Defense Evasion: The Service Run Failed Successfully
https://ift.tt/6osVSMU
Submitted February 08, 2026 at 07:51PM by Cold-Dinosaur
via reddit https://ift.tt/TDtxJLw
https://ift.tt/6osVSMU
Submitted February 08, 2026 at 07:51PM by Cold-Dinosaur
via reddit https://ift.tt/TDtxJLw
Zerosalarium
Defense Evasion: The Service Run Failed Successfully
RecoverIt uses penetration testing techniques to exploit service failure recovery functions to trigger the execution of malicious payloads.
Vouch: earn the right to submit a pull request
https://ift.tt/OlQyVsC
Submitted February 08, 2026 at 11:58PM by jpcaparas
via reddit https://ift.tt/QmnGFis
https://ift.tt/OlQyVsC
Submitted February 08, 2026 at 11:58PM by jpcaparas
via reddit https://ift.tt/QmnGFis
Medium
Vouch: earn the right to submit a pull request
Mitchell Hashimoto got tired of AI PR slop, so he built Vouch: a trust management system that could change how open source handles…
klint - Linux Kernel Security Scanner
https://saturnine.cc/klint
Submitted February 09, 2026 at 11:50AM by Short_Radio_1450
via reddit https://ift.tt/neb8xK2
https://saturnine.cc/klint
Submitted February 09, 2026 at 11:50AM by Short_Radio_1450
via reddit https://ift.tt/neb8xK2
saturnine.cc
klint - Linux Kernel Security Scanner
klint is a single-binary, one-shot Linux incident response scanner. Detect hidden kernel modules, rootkits, and compromised system state.
Open Security Architecture - 15 new security patterns with NIST 800-53 mappings (free, CC BY-SA 4.0)
https://ift.tt/oHTxLdu
Submitted February 09, 2026 at 03:08PM by cyberruss
via reddit https://ift.tt/Qmalscz
https://ift.tt/oHTxLdu
Submitted February 09, 2026 at 03:08PM by cyberruss
via reddit https://ift.tt/Qmalscz
www.opensecurityarchitecture.org
Home | Open Security Architecture
Open Security Architecture - Free, open security patterns and NIST 800-53 control mappings for enterprise security architects.
Roundcube Webmail: SVG feImage bypasses image blocking to track email opens
https://ift.tt/bKJ0rO7
Submitted February 09, 2026 at 02:35AM by nullcathedral
via reddit https://ift.tt/VhuiyIx
https://ift.tt/bKJ0rO7
Submitted February 09, 2026 at 02:35AM by nullcathedral
via reddit https://ift.tt/VhuiyIx
NULL CATHEDRAL
Roundcube Webmail <1.5.13 / <1.6.13 allows attackers to force remote image loads via SVG feImage
Roundcube's HTML sanitizer doesn't treat SVG feImage href as an image source. Attackers can bypass remote image blocking to track email opens. (CVE-2026-25916)
On the risk of destructive bricking attacks against OT devices (part 1)
https://ift.tt/obchjve
Submitted February 09, 2026 at 05:00PM by 2ROT13
via reddit https://ift.tt/kdRbSo8
https://ift.tt/obchjve
Submitted February 09, 2026 at 05:00PM by 2ROT13
via reddit https://ift.tt/kdRbSo8
www.midnightblue.nl
On the risk of destructive bricking attacks against OT devices (part 1)
A discussion of the recent cyber attacks against a number of targets connected to Polands electric grid.
CVE-2026-2103 - Infor Syteline ERP - Keys Included: No Assembly Required
https://ift.tt/lBdNK9L
Submitted February 09, 2026 at 08:03PM by aconite33
via reddit https://ift.tt/32VaBb4
https://ift.tt/lBdNK9L
Submitted February 09, 2026 at 08:03PM by aconite33
via reddit https://ift.tt/32VaBb4
Blacklanternsecurity
CVE-2026-2103 - Infor Syteline ERP
Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools
https://matheuzsecurity.github.io/hacking/ebpf-security-tools-hacking/
Submitted February 10, 2026 at 02:41AM by Worldly-Fruit5174
via reddit https://ift.tt/5pO6th2
https://matheuzsecurity.github.io/hacking/ebpf-security-tools-hacking/
Submitted February 10, 2026 at 02:41AM by Worldly-Fruit5174
via reddit https://ift.tt/5pO6th2
0xMatheuZ
Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools
Deep technical analysis of bypassing eBPF-based security solutions through kernel-level hooks targeting BPF iterators, ringbuffers, and perf events
Augustus: Open Source LLM Prompt Injection Tool
https://ift.tt/sFyd8Ii
Submitted February 10, 2026 at 02:56AM by Praetorian_Security
via reddit https://ift.tt/f93jci8
https://ift.tt/sFyd8Ii
Submitted February 10, 2026 at 02:56AM by Praetorian_Security
via reddit https://ift.tt/f93jci8
Praetorian
Introducing Augustus: Open Source LLM Prompt Injection Tool | Praetorian
From LLM Fingerprinting to LLM Prompt Injection LLMs Are Deployed Faster Than They're Tested Introducing Augustus How It Works Buff Transformations 28 LLM Providers Quick Start What's Next Contributing & Community
We scanned 8,000+ MCP servers, this is what we learned.
