Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com/2025/10/30/v...
@warthogtk.bsky.social
Pentester | Ex MD (Intensivist & Healthcare Simulation) | (Black) Arch Enthusiast | Infosec - AD - Windows Internals/Maldev enthusiast | Geopolitics, Defense, Disinformation, Hybrid warfare | DCS, Gaming, Metal (OU=FR,DC=WORLD,DC=UNIVERSE)
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com/2025/10/30/v...
Key IOCs for Pegasus and Predator Spyware Cleaned With iOS 26 Update iverify.io/blog/key-ioc...
29.10.2025 07:17 — 👍 0 🔁 0 💬 0 📌 0Hack-cessibility: When DLL Hijacks Meet Windows Helpers
trustedsec.com/blog/hack-ce...
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching
malwaretech.com/2025/10/exif...
Prompt injection to RCE in AI agents
blog.trailofbits.com/2025/10/22/p...
100 % agree
This 👇👇👇
Weaponizing Apple AI for Offensive Operations 
Part I
hxr1.ghost.io/weaponizing-...
Part II
hxr1.ghost.io/weaponizing-...
GitHub - tijme/dittobytes: Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE. github.com/tijme/dittob...
25.10.2025 08:45 — 👍 0 🔁 0 💬 0 📌 0Hunting for reflected XSS vulnerabilities: A complete guide
www.intigriti.com/researchers/...
Guide pour relayer NTLM sur HTTP – l’exemple de GLPI
mobeta.fr/guide-pour-r...
On apprend ce soir que les travaux de D. #Trump à la #MaisonBlanche ont détruit aussi le jardin Jackie Kennedy adjacent. Mais #Trump a le droit pour lui: le président est exempté de la procédure préalable d'examen des plans de travaux par la NCPC, commission ad hoc... 1/ 
bbc.com/news/article...
A deep dive into modern Windows Structured Exception Handler (SEH)
blog.elmo.sg/posts/struct...
The Ultimate Guide to Windows Coercion Techniques in 2025 blog.redteam-pentesting.de/2025/windows...
24.10.2025 19:16 — 👍 1 🔁 0 💬 0 📌 0Windows API Arsenal - FAUT.L Reverse Engineering Reference blog.fautl.com/api-list.html
24.10.2025 19:03 — 👍 0 🔁 0 💬 0 📌 0Scream at It Until It Escalates — XSS to ATO via Server Size Errors Gadgets
 castilho.sh/scream-until...
(2025-10-21) Managing The DSRM Administrator Account Password (Revisited) jorgequestforknowledge.wordpress.com/2025/10/21/m...
23.10.2025 21:56 — 👍 1 🔁 0 💬 0 📌 0[LONG INT*] Laluka pirate la planète (Cybersec, pentest, et Vol Libre) youtube.com/watch?v=kBAi...
23.10.2025 20:54 — 👍 0 🔁 0 💬 0 📌 0Politiquement, sans doute l'1 des déclarations les plus marquantes de 2025
Steve #Bannon, chef de file des nationaux-populistes US, affirme que D. #Trump restera président après 2028. Et qu'ils trouveront moyen de contourner le 22e amendement de la Constitution 1/
RT+
www.youtube.com/shorts/8AVTx...
The minefield between syntaxes: exploit syntax confusion in the wild www.yeswehack.com/learn-bug-bo...
23.10.2025 18:39 — 👍 0 🔁 0 💬 0 📌 0Why nested deserialization is STILL harmful – Magento RCE (CVE-2025-54236) › Searchlight Cyber slcyber.io/assetnote-se...
22.10.2025 07:34 — 👍 0 🔁 0 💬 0 📌 0The (Near) Return of the King: Account Takeover Using the BadSuccessor Technique - SpecterOps specterops.io/blog/2025/10...
20.10.2025 18:54 — 👍 0 🔁 0 💬 0 📌 0Cloudflare Image Proxy CSPT Exploit Explained blog.voorivex.team/cloudflare-i...
19.10.2025 18:07 — 👍 0 🔁 0 💬 0 📌 0Signal dévoile un protocole de chiffrement post-quantique conçu pour garantir la confidentialité persistante des échanges et la sécurité post-compromission, sans altérer les performances de l'application securite.developpez.com/actu/376845/...
19.10.2025 15:23 — 👍 0 🔁 0 💬 0 📌 0À Prisma Media, les salariés craignent d’être à leur tour avalés par Bolloré www.mediapart.fr/journal/cult...
19.10.2025 15:21 — 👍 0 🔁 0 💬 0 📌 0NetworkHound Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑compatible OpenGraph JSON. github.com/mordavid/Net...
19.10.2025 13:18 — 👍 1 🔁 0 💬 0 📌 0CVE-2025-59287 WSUS Remote Code Execution | HawkTrace hawktrace.com/blog/CVE-202...
19.10.2025 10:45 — 👍 1 🔁 1 💬 0 📌 0Yet Another DCOM Object for Command Execution Part 1 sud0ru.ghost.io/yet-another-...
19.10.2025 08:11 — 👍 0 🔁 0 💬 0 📌 0Denial of Fuzzing: Rust in the Windows kernel - Check Point Research research.checkpoint.com/2025/denial-...
19.10.2025 08:08 — 👍 0 🔁 0 💬 0 📌 0CRLF Injection Nested Response Splitting CSP Gadget lab.ctbb.show/research/crl...
18.10.2025 18:48 — 👍 0 🔁 0 💬 0 📌 0Leveraging Raw Disk Reads to Bypass EDR
 medium.com/workday-engi...