We ran a live red-team vs blue-team test on autonomous OpenClaw agents
https://ift.tt/lLhnNAd
Submitted February 01, 2026 at 06:49PM by Uditakhourii
via reddit https://ift.tt/aDpjouJ
https://ift.tt/lLhnNAd
Submitted February 01, 2026 at 06:49PM by Uditakhourii
via reddit https://ift.tt/aDpjouJ
r/netsec monthly discussion & tool thread
Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on r/netsec.As always, the content & discussion guidelines should also be observed on r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted February 01, 2026 at 07:59PM by albinowax
via reddit https://ift.tt/WpCKJZn
Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on r/netsec.As always, the content & discussion guidelines should also be observed on r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted February 01, 2026 at 07:59PM by albinowax
via reddit https://ift.tt/WpCKJZn
Reddit
From the netsec community on Reddit
Explore this post and more from the netsec community
Comparing different IP Geolocation Provider's Accuracy
https://ift.tt/zZPiOVM
Submitted February 01, 2026 at 11:09PM by incolumitas
via reddit https://ift.tt/fciEZ3w
https://ift.tt/zZPiOVM
Submitted February 01, 2026 at 11:09PM by incolumitas
via reddit https://ift.tt/fciEZ3w
ipapi.is
ipapi.is - On IP Geolocation Accuracy: A Comparative Study
ipapi.is offers precise IP data via a user-friendly API, encompassing geolocation, ASN data, hosting detection, VPN detection, and proxy detection.
1-Click RCE in OpenClaw/Moltbot/ClawdBot
https://ift.tt/P68eVRJ
Submitted February 01, 2026 at 11:42PM by va_start
via reddit https://ift.tt/ZFzBp24
https://ift.tt/P68eVRJ
Submitted February 01, 2026 at 11:42PM by va_start
via reddit https://ift.tt/ZFzBp24
Depthfirst
depthfirst | 1-Click RCE To Steal Your Moltbot Data and Keys
A technical teardown of a 1-click RCE against OpenClaw (formerly Moltbot/ClawdBot), a viral open-source AI assistant trusted by 100,000+ developers with high-privilege access. See how a settings logic flaw and a WebSocket pivot turn a single webpage visit…
Notepad++ Hijacked by State-Sponsored Hackers
https://ift.tt/pfUOB7d
Submitted February 02, 2026 at 07:50AM by thewhippersnapper4
via reddit https://ift.tt/htKp0bB
https://ift.tt/pfUOB7d
Submitted February 02, 2026 at 07:50AM by thewhippersnapper4
via reddit https://ift.tt/htKp0bB
Your Phone Silently Sends GPS to Your Carrier via RRLP/LPP – Here's How the Control Plane Positioning Works
https://ift.tt/XfRGxQy
Submitted February 02, 2026 at 12:12PM by Upper-Host3983
via reddit https://ift.tt/wEPD0ov
https://ift.tt/XfRGxQy
Submitted February 02, 2026 at 12:12PM by Upper-Host3983
via reddit https://ift.tt/wEPD0ov
Sudheer Singh
Your Phone Silently Sends GPS to Your Carrier — Here's How
RRLP and LPP protocols let carriers silently extract your precise GPS location. No app permissions, no notification. Here's the technical breakdown.
vr2jb: Pwning the PlayStation VR2 using Sony's hidden recovery mode
https://ift.tt/Axq6Dnh
Submitted February 02, 2026 at 02:31PM by Titokhan
via reddit https://ift.tt/Q4vCq5u
https://ift.tt/Axq6Dnh
Submitted February 02, 2026 at 02:31PM by Titokhan
via reddit https://ift.tt/Q4vCq5u
Bnuuy Solutions
The path to pwning the PS VR2 (part 1) - “Recovery mode”
How a fatal mistake in the PS VR2 authentication code leads to us discovering a way to enter a “recovery mode”, allowing us to downgrade the PS VR2 to any firmware.
