Google urges open source community to fuzz test code

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Google’s open source security team says OSS-Fuzz, its community fuzzing service, has helped fix more than 8,000 security vulnerabilities and

Read more

How a Russian cyberwar in Ukraine could ripple out globally

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Russia has sent more than 100,000 soldiers to the nation’s border with Ukraine, threatening a war, unlike anything Europe has

Read more

Cheat Sheet for Analyzing Malicious Software

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

This cheat sheet presents tips for analyzing and reverse-engineering malware. It outlines the steps for performing behavioral and code-level analysis

Read more

October CMS Build 465 – Arbitrary File Read Exploit (Authenticated) 11-13

Date added: 2020-11-13 Just one of many vulns discovered on this cms. # Exploit Title: October CMS Build 465 –

Read more

Microsoft Windows Local Spooler Bypass Vulnerability

One way of exploiting this on Windows 10 200x is to understand that FileNormalizedNameInformation will fail if the new path

Read more

SaltStack Salt REST API Arbitrary Command Execution Exploit

Date added 12-11-2020 This Metasploit module exploits an authentication bypass and command injection in SaltStack Salt’s REST API to execute

Read more