InfoSec Planet
A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.
Puny-Code, 0-Click Account Takeover | @YShahinzadeh & @AmirMSafari | #NahamCon2025 on 09/06/2025
Path Traversal Vulnerability in Lila Project on 09/06/2025
Lichess disclosed a bug submitted by immm: https://hackerone.com/reports/3181066 [...]
New Way to Track Covertly Android Users on 09/06/2025
Researchers have discovered a new way to covertly track Android users. Both Meta and Yandex were using it, but have suddenly stopped now that they have been caught. The details are interesting, and worth reading in detail: >Tracking code that Meta and Russia-based Yandex embed into millions of websites is de-anonymizing visitors by abusing legitimate Internet protocols, causing Chrome and other br [...]
IDOR Vulnerability at AddTagToAssets operation name on 08/06/2025
HackerOne disclosed a bug submitted by root_geek280: https://hackerone.com/reports/2633771 [...]
Friday Squid Blogging: Squid Run in Southern New England on 06/06/2025
Southern New England is having the best squid run in years. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. [...]
ImageId Format Injection in Image Upload Endpoint on 06/06/2025
Lichess disclosed a bug submitted by oblivionsage: https://hackerone.com/reports/3175928 [...]
Hearing on the Federal Government and AI on 06/06/2025
On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled “The Federal Government in the Age of Artificial Intelligence.” The other speakers mostly talked about how cool AI was—and sometimes about how cool their own company was—but I was asked by the Democrats to specifically talk about DOGE and the risks of exfiltrating our d [...]
Getting Started with HackTheBox in 2025 | Cheatsheet Inside on 06/06/2025
Report on the Malicious Uses of AI on 06/06/2025
OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity including social engineering, cyber espionage, deceptive employment schemes, covert influence operations and scams. These operations originated in many parts o [...]
1 Click Account Takeover via Auth Token Theft on marketing.hostinger.com on 06/06/2025
hostinger disclosed a bug submitted by aziz0x48: https://hackerone.com/reports/3081691 [...]
The One Thing You Keep Forgetting About Broad Scope -ShuffelDNS on 06/06/2025
Proxy Services Feast on Ukraine’s IP Address Exodus by BrianKrebs on 05/06/2025
Image: Mark Rademaker, via Shutterstock. Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study finds. The analysis indicates large chunks of Ukrainian Internet address space are now in the hands of shadowy proxy and anonymity services that are nested at some of America’s largest Internet service [...]
Impress Interviewers With This IT Weekend Project! on 05/06/2025
Addressing API Security with NIST SP 800-228 by Tim Erlin on 05/06/2025
According to the Wallarm Q1 2025 ThreatStats report, 70% of all application attacks target APIs. The industry can no longer treat API security as a sidenote; it’s time to treat it as the main event. NIST seems to be on board with this view, releasing the initial public draft of NIST SP 800-228, a set of recommendations for securing APIs. I recently sat down with AJ Debole, Field CISO at Oracl [...]
DoS Vulnerability via Cache Poisoning on cdn.shopify.com and shopify-assets.shopifycdn.com on 04/06/2025
Shopify disclosed a bug submitted by bassem_sadaqah: https://hackerone.com/reports/1695604 - Bounty: $3800 [...]
🔴 LIVE: Conti Ransomware | Cybersecurity | TryHackme | AMA on 04/06/2025
returnUrl= allow attacker to redirect users to the another phising website and takeover credientials on 04/06/2025
Insightly disclosed a bug submitted by basant0x01: https://hackerone.com/reports/1544236 [...]
The Ramifications of Ukraine’s Drone Attack on 04/06/2025
You can read the details of Operation Spiderweb elsewhere. What interests me are the implications for future warfare: If the Ukrainians could sneak drones so close to major air bases in a police state such as Russia, what is to prevent the Chinese from doing the same with U.S. air bases? Or the Pakistanis with Indian air bases? Or the North Koreans with South Korean air bases? Militaries that thou [...]
CVE-2025-5399: WebSocket endless loop on 04/06/2025
curl disclosed a bug submitted by z2_: https://hackerone.com/reports/3168039 [...]
What does it take to become CREST-accredited? Top 10 questions answered. by Eleanor Barlow on 04/06/2025
Reputation - What is CREST? CREST is the gold standard for quality assurance accreditation in the cybersecurity industry. It is a globally recognised not-for-profit cybersecurity authority that rigorously assesses organisations against stringent standards for quality, technical proficiency, and operational integrity. ‘Keeping information safe in today’s digital world is a s… [...]
What Is ASLR and Why Does It Matter? on 03/06/2025
Server-Side Request Forgery (SSRF) via Game Export API on 03/06/2025
Lichess disclosed a bug submitted by oblivionsage: https://hackerone.com/reports/3165242 [...]
New Linux Vulnerabilities on 03/06/2025
They’re interesting: Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like Apport and systemd-coredump are designed to handle crash reporting and core dumps in Linux systems. […] “This means that if a local attacker manages to induce a crash in a priv [...]
IDOR: Account Deletion via Session Misbinding Attacker Can Delete Victim Account on 03/06/2025
Mozilla disclosed a bug submitted by z3phyrus: https://hackerone.com/reports/3154983 - Bounty: $6000 [...]
Discovering hidden parameters: An advanced guide by blackbird-eu on 03/06/2025
Reconnaissance plays an integral part in bug bounty hunting, with hidden parameter discovery an even more crucial role as they are often left with inadequate validation. Making these types of parameters usually more susceptible to common injection vulnerabilities such as SQLs, XSS, IDORs and even command injections. In this article, we will cover 5 various ways to detect possi… [...]
Top 10 Bug Bounty Bits - Tip2 - 3 ways to test for BAC on 02/06/2025
The XSS Rat - Underground rats By Nimble [Music Video] on 02/06/2025
#NahamCon2025 Day 1 Keynote: Hacking, Prompt Engineering, and the Future of Pentesting with AI on 02/06/2025
Australia Requires Ransomware Victims to Declare Payments on 02/06/2025
A new Australian law requires larger companies to declare any ransomware payments they have made. [...]
Top 10 Bug Bounty Bits - Tip1 - XSS Detection Techniques on 31/05/2025
Public GitHub repositories for multiple HackerOne managed triage team profiles contain private HackerOne reports information on 31/05/2025
HackerOne disclosed a bug submitted by w2w: https://hackerone.com/reports/2937622 - Bounty: $1200 [...]
How Hackers Establish Persistence on 30/05/2025
Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store on 30/05/2025
Posted by Chrome Root Program, Chrome Security Team Note: Google Chrome communicated its removal of default trust of Chunghwa Telecom and Netlock in the public forum on May 30, 2025. The Chrome Root Program Policy states that Certification Authority (CA) certificates included in the Chrome Root Store must provide value to Chrome end users that exceeds the risk of their continued inclusion. It [...]
Malware & Hackers Evade Antivirus with Windows Sandbox on 30/05/2025
Why Take9 Won’t Improve Cybersecurity on 30/05/2025
There’s a new cybersecurity awareness campaign: Take9. The idea is that people—you, me, everyone—should just pause for nine seconds and think more about the link they are planning to click on, the file they are planning to download, or whatever it is they are planning to share. There’s a website—of course—and a video, well-produced and scary. But the campaign wo [...]
A deep dive into Axiom’s Halo2 circuits on 30/05/2025
Over two audits in 2023, we reviewed a blockchain system developed by Axiom that allows computing over the entire history of Ethereum, all verified by zero-knowledge proofs (ZKPs) on-chain using ZK-verified elliptic curve and SNARK recursion operations. This system is built using the Halo2 framework—a complex, emerging technology that presents many challenges when building a secure application, in [...]
PortSwigger Honored with the King's Award for Enterprise in International Trade on 30/05/2025
We’re proud to announce that PortSwigger has been awarded the prestigious King’s Award for Enterprise in the category of International Trade - a recognition that reflects our sustained international s [...]
Information Disclosure of metrics fax.wavecell.com/metrics on 30/05/2025
8x8 Bounty disclosed a bug submitted by kauenavarro: https://hackerone.com/reports/1365076 [...]
Facebook Username Takeover via Broken Link in Footer on 30/05/2025
Omise disclosed a bug submitted by vulnerability_is_here: https://hackerone.com/reports/3119034 [...]
U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams by BrianKrebs on 30/05/2025
Image: Shutterstock, ArtHead. The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams known as “pig butchering.” In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that ca [...]
Pipe To Vim on 29/05/2025
Friday Squid Blogging: NGC 1068 Is the “Squid Galaxy” on 29/05/2025
I hadn’t known that the NGC 1068 galaxy is nicknamed the “Squid Galaxy.” It is, and it’s spewing neutrinos without the usual accompanying gamma rays. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. [...]
Vibe Coding in Cursor for Cyber Security on 29/05/2025
How Swiss Cheese is Like Cybersecurity on 29/05/2025
hackers weaponize... really long filenames?? on 29/05/2025
Apache Airflow Fab Provider: Application does not invalidate session after password change via Airflow cli on 29/05/2025
Internet Bug Bounty disclosed a bug submitted by saurabhb: https://hackerone.com/reports/3073507 [...]
Surveillance Via Smart Toothbrush on 29/05/2025
The only links are from The Daily Mail and The Mirror, but a marital affair was discovered because the cheater was recorded using his smart toothbrush at home when he was supposed to be at work. [...]
Meet Burp Suite DAST: Your questions answered on 29/05/2025
We recently hosted a webinar to introduce Burp Suite DAST, the new name for Burp Suite Enterprise Edition, the best-in-class, automated web application and API security scanning solution for modern Ap [...]
CISO Spotlight: Mike Wilkes on Building Resilience in an Evolving Threat Landscape by Tim Erlin on 29/05/2025
Mike Wilkes has had a career many cybersecurity professionals could only dream of. An adjunct professor, former CISO of Marvel and MLS, member of the World Economic Forum, drummer, and board member at the National Jazz Museum in Harlem, his interests and achievements are as eclectic as they are impressive. In the first edition of CISO Spotlight, we sat down with Mike to explore the skill [...]
The Custodial Stablecoin Rekt Test on 29/05/2025
Introducing the Custodial Stablecoin Rekt Test; a new spin on the classic Rekt Test for evaluating the security maturity of stablecoin issuers. [...]
LIVE: HackTheBox | Pentesting | AppSec | Cybersecurity on 28/05/2025
Pakistan Arrests 21 in ‘Heartsender’ Malware Service by BrianKrebs on 28/05/2025
Authorities in Pakistan have arrested 21 individuals accused of operating “Heartsender,” a once popular spam and malware dissemination service that operated for more than a decade. The main clientele for HeartSender were organized crime groups that tried to trick victim companies into making payments to a third party, and its alleged proprietors were publicly identified by KrebsOnSecur [...]
Remote Code Execution via unsafe usage of `reply.view({ raw })` in @fastify/view (EJS template engine) on 28/05/2025
Fastify disclosed a bug submitted by oblivionsage: https://hackerone.com/reports/3122019 [...]
This Sneaky Malware Uses Cloudflare to Steal Your Password on 28/05/2025
RCE via deserialization with a class allowlist bypass and DNS exfiltration with Arthur Aires on 28/05/2025
CVE-2025-5025: No QUIC certificate pinning with wolfSSL on 28/05/2025
curl disclosed a bug submitted by kurohiro: https://hackerone.com/reports/3153497 [...]
