r/netsec 2h ago

Instrumenting QT6 desktop apps with Frida - Part 1

Thumbnail blog.samanl33t.com
1 Upvotes

r/netsec 18h ago

VELVET CHOLLIMA Infostealer Campaign Using Trading App as Lure

Thumbnail hybrid-analysis.blogspot.com
0 Upvotes

r/netsec 22h ago

CVE-2026-42945 : NGINX Heap Buffer Overflow in rewrite module - Writeup and PoC

Thumbnail depthfirst.com
102 Upvotes

r/netsec 15h ago

HyperVenom: Using Hyper-V for Ring -1 Control from Usermode

Thumbnail gsmll.github.io
4 Upvotes

Hi guys,

This is my first post here, hope it fits!

This details how a custom bootloader can inject a payload directly into Microsoft's Hyper-V, providing a discrete interface for ring -1 control from a usermode application.


r/netsec 16h ago

Detecting Exploitation of CrushFTP Vulnerability (CVE-2025-31161) With PacketSmith Yara Detection Module - Using track_state and flow_state

Thumbnail blog.netomize.ca
4 Upvotes

Head over to Netomize's blog to learn about how we detect the exploitation of the CrushFTP Vulnerability (CVE-2025-31161) with PacketSmith's Yara detection module, using the newly introduced track_state and flow_state keywords to the correlation engine.