cvsweb.openbsd.org fights AI crawler bots by redirecting hotlinking requests to theannoyingsite.com (labelled "Malware" by eero), gets blacklisted by eero, too, for "Phishing & Deception"
https://ift.tt/jpDm63U
Submitted January 25, 2026 at 10:16PM by Mcnst
via reddit https://ift.tt/lnvkDes
https://ift.tt/jpDm63U
Submitted January 25, 2026 at 10:16PM by Mcnst
via reddit https://ift.tt/lnvkDes
Your Vibe Coded AI App Can Bankrupt You
https://ift.tt/iy1Seap
Submitted January 26, 2026 at 12:31AM by utku1337
via reddit https://ift.tt/kINLoDB
https://ift.tt/iy1Seap
Submitted January 26, 2026 at 12:31AM by utku1337
via reddit https://ift.tt/kINLoDB
Substack
Your Vibe Coded AI App Can Bankrupt You
Vibe coders may not realize they could wake up to a $20,000 cloud bill. This article explains the risks and how to avoid them.
địt mẹ mày morphisec: When Malware Authors Taunt Security Researchers
https://ift.tt/GZSTV2B
Submitted January 26, 2026 at 02:04AM by GelosSnake
via reddit https://ift.tt/VLJrU1M
https://ift.tt/GZSTV2B
Submitted January 26, 2026 at 02:04AM by GelosSnake
via reddit https://ift.tt/VLJrU1M
profero.io
địt mẹ mày morphisec: When Malware Authors Taunt Security Researchers
The complete analysis of Vietnamese Stealer a Python-based info stealer using Telegram as a C2.
/r/netsec's Q1 2026 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.iss.onention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted January 26, 2026 at 06:59AM by netsec_burn
via reddit https://ift.tt/9KF12cT
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.iss.onention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted January 26, 2026 at 06:59AM by netsec_burn
via reddit https://ift.tt/9KF12cT
Reddit
From the netsec community on Reddit
Explore this post and more from the netsec community
Certificate Transparency as Communication Channel
https://latedeployment.github.io/posts/certificate-transparency-as-communication-channel/
Submitted January 26, 2026 at 12:52AM by MembershipOptimal777
via reddit https://ift.tt/alvrwKd
https://latedeployment.github.io/posts/certificate-transparency-as-communication-channel/
Submitted January 26, 2026 at 12:52AM by MembershipOptimal777
via reddit https://ift.tt/alvrwKd
A lazy blog
Certificate Transparency as Communication Channel
This is part three of the Certificate Transparency series.
Introduction
Described here is a way to leverage the infrastructure used to validate certificates in order to distribute messages through the Certificate Transparency Logs.
Introduction
Described here is a way to leverage the infrastructure used to validate certificates in order to distribute messages through the Certificate Transparency Logs.
"Open sesame": Critical vulnerabilities in dormakaba physical access control system enable unlocking arbitrary doors
https://ift.tt/bdiNeZk
Submitted January 26, 2026 at 04:21PM by 0x9000
via reddit https://ift.tt/51WADZR
https://ift.tt/bdiNeZk
Submitted January 26, 2026 at 04:21PM by 0x9000
via reddit https://ift.tt/51WADZR
SEC Consult
Hands-Free Lockpicking: Critical Vulnerabilities in dormakaba’s Physical Access Control System
AI Finds Vulnerability Chain Leading to Account Takeover and Leaked Bookings
https://ift.tt/saj4HeA
Submitted January 26, 2026 at 07:14PM by Same-Cauliflower-830
via reddit https://ift.tt/gmEYGpl
https://ift.tt/saj4HeA
Submitted January 26, 2026 at 07:14PM by Same-Cauliflower-830
via reddit https://ift.tt/gmEYGpl
www.gecko.security
How Broken Access Controls in Cal.com Leaked Millions of Bookings and Enabled Complete Account Takeover | Gecko Security
Gecko's AI security engineer discovered critical chained vulnerabilities in Cal.com Cloud that allowed complete account takeover and exposed all booking data.