CVE-2025-4947: QUIC certificate check skip with wolfSSL on 28/05/2025
curl disclosed a bug submitted by kurohiro: https://hackerone.com/reports/3150884 [...]
Non-Production API Endpoints for the bedrock-agent Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration on 28/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/2800091 [...]
Non-Production API Endpoints for the bedrock Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration on 28/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/2951803 [...]
Non-Production API Endpoint for the EventBridge Service Fails to Log to CloudTrail Resulting in Silent Permission Enumeration on 28/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3021618 [...]
Non-Production API Endpoints for the Global Accelerator Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration on 28/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3029552 [...]
Non-Production API Endpoints for the Health Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration on 28/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3042588 [...]
Amazon Pinpoint SMS and Voice, version 2 Service Reporting "AWS Internal" for CloudTrail Events Generated from FIPS Endpoints on 28/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3072841 [...]
Amazon Kendra Intelligent Ranking Service Reporting "AWS Internal" for CloudTrail Events Generated from FIPS Endpoints on 28/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3044471 [...]
Adoption of CVSS v4.0 vulnerability assessment calculator by Eleanor Barlow on 28/05/2025
CVSS stands for "Common Vulnerability Scoring System". The CVSS framework is an open cyber security framework owned by a US-based non-profit organization "Forum of Incident Response and Security Teams" (FIRST). The mission of FIRST is to help worldwide cyber security response teams quickly and easily calculate the severity of cyber security vulnerabilities based on metrics. How… [...]
Non-Production API Endpoints for the Neptune Graph Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration on 27/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3068422 [...]
Non-Production API Endpoints for the Route 53 Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration on 27/05/2025
AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3092085 [...]
Why Global Cybersecurity Standards Matter: A Conversation with Bugcrowd’s Founder & CISO on 27/05/2025
unauthorized access and add user and change personal information all users on 27/05/2025
Mars disclosed a bug submitted by bughunter0x7: https://hackerone.com/reports/2828641 [...]
How Bad Characters Can Hold Your Exploits Back! on 27/05/2025
Customer Data Exposure via Insecure Endpoint of coupon on 27/05/2025
Mars disclosed a bug submitted by bughunter0x7: https://hackerone.com/reports/2828720 [...]
Apache Airflow Sql injection by authenticated user on 27/05/2025
Internet Bug Bounty disclosed a bug submitted by nxczje: https://hackerone.com/reports/3078856 - Bounty: $505 [...]
Modat io - The shodan killer? on 27/05/2025
[SECURITY] CVE-2024-50379 Apache Tomcat - RCE via write-enabled default servlet on 27/05/2025
Internet Bug Bounty disclosed a bug submitted by nacl_123: https://hackerone.com/reports/2905013 [...]
TLS client authentication can be bypassed due to ticket resumption on 27/05/2025
Internet Bug Bounty disclosed a bug submitted by snhebrok: https://hackerone.com/reports/2978267 - Bounty: $2162 [...]
FAKE Gambling Cheat Runs Malware on 27/05/2025
CVE-2024-56374: Denial-of-service vulnerability in IPv6 validation on 27/05/2025
Internet Bug Bounty disclosed a bug submitted by sav_: https://hackerone.com/reports/2939104 - Bounty: $2162 [...]
Bug Bounty Dreams [FULL ALBUM] - Hackers Hardstyle on 26/05/2025
WASI sandbox escape via symlink on 24/05/2025
Node.js disclosed a bug submitted by jessewilson: https://hackerone.com/reports/2084280 [...]
Learn Quantum Computing! on 23/05/2025
Is this Entry-Level Microsoft Cybersecurity Cert Worth It?! on 23/05/2025
Dynamic fee algorithm doesn't check for zero fee on 23/05/2025
Monero disclosed a bug submitted by sech1: https://hackerone.com/reports/1981441 [...]
RPC service DOS on 23/05/2025
Monero disclosed a bug submitted by ptrstr: https://hackerone.com/reports/2338094 [...]
