InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Learn Phishing!

on 09/06/2025

See full content

Puny-Code, 0-Click Account Takeover | @YShahinzadeh & @AmirMSafari | #NahamCon2025

on 09/06/2025

See full content

Path Traversal Vulnerability in Lila Project

on 09/06/2025

Lichess disclosed a bug submitted by immm: https://hackerone.com/reports/3181066 [...]

See full content

New Way to Track Covertly Android Users

on 09/06/2025

Researchers have discovered a new way to covertly track Android users. Both Meta and Yandex were using it, but have suddenly stopped now that they have been caught. The details are interesting, and worth reading in detail: >Tracking code that Meta and Russia-based Yandex embed into millions of websites is de-anonymizing visitors by abusing legitimate Internet protocols, causing Chrome and other br [...]

See full content

IDOR Vulnerability at AddTagToAssets operation name

on 08/06/2025

HackerOne disclosed a bug submitted by root_geek280: https://hackerone.com/reports/2633771 [...]

See full content

Friday Squid Blogging: Squid Run in Southern New England

on 06/06/2025

Southern New England is having the best squid run in years. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. [...]

See full content

ImageId Format Injection in Image Upload Endpoint

on 06/06/2025

Lichess disclosed a bug submitted by oblivionsage: https://hackerone.com/reports/3175928 [...]

See full content

Hearing on the Federal Government and AI

on 06/06/2025

On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled “The Federal Government in the Age of Artificial Intelligence.” The other speakers mostly talked about how cool AI was—and sometimes about how cool their own company was—but I was asked by the Democrats to specifically talk about DOGE and the risks of exfiltrating our d [...]

See full content

Getting Started with HackTheBox in 2025 | Cheatsheet Inside

on 06/06/2025

See full content

Report on the Malicious Uses of AI

on 06/06/2025

OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity including social engineering, cyber espionage, deceptive employment schemes, covert influence operations and scams. These operations originated in many parts o [...]

See full content

1 Click Account Takeover via Auth Token Theft on marketing.hostinger.com

on 06/06/2025

hostinger disclosed a bug submitted by aziz0x48: https://hackerone.com/reports/3081691 [...]

See full content

The One Thing You Keep Forgetting About Broad Scope -ShuffelDNS

on 06/06/2025

See full content

Proxy Services Feast on Ukraine’s IP Address Exodus

by BrianKrebs on 05/06/2025

Image: Mark Rademaker, via Shutterstock. Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study finds. The analysis indicates large chunks of Ukrainian Internet address space are now in the hands of shadowy proxy and anonymity services that are nested at some of America’s largest Internet service [...]

See full content

Impress Interviewers With This IT Weekend Project!

on 05/06/2025

See full content

Addressing API Security with NIST SP 800-228

by Tim Erlin on 05/06/2025

According to the Wallarm Q1 2025 ThreatStats report, 70% of all application attacks target APIs. The industry can no longer treat API security as a sidenote; it’s time to treat it as the main event. NIST seems to be on board with this view, releasing the initial public draft of NIST SP 800-228, a set of recommendations for securing APIs.  I recently sat down with AJ Debole, Field CISO at Oracl [...]

See full content

DoS Vulnerability via Cache Poisoning on cdn.shopify.com and shopify-assets.shopifycdn.com

on 04/06/2025

Shopify disclosed a bug submitted by bassem_sadaqah: https://hackerone.com/reports/1695604 - Bounty: $3800 [...]

See full content

🔴 LIVE: Conti Ransomware | Cybersecurity | TryHackme | AMA

on 04/06/2025

See full content

returnUrl= allow attacker to redirect users to the another phising website and takeover credientials

on 04/06/2025

Insightly disclosed a bug submitted by basant0x01: https://hackerone.com/reports/1544236 [...]

See full content

The Ramifications of Ukraine’s Drone Attack

on 04/06/2025

You can read the details of Operation Spiderweb elsewhere. What interests me are the implications for future warfare: If the Ukrainians could sneak drones so close to major air bases in a police state such as Russia, what is to prevent the Chinese from doing the same with U.S. air bases? Or the Pakistanis with Indian air bases? Or the North Koreans with South Korean air bases? Militaries that thou [...]

See full content

CVE-2025-5399: WebSocket endless loop

on 04/06/2025

curl disclosed a bug submitted by z2_: https://hackerone.com/reports/3168039 [...]

See full content

What does it take to become CREST-accredited? Top 10 questions answered.

by Eleanor Barlow on 04/06/2025

Reputation - What is CREST?   CREST is the gold standard for quality assurance accreditation in the cybersecurity industry. It is a globally recognised not-for-profit cybersecurity authority that rigorously assesses organisations against stringent standards for quality, technical proficiency, and operational integrity.   ‘Keeping information safe in today’s digital world is a s… [...]

See full content

What Is ASLR and Why Does It Matter?

on 03/06/2025

See full content

Server-Side Request Forgery (SSRF) via Game Export API

on 03/06/2025

Lichess disclosed a bug submitted by oblivionsage: https://hackerone.com/reports/3165242 [...]

See full content

New Linux Vulnerabilities

on 03/06/2025

They’re interesting: Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like Apport and systemd-coredump are designed to handle crash reporting and core dumps in Linux systems. […] “This means that if a local attacker manages to induce a crash in a priv [...]

See full content

IDOR: Account Deletion via Session Misbinding Attacker Can Delete Victim Account

on 03/06/2025

Mozilla disclosed a bug submitted by z3phyrus: https://hackerone.com/reports/3154983 - Bounty: $6000 [...]

See full content

Discovering hidden parameters: An advanced guide

by blackbird-eu on 03/06/2025

Reconnaissance plays an integral part in bug bounty hunting, with hidden parameter discovery an even more crucial role as they are often left with inadequate validation. Making these types of parameters usually more susceptible to common injection vulnerabilities such as SQLs, XSS, IDORs and even command injections. In this article, we will cover 5 various ways to detect possi… [...]

See full content

Top 10 Bug Bounty Bits - Tip2 - 3 ways to test for BAC

on 02/06/2025

See full content

The XSS Rat - Underground rats By Nimble [Music Video]

on 02/06/2025

See full content

#NahamCon2025 Day 1 Keynote: Hacking, Prompt Engineering, and the Future of Pentesting with AI

on 02/06/2025

See full content

Australia Requires Ransomware Victims to Declare Payments

on 02/06/2025

A new Australian law requires larger companies to declare any ransomware payments they have made. [...]

See full content

Top 10 Bug Bounty Bits - Tip1 - XSS Detection Techniques

on 31/05/2025

See full content

Public GitHub repositories for multiple HackerOne managed triage team profiles contain private HackerOne reports information

on 31/05/2025

HackerOne disclosed a bug submitted by w2w: https://hackerone.com/reports/2937622 - Bounty: $1200 [...]

See full content

How Hackers Establish Persistence

on 30/05/2025

See full content

Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store

on 30/05/2025

Posted by Chrome Root Program, Chrome Security Team Note: Google Chrome communicated its removal of default trust of Chunghwa Telecom and Netlock in the public forum on May 30, 2025. The Chrome Root Program Policy states that Certification Authority (CA) certificates included in the Chrome Root Store must provide value to Chrome end users that exceeds the risk of their continued inclusion. It [...]

See full content

Malware & Hackers Evade Antivirus with Windows Sandbox

on 30/05/2025

See full content

Why Take9 Won’t Improve Cybersecurity

on 30/05/2025

There’s a new cybersecurity awareness campaign: Take9. The idea is that people—you, me, everyone—should just pause for nine seconds and think more about the link they are planning to click on, the file they are planning to download, or whatever it is they are planning to share. There’s a website—of course—and a video, well-produced and scary. But the campaign wo [...]

See full content

A deep dive into Axiom’s Halo2 circuits

on 30/05/2025

Over two audits in 2023, we reviewed a blockchain system developed by Axiom that allows computing over the entire history of Ethereum, all verified by zero-knowledge proofs (ZKPs) on-chain using ZK-verified elliptic curve and SNARK recursion operations. This system is built using the Halo2 framework—a complex, emerging technology that presents many challenges when building a secure application, in [...]

See full content

PortSwigger Honored with the King's Award for Enterprise in International Trade

on 30/05/2025

We’re proud to announce that PortSwigger has been awarded the prestigious King’s Award for Enterprise in the category of International Trade - a recognition that reflects our sustained international s [...]

See full content

Information Disclosure of metrics fax.wavecell.com/metrics

on 30/05/2025

8x8 Bounty disclosed a bug submitted by kauenavarro: https://hackerone.com/reports/1365076 [...]

See full content

Facebook Username Takeover via Broken Link in Footer

on 30/05/2025

Omise disclosed a bug submitted by vulnerability_is_here: https://hackerone.com/reports/3119034 [...]

See full content

U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams

by BrianKrebs on 30/05/2025

Image: Shutterstock, ArtHead. The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams known as “pig butchering.” In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that ca [...]

See full content

Pipe To Vim

on 29/05/2025

See full content

Friday Squid Blogging: NGC 1068 Is the “Squid Galaxy”

on 29/05/2025

I hadn’t known that the NGC 1068 galaxy is nicknamed the “Squid Galaxy.” It is, and it’s spewing neutrinos without the usual accompanying gamma rays. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. [...]

See full content

Vibe Coding in Cursor for Cyber Security

on 29/05/2025

See full content

How Swiss Cheese is Like Cybersecurity

on 29/05/2025

See full content

hackers weaponize... really long filenames??

on 29/05/2025

See full content

Apache Airflow Fab Provider: Application does not invalidate session after password change via Airflow cli

on 29/05/2025

Internet Bug Bounty disclosed a bug submitted by saurabhb: https://hackerone.com/reports/3073507 [...]

See full content

Surveillance Via Smart Toothbrush

on 29/05/2025

The only links are from The Daily Mail and The Mirror, but a marital affair was discovered because the cheater was recorded using his smart toothbrush at home when he was supposed to be at work. [...]

See full content

Meet Burp Suite DAST: Your questions answered

on 29/05/2025

We recently hosted a webinar to introduce Burp Suite DAST, the new name for Burp Suite Enterprise Edition, the best-in-class, automated web application and API security scanning solution for modern Ap [...]

See full content

CISO Spotlight: Mike Wilkes on Building Resilience in an Evolving Threat Landscape

by Tim Erlin on 29/05/2025

Mike Wilkes has had a career many cybersecurity professionals could only dream of. An adjunct professor, former CISO of Marvel and MLS, member of the World Economic Forum, drummer, and board member at the National Jazz Museum in Harlem, his interests and achievements are as eclectic as they are impressive.  In the first edition of CISO Spotlight, we sat down with Mike to explore the skill [...]

See full content

The Custodial Stablecoin Rekt Test

on 29/05/2025

Introducing the Custodial Stablecoin Rekt Test; a new spin on the classic Rekt Test for evaluating the security maturity of stablecoin issuers. [...]

See full content

LIVE: HackTheBox | Pentesting | AppSec | Cybersecurity

on 28/05/2025

See full content

Pakistan Arrests 21 in ‘Heartsender’ Malware Service

by BrianKrebs on 28/05/2025

Authorities in Pakistan have arrested 21 individuals accused of operating “Heartsender,” a once popular spam and malware dissemination service that operated for more than a decade. The main clientele for HeartSender were organized crime groups that tried to trick victim companies into making payments to a third party, and its alleged proprietors were publicly identified by KrebsOnSecur [...]

See full content

Remote Code Execution via unsafe usage of `reply.view({ raw })` in @fastify/view (EJS template engine)

on 28/05/2025

Fastify disclosed a bug submitted by oblivionsage: https://hackerone.com/reports/3122019 [...]

See full content

This Sneaky Malware Uses Cloudflare to Steal Your Password

on 28/05/2025

See full content

RCE via deserialization with a class allowlist bypass and DNS exfiltration with Arthur Aires

on 28/05/2025

See full content

CVE-2025-5025: No QUIC certificate pinning with wolfSSL

on 28/05/2025

curl disclosed a bug submitted by kurohiro: https://hackerone.com/reports/3153497 [...]

See full content

CVE-2025-4947: QUIC certificate check skip with wolfSSL

on 28/05/2025

curl disclosed a bug submitted by kurohiro: https://hackerone.com/reports/3150884 [...]

See full content

Non-Production API Endpoints for the bedrock-agent Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration

on 28/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/2800091 [...]

See full content

Non-Production API Endpoints for the bedrock Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration

on 28/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/2951803 [...]

See full content

Non-Production API Endpoint for the EventBridge Service Fails to Log to CloudTrail Resulting in Silent Permission Enumeration

on 28/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3021618 [...]

See full content

Non-Production API Endpoints for the Global Accelerator Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration

on 28/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3029552 [...]

