puntos! #NextGenerationEU #CyberCampUNIZAR #PlanDeRecuperación #EscuelaCTFsUNIZAR
0
0
0
¡Hoy tenemos el primer CTF de la Escuela CTFs de este curso académico! Mucho ánimo a los participantes. Con @dankitan @Razvieu @RicardoJRdez y "duroz". #NextGenerationEU #CyberCampUNIZAR #PlanDeRecuperación #EscuelaCTFsUNIZAR
2
0
2
Hijacking Cursor’s Agent: How We Took Over an EC2 Instance #CursorAgentHack #EC2Takeover #DockerEscape #SaaSSecurity #CloudVulnerability
reco.ai
Discover how Reco exploited a critical vulnerability in Cursor’s Background Agent, escaping Docker, gaining root access, and exposing SaaS security risks.
0
0
0
🔐 ¿Quieres convertirte en un experto en ciberseguridad? 🔐 Si aspiras a liderar la defensa digital en empresas, instituciones o proyectos propios, este es tu momento. ¡El curso está a punto de comenzar! Infórmate aquí:
0
0
0
The Guest Who Could: Exploiting LPE in VMWare Tools #VMwareTools #VGAuth #LPE #NamedPipeAttack #ArbitraryFile
swarm.ptsecurity.com
VMWare Tools provides a rich set of drivers and services that enhance manageability of virtual machines and enable guest-host communication. While the host-to-guest RPC mechanisms have long been...
0
0
3
Invision Community <= 5.0.7 (oauth/callback) Reflected Cross-Site Scripting Vulnerability
0
1
2
How We Accidentally Discovered a Remote Code Execution Vulnerability in ETQ Reliance
slcyber.io
Note: In correspondence with Hexagon while disclosing the bugs below, they informed us that any sharing of source code would be considered a violation of their terms and license. The Java code has...
0
0
0
x86-64 GetPC: SYSCALL
medium.com
A look at how SYSCALL can be used to retrieve RIP for shellcode positioning.
0
1
10
Quick-Skoping through Netskope SWG Tenants - CVE-2024-7401 #Netskope #CVE20247401 #Vulnerability #Impersonation #QuickSkope
quickskope.com
## Table of Contents1. [Introduction](#introduction)2. [Understanding How Netskope Client Works](#understanding-how-netskope-client-works)3. [Scraping for Ne...
0
0
0