veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

265
active users

#vulnerabilityresearch

0 posts0 participants0 posts today
HN Security<p>We have identified some security vulnerabilities (CVE-2025-1731) in Zyxel USG FLEX H Series firewall appliances, that allow local users with access to a Linux OS shell to escalate privileges to root.<br> <br><a href="https://security.humanativaspa.it/local-privilege-escalation-on-zyxel-usg-flex-h-series-cve-2025-1731" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.humanativaspa.it/loca</span><span class="invisible">l-privilege-escalation-on-zyxel-usg-flex-h-series-cve-2025-1731</span></a><br> <br><a href="https://infosec.exchange/tags/Zyxel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zyxel</span></a> <a href="https://infosec.exchange/tags/VulnerabilityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityResearch</span></a> <a href="https://infosec.exchange/tags/CoordinatedDisclosure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CoordinatedDisclosure</span></a></p>
Kevin Thomas ✅<p>We are in the Age of Agentic AI.</p><p>Ladies and gentlemen, we stand at the dawn of something extraordinary—the birth of Embedded Reverse Engineering and Vulnerability Research in the Agentic AI generation.</p><p>For years, we’ve reverse-engineered binaries, unraveled obfuscation, and traced execution flows deep into silicon. But now, the game is changing. AI isn’t just a tool anymore—it’s an active agent, reasoning, adapting, and challenging assumptions in ways we’ve never seen before.</p><p>This is more than automation. It’s more than efficiency. It’s intelligence—embedded, autonomous, and evolving.</p><p>We are the pioneers in a field where AI meets hardware, where security meets intelligence, and where the vulnerabilities of today shape the resilience of tomorrow.</p><p>So here’s my challenge to you:<br>🔹 Push the boundaries of what’s possible.<br>🔹 Question the architecture of security itself.<br>🔹 Reimagine what AI-driven reverse engineering can achieve.</p><p>The next frontier isn’t just about finding flaws. It’s about understanding systems at a level deeper than ever before.</p><p>We are the ones forging this path. Let’s build the future. 🚀 <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://defcon.social/tags/VulnerabilityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityResearch</span></a> <a href="https://defcon.social/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgenticAI</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Harry Sintonen<p>In 2019 I discovered class of SSH <a href="https://infosec.exchange/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> attacks that employ the "no auth" supported by the <a href="https://infosec.exchange/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> protocol. This lead to some SSH clients implementing trust indicators to clearly identify prompts originating from the application. <a href="https://infosec.exchange/tags/PuTTY" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PuTTY</span></a> added a "trust sigil" to indicate that the prompt originates from the application itself instead of the server: <a href="https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-auth-prompt-spoofing.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chiark.greenend.org.uk/~sgtath</span><span class="invisible">am/putty/wishlist/vuln-auth-prompt-spoofing.html</span></a></p><p><a href="https://infosec.exchange/tags/vulnerabilityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilityresearch</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a></p>
James<p>Just finishing up Obfu[DE]scate! A <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> tool that simplifies de-obfuscation and comparison between <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> APK versions - even after functions have been renamed, removed, or altered as part of obfuscation.</p><p><a href="https://github.com/user1342/Obfu-DE-Scate" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/user1342/Obfu-DE-Sc</span><span class="invisible">ate</span></a></p><p><a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/VulnerabilityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityResearch</span></a></p>
James<p>I've been working on a <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a>, <a href="https://infosec.exchange/tags/VulnerabilityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityResearch</span></a> , <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a>, and <a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffensiveSecurity</span></a> training platform over the past few months. It's still in the 'MVP' stage so I'd love any feedback folk have for it! 🧑‍💻👩‍💻👨‍💻</p><p><a href="http://www.TODO.courses" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">http://www.</span><span class="">TODO.courses</span><span class="invisible"></span></a></p>
James<p>I've finally setup an account on Mastodon 🙌​😅​ Now that I'm here, thought that I'd fill my feed with a few bits and pieces that I've been up to over the past year. 🧵​</p><p>📱​100% off <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> Analysis Course:<br><a href="https://www.udemy.com/course/android-malware-analysis/?couponCode=MASTODON" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">udemy.com/course/android-malwa</span><span class="invisible">re-analysis/?couponCode=MASTODON</span></a></p><p>🤖​ 100% off Android Games <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> Course:<br><a href="https://www.udemy.com/course/learn-reverse-engineering-through-android-games/?couponCode=MASTODON" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">udemy.com/course/learn-reverse</span><span class="invisible">-engineering-through-android-games/?couponCode=MASTODON</span></a></p><p>📚​ 75% Off My Android / <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/VulnerabilityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityResearch</span></a> and <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> book: <a href="https://ko-fi.com/jamesstevenson/link/MASTODON" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ko-fi.com/jamesstevenson/link/</span><span class="invisible">MASTODON</span></a></p>