logo

Information Security Managed

  • SIT Appliance
  • SIT Xternal
  • SIT Professional Services
  • icon
    • About SIT CyberSecurity
    • Some of Our Customers
    • Information Security Management
logo
Sep 2025 10 Categories: Uncategorized
Entry Thumbnail

Lost in Translation: Apache Vulnerabilities That Don’t Count (Literally)

During our security research in 2024, we discovered several vulnerabilities in Apache Foundation projects that seem to have gotten ’lost in translation’ between our bug reports and the CVE assignment process. While we’ve been patiently waiting for these findings to officially ‘count,’ they’ve apparently been stuck longer than a software […]

Posted by Anders Jensen
0
Sep 2025 10 Categories: Uncategorized
Entry Thumbnail

You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)

# You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819) We’re back – it’s a day, in a month, in a year – and once again, something has _happened._ In this week’s episode of “the Internet is made of string and there is literally no evidence […]

Posted by Anders Jensen
0
Sep 2025 08 Categories: Uncategorized
Entry Thumbnail

FFmpeg – Heap-buffer-overflow write in jpeg2000dec

**security-research** Public # FFmpeg – Heap-buffer-overflow write in jpeg2000dec ## Package ## Affected versions ## Patched versions ## Description ### Summary The vulnerability lies in the Channel Definition cdef atom of JPEG2000 which is used to define the mapping of associated components to channels. If a chroma-subsampled pixel format is […]

Posted by Anders Jensen
0
Sep 2025 08 Categories: Uncategorized
Entry Thumbnail

ChatGPT Agent – XSS on file://home/oai/redirect.html

/ **security-research** Public # ChatGPT Agent – XSS on file://home/oai/redirect.html ## Package ChatGPT Agent (OpenAI) ## Affected versions SaaS ## Patched versions None ## Description ### Summary ChatGPT’s Agent mode can use a browser inside a remote VM (just like Operator). `file:///home/oai/redirect.html` is a file available in the remote VM […]

Posted by Anders Jensen
0
Sep 2025 05 Categories: Uncategorized
Entry Thumbnail

Windows Internals: Secure Calls – The Bridge Between NT and SK

# Windows Internals: Secure Calls – The Bridge Between NT and SK ## Introduction As many are aware, without the presence of Hyper-V on modern Windows systems – kernel-mode is the “highest privilege boundary” in terms of the OS. Because the kernel is responsible for privileged operations (like memory-management) a […]

Posted by Anders Jensen
0
Sep 2025 03 Categories: Uncategorized
Entry Thumbnail

Cookie Chaos: How to bypass __Host and __Secure cookie prefixes

Researcher **Published:** 03 September 2025 at 14:46 UTC **Updated:** 03 September 2025 at 14:46 UTC Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies. In this post, you’ll see how to bypass cookie defenses using discrepancies in browser and server logic. For a visual […]

Posted by Anders Jensen
0
Sep 2025 01 Categories: Uncategorized
Entry Thumbnail

ksmbd – Fuzzing Improvements and Vulnerability Discovery

# ksmbd – Fuzzing Improvements and Vulnerability Discovery (2/3) 02 Sep 2025 – Posted by Norbert Szetei ## Introduction This is a follow-up to the article originally published here. Our initial research uncovered several unauthenticated bugs, but we had only touched the attack surface lightly. Even after patching the code […]

Posted by Anders Jensen
0
Aug 2025 31 Categories: Uncategorized
Entry Thumbnail

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System

# ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System Taesoo Kim, HyungSeok Han, Soyeon Park, Dae R. Jeong, Dohyeok Kim, Dongkwan Kim, Eunsoo Kim, Jiho Kim, Joshua Wang, Kangsu Kim, Sangwoo Ji, Woosun Song, Hanqing Zhao, Andrew Chin, Gyejin Lee, Kevin Stevens, Mansour Alharthi, Yizhuo Zhai, Cen Zhang, Joonun […]

Posted by Anders Jensen
0
Apr 2025 13 Categories: CyberSecurity
Entry Thumbnail

IT and Security Audits expects good control

IT and Security Audits expects good control Do you know how your rules are handled in practice? The uncertainty often leads to wrong investments based on subjective judgments. In our audits, we assume your rules and guidelines, but we also check the relevance against the standards and frameworks such as […]

Posted by Anders Jensen
0
Dec 2024 07 Categories: CyberSecurity
Entry Thumbnail

Your documents may contain hidden information

Your documents may contain hidden information There is more information than you can believe in many of the files that a company’s employees attach to their email… They contain not only the text you see directly, but also hidden data called metadata, which is simpler data describing data! Metadata in […]

Posted by Anders Jensen
0
← Newer posts 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Recent posts

  • Post Title
  • How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
  • The MCP AuthN/Z Nightmare
  • Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
  • Silver Dragon Targets Organizations in Southeast Asia and Europe
  • Home
  • About us
  • Blog
  • Customers
  • Information Security Management
  • News
  • Privacy Policy
  • SIT Appliance
  • SIT Professional Services
  • SIT Xternal

SIT Solutions

SIT Appliance

SIT Xternal

SIT Professional Services

More Information

About Us

Customers

Information Security Management

Emailsales @ sit-cybersecurity.com

SIT CyberSecurity LinkedIn

Privacy Policy

  • icon icon Facebook
  • icon icon Youtube
  • icon icon Twitter
  • icon icon Flickr
  • icon icon Rss

When you visit this site, cookies will be placed on your machine for tracking visitor activity anonymously and remembering user preferences. We set a cookie to remember that you don't want to see this infobar that warns you about cookies on this site. If you click the button to enable this, you will not see this infobar on future visits* and you will opt in to having a cookie placed on your machine by us. This site makes use of some third party services who also store cookies (Third party cookies) on your machine.

These services are:
– Google Analytics
– Google AdSense

If you would like more general information on controlling cookies, please visit www.aboutcookies.org.

*Note: cookies are browser-specific. If you visit using a different browser or on another machine, you may see the infobar again.

Enable