Explore >> Select a destination


You are here

www.malwaretech.com
| | rubenerd.com
6.3 parsecs away

Travel
| | By Ruben Schade in Sydney, Australia. ??
| | so.nwalsh.com
4.8 parsecs away

Travel
| | I've pushed an update for the XML Resolver, 6.0.13, and a patch on the legacy V5 branch, 5.3.0, to address a security vulnerability.
| | malwaretech.com
1.1 parsecs away

Travel
| | Since i got into firmware hacking, I've been working on a little project behind the scenes: A hard disk firmware based rootkit which allows malware to survive an operating system re-install or full disk format. Unfortunately I can't post a proof of concept for many reasons (people have even contacted me just to tell me not to post it), so instead I've written a presentation overviewing and explaining the rootkit, which I've dubbed MT-SBK. The general purpose of MT-SBK is to provide a "framework" for my previous project, TinyXPB, A windows XP bootkit. This framework enables TinyXPB to be stored and loaded from within the hard disk firmware, preventing it from being removed by: antiviruses, operating system re-installs, or even full disk reformats. This rootki...
| | www.sysdig.com
48.4 parsecs away

Travel
| CVE-2025-49844 (RediShell) is a critical Redis remote code execution vulnerability (CVSS 10.0) affecting all versions with Lua scripting. Discovered by Wiz and patched on October 3 2025, it allows authenticated users to gain host access. Learn how it works, who's affected, and how to detect and mitigate it.