kriware :verified:

Security Analyst at Layakk
Permanent student
Kriware Security Feed: Feed of technical blogs about cybersecurity. -> Telegram Channel: t.me/kriwarefeed
YouTuber: kriware
RootedCON co-organizer

kriware :verified:kriware@infosec.exchange
2026-01-10

TP-Link Tapo C200 Hacking

An analysis found hardcoded private keys, multiple buffer overflow and unauthenticated API in the Tapo C200 firmware

evilsocket.net/2025/12/18/TP-L

#ai

kriware :verified:kriware@infosec.exchange
2026-01-09

CVE-2025-43530: Exploiting a private API for VoiceOver

A flaw in macOS’s ScreenReader.framework private API lets attackers bypass TCC and run AppleScript to access sensitive data.

jhftss.github.io/CVE-2025-4353

#TCC #macOS

kriware :verified:kriware@infosec.exchange
2026-01-08

Parked Domains Turned into Malicious Vectors

Article explains how parked domains now redirect users to scams, malware, and deceptive ads via direct search abuse, making a threat.

infoblox.com/blog/threat-intel

#Malware

kriware :verified: boosted:
EuskalHackeuskalhack
2026-01-07

Calling cybersecurity experts! Call for Papers for EuskalHack Security Congress IX is open. Do you have an interesting talk or workshop? You can send us your proposal until next April > euskalhack.org/securitycongres

kriware :verified:kriware@infosec.exchange
2026-01-07

Kubernetes Networking Best Practices

Comprehensive guide on Kubernetes networking fundamentals, choosing CNIs like Calico and Cilium, and applying network policies

kubezilla.io/kubernetes-networ

#Kubernetes

kriware :verified:kriware@infosec.exchange
2026-01-01

Examining the IconCache database

Investigates the Windows IconCache.db forensic artifact, its structure, parsing methods, and usefulness for threat hunting.

thinkdfir.com/2025/12/28/exami

#DFIR #WindowsArtifacts

kriware :verified:kriware@infosec.exchange
2025-12-31

Decompiling run-only AppleScripts

Discusses decompiling run-only AppleScripts using a decompiler tool, demonstrates recovering code from obfuscated samples and malware run-only scripts

pberba.github.io/security/2025

#appleScript

kriware :verified:kriware@infosec.exchange
2025-12-18

How and Why We Hacked a Hardware Wallet

Researchers chained firmware and bootloader flaws in a crypto hardware wallet to bypass authenticity checks

darknavy.org/blog/how_and_why_

#Hardware #Firmware

kriware :verified:kriware@infosec.exchange
2025-12-17

Proof-of-concept for CVE-2025-48593: No Real Impact on Phones/Tablets

A PoC shows Android Bluetooth flaw CVE-2025-48593 crashes the service, but only on devices acting as Bluetooth headphones/speakers.

worthdoingbadly.com/bluetooth/

#Bluetooth

kriware :verified:kriware@infosec.exchange
2025-12-16

Living Off The Land in Proxmox (LOLPROX)

A red-team cheatsheet showing how native Proxmox tools can be abused for post-exploitation, including guest agent abuse, vsock tunneling, storage access, and hypervisor persistence techniques.

blog.zsec.uk/lolprox/

#Proxmox

kriware :verified:kriware@infosec.exchange
2025-12-15

WatchGuard Fireware OS IKEv2 Out-of-Bounds Write

An out-of-bounds write in WatchGuard Fireware OS IKEv2 VPN allows remote unauthenticated arbitrary code execution on affected Firebox devices.

labs.watchtowr.com/yikes-watch

#RCE #IKE

kriware :verified:kriware@infosec.exchange
2025-12-14

CVE-2025-55182 – React Server Components RCE via Flight Payload Deserialization

A critical RCE flaw in React Server Components allows unsafe deserialization of Flight payloads, enabling unauthenticated arbitrary code execution on servers.

offsec.com/blog/cve-2025-55182/

#React #RCE

kriware :verified:kriware@infosec.exchange
2025-12-09

Reverse engineering Bluetooth on Amazon Kindle eReaders

How a researcher reenabled BLE on a Kindle by bypassing its disabled stack to control page turns.

sighery.com/posts/reverse-engi

#BLE #HardwareHacking

kriware :verified:kriware@infosec.exchange
2025-12-06

macOS Infection Vector: Using AppleScripts to bypass Gatekeeper

Shows how attackers use AppleScript files disguised as fake docs or update installers to bypass Gatekeeper on macOS.

pberba.github.io/security/2025

#macOS #AppleScript

kriware :verified:kriware@infosec.exchange
2025-12-05

SupaPwn: Advanced Cloud Attack Toolkit

Explains a powerful cloud-focused toolkit that automates recon, privilege escalation, lateral movement and data exfiltration across major platforms.

hacktron.ai/blog/supapwn

#cloud

kriware :verified:kriware@infosec.exchange
2025-12-04

No Leak, No Problem — Bypassing ASLR with a ROP Chain to Gain RCE

Shows how a researcher extracts firmware, builds an ARM ROP chain, bypasses ASLR without leaks, and achieves unauthenticated RCE on an IP camera.

modzero.com/en/blog/no-leak-no

#ARM #exploiting

kriware :verified:kriware@infosec.exchange
2025-12-03

Drawbot: Let’s Hack Something Cute!

Researchers disassemble a children’s drawing-robot, dump its flash memory via SPI, reverse engineer its barcode logic and uncover hidden drawings enabling custom image injection.

atredis.com/blog/2025/9/30/dra

#hardware

kriware :verified:kriware@infosec.exchange
2025-12-02

Kernel fuzzing on Mac with syzkaller

Guide to build a VM, add a vulnerable driver and crash it using syzkaller from macOS.

slava-moskvin.medium.com/fuzzi

#fuzzing #kernel

kriware :verified:kriware@infosec.exchange
2025-12-01

Android pentesting playbook

Guide to Android app analysis, component abuse, root and TLS pinning bypass, etc

meteor-rib-8cd.notion.site/11e

#android

kriware :verified:kriware@infosec.exchange
2025-11-29

bad-opsec: Collection of links on bad opsec

A curated list of real-world cases and links showing major opsec failures (hackers, leaks, darknet markets, etc.) as learning examples.

github.com/jermanuts/bad-opsec

#opsec #privacy

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst