logo

Next-generation SaaS platform for automated infrastructure monitoring and digital resilience.

  • SIT Appliance
  • SIT Xternal
  • About SIT CyberSecurity
  • Some of Our Customers
  • Information Security Management
logo
Sep 2025 12 Categories: Uncategorized
Entry Thumbnail

Yurei & The Ghost of Open Source Ransomware

Check Point Research discovered a new ransomware group on September 5. The group calls themselves Yurei (a sort of spirit in Japanese folklore), and initially listed one victim, a Sri Lankan food manufacturing company, on their darknet blog. These blogs are used by ransomware groups to list their victims, show […]

Posted by Anders Jensen
0
Sep 2025 10 Categories: Uncategorized
Entry Thumbnail

Lost in Translation: Apache Vulnerabilities That Don’t Count (Literally)

During our security research in 2024, we discovered several vulnerabilities in Apache Foundation projects that seem to have gotten ’lost in translation’ between our bug reports and the CVE assignment process. While we’ve been patiently waiting for these findings to officially ‘count,’ they’ve apparently been stuck longer than a software […]

Posted by Anders Jensen
0
Sep 2025 10 Categories: Uncategorized
Entry Thumbnail

You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)

# You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819) We’re back – it’s a day, in a month, in a year – and once again, something has _happened._ In this week’s episode of “the Internet is made of string and there is literally no evidence […]

Posted by Anders Jensen
0
Sep 2025 08 Categories: Uncategorized
Entry Thumbnail

FFmpeg – Heap-buffer-overflow write in jpeg2000dec

**security-research** Public # FFmpeg – Heap-buffer-overflow write in jpeg2000dec ## Package ## Affected versions ## Patched versions ## Description ### Summary The vulnerability lies in the Channel Definition cdef atom of JPEG2000 which is used to define the mapping of associated components to channels. If a chroma-subsampled pixel format is […]

Posted by Anders Jensen
0
Sep 2025 08 Categories: Uncategorized
Entry Thumbnail

ChatGPT Agent – XSS on file://home/oai/redirect.html

/ **security-research** Public # ChatGPT Agent – XSS on file://home/oai/redirect.html ## Package ChatGPT Agent (OpenAI) ## Affected versions SaaS ## Patched versions None ## Description ### Summary ChatGPT’s Agent mode can use a browser inside a remote VM (just like Operator). `file:///home/oai/redirect.html` is a file available in the remote VM […]

Posted by Anders Jensen
0
Sep 2025 05 Categories: Uncategorized
Entry Thumbnail

Windows Internals: Secure Calls – The Bridge Between NT and SK

# Windows Internals: Secure Calls – The Bridge Between NT and SK ## Introduction As many are aware, without the presence of Hyper-V on modern Windows systems – kernel-mode is the “highest privilege boundary” in terms of the OS. Because the kernel is responsible for privileged operations (like memory-management) a […]

Posted by Anders Jensen
0
Sep 2025 03 Categories: Uncategorized
Entry Thumbnail

Cookie Chaos: How to bypass __Host and __Secure cookie prefixes

Researcher **Published:** 03 September 2025 at 14:46 UTC **Updated:** 03 September 2025 at 14:46 UTC Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies. In this post, you’ll see how to bypass cookie defenses using discrepancies in browser and server logic. For a visual […]

Posted by Anders Jensen
0
Sep 2025 01 Categories: Uncategorized
Entry Thumbnail

ksmbd – Fuzzing Improvements and Vulnerability Discovery

# ksmbd – Fuzzing Improvements and Vulnerability Discovery (2/3) 02 Sep 2025 – Posted by Norbert Szetei ## Introduction This is a follow-up to the article originally published here. Our initial research uncovered several unauthenticated bugs, but we had only touched the attack surface lightly. Even after patching the code […]

Posted by Anders Jensen
0
Aug 2025 31 Categories: Uncategorized
Entry Thumbnail

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System

# ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System Taesoo Kim, HyungSeok Han, Soyeon Park, Dae R. Jeong, Dohyeok Kim, Dongkwan Kim, Eunsoo Kim, Jiho Kim, Joshua Wang, Kangsu Kim, Sangwoo Ji, Woosun Song, Hanqing Zhao, Andrew Chin, Gyejin Lee, Kevin Stevens, Mansour Alharthi, Yizhuo Zhai, Cen Zhang, Joonun […]

Posted by Anders Jensen
0
Apr 2025 13 Categories: CyberSecurity
Entry Thumbnail

IT and Security Audits expects good control

IT and Security Audits expects good control Do you know how your rules are handled in practice? The uncertainty often leads to wrong investments based on subjective judgments. In our audits, we assume your rules and guidelines, but we also check the relevance against the standards and frameworks such as […]

Posted by Anders Jensen
0
← Newer posts 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Older posts →

Recent posts

  • 1/1/01, 12:00 AM
  • 1/1/01, 12:00 AM
  • Breaking Opus 4.7 with ChatGPT (Hacking Claude’s Memory)
  • Foxit, LibRaw vulnerabilities
  • Slowburn: Looking through AMD Platform Configuration Blobs infrastructure
  • Home
  • About us
  • Blog
  • Customers
  • Information Security Management
  • News
  • Privacy Policy
  • SIT Appliance
  • SIT Professional Services
  • SIT Xternal

SIT Solutions

SIT Appliance

SIT Xternal

About Us

Customers

Information Security Management

Emailsales @ sit-cybersecurity.com

SIT CyberSecurity LinkedIn

Privacy Policy

  • icon icon Facebook
  • icon icon Youtube
  • icon icon Twitter
  • icon icon Flickr
  • icon icon Rss

When you visit this site, cookies will be placed on your machine for tracking visitor activity anonymously and remembering user preferences. We set a cookie to remember that you don't want to see this infobar that warns you about cookies on this site. If you click the button to enable this, you will not see this infobar on future visits* and you will opt in to having a cookie placed on your machine by us. This site makes use of some third party services who also store cookies (Third party cookies) on your machine.

These services are:
– Google Analytics
– Google AdSense

If you would like more general information on controlling cookies, please visit www.aboutcookies.org.

*Note: cookies are browser-specific. If you visit using a different browser or on another machine, you may see the infobar again.

Enable