If you're curious about how Microsoft access tokens work under the hood, maybe it's useful to you too. I call it "A Token of Appreciation" 😜
securitywithtom.com/posts/A-Toke...
#Microsoft #EntraID #JWT #IdentitySecurity #SecurityResearch
Latest posts tagged with #SecurityResearch on Bluesky
If you're curious about how Microsoft access tokens work under the hood, maybe it's useful to you too. I call it "A Token of Appreciation" 😜
securitywithtom.com/posts/A-Toke...
#Microsoft #EntraID #JWT #IdentitySecurity #SecurityResearch
How to become a bug bounty hunter
negativepid.blog/how...
#bugBounty #securityResearch #cybersecurityCareers #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid #offSec
winbuzzer.com/2026/04/01/c...
Claude AI Writes Full FreeBSD Kernel Exploit in Four Hours
#AI #Anthropic #Claude #Cybersecurity #ZeroDay #Exploits #SecurityResearch #AIArmsRace #Linux #FreeBSD
How to become a bug bounty hunter
negativepid.blog/how...
#bugBounty #securityResearch #cybersecurityCareers #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid #offSec
𝗙𝗥𝗢𝗠 𝗖𝗢𝗗𝗘 𝗧𝗢 𝗖𝗢𝗠𝗣𝗥𝗢𝗠𝗜𝗦𝗘: 𝗧𝗨𝗥𝗡𝗜𝗡𝗚 𝗠𝗢𝗗𝗘𝗥𝗡 𝗗𝗔𝗬 𝗜𝗗𝗘𝗦 𝗜𝗡𝗧𝗢 𝗔𝗧𝗧𝗔𝗖𝗞 𝗩𝗘𝗖𝗧𝗢𝗥𝗦 𝗩𝗜𝗔 𝗠𝗔𝗟𝗜𝗖𝗜𝗢𝗨𝗦 𝗘𝗫𝗧𝗘𝗡𝗦𝗜𝗢𝗡𝗦 (2h Workshop) Debjeet Banerjee ( @whokilleddb )
Visual Studio Code isn’t just a developer favorite — it’s now a high-value target for stealthy supply-chain attacks […]
[Original post on infosec.exchange]
Screenshot of BaseFortify CVE report showing CVE-2026-4606 details, including description of SYSTEM-level privilege escalation, CVSS score of 10.0, and affected GeoVision ERM product.
Technical details:
• CWE-250: Execution with excessive privileges
• SYSTEM-level processes spawned incorrectly
• File dialogs run as SYSTEM
• Modify/delete protected files
Impact: Full system compromise from local access
#Vulnerability #InfoSec #CWE250 #SecurityResearch
The Xbox One's 13-year security run ends in a shower of sparks
#XboxOne #Hacking #SecurityResearch #Gaming #AusNews
thedailyperspective.org/article/2026-03-15-the-x...
Anthropic's Claude Found 22 Firefox CVEs in 14 Days
https://awesomeagents.ai/news/claude-firefox-22-cves/
#MozillaFirefox #Claude #SecurityResearch
Build hands-on RFID experience with the iCopy-X Intermediate Tag Pack. A versatile selection of blank HF & LF tags designed for learning, testing, and development using iCopy-X. 🧪📶 l.lab401.com/58tAS
#RFIDTools #SecurityResearch #icopyx #Lab401
Read the full story:
www.technadu.com/ai-agents-no...
Do you think AI will ultimately strengthen cybersecurity defenses or empower attackers more? Share your thoughts below.
#CyberSecurity #ArtificialIntelligence #ThreatIntelligence #APT #Infosec #CyberThreats #SecurityResearch
winbuzzer.com/2026/03/07/g...
Google Safe Browsing Missed 84% of Phishing Sites
#Google #GoogleChrome #GoogleSafeBrowsing #WebBrowsers #PhishingAttacks #Cybersecurity #Cybercrime #Hackers #Malware #ThreatIntelligence #SecurityResearch #SecurityThreats #SecurityFlaws
Some phishing campaigns change behavior by region.
Residential routing helps analysts observe country-specific variants.
#securityresearch
Somewhere out there a hundred people cloned this: github.com/HowWeLand/Se...
If you did, maybe PayPal me.
Times got tight again
#cybersecurity #AI #securityresearch
🔎 Technical details: CVE-2026-22769
A hardcoded admin credential in the Tomcat Manager lets attackers deploy a malicious WAR file, execute commands as root, and maintain persistence.
Threat actors reportedly used web shells + custom backdoors.
#ZeroDay #ThreatIntel #BlueTeam #SecurityResearch
#SecurityResearch @kimzetter.bsky.social
Exploiting CVE-2023-52271 and evading AV/EDR by terminating their PPL processes via BYOVD. One of the few times I've dealt with #ReverseEngineering a PE and I must admit it was fun.
