TP-Link Tapo C200 Hacking
An analysis found hardcoded private keys, multiple buffer overflow and unauthenticated API in the Tapo C200 firmware
Security Analyst at Layakk Permanent student Kriware Security Feed: Feed of technical blogs about cybersecurity. -> Telegram Channel: https://t.me/kriwarefeed YouTuber: kriware RootedCON co-organizer
TP-Link Tapo C200 Hacking
An analysis found hardcoded private keys, multiple buffer overflow and unauthenticated API in the Tapo C200 firmware
CVE-2025-43530: Exploiting a private API for VoiceOver
A flaw in macOS’s ScreenReader.framework private API lets attackers bypass TCC and run AppleScript to access sensitive data.
Parked Domains Turned into Malicious Vectors
Article explains how parked domains now redirect users to scams, malware, and deceptive ads via direct search abuse, making a threat.
Calling cybersecurity experts! Call for Papers for EuskalHack Security Congress IX is open. Do you have an interesting talk or workshop? You can send us your proposal until next April > https://www.euskalhack.org/securitycongress/CFP/CFP_EuskalHack2026_EN.txt #CFP #ESCIX #SecurityCongress
Kubernetes Networking Best Practices
Comprehensive guide on Kubernetes networking fundamentals, choosing CNIs like Calico and Cilium, and applying network policies
https://kubezilla.io/kubernetes-networking-best-practices-a-complete-guide-for-2025/
Examining the IconCache database
Investigates the Windows IconCache.db forensic artifact, its structure, parsing methods, and usefulness for threat hunting.
https://thinkdfir.com/2025/12/28/examining-the-iconcache-database/
Decompiling run-only AppleScripts
Discusses decompiling run-only AppleScripts using a decompiler tool, demonstrates recovering code from obfuscated samples and malware run-only scripts
https://pberba.github.io/security/2025/12/14/decompiling-run-only-applescripts/
How and Why We Hacked a Hardware Wallet
Researchers chained firmware and bootloader flaws in a crypto hardware wallet to bypass authenticity checks
https://www.darknavy.org/blog/how_and_why_we_hacked_cypherock_hardware_wallet_the_full_story/
Proof-of-concept for CVE-2025-48593: No Real Impact on Phones/Tablets
A PoC shows Android Bluetooth flaw CVE-2025-48593 crashes the service, but only on devices acting as Bluetooth headphones/speakers.
Living Off The Land in Proxmox (LOLPROX)
A red-team cheatsheet showing how native Proxmox tools can be abused for post-exploitation, including guest agent abuse, vsock tunneling, storage access, and hypervisor persistence techniques.
WatchGuard Fireware OS IKEv2 Out-of-Bounds Write
An out-of-bounds write in WatchGuard Fireware OS IKEv2 VPN allows remote unauthenticated arbitrary code execution on affected Firebox devices.
https://labs.watchtowr.com/yikes-watchguard-fireware-os-ikev2-out-of-bounds-write-cve-2025-9242/
CVE-2025-55182 – React Server Components RCE via Flight Payload Deserialization
A critical RCE flaw in React Server Components allows unsafe deserialization of Flight payloads, enabling unauthenticated arbitrary code execution on servers.
Reverse engineering Bluetooth on Amazon Kindle eReaders
How a researcher reenabled BLE on a Kindle by bypassing its disabled stack to control page turns.
https://sighery.com/posts/reverse-engineering-bluetooth-on-kindle-ereaders/
macOS Infection Vector: Using AppleScripts to bypass Gatekeeper
Shows how attackers use AppleScript files disguised as fake docs or update installers to bypass Gatekeeper on macOS.
https://pberba.github.io/security/2025/11/11/macos-infection-vector-applescript-bypass-gatekeeper/
SupaPwn: Advanced Cloud Attack Toolkit
Explains a powerful cloud-focused toolkit that automates recon, privilege escalation, lateral movement and data exfiltration across major platforms.
No Leak, No Problem — Bypassing ASLR with a ROP Chain to Gain RCE
Shows how a researcher extracts firmware, builds an ARM ROP chain, bypasses ASLR without leaks, and achieves unauthenticated RCE on an IP camera.
Drawbot: Let’s Hack Something Cute!
Researchers disassemble a children’s drawing-robot, dump its flash memory via SPI, reverse engineer its barcode logic and uncover hidden drawings enabling custom image injection.
https://www.atredis.com/blog/2025/9/30/drawbot-lets-hack-something-cute
Kernel fuzzing on Mac with syzkaller
Guide to build a VM, add a vulnerable driver and crash it using syzkaller from macOS.
Android pentesting playbook
Guide to Android app analysis, component abuse, root and TLS pinning bypass, etc
bad-opsec: Collection of links on bad opsec
A curated list of real-world cases and links showing major opsec failures (hackers, leaks, darknet markets, etc.) as learning examples.