Tracking the Cost of Quantum Factoring on 23/05/2025
Posted by Craig Gidney, Quantum Research Scientist, and Sophie Schmieg, Senior Staff Cryptography Engineer Google Quantum AI's mission is to build best in class quantum computing for otherwise unsolvable problems. For decades the quantum and security communities have also known that large-scale quantum computers will at some point in the future likely be able to break many of today’s secure p [...]
Intigriti Bug Bytes #224 - May 2025 🚀 by Intigriti on 23/05/2025
Hello Hackers 👋 Spring is in the air, and so is the sweet scent of freshly reported bugs. Intigriti’s blooming too—each month, we squad up with elite hackers to drop hot tips, platform news, shiny new programs, and community events you won’t want to miss. Let’s make this bug season one for the bounty books. 🐞💰 Hackdonalds Challenge results are in! An easier-than-usual challe… [...]
Oops: DanaBot Malware Devs Infected Their Own PCs by BrianKrebs on 22/05/2025
The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants exposed their real-life identities after accidentally infecting their own sys [...]
Registry Hack: Clean Up Your Windows Search Bar! on 22/05/2025
Attackers Abuse TikTok and Instagram APIs by Tim Erlin on 22/05/2025
It must be the season for API security incidents. Hot on the heels of a developer leaking an API key for private Tesla and SpaceX LLMs, researchers have now discovered a set of tools for validating account information via API abuse, leveraging undocumented TikTok and Instagram APIs. The tools, and assumed exploitation, involve malicious Python packages - checker-SaGaF, stein lurks, and inner c [...]
Memory Leak in libcurl via Location Header Handling (CWE-770) on 22/05/2025
curl disclosed a bug submitted by darkroomdragon: https://hackerone.com/reports/3158093 [...]
Mapping the Future of AI Security by Ivan Novikov on 22/05/2025
AI security is one of the most pressing challenges facing the world today. Artificial intelligence is extraordinarily powerful, and, especially considering the advent of Agentic AI, growing more so by the day. But it is for this reason that securing it is so important. AI handles massive amounts of data and plays an increasingly important role in operations; should cybercriminals abuse it, the co [...]
LIVE: 🔎ForenSICK! | Cybersecurity | TryHackme | AMA on 21/05/2025
An ATO that doesn’t make sense feat. Jasmin “JR0ch17” Landry #bugbounty #bugbountytips #bugbountyhun on 21/05/2025
Elevate your testing with Burp AI: watch Clint Gibler’s exclusive interview with PortSwigger’s Dafydd Stuttard and James Kettle on 21/05/2025
AI is transforming Application Security, and PortSwigger is leading the charge. In a must-watch interview, Clint Gibler - one of the leading voices in the AppSec industry - sat down with PortSwigger F [...]
The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions on 21/05/2025
Analysis of a threat actor campaign targeting Solidity developers via three malicious VS Code extensions [...]
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS by BrianKrebs on 20/05/2025
KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things (IoT) botnet capable of launching crippling digital assaults that few web destinations can withstand. Read on for mo [...]
ThinkPad FDE vs Apple Data Protection and WT_ is Opal on 20/05/2025
How to Write Shellcode in 3 Minutes! on 20/05/2025
`Curl_socketpair()` fallback vulnerable to man-in-the-middle attack on 20/05/2025
curl disclosed a bug submitted by jmanojlovich: https://hackerone.com/reports/3148937 [...]
CREST accreditation reinforces Intigriti’s pentesting excellence by Eleanor Barlow on 20/05/2025
Intigriti, a global crowdsourced security provider, is delighted to announce that it is now CREST accredited. Who is CREST? CREST, a globally recognised not-for-profit authority in cyber security, rigorously assesses organisations against stringent standards for quality, technical proficiency, and operational integrity. This accreditation acknowledges that Intigriti meets CREST… [...]