February 26, 2025 at 01:49PM

■■■□□ Interesting thread | 𝕏 Deep dive into the Signal arbitrary deletion vulnerability I discovered in Signal Desktop: In Signal Desktop, attachments are stored in a designated folder (typically “attachments.noindex”). The deletion logic resolves this folder’s absolute path using fs.realpathSync, which inherently follows symbolic links. https://x.com/jipisback/status/1894682205500088793

February 25, 2025 at 05:21PM

ANY.RUN presents an educational program on malware analysis, a course designed for university and students, individual researchers, and security teams. You will upgrade your skills and get: 》Quality education in the field of malware analysis 》Practical application of theoretical knowledge 》Access to relevant educational materials 》Interactive classes with real simulations and laboratory work 》Certificate at…

February 24, 2025 at 10:58AM

■■■□□ YT exploit semi-deep dive: Two YouTube redirect abuses. First, copy a redirect URL from a video’s description, paste it out, and edit the original website to whatever website you’d like to create an open redirect. Example: Zcw&q=https%3A%2F%2Fbad.com%2F&v=ivbQ_Ubo3YU Then simply change the “q=” parameter to any URL, even a malicious one because YouTube doesn’t revalidate…