AppLocker Rules Abuse
https://ift.tt/BKTNHcQ
Submitted February 02, 2026 at 05:48PM by netbiosX
via reddit https://ift.tt/5UeLPVA
https://ift.tt/BKTNHcQ
Submitted February 02, 2026 at 05:48PM by netbiosX
via reddit https://ift.tt/5UeLPVA
Purple Team
AppLocker Rules Abuse
AppLocker was introduced by Microsoft in Windows 7 to enable organizations to define which executables, scripts or installers are allowed to run in their environments. AppLocker can reduce the atta…
WhatsApp Encryption, a Lawsuit, and a Lot of Noise
https://ift.tt/Vy1YAqk
Submitted February 03, 2026 at 12:02AM by feross
via reddit https://ift.tt/AvlR8yE
https://ift.tt/Vy1YAqk
Submitted February 03, 2026 at 12:02AM by feross
via reddit https://ift.tt/AvlR8yE
A Few Thoughts on Cryptographic Engineering
WhatsApp Encryption, a Lawsuit, and a Lot of Noise
It’s not every day that we see mainstream media get excited about encryption apps! For that reason, the past several days have been fascinating, since we’ve been given not one but sever…
OpenClaw (aka Clawdbot) gives malicious websites access to session cookies
https://ift.tt/hZzOcUk
Submitted February 03, 2026 at 01:07AM by Prior-Penalty
via reddit https://ift.tt/oMd7GkZ
https://ift.tt/hZzOcUk
Submitted February 03, 2026 at 01:07AM by Prior-Penalty
via reddit https://ift.tt/oMd7GkZ
Zeropath
Malicious Websites Can Exploit Openclaw (aka Clawdbot) To Steal Credentials - ZeroPath Blog
Openclaw (aka Clawdbot) delivers impressive AI experiences but malicious websites can abuse it to steal your credentials
The Recent 0-Days in Node.js and React Were Found by an AI
https://ift.tt/Abi78oa
Submitted February 03, 2026 at 09:43AM by mufeedvh
via reddit https://ift.tt/vqoFyN4
https://ift.tt/Abi78oa
Submitted February 03, 2026 at 09:43AM by mufeedvh
via reddit https://ift.tt/vqoFyN4
Winfunc
The Recent 0-Days in Node.js and React Were Found by an AI | winfunc
In December 2025 and January 2026, an AI system autonomously discovered zero-day vulnerabilities in Node.js and React, two of the most widely deployed JavaScrip...
Exploiting CVE-2025-49825 (authentication bypass vulnerability in Teleport)
https://ift.tt/Nph9dQR
Submitted February 03, 2026 at 01:54PM by gid0rah
via reddit https://ift.tt/8Kp5Xre
https://ift.tt/Nph9dQR
Submitted February 03, 2026 at 01:54PM by gid0rah
via reddit https://ift.tt/8Kp5Xre
blog.offensive.af
Exploiting CVE-2025-49825
Teleport authentication bypass
How LLMs Feed Your RE Habit: Following the Use-After-Free Trail in CLFS
https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/
Submitted February 03, 2026 at 08:31PM by onlinereadme
via reddit https://ift.tt/1gfDECn
https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/
Submitted February 03, 2026 at 08:31PM by onlinereadme
via reddit https://ift.tt/1gfDECn
clearbluejar
How LLMs Feed Your RE Habit: Following the Use-After-Free Trail in CLFS
Dive into how LLMs and pyghidra-mcp accelerate reverse engineering by tracing a UAF vulnerability in CLFS through a patch diff.
10 SSO providers and solutions compared for 2026
https://ift.tt/uwVR853
Submitted February 03, 2026 at 08:01PM by Main-Perspective3235
via reddit https://ift.tt/ZpGyTnj
https://ift.tt/uwVR853
Submitted February 03, 2026 at 08:01PM by Main-Perspective3235
via reddit https://ift.tt/ZpGyTnj
Scalefusion
10 Best SSO Providers & Solutions in 2026
Here's a quick rundown of the top 10 SSO providers in 2026, offering a glimpse into their strengths. Explore one of the best SSO Solutions!
GatewayToHeaven: Finding a Cross-Tenant Vulnerability in Google Cloud's Apigee
https://ift.tt/s7Iw8ET
Submitted February 02, 2026 at 07:25PM by omerhacking
via reddit https://ift.tt/sGfpr8O
https://ift.tt/s7Iw8ET
Submitted February 02, 2026 at 07:25PM by omerhacking
via reddit https://ift.tt/sGfpr8O
Omeramiad
GatewayToHeaven: Finding a Cross-Tenant Vulnerability in GCP's Apigee | Omer Amiad's Blog
A technical step-by-step writeup about finding CVE-2025-13292, a cross-tenant vulnerability in Google Cloud's Apigee. This vulnerability allowed an attacker to gain read/write access to verbose cross-tenant access logs and analytics data that could contain…
Auditing Outline. Firsthand lessons from comparing manual testing and AI security platforms
https://ift.tt/Cm4sZ6l
Submitted February 03, 2026 at 10:16PM by nibblesec
via reddit https://ift.tt/NvnFP3O
https://ift.tt/Cm4sZ6l
Submitted February 03, 2026 at 10:16PM by nibblesec
via reddit https://ift.tt/NvnFP3O
Doyensec
Auditing Outline. Firsthand lessons from comparing manual testing and AI security platforms
In July 2025, we performed a brief audit of Outline - an OSS wiki similar in many ways to Notion. This activity was meant to evaluate the overall posture of the application, and involved two researchers for a total of 60 person-days. In parallel, we thought…
Fighting AI anomaly false-positives with firejail and proxychains
https://ift.tt/tjoqaHb
Submitted February 03, 2026 at 10:06PM by maltfield
via reddit https://ift.tt/F2NKkRx
https://ift.tt/tjoqaHb
Submitted February 03, 2026 at 10:06PM by maltfield
via reddit https://ift.tt/F2NKkRx
Michael Altfield's Tech Blog
Persistent, Sandboxed, Single-Site Browser (firejail and proxychains) - Michael Altfield's Tech Blog
Or how to avoid getting locked-out of another Google Account This guide will describe how to setup a persistent browser (for Evil Corp) that’s isolated in a sandbox (with firejail) and forced to use a SOCKS5 proxy to retain a static IP address (using proxychains)…