HPD (Hex Packet Decoder) now have AI feature – looking for feedback
https://hpd.gasmi.net
Submitted March 5, 2026 at 08:22PM by Secure-Ad2104
via reddit https://ift.tt/9sWdBjZ
https://hpd.gasmi.net
Submitted March 5, 2026 at 08:22PM by Secure-Ad2104
via reddit https://ift.tt/9sWdBjZ
hpd.gasmi.net
Hex Packet Decoder
Network packet decoder
Credential Protection for AI Agents: The Phantom Token Pattern
https://ift.tt/HY92zfq
Submitted March 5, 2026 at 10:27PM by DecodeBytes
via reddit https://ift.tt/y7q2ZMX
https://ift.tt/HY92zfq
Submitted March 5, 2026 at 10:27PM by DecodeBytes
via reddit https://ift.tt/y7q2ZMX
nono.sh
nono - Next-Generation Agent Security
Kernel-enforced isolation, network filtering, immutable auditing, and atomic rollbacks for AI agents - built into the nono CLI and native SDKs.
Model Context Protocol (MCP) Authentication and Authorization
https://ift.tt/89NkIO0
Submitted March 6, 2026 at 06:13PM by nibblesec
via reddit https://ift.tt/Qz8dgIr
https://ift.tt/89NkIO0
Submitted March 6, 2026 at 06:13PM by nibblesec
via reddit https://ift.tt/Qz8dgIr
Doyensec
The MCP AuthN/Z Nightmare
This article shares our perspective on the current state of authentication and authorization in enterprise-ready, remote MCP server deployments.
Hardening Firefox with Anthropic’s Red Team
https://ift.tt/TRNzgfE
Submitted March 6, 2026 at 07:57PM by evilpies
via reddit https://ift.tt/y8Yid0k
https://ift.tt/TRNzgfE
Submitted March 6, 2026 at 07:57PM by evilpies
via reddit https://ift.tt/y8Yid0k
The Mozilla Blog
An emerging technique, pressure-tested by Firefox engineers
For more than two decades, Firefox has been one of the most scrutinized and security-hardened codebases on the web. Open source means our code is visible,
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets
https://ift.tt/afAYxXi
Submitted March 7, 2026 at 04:12AM by maurosoria
via reddit https://ift.tt/Yk14PAt
https://ift.tt/afAYxXi
Submitted March 7, 2026 at 04:12AM by maurosoria
via reddit https://ift.tt/Yk14PAt
blog.calif.io
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets
A step-by-step guide to exploiting a 20-year-old bug in the Linux kernel to achieve full privilege escalation and container escape, plus a cool bug-hunting heuristic.
We (at Tachyon) found an auth bypass in MLflow
https://ift.tt/vRtrLQs
Submitted March 7, 2026 at 05:13AM by securely-vibe
via reddit https://ift.tt/NZYEG96
https://ift.tt/vRtrLQs
Submitted March 7, 2026 at 05:13AM by securely-vibe
via reddit https://ift.tt/NZYEG96
tachyon.so
CVE-2025-14297: MLflow Authorization Bypass | Tachyon Blog
How Tachyon's autonomous security researcher found an authorization bypass in the open-source MLflow tracking server by reasoning across protocols and surfaces—and why this class of bug is so hard to catch.
Need feedback from security specialists
https://ift.tt/fDL42mq
Submitted March 7, 2026 at 05:58AM by Witty-Passenger5391
via reddit https://ift.tt/qhX7jzE
https://ift.tt/fDL42mq
Submitted March 7, 2026 at 05:58AM by Witty-Passenger5391
via reddit https://ift.tt/qhX7jzE
38 researchers red-teamed AI agents for 2 weeks. Here's what broke. (Agents of Chaos, Feb 2026)AI Security
https://ift.tt/dFJ4BmN
Submitted March 7, 2026 at 01:32PM by Kind-Release-3817
via reddit https://ift.tt/cb5swfj
https://ift.tt/dFJ4BmN
Submitted March 7, 2026 at 01:32PM by Kind-Release-3817
via reddit https://ift.tt/cb5swfj
arXiv.org
Agents of Chaos
We report an exploratory red-teaming study of autonomous language-model-powered agents deployed in a live laboratory environment with persistent memory, email accounts, Discord access, file...
Tracking the Top 10 exploited CVEs of the week (updated daily)
https://ift.tt/QpDeE2c
Submitted March 8, 2026 at 10:31PM by Intelligent_Emu_8075
via reddit https://ift.tt/61Yvq7R
https://ift.tt/QpDeE2c
Submitted March 8, 2026 at 10:31PM by Intelligent_Emu_8075
via reddit https://ift.tt/61Yvq7R
Leakycreds
Credential Leak Monitoring & Stealer Log Intelligence | LeakyCreds
Credential exposure intelligence with fast detection, scoring, and remediation workflows.
From Chrome Extension Supply-Chain Compromise to Host Malware: Technical Breakdown of the ShotBird Campaign
https://monxresearch-sec.github.io/shotbird-extension-malware-report/
Submitted March 8, 2026 at 11:14PM by TheReedemer69
via reddit https://ift.tt/w7TU2pu
https://monxresearch-sec.github.io/shotbird-extension-malware-report/
Submitted March 8, 2026 at 11:14PM by TheReedemer69
via reddit https://ift.tt/w7TU2pu
ShotBird Extension Malware Report
From a Sophisticated Browser-Extension Supply-Chain Compromise to a VibeCoded Twist: A Chrome Extension as the Initial Access Vector…
Independent technical analysis of a Chrome extension compromise, fake update chain, and Windows-stage malware activity.
Fake Claude Code Install Guides Spread Amatera Infostealer in New “InstallFix” Malvertising Campaign
https://ift.tt/L954nNq
Submitted March 8, 2026 at 11:42PM by NeuraCyb-Intel
via reddit https://ift.tt/j5ZGW8Y
https://ift.tt/L954nNq
Submitted March 8, 2026 at 11:42PM by NeuraCyb-Intel
via reddit https://ift.tt/j5ZGW8Y
NeuraCyb Intelligence
Fake Claude Code Install Guides Spread Amatera Infostealer in New “InstallFix” Malvertising Campaign
Cybersecurity researchers have uncovered a new malware distribution campaign in which attackers impersonate legitimate command-line installation guides for developer tools. The campaign uses a...
AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks
https://ift.tt/RU6jD4l
Submitted March 9, 2026 at 04:36AM by NeitherEchidna3491
via reddit https://ift.tt/DBv7AdR
https://ift.tt/RU6jD4l
Submitted March 9, 2026 at 04:36AM by NeitherEchidna3491
via reddit https://ift.tt/DBv7AdR
**MCP Security Checklist - 40 controls for securing AI agent tool infrastructure**
https://ift.tt/dE9B4DK
Submitted March 9, 2026 at 11:08AM by dalugoda
via reddit https://ift.tt/kVfEJaL
https://ift.tt/dE9B4DK
Submitted March 9, 2026 at 11:08AM by dalugoda
via reddit https://ift.tt/kVfEJaL
checklist.helixar.ai
MCP Security Checklist
A practical, community-maintained security checklist for teams building and deploying Model Context Protocol (MCP) servers and AI agent infrastructure.
How We Hacked McKinsey's AI Platform
https://ift.tt/if1ohIG
Submitted March 9, 2026 at 07:14PM by eth0izzle
via reddit https://ift.tt/cw1NZQI
https://ift.tt/if1ohIG
Submitted March 9, 2026 at 07:14PM by eth0izzle
via reddit https://ift.tt/cw1NZQI
codewall.ai
How We Hacked McKinsey's AI Platform
An autonomous AI agent found a SQL injection in McKinsey's Lilli AI platform. What it extracted was worse than we expected.
Unpinched - Instant point-in-time detection of PinchTab and agentic browser bridge artifacts.
https://ift.tt/B56FTpb
Submitted March 9, 2026 at 07:02PM by dalugoda
via reddit https://ift.tt/env5LT7
https://ift.tt/B56FTpb
Submitted March 9, 2026 at 07:02PM by dalugoda
via reddit https://ift.tt/env5LT7
Helixar.ai
Helixar Labs — Open-Source AI Security Tools
MCP Security Checklist, Sentinel MCP scanner, and Unpinched PinchTab detector. Three open-source tools for securing AI agent pipelines and agentic browser infrastructure.
InferShield v1.0 – Zero-Custody OAuth Proxy: Client-Side Token Encryption for AI Workflows
https://ift.tt/LepQGcm
Submitted March 9, 2026 at 06:57PM by Alex-Hosein
via reddit https://ift.tt/8m6lCf4
https://ift.tt/LepQGcm
Submitted March 9, 2026 at 06:57PM by Alex-Hosein
via reddit https://ift.tt/8m6lCf4
blog.infershield.io
InferShield Blog
InferShield: Secure OAuth authentication for AI workflows
Using cookies to hack into a tech college's admission system
https://ift.tt/tSC0nhM
Submitted March 9, 2026 at 07:29PM by EatonZ
via reddit https://ift.tt/Rlq9aKC
https://ift.tt/tSC0nhM
Submitted March 9, 2026 at 07:29PM by EatonZ
via reddit https://ift.tt/Rlq9aKC
Eaton-Works
Using cookies to hack into a tech college’s admission system
The Sri Krishna College of Engineering and Technology (SKCET) in India made elementary mistakes in web app security.
Sign in with ANY password into Rocket.Chat EE (CVE-2026-28514) and other vulnerabilities we’ve found with our open source AI framework
https://ift.tt/p6HRsgL
Submitted March 9, 2026 at 09:47PM by ulldma
via reddit https://ift.tt/sBIFcU7
https://ift.tt/p6HRsgL
Submitted March 9, 2026 at 09:47PM by ulldma
via reddit https://ift.tt/sBIFcU7
The GitHub Blog
How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
GitHub Security Lab Taskflow Agent is very effective at finding Auth Bypasses, IDORs, Token Leaks, and other high-impact vulnerabilities.
Autonomous agent traffic as an emerging attack surface
https://www.usevigil.dev
Submitted March 10, 2026 at 02:30AM by SenseOk976
via reddit https://ift.tt/8g6KWOf
https://www.usevigil.dev
Submitted March 10, 2026 at 02:30AM by SenseOk976
via reddit https://ift.tt/8g6KWOf
Agent Auth
Agent Auth — Identity for AI Agents
DID-based cryptographic identity for AI agents. Register once, authenticate everywhere.
Mobile spyware campaign impersonates Israel's Red Alert rocket warning system
https://ift.tt/owh0Xeb
Submitted March 10, 2026 at 02:29AM by bagaudin
via reddit https://ift.tt/1NmxdjC
https://ift.tt/owh0Xeb
Submitted March 10, 2026 at 02:29AM by bagaudin
via reddit https://ift.tt/1NmxdjC
Acronis
Mobile spyware campaign impersonates Israel's Red Alert rocket warning system
Acronis Threat Research Unit (TRU) has identified a targeted campaign distributing a trojanized version of the Red Alert rocket warning Android app to Israeli users via SMS messages impersonating official Home Front Command communications
Beware! Fake CleanMyMac Website can steal your credential through malicious infostealers.
https://ift.tt/PYRWnIQ
Submitted March 10, 2026 at 09:21AM by NeuraCyb-Intel
via reddit https://ift.tt/0CQEOUn
https://ift.tt/PYRWnIQ
Submitted March 10, 2026 at 09:21AM by NeuraCyb-Intel
via reddit https://ift.tt/0CQEOUn
NeuraCyb Intelligence
Fake CleanMyMac Website Spreads SHub Stealer Through ClickFix Terminal Trick
Mac users searching for a trusted system optimization tool are being targeted in a new malware campaign that impersonates the popular macOS utility CleanMyMac. Security researchers warn that a...