#infosec #hacking #securityresearch #offsec
John Ostrowski (Compass Security) and Manuel Kiesel (Cyllective AG) worked together on CVE-2025-13154, a Lenovo Vantage LPE. Even after Microsoft closed a known primitive, collaboration led to a working PoC.
blog.compass-security.com/2026/02/from...
#Windows #CVE #SecurityResearch #PrivEsc
New here - curious who’s into:
• Bug bounty
• Pentesting
• OSINT
• Security research
Let’s connect and grow together
.
.
.
.
.
#CyberSecurity
#InfoSec
#BugBounty
#Pentesting
#SecurityResearch
#OSINT
#AppSec
#RedTeam
#BlueTeam
#CTF
#WebSecurity
#EthicalHacking
Secure adversary research gives SOCs the context alerts often miss. That means fewer blind spots, stronger detection, and faster, intelligence-driven response without added risk.
Read more: https://bit.ly/4r9mL5b
#threatintelligence #SOC #securityresearch
Hacker communities are reshaping vulnerability discovery — collaboration, incentives, and scale are accelerating security research. The crowd is becoming a force multiplier. 🧠⚡️ #BugBounty #SecurityResearch
buff.ly/cnj32AX
Introductory slide with the SCENOR – The Science Crew logo and the title “FACT VS FICTION”. Subheading states: “Debunking myths about extremism, terrorism and more.” Neutral blue-grey background with minimal graphic elements.
Slide titled “FICTION”. Text states: “Deradicalisation programmes do not work and fail to prevent reoffending.” Clean layout with a white text box on a blue-grey background and a visual cue to swipe for the fact.
Slide titled “FACT”. Text explains that deradicalisation does not require full ideological change to be effective. It highlights risk reduction through disengagement from violence, weakening harmful networks, and improved social functioning. Source cited: RAN Rehabilitation Manual.
Slide titled “WHY IT MATTERS”. Text explains that judging success only by belief change creates blind spots in policy and practice. It stresses assessing outcomes based on reduced risk, sustained disengagement, and social reintegration rather than ideological transformation alone.
NEW FACT VS FICTION EDITION
What does research really tell us about deradicalisation and how success should be understood in prevention work?
Source:
buff.ly/7Na8FUE
Follow SCENOR for new FACT vs FICTION editions every two weeks.
#FactVsFiction #Deradicalisation #SecurityResearch #SCENOR
Published my DLL hijacking research on GitHub.
GitHub: DLL Hijacking Detection - Theory, Evidence, and Telemetry
37 real Sysmon events. Complete analysis. Open to feedback.
github.com/Manishrawat2...
#ThreatHunting #SecurityResearch #Github #Analysis #Cybersecurity #Windows #Sysmon #Splunk #hack
Welcome back, hackers.
0x00sec is live again with new security research, active forums, and community-driven offensive security content.
0x00sec.org/welcome-back...
#infosec #hacking #offsec #securityresearch #ctf #0x00sec
PRIORITY ACCESS TO RESEARCH ON EXTREMISM.
#SCENOR’s Science Hive shares early research, updates, and events on political extremism and prevention.
Join here: buff.ly/391R9bz
What would you change in current responses to violent extremism?
#PoliticalExtremism #SecurityResearch #Radicalisation
Read more via TechNadu and follow for objective infosec coverage:
www.technadu.com/founder-of-p...
#Infosec #Privacy #Stalkerware #CyberLaw #DigitalSurveillance #SecurityResearch
🚀 We’re excited to announce the launch of the CRYPTOACTION website!
The CryptoACTION website is officially live.
Visit: lnkd.in/dFbJh-Ya
💥 This is just the beginning. More features and updates are on the way.
#CryptoACTION #Website #Launch #HorizonEurope #SecurityResearch #Innovation #CFCT
💫 Happy New Year from the CRYPTOACTION team!
#CryptoACTION #HorizonEurope #SecurityResearch #Innovation #Research #CFCT #Cryptocurrency
🌟 Happy Holiday Season from the CRYPTOACTION project!
#CryptoACTION #HorizonEurope #SecurityResearch #Innovation #CFCT
MongoBleed Exploit Demonstrated: CVE-2025-14847 MongoDB Memory Leak | Not RCE, Still Critical
https://ow.ly/yjEv50XRuW4
#MongoDB #CyberSecurity #Vulnerability #InfoSec #MemoryLeak #CVE2025 #SecurityResearch #Exploit
Zeroday Cloud Awards Big Bug Bounty
Read More: buff.ly/1V9pox2
#ZeroDay #BugBounty #CloudSecurity #RCE #SecurityResearch #EthicalHacking #VulnerabilityDiscovery #InfosecCommunity