December 5-6-7, 2025
December 5-6-7, 2025
Administrivia: sorry for the delay, it’s been hectic. Somehow I managed to get deadlines converge on the same day and my normal “procrastinate until the last minute” process turned out to be less than ideal.
Holy shit… the exploitation of CVE-2025-55182 has reached a new level. There’s now a publicly available Chrome extension on GitHub that automatically scans for and exploits vulnerable sites as you browse. Absolutely wild. 🤦♂️ pic.twitter.com/Owpzb1llEr
— Marius Avram (@securityshell) December 5, 2025
How do IR folks deal with time zones? When someone says “12:37” without specifying, do you have to convert it to every single time zone as a possibility? Can we delete time zones
— solst/ICE of Astarte (@IceSolst) December 4, 2025
Well, a lot of people would say that’s easy because there is no 37th month, so it is obviously December 37th. It gets tricky when it’s something like 12:09.
— thaddeus e. grugq (@thegrugq) December 5, 2025
Full RCE PoC is now live @ https://t.co/VFu7NxJ3TQ
— Moritz Sanft (@stdoutput) December 4, 2025
Credit goes to @maple3142. Great job! Brilliant idea for the root reference. Felt like a CTF challenge indeed. Writing the full breakdown now. https://t.co/nLFnss4OZh
A glorious Linux LPE:https://t.co/hIdXtnKzgF
— Gergely Kalman (@gergely_kalman) December 4, 2025
Intellexa Predator cyber tool (spyware hacking user devices) operates across multiple countries, recent targets identified in Pakistan, Kazakhstan, Angola, Egypt, Uzbekistan, Saudi Arabia, and Tajikistan. Among the users are at least 25 countries including Germany, Austria,… pic.twitter.com/qwmbRwZl9X
— Lukasz Olejnik (@lukOlejnik) December 4, 2025
If you’re following the AI + cyber uplift discourse closely you’ll want to take note of this particular case study. It’s not conclusive that LLMs could not have exploited this issue but the incorrect attempts it produced, which were further amplified by the community, are a… https://t.co/2oDb2gYwZm
— chrisrohlf (@chrisrohlf) December 5, 2025
When working on enabling MTE, Apple used an arm64->arm64 version of Rosetta that emulated MTE on existing hardware.
— Longhorn (@never_released) December 4, 2025
The XNU sources talk about it now pic.twitter.com/T3GWeDz9Na
my new blogpost is out!!
— Rebane (@rebane2001) December 4, 2025
this one talks about a new web vulnerability class i discovered that allows for complex interactive cross-origin attacks and data exfiltration
and i've already used it to get a google docs bounty ^^
have fun <3https://t.co/PBct6aB24W
IISS - The Scale of Russian Sabotage Operations Against Europe’s Critical Infrastructure https://t.co/pjelJ9UcvC
— Covert Intel and Operations (@covert_intel) December 4, 2025
Declassified CIA files are a goldmine of the bizarre, and cases like “Messrs. 1569 and 1571” are exactly why people get hooked. Sometimes the strangest leads are the ones that tell us the most about the era. 🕵️♂️📁#CIA #DeclassifiedFiles #Intelligence https://t.co/eAKr1Mqlzz
— Robert Morton (@Robert4787) December 5, 2025
This is an INCREDIBLE investigative story, reported in the form of a graphic novel. Arrested by phone - a true story.
— Jason Leopold (@JasonLeopold) December 4, 2025
A must read https://t.co/k6njyDVc0G
This pretty much sums up the situation: an in-memory (!) JavaScript-based (!) webshell gets implanted into a vulnerable React server with a single(!) POST request and leaves zero(!) trace in logs or on disk.
— Florian Roth ⚡️ (@cyb3rops) December 5, 2025
Someone used that POC, successfully injected the shell and still… https://t.co/B6SBsopR07 pic.twitter.com/of7hZ7WUOw
Yesterday a CVSS 10 dropped for React Server Components.
— Peter Girnus 🦅 (@gothburz) December 4, 2025
CVE-2025-55182.
Remote code execution.
I am a 10x developer.
I make $340,000 a year.
I have vested stock options.
I have not written code since 2023.
I prompt.
My entire codebase was generated by Claude.
I don't…
Slides from @n0psledbyte, @st424204 & @Peterpan980927 at @codeblue_jp talk are also up:
— starlabs (@starlabs_sg) December 5, 2025
“Dancing with Exynos Coprocessor: Pwning Samsung for fun and ‘profit’”https://t.co/FaeX6SkoFc
Shout-out to @rainbowpigeon_ for contributing a lot in this research during his internship.
This guy is complaining that GrapheneOS “failed him”. Showing a Belgian 🇧🇪 police request for an interrogation regarding premeditated murder (as a suspect). https://t.co/3EavQpF1go
— 🕳 (@sekurlsa_pw) December 6, 2025
Slide: https://t.co/H9WiHIqUEm
— 1ce0ear (@1ce0ear) December 7, 2025
Thanks for the fantastic conference @POC_Crew :) https://t.co/bj6ZdVxFDB
This issue can be discovered by ask AI to review the commit for vulnerability and modify the testcase included in the commit until it can trigger crash!
— Toan Pham (@__suto) December 7, 2025
The only problem is these low hanging fruit is very rare, you must burn huge token to scan every commit to get one ( if lucky… https://t.co/2hNaNtwuyP
Seems also same for this medium severity and probably non exploitable case:https://t.co/rNxY0dJmlW
— Toan Pham (@__suto) December 7, 2025
Add a comment: