InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody

by BrianKrebs on 02/11/2025

A Ukrainian man indicted in 2012 for conspiring with a prolific hacking group to steal tens of millions of dollars from U.S. businesses was arrested in Italy and is now in custody in the United States, KrebsOnSecurity has learned. Sources close to the investigation say Yuriy Igorevich Rybtsov, a 41-year-old from the Russia-controlled city of Donetsk, Ukraine, was previously referenced in U.S. fede [...]

See full content

Directory Traversal Vulnerability in cURL via Content-Disposition Header Processing

on 01/11/2025

curl disclosed a bug submitted by oliverkremer: https://hackerone.com/reports/3408126 [...]

See full content

Multi-Factor Authentication?

on 01/11/2025

See full content

Spooky sales

on 01/11/2025

See full content

My sales are scary but 😱😱

on 01/11/2025

See full content

Friday Squid Blogging: Giant Squid at the Smithsonian

on 31/10/2025

I can’t believe that I haven’t yet posted this picture of a giant squid at the Smithsonian. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

No Confirmation Email For Email Change

on 31/10/2025

Hiro disclosed a bug submitted by craxermgr: https://hackerone.com/reports/268221 [...]

See full content

Information Disclosure

on 31/10/2025

Hiro disclosed a bug submitted by craxermgr: https://hackerone.com/reports/268224 [...]

See full content

REDIRECTION VULNERABILITY/HOST HEADER INJECTION VULNERABILITY

on 31/10/2025

Hiro disclosed a bug submitted by vyshnav_nk: https://hackerone.com/reports/300164 [...]

See full content

Missing restriction on string size of Full Name at browser.blockstack.org

on 31/10/2025

Hiro disclosed a bug submitted by myskar: https://hackerone.com/reports/304073 [...]

See full content

Can view all username leaked in https://core.blockstack.org

on 31/10/2025

Hiro disclosed a bug submitted by myskar: https://hackerone.com/reports/377565 [...]

See full content

Invalidate active sessions after password change

on 31/10/2025

Hiro disclosed a bug submitted by droop3r: https://hackerone.com/reports/716647 [...]

See full content

blockstack.org - is vulnerable to (CVE-2016-2183, CVE-2016-6329)

on 31/10/2025

Hiro disclosed a bug submitted by 0x1_aulia: https://hackerone.com/reports/910732 [...]

See full content

Blockstack Browser For Mac leaks "Core API Password" to 3rd parties

on 31/10/2025

Hiro disclosed a bug submitted by frozensolid: https://hackerone.com/reports/541760 [...]

See full content

Logout Bypass Vulnerability in Hiro.so

on 31/10/2025

Hiro disclosed a bug submitted by anonymous--1000: https://hackerone.com/reports/3062299 - Bounty: $150 [...]

See full content

FULL 10 DAY!! Pentesting Boot Camp - Part 1 [NEARLY 4H!]

on 31/10/2025

See full content

Intro to PowerShell: Hunting Network Activity.

on 31/10/2025

See full content

happy halloween!

on 31/10/2025

See full content

How Hackers Become Admin (they just ask)

on 31/10/2025

See full content

Buffer over-read,, Missing NUL termination in addvariable() causes undefined behavior

on 31/10/2025

curl disclosed a bug submitted by sagorhawlader: https://hackerone.com/reports/3406123 [...]

See full content

SOCKS5 Heap Buffer Overflow via Malicious HTTP Redirect with Oversized Hostname

on 31/10/2025

curl disclosed a bug submitted by abdullah-107: https://hackerone.com/reports/3404025 [...]

See full content

Will AI Strengthen or Undermine Democracy?

on 31/10/2025

Listen to the Audio on NextBigIdeaClub.com Below, co-authors Bruce Schneier and Nathan E. Sanders share five key insights from their new book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship. What’s the big idea? AI can be used both for and against the public interest within democracies. It is already being used in the governing of nations around the world [...]

See full content

When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us

by Tim Erlin on 31/10/2025

Wallarm’s latest Q3 2025 API ThreatStats report [link placeholder] reveals that API vulnerabilities, exploits, and breaches are not just increasing; they’re evolving.  Malicious actors are shifting from code-level weaknesses to business logic flaws, from web apps to partner integrations, and from REST to AI-powered APIs. Here’s what stood out this quarter, and what security leaders sho [...]

See full content

The cryptography behind electronic passports

on 31/10/2025

Did you know that most modern passports are actually embedded devices containing an entire filesystem, access controls, and support for several cryptographic protocols? Such passports display a small symbol indicating an electronic machine-readable travel document (eMRTD), which digitally stores the same personal data printed in traditional passport booklets in its embedded filesystem. Beyond allo [...]

See full content

Intigriti Bug Bytes #229 - October 2025 🚀

by blackbird-eu on 31/10/2025

Hi hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  Cool trick to find disclosed secrets in internal web extensions A repository full of WAF bypasses Hacking Intercom misconfigurations Wayback Machine for hackers And so much more! Let’s dive in! INTIGRITI 1025 results are in October’s Intigriti challenge (by @chux13786509) brought hundreds of [...]

See full content

Datadog threat roundup: Top insights for Q3 2025

on 31/10/2025

Threat insights from Datadog Security Labs for Q3 2025. [...]

See full content

HackerOne was proud to co-sponsor a two-day "Capture the Flag" event for women in cybersecurity.

on 30/10/2025

See full content

How Android provides the most effective protection to keep you safe from mobile scams

on 30/10/2025

Posted by Lyubov Farafonova, Product Manager, Phone by Google; Alberto Pastor Nieto, Sr. Product Manager Google Messages and RCS Spam and Abuse; Vijay Pareek, Manager, Android Messaging Trust and Safety As Cybersecurity Awareness Month wraps up, we’re focusing on one of today's most pervasive digital threats: mobile scams. In the last 12 months, fraudsters have used advanced AI tools to create [...]

See full content

The AI-Designed Bioweapon Arms Race

on 30/10/2025

Interesting article about the arms race between AI systems that invent/design new biological pathogens, and AI systems that detect them before they’re created: The team started with a basic test: use AI tools to design variants of the toxin ricin, then test them against the software that is used to screen DNA orders. The results of the test suggested there was a risk of dangerous protein var [...]

See full content

Vulnerabilities in LUKS2 disk encryption for confidential VMs

on 30/10/2025

Trail of Bits is disclosing vulnerabilities in eight different confidential computing systems that use Linux Unified Key Setup version 2 (LUKS2) for disk encryption. Using these vulnerabilities, a malicious actor with access to storage disks can extract all confidential data stored on that disk and can modify the contents of the disk arbitrarily. The vulnerabilities are caused by malleable metadat [...]

See full content

New Course Release! LIVE | AI Hacking 101 | Viewer Guided Hacking!!! | AMA

on 30/10/2025

See full content

Learnings from recent npm supply chain compromises

on 30/10/2025

A look at recent npm supply chain compromises and how we can learn from them to better prepare for future incidents. [...]

See full content

Tips for writing a good report

on 29/10/2025

See full content

Logical Flaw in curl_url_set Leads to Inconsistent Query Parameter Encoding

on 29/10/2025

curl disclosed a bug submitted by exploitguru101: https://hackerone.com/reports/3403880 [...]

See full content

Signal’s Post-Quantum Cryptographic Implementation

on 29/10/2025

Signal has just rolled out its quantum-safe cryptographic implementation. Ars Technica has a really good article with details: Ultimately, the architects settled on a creative solution. Rather than bolt KEM onto the existing double ratchet, they allowed it to remain more or less the same as it had been. Then they used the new quantum-safe ratchet to implement a parallel secure messaging system. No [...]

See full content

API Attack Awareness: Business Logic Abuse — Exploiting the Rules of the Game

by Tim Erlin on 29/10/2025

As Cybersecurity Awareness Month continues, we wanted to dive even deeper into the attack methods affecting APIs. We’ve already reviewed Broken Object Level Authentication (BOLA), injection attacks, and authentication flaws; this week, we’re exploring business logic abuse (BLA).  Unlike technical flaws, business logic flaws exploit how an API is designed to behave. They are difficult t [...]

See full content

Aisuru Botnet Shifts from DDoS to Residential Proxies

by BrianKrebs on 29/10/2025

Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy services that help cybercriminals anonymize their traffic. Experts say a glut of proxies from Aisuru and other [...]

See full content

CAPIE: FULL 3 DAY (8 hours!) API Hacking Boot Camp

on 28/10/2025

See full content

TCM Security Future Content Preview 👀

on 28/10/2025

See full content

HTTPS by default

on 28/10/2025

One year from now, with the release of Chrome 154 in October 2026, we will change the default settings of Chrome to enable “Always Use Secure Connections”. This means Chrome will ask for the user's permission before the first access to any public site without HTTPS. The “Always Use Secure Connections” setting warns users before accessing a site without HTTPS Chrome Security's mission is to [...]

See full content

Memory leak in Curl_auth_create_ntlm_type3_message

on 28/10/2025

curl disclosed a bug submitted by tjbecker_theori: https://hackerone.com/reports/3393539 [...]

See full content

Does @CristiVladZ think the OWASP 10 is enough?

on 28/10/2025

See full content

What does @_JohnHammond think about CTFs?

on 28/10/2025

See full content

Social Engineering People’s Credit Card Details

on 28/10/2025

Good Wall Street Journal article on criminal gangs that scam people out of their credit card information: Your highway toll payment is now past due, one text warns. You have U.S. Postal Service fees to pay, another threatens. You owe the New York City Department of Finance for unpaid traffic violations. The texts are ploys to get unsuspecting victims to fork over their credit-card details. The gan [...]

See full content

curls persistence files inherit world-readable/writable perms from umask, leaking and tampering with cookies/HSTS/Alt-Svc caches

on 28/10/2025

curl disclosed a bug submitted by geeknik: https://hackerone.com/reports/3400761 [...]

See full content

libcurl MQTT PUBLISH length overflow (heap overflow)

on 28/10/2025

curl disclosed a bug submitted by max_from_secmate: https://hackerone.com/reports/3395666 [...]

See full content

Louvre Jewel Heist

on 27/10/2025

I assume I don’t have to explain last week’s Louvre jewel heist. I love a good caper, and have (like many others) eagerly followed the details. An electric ladder to a second-floor window, an angle grinder to get into the room and the display cases, security guards there more to protect patrons than valuables—seven minutes, in and out. There were security lapses: The Louvre, it t [...]

See full content

No Code Bug Bounty Automation Using n8n

on 27/10/2025

See full content

Inside the Mind of a CISO '25

on 27/10/2025

See full content

First Wap: A Surveillance Computer You’ve Never Heard Of

on 27/10/2025

Mother Jones has a long article on surveillance arms manufacturers, their wares, and how they avoid export control laws: Operating from their base in Jakarta, where permissive export laws have allowed their surveillance business to flourish, First Wap’s European founders and executives have quietly built a phone-tracking empire, with a footprint extending from the Vatican to the Middle East [...]

See full content

Cookie exposure due to unexpected file permission change

on 27/10/2025

curl disclosed a bug submitted by nyymi: https://hackerone.com/reports/1024749 [...]

See full content

CURLX_SET_BINMODE(NULL) can call fileno(NULL) and cause undefined behavior / crash

on 27/10/2025

curl disclosed a bug submitted by sippysir: https://hackerone.com/reports/3400831 [...]

See full content

Cyber Awareness Month: Vulnerabilities beware this Halloween

by Eleanor Barlow on 27/10/2025

Cybersecurity Awareness Month: why it matters and this year’s theme. We couldn’t let Cybersecurity Awareness Month slip by without posting a bit of a fun blog on the topic, with a Halloween twist! Launched by the National Cybersecurity Alliance and the U.S. Department of Homeland Security in 2004, Cybersecurity Awareness Month was formulated to encourage, as well as provide people with the right t [...]

See full content

9 Hours Of Hacker Interviews - @TomNomNomDotCom @STOKfredrik @_JohnHammond @CristiVladZ

on 26/10/2025

See full content

Integer Overflow to Heap Overflow in DoH Response Handling

on 25/10/2025

curl disclosed a bug submitted by asdkjhasldkjahslfdkjfa: https://hackerone.com/reports/3399774 [...]

See full content

Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training

on 25/10/2025

See full content

Friday Squid Blogging: “El Pulpo The Squid”

on 24/10/2025

There is a new cigar named “El Pulpo The Squid.” Yes, that means “The Octopus The Squid.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

FULL 9 Hour Bug Bounty Boot Camp - PART 2!

on 24/10/2025

See full content

Error-Based & Time-Based SQL Injection in 'keyword' Parameter of admin-search.php Allowing Full Database Access in Revive Adserver v6.0.0

on 24/10/2025

Revive Adserver disclosed a bug submitted by kanon4: https://hackerone.com/reports/3395221 [...]

See full content

Part Four of The Kryptos Sculpture

on 24/10/2025

Two people found the solution. They used the power of research, not cryptanalysis, finding clues amongst the Sanborn papers at the Smithsonian’s Archives of American Art. This comes as an awkward time, as Sanborn is auctioning off the solution. There were legal threats—I don’t understand their basis—and the solvers are not publishing their solution. [...]

See full content

Serious F5 Breach

on 23/10/2025

This is bad: F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long-term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hack [...]

See full content

Big shifts in cybersecurity

on 23/10/2025

See full content

LIVE: 🕵️ HTB Sherlocks! | Cybersecurity | Blue Team

on 23/10/2025

See full content

Intigriti partners with Shield to empower security within healthcare

by Eleanor Barlow on 23/10/2025

Antwerp, Belgium, Oct. 23, 2025.  Intigriti, a global crowdsourced security provider, is delighted to announce its latest partnership with non-profit Shield vzw within the framework agreement with the Federal Public Service (FPS) Health in Belgium. This partnership provides essential support and services on vulnerability disclosure programs for critical national infrastructure (CNI) organisations [...]

See full content

Use of Deprecated strcpy() with User-Controlled Environment Variable in Memory Debug Initialization

on 22/10/2025

curl disclosed a bug submitted by idris_0x: https://hackerone.com/reports/3395227 [...]

See full content

Use of Deprecated strcpy() with Fixed-Size Buffers in Progress Time Formatting

on 22/10/2025

curl disclosed a bug submitted by idris_0x: https://hackerone.com/reports/3395218 [...]

See full content

Free will

on 22/10/2025

See full content

Canada Fines Cybercrime Friendly Cryptomus $176M

by BrianKrebs on 22/10/2025

Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services. The penalties for violating Canada’s anti money-laundering laws come ten months after KrebsOnSecurity noted that Cryptomus’s Vancouver street address was home to dozens of [...]

See full content

Can Burp AI hack a website? CyberMaddy explores the new agentic capabilities in Burp AI

on 22/10/2025

In her latest video, CyberMaddy dives into the world of AI-driven ethical hacking, exploring how Burp AI performs in Repeater when tasked with finding web vulnerabilities like SQL injection, cross-sit [...]

See full content

Burp AI takes on a vulnerable web app: watch Tib3rius put Burp’s new agentic capabilities to the test

on 22/10/2025

What happens when you set Burp AI loose on a deliberately vulnerable web app? In his latest video, Tib3rius takes Burp’s new agentic Burp AI capabilities for a spin - and the results are seriously coo [...]

See full content

Are These The Best Hacking Tools for 2026?

on 22/10/2025

See full content

Prompt injection to RCE in AI agents

on 22/10/2025

Modern AI agents increasingly execute system commands to automate filesystem operations, code analysis, and development workflows. While some of these commands are allowed to execute automatically for efficiency, others require human approval, which may seem like robust protection against attacks like command injection. However, we’ve commonly experienced a pattern of bypassing the human app [...]

See full content

Reflected Cross-Site Scripting (XSS) in Revive Adserver 5.5.2

on 22/10/2025

Revive Adserver disclosed a bug submitted by env_bak: https://hackerone.com/reports/3091390 [...]

See full content

2FA bypass possible on https://authsvc.singlestore.com

on 22/10/2025

SingleStore disclosed a bug submitted by axolot23: https://hackerone.com/reports/3329361 [...]

See full content

AWS Outage: Lessons Learned

by Tim Erlin on 21/10/2025

What can we learn from the recent AWS outage, and how can we apply those lessons to our own infrastructure? What Happened? On October 20, 2025, AWS experienced a major disruption that rippled across the internet (and social media), affecting widely used services such as Zoom, Microsoft Teams, Slack, and Atlassian. The issue originated not in a single data center or customer workload, but in [...]

See full content

Can Learning Assembly Help Your Career?

on 21/10/2025

See full content

CISOs! Have no fear

on 21/10/2025

See full content

Key API Security Takeaways from the Postman 2025 State of API Report

by Tim Erlin on 21/10/2025

API security has never been more important because modern APIs are operational necessities. Unfortunately, many organizations are failing to adapt their security models to a rapidly changing API threat landscape. Like it or not, we live in an AI-first world, and API security must reflect that reality. The Postman 2025 State of API Report is confirmation of that fact.  AI is Becoming Bu [...]

See full content

Buffer Overflow in WebSocket Handshake (lib/ws.c:1287)

on 21/10/2025

curl disclosed a bug submitted by aybanda: https://hackerone.com/reports/3392174 [...]

See full content

Meet Johan Carlsson 👋

on 20/10/2025

See full content

Happy Diwali 🪔 amazing hacker

on 20/10/2025

See full content

Hackers Bruteforce Passwords to Microsoft Online

on 20/10/2025

See full content

Hunting for reflected XSS vulnerabilities: A complete guide

by blackbird-eu on 20/10/2025

Cross-site scripting vulnerabilities are, by no doubt, one of the vulnerability types that'll keep haunting applications for a long time. This seamless injection bug can often be further escalated to allow attackers to perform malicious actions on behalf of the victim, or even worse, on behalf of a vulnerable server-side component, from reading and changing account information, such as passwords o [...]

See full content

CoPhish: Using Microsoft Copilot Studio as a wrapper for OAuth phishing

on 20/10/2025

Copilot Studio links look benign, but they can host content to redirect users to arbitrary URLs. In this post, we document a method by which a Copilot Studio agent's login settings can redirect a user to any URL, including an OAuth consent attack. [...]

See full content

DNS Rebinding Attack

on 19/10/2025

arkadiyt-projects disclosed a bug submitted by newby99: https://hackerone.com/reports/3383095 [...]

See full content

Arbitrary File Write

on 19/10/2025

arkadiyt-projects disclosed a bug submitted by newby99: https://hackerone.com/reports/3384150 [...]

See full content

[FREE COURSE] Uncle Rat - OFFICIAL PARTNER Of RedOps Academy

on 19/10/2025

See full content

Application Level DoS - Large Markdown Payload in Reply Section Leading to Resource Exhaustion

on 18/10/2025

Discourse disclosed a bug submitted by theteatoast: https://hackerone.com/reports/3058919 [...]

See full content

Blu-ray Disc Java Sandbox Escape via two vulnerabilities

on 18/10/2025

PlayStation disclosed a bug submitted by theflow0: https://hackerone.com/reports/3104356 - Bounty: $5000 [...]

See full content

Logger++ logs everything

on 17/10/2025

See full content

Why macOS wrecks maxed-out USB-C SSDs

on 17/10/2025

See full content

AI Fundamentals 100 Course - 3+ Hours of Content!

on 17/10/2025

See full content

Email Bombs Exploit Lax Authentication in Zendesk

by BrianKrebs on 17/10/2025

Cybercriminals are abusing a widespread lack of authentication in the customer service platform Zendesk to flood targeted email inboxes with menacing messages that come from hundreds of Zendesk corporate customers simultaneously. Zendesk is an automated help desk service designed to make it simple for people to contact companies for customer support issues. Earlier this week, KrebsOnSecurity start [...]

See full content

SMTP Command Injection Vulnerability in libcurl 8.16.0 via RFC 3461 Suffix

on 17/10/2025

curl disclosed a bug submitted by spolu-dust: https://hackerone.com/reports/3387499 [...]

See full content

Safeguarding digital playgrounds: cyber insights for gaming and eSports

by Eleanor Barlow on 17/10/2025

According to Statista, revenue for the gaming and esports industry is expected to demonstrate an annual growth rate (CAGR 2025-2029) of 5.56%, resulting in a projected market volume of US$5.9bn by 2029. While this scale, visibility, and monetization have been fantastic for creators, developers, and providers, this same growth comes with amplified cybersecurity risk. Throughout 2025, threat actors [...]

See full content

How to run a Bitcoin node on Apple silicon

on 16/10/2025

See full content

The Truth About OSINT Careers

on 16/10/2025

See full content

when you change your password, it's already stolen

on 16/10/2025

See full content

API Attack Awareness: When Authentication Fails — Exposing APIs to Risk

by Tim Erlin on 16/10/2025

Authentication issues seem like low-level attacks. But authentication today – especially API authentication – can be more difficult than people expect. Companies rely on APIs to carry sensitive information every day. If access to those APIs is not properly secured, all the sophisticated security solutions companies use to protect their data elsewhere are completely undermined.  A single API [...]

See full content

Live IoT Hacking | Router Hacking | Hardware Hacking | AMA

on 16/10/2025

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Phylum Research | Software Supply Chain Security
  4. Schneier on Security
  5. Krebs on Security
  6. Google Online Security Blog
  7. $BLOG_TITLE
  8. Agarri : Sécurité informatique offensive
  9. Alex Chapman's Blog
  10. www.alphabot.com
  11. ziot
  12. Bug Bounty Reports Explained
  13. Bugcrowd
  14. cat ~/footstep.ninja/blog.txt
  15. Ezequiel Pereira
  16. HackerOne
  17. surajdisoja.me
  18. InsiderPhD
  19. Intigriti
  20. John Hammond
  21. LiveOverflow
  22. NahamSec
  23. PortSwigger Blog
  24. Rana Khalil
  25. Richard’s Infosec blog
  26. Ron Chan
  27. ropnop blog
  28. STÖK
  29. Sun Knudsen
  30. The Cyber Mentor
  31. The unofficial HackerOne disclosure timeline
  32. The XSS Rat
  33. TomNomNom
  34. Wallarm