https://mcp-trust.com
Submitted February 10, 2026 at 04:44AM by Upstairs_Safe2922
via reddit https://ift.tt/AEjW3BT
https://mcp-trust.com
Submitted February 10, 2026 at 04:44AM by Upstairs_Safe2922
via reddit https://ift.tt/AEjW3BT
Reddit
From the netsec community on Reddit: We scanned 8,000+ MCP servers, this is what we learned.
Explore this post and more from the netsec community
Http11Probe - Probe for Http 1.1 compliance
https://mda2av.github.io/Http11Probe/
Submitted February 10, 2026 at 04:24PM by MDA2AV
via reddit https://ift.tt/Qh2mbIo
https://mda2av.github.io/Http11Probe/
Submitted February 10, 2026 at 04:24PM by MDA2AV
via reddit https://ift.tt/Qh2mbIo
mda2av.github.io
Http11Probe
Open Source HTTP/1.1 Compliance Platform An open testing platform that probes HTTP/1.1 servers against RFC 9110/9112 requirements, smuggling vectors, and malformed input handling. Add your framework, get compliance results automatically.
GAC Hijacking
https://ift.tt/hDvz0Id
Submitted February 10, 2026 at 05:35PM by netbiosX
via reddit https://ift.tt/FYNCU3e
https://ift.tt/hDvz0Id
Submitted February 10, 2026 at 05:35PM by netbiosX
via reddit https://ift.tt/FYNCU3e
Purple Team
GAC Hijacking
The Global Assembly Cache is a system-wide repository in the .NET framework that stores strong named (name + version + culture + public key token identity) assemblies so multiple applications can u…
We hid backdoors in binaries — Opus 4.6 found 49% of them
https://ift.tt/SAiBCWm
Submitted February 10, 2026 at 07:48PM by jakozaur
via reddit https://ift.tt/rPT0ZbN
https://ift.tt/SAiBCWm
Submitted February 10, 2026 at 07:48PM by jakozaur
via reddit https://ift.tt/rPT0ZbN
Quesma
We hid backdoors in binaries — Opus 4.6 found 49% of them - Quesma Blog
BinaryAudit benchmarks AI agents using Ghidra to find backdoors in compiled binaries of real open-source servers, proxies, and network infrastructure.
Adbleed: partially de-anonymizing VPN users with adblock filter lists
https://ift.tt/bFcwmBW
Submitted February 10, 2026 at 09:34PM by TroubleNo3411
via reddit https://ift.tt/6qge9nd
https://ift.tt/bFcwmBW
Submitted February 10, 2026 at 09:34PM by TroubleNo3411
via reddit https://ift.tt/6qge9nd
LOTUSLITE: Targeted espionage leveraging geopolitical themes
https://ift.tt/7jhU8ot
Submitted February 10, 2026 at 11:22PM by bagaudin
via reddit https://ift.tt/6jXLOEC
https://ift.tt/7jhU8ot
Submitted February 10, 2026 at 11:22PM by bagaudin
via reddit https://ift.tt/6jXLOEC
Acronis
LOTUSLITE: Targeted espionage leveraging geopolitical themes
Acronis Threat Research Unit (TRU) observed a targeted malware campaign against U.S. government entities leveraging a politically themed ZIP archive containing a loader executable and a malicious DLL. The executable is used to sideload and execute the DLL…
I let Claude Code with 150+ offensive security MCP tools loose on my homelab
https://ift.tt/HyGm6c4
Submitted February 11, 2026 at 01:45AM by Mindless-Study1898
via reddit https://ift.tt/VczmoWL
https://ift.tt/HyGm6c4
Submitted February 11, 2026 at 01:45AM by Mindless-Study1898
via reddit https://ift.tt/VczmoWL
Cred Relay
I Let Claude Code Hack My Homelab | Cred Relay
Letting AI Loose in My Homelab
Confused Deputy Problem – How to Hack Cloud Integrations
https://ift.tt/VrNSe52
Submitted February 11, 2026 at 01:26AM by x0zayl
via reddit https://ift.tt/b1LqIzA
https://ift.tt/VrNSe52
Submitted February 11, 2026 at 01:26AM by x0zayl
via reddit https://ift.tt/b1LqIzA
zayl.dk
Confused Deputy Problem – How to Hack Cloud Integrations | Zayl Security