See full content

Non-Production API Endpoints for the Health Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration

on 28/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3042588 [...]

See full content

Amazon Pinpoint SMS and Voice, version 2 Service Reporting "AWS Internal" for CloudTrail Events Generated from FIPS Endpoints

on 28/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3072841 [...]

See full content

Amazon Kendra Intelligent Ranking Service Reporting "AWS Internal" for CloudTrail Events Generated from FIPS Endpoints

on 28/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3044471 [...]

See full content

Adoption of CVSS v4.0 vulnerability assessment calculator

by Eleanor Barlow on 28/05/2025

CVSS stands for "Common Vulnerability Scoring System". The CVSS framework is an open cyber security framework owned by a US-based non-profit organization "Forum of Incident Response and Security Teams" (FIRST). The mission of FIRST is to help worldwide cyber security response teams quickly and easily calculate the severity of cyber security vulnerabilities based on metrics. How… [...]

See full content

Non-Production API Endpoints for the Neptune Graph Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration

on 27/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3068422 [...]

See full content

Non-Production API Endpoints for the Route 53 Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration

on 27/05/2025

AWS VDP disclosed a bug submitted by nick_frichette_dd: https://hackerone.com/reports/3092085 [...]

See full content

Why Global Cybersecurity Standards Matter: A Conversation with Bugcrowd’s Founder & CISO

on 27/05/2025

See full content

unauthorized access and add user and change personal information all users

on 27/05/2025

Mars disclosed a bug submitted by bughunter0x7: https://hackerone.com/reports/2828641 [...]

See full content

How Bad Characters Can Hold Your Exploits Back!

on 27/05/2025

See full content

Customer Data Exposure via Insecure Endpoint of coupon

on 27/05/2025

Mars disclosed a bug submitted by bughunter0x7: https://hackerone.com/reports/2828720 [...]

See full content

Apache Airflow Sql injection by authenticated user

on 27/05/2025

Internet Bug Bounty disclosed a bug submitted by nxczje: https://hackerone.com/reports/3078856 - Bounty: $505 [...]

See full content

Modat io - The shodan killer?

on 27/05/2025

See full content

[SECURITY] CVE-2024-50379 Apache Tomcat - RCE via write-enabled default servlet

on 27/05/2025

Internet Bug Bounty disclosed a bug submitted by nacl_123: https://hackerone.com/reports/2905013 [...]

See full content

TLS client authentication can be bypassed due to ticket resumption

on 27/05/2025

Internet Bug Bounty disclosed a bug submitted by snhebrok: https://hackerone.com/reports/2978267 - Bounty: $2162 [...]

See full content

FAKE Gambling Cheat Runs Malware

on 27/05/2025

See full content

CVE-2024-56374: Denial-of-service vulnerability in IPv6 validation

on 27/05/2025

Internet Bug Bounty disclosed a bug submitted by sav_: https://hackerone.com/reports/2939104 - Bounty: $2162 [...]

See full content

Bug Bounty Dreams [FULL ALBUM] - Hackers Hardstyle

on 26/05/2025

See full content

WASI sandbox escape via symlink

on 24/05/2025

Node.js disclosed a bug submitted by jessewilson: https://hackerone.com/reports/2084280 [...]

See full content

Learn Quantum Computing!

on 23/05/2025

See full content

Is this Entry-Level Microsoft Cybersecurity Cert Worth It?!

on 23/05/2025

See full content

Dynamic fee algorithm doesn't check for zero fee

on 23/05/2025

Monero disclosed a bug submitted by sech1: https://hackerone.com/reports/1981441 [...]

See full content

RPC service DOS

on 23/05/2025

Monero disclosed a bug submitted by ptrstr: https://hackerone.com/reports/2338094 [...]

See full content

Tracking the Cost of Quantum Factoring

on 23/05/2025

Posted by Craig Gidney, Quantum Research Scientist, and Sophie Schmieg, Senior Staff Cryptography Engineer Google Quantum AI's mission is to build best in class quantum computing for otherwise unsolvable problems. For decades the quantum and security communities have also known that large-scale quantum computers will at some point in the future likely be able to break many of today’s secure p [...]

See full content

Intigriti Bug Bytes #224 - May 2025 🚀

by Intigriti on 23/05/2025

Hello Hackers 👋 Spring is in the air, and so is the sweet scent of freshly reported bugs. Intigriti’s blooming too—