After reporting vulnerabilities found in MDT, Microsoft chose to retire the service rather than fix the issues... Admins should follow the defensive recommendations to mitigate the issues if they choose to continue using the software or can’t migrate to a different solution.
https://ift.tt/6lgExRB
Submitted January 26, 2026 at 07:04PM by TheDarthSnarf
via reddit https://ift.tt/jiLETyK
https://ift.tt/6lgExRB
Submitted January 26, 2026 at 07:04PM by TheDarthSnarf
via reddit https://ift.tt/jiLETyK
SpecterOps
Task Failed Successfully - Microsoft’s “Immediate” Retirement of MDT - SpecterOps
After reporting vulnerabilities found in MDT, Microsoft chose to retire the service rather than fix the issues. As of January 6, 2025, Microsoft stopped supporting MDT and will no longer provide updates, including security patches.
Bypassing Windows Administrator Protection
https://ift.tt/l7TnPW5
Submitted January 26, 2026 at 11:26PM by thewhippersnapper4
via reddit https://ift.tt/gZbyEd8
https://ift.tt/l7TnPW5
Submitted January 26, 2026 at 11:26PM by thewhippersnapper4
via reddit https://ift.tt/gZbyEd8
projectzero.google
Bypassing Windows Administrator Protection - Project Zero
A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...
Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission
https://ift.tt/0sANbd9
Submitted January 27, 2026 at 02:08AM by safeaim
via reddit https://ift.tt/rZpwWsl
https://ift.tt/0sANbd9
Submitted January 27, 2026 at 02:08AM by safeaim
via reddit https://ift.tt/rZpwWsl
Graham Helton
Kubernetes Remote Code Execution
Via Nodes/Proxy GET Permission
Via Nodes/Proxy GET Permission
An authorization bypass in
Kubernetes RBAC allows for nodes/proxy GET permissions to execute
commands in any Pod in the cluster.
Kubernetes RBAC allows for nodes/proxy GET permissions to execute
commands in any Pod in the cluster.
One-Click Hack Against Popular Video Platform
https://ift.tt/Fc2YAfw
Submitted January 27, 2026 at 10:51PM by derp6996
via reddit https://ift.tt/sQ5MyUz
https://ift.tt/Fc2YAfw
Submitted January 27, 2026 at 10:51PM by derp6996
via reddit https://ift.tt/sQ5MyUz
Claroty
New Architecture, New Risks: One-Click to Pwn IDIS IP Cameras
Team82 uncovered a one-click remote-code execution vulnerability affecting IDIS Cloud Manager viewer that could be exploited to give an attacker the ability to view live video feeds, recordings, and search images on the video surveillance system.
Audited hypervisor kernel escapes in regulated environments — Ring 0 is the real attack surface
https://ift.tt/61Iq0Vf
Submitted January 27, 2026 at 10:30PM by NTCTech
via reddit https://ift.tt/XMYU98Z
https://ift.tt/61Iq0Vf
Submitted January 27, 2026 at 10:30PM by NTCTech
via reddit https://ift.tt/XMYU98Z
Rack2Cloud
Hypervisor Kernel Hardening: KASLR, SEDs & Drift Control
Stop hypervisor escapes. Compare KASLR vs HVCI, calculate SED TCO ($0.04/GB), and eliminate config drift. Deterministic engineering for Day 2 Ops.
Why code indexing matters for AI security tools
https://ift.tt/yMdYLg9
Submitted January 28, 2026 at 12:23AM by Same-Cauliflower-830
via reddit https://ift.tt/i2DV50G
https://ift.tt/yMdYLg9
Submitted January 28, 2026 at 12:23AM by Same-Cauliflower-830
via reddit https://ift.tt/i2DV50G
www.gecko.security
Why Static Analysis Struggles with Business Logic Vulnerabilities | Gecko Security
The gap between tracking where data flows and reasoning about whether the logic is correct.
OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows
https://ift.tt/dyk6Ug7
Submitted January 28, 2026 at 12:48AM by RedTermSession
via reddit https://ift.tt/hWPHLRu
https://ift.tt/dyk6Ug7
Submitted January 28, 2026 at 12:48AM by RedTermSession
via reddit https://ift.tt/hWPHLRu
Datadoghq
OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows
A deep dive into OpenSSL’s January 2026 CMS and PKCS#12 vulnerabilities, including a pre-auth stack overflow and a PKCS#12 parsing bug.
Safeguarding sources and sensitive information in the event of a raid
https://freedom.press/digisec/blog/safeguarding-sources-and-sensitive-information-in-the-event-of-a-raid/
Submitted January 28, 2026 at 02:00AM by FreedomofPress
via reddit https://ift.tt/pISAxUH
https://freedom.press/digisec/blog/safeguarding-sources-and-sensitive-information-in-the-event-of-a-raid/
Submitted January 28, 2026 at 02:00AM by FreedomofPress
via reddit https://ift.tt/pISAxUH
Freedom of the Press
Safeguarding sources and sensitive information in the event of a raid
Following the search of Washington Post reporter Hannah Natanson’s home, here are concrete steps to take to safeguard yourself and your sources
Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals
https://ift.tt/NPcwZQ3
Submitted January 28, 2026 at 09:24AM by bouncyhat
via reddit https://ift.tt/9SHOoJw
https://ift.tt/NPcwZQ3
Submitted January 28, 2026 at 09:24AM by bouncyhat
via reddit https://ift.tt/9SHOoJw
Praetorian
Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals
Swarmer enables stealthy Windows registry persistence by exploiting mandatory user profiles and the Offline Registry API to bypass EDR detection. Learn how this technique leverages NTUSER.MAN files to modify the registry without triggering standard API monitoring.
[Research] Analysis of 74,636 AI Agent Interactions: 37.8% Contained Attack Attempts - New "Inter-Agent Attack" Category Emerges
https://ift.tt/NdKln7j
Submitted January 28, 2026 at 12:00PM by cyberamyntas
via reddit https://ift.tt/RimNwS6
https://ift.tt/NdKln7j
Submitted January 28, 2026 at 12:00PM by cyberamyntas
via reddit https://ift.tt/RimNwS6
raxe.ai
AI Threat Intelligence Report - Week 3, 2026
28,194 threats detected. Interactive analysis of AI attack patterns targeting LLMs and AI agents.
Blind Boolean-Based Prompt Injection
https://ift.tt/bvTJQGP
Submitted January 26, 2026 at 07:45PM by -rootcauz-
via reddit https://ift.tt/X2tfYkr
https://ift.tt/bvTJQGP
Submitted January 26, 2026 at 07:45PM by -rootcauz-
via reddit https://ift.tt/X2tfYkr
Medium
Blind Boolean-Based Prompt Injection
In this post, I introduce and demonstrate the attack method Blind Boolean-Based Prompt Injection (BBPI) which is a prompt injection…
CVE-2025-40551: SolarWinds WebHelpDesk RCE Deep-Dive and Indicators of Compromise
https://ift.tt/TKcnfpm
Submitted January 28, 2026 at 10:19PM by scopedsecurity
via reddit https://ift.tt/uMqw5zb
https://ift.tt/TKcnfpm
Submitted January 28, 2026 at 10:19PM by scopedsecurity
via reddit https://ift.tt/uMqw5zb
Horizon3.ai
CVE-2025-40551: SolarWinds WHD RCE
Horizon3.ai discovered multiple vulnerabilities in SolarWinds Web Help Desk that enable unauthenticated remote code execution.
Fun RCE in Command & Conquer: Generals
https://ift.tt/48ECdTm
Submitted January 28, 2026 at 09:32PM by jordan9001
via reddit https://ift.tt/sqkQdJE
https://ift.tt/48ECdTm
Submitted January 28, 2026 at 09:32PM by jordan9001
via reddit https://ift.tt/sqkQdJE
Atredis Partners
General Graboids: Worms and Remote Code Execution in Command & Conquer — Atredis Partners
[this work was conducted collaboratively by Bryan Alexander and Jordan Whitehead] This post details several vulnerabilities discovered in the popular online game Command & Conquer: Generals. We recently presented some of this work at an information security…
Limits of static guarantees under adaptive adversaries (G-CTR experience)
https://ift.tt/wOtMVy7
Submitted January 28, 2026 at 10:51PM by Obvious-Language4462
via reddit https://ift.tt/PnICtVD
https://ift.tt/wOtMVy7
Submitted January 28, 2026 at 10:51PM by Obvious-Language4462
via reddit https://ift.tt/PnICtVD
arXiv.org
Cybersecurity AI: A Game-Theoretic AI for Guiding Attack and Defense
AI-driven penetration testing now executes thousands of actions per hour but still lacks the strategic intuition humans apply in competitive security. To build cybersecurity superintelligence...