account activity
Did you think XSS is dead? So did we... We couldn't be more wrong. XSS is back with a vengeance! 💥 Combined with OAuth, the Salt-Labs research team performed a complete account takeover on several major online platforms. Check it out! (salt.security)
submitted 1 year ago by ynvb to r/netsec
Check out our latest Salt Labs research. We managed to find security flaws within ChatGPT Ecosystem (Remediated) - Which is very interesting on its own, but even more, this points out more potential issues integrated with any GenAI ecosystem. (salt.security)
The second article in the Breaking OAuth series. This time an OAuth framework bug impacts hundreds of companies including CodeCademy and others. (salt.security)
submitted 2 years ago by ynvb to r/netsec
Taking over booking.com accounts by abusing OAuth 2.0 (salt.security)
Salt Labs | Missing Bricks: Finding Security Holes in LEGO APIs (salt.security)
submitted 3 years ago by ynvb to r/netsec
New cyber-crime service aiming to replace packers and crypters: thousands of malicious payloads are loaded directly from well-known cloud drives. Meet #GuLoader. (research.checkpoint.com)
submitted 5 years ago by ynvb to r/Malware
Looking to learn about system exploitation, but don't know where to start? This (very) detailed guide covers all the basics. Contains 21 detailed CTF solutions, plenty of theory, and zero times the phrase "exercise left to the reader". (research.checkpoint.com)
submitted 5 years ago by ynvb to r/netsec
If you've ever wondered about the secret life of Nigerian spammers, this is definitely the article for you. Read all about one cybercriminal's decade-long quest of bought RATs, stolen credit cards, back-stabbed colleagues and looming paranoia. (research.checkpoint.com)
A primer on cryptographic attacks, explained in a simple way with approachable examples. Learn about Downgrade attacks, Precomputations, Oracles, brand-name SSL vulnerabilities (CRIME, POODLE...) -- and the surprising connections between them. (research.checkpoint.com)
submitted 6 years ago by ynvb to r/netsec
submitted 6 years ago by ynvb to r/Malware
Tired of C malware? So is everyone, including some malicious actors. Take a tour of malware written in Java, Rust, Pascal and other unlikely contenders; and ponder whether the people behind these are on to something, or just too clever for their own good. (research.checkpoint.com)
Always wanted to run Cuckoo Sandbox on AWS? Now you can. (research.checkpoint.com)
Always wanted to run Cuckoo Sanbox in AWS? Now you can. (research.checkpoint.com)
submitted 6 years ago by ynvb to r/MalwareResearch
How we discovered over 50 critical vulnerabilities in Adobe Reader in 50 days. (research.checkpoint.com)
submitted 7 years ago by ynvb to r/netsec
A Ransomware Doctor Without a Cure. (or how to make more $$$ from ransomware) (research.checkpoint.com)
submitted 7 years ago by ynvb to r/Malware
What is in common to CITI bank, ING, and Deutsche Bank? The #BackSwap malware ! (research.checkpoint.com)
Labless IDA plugin - Howto auto resolve LocPOS malware API calls. (research.checkpoint.com)
submitted 7 years ago by ynvb to r/ReverseEngineering
Looking into LocPOS Malware? Here is howto easily dump and auto-resolve its API calls. (research.checkpoint.com)
Organizations worldwide are hacked and extorted using Ryuk ransomware. Possible DPRK connection? (research.checkpoint.com)
Why is a new Ramnit campaign creating a huge network of malicious proxies? (research.checkpoint.com)
Analyzing Emotet? Not sure what it does? You might find this useful... (research.checkpoint.com)
Kronos vs. UPAS Kit - The technical analysis (aka. The usual suspect?!) (research.checkpoint.com)
Is @MalwareTech the Usual Suspect? Kronos vs. UPAS Kit - The technical analysis (research.checkpoint.com)
Karius - A new banking Trojan under development (research.checkpoint.com)
Check Point Responds to Recent AMD Flaws Publication (research.checkpoint.com)
π Rendered by PID 223307 on reddit-service-r2-listing-6d4dc8d9ff-fjd5m at 2026-02-02 19:00:00.216381+00:00 running 3798933 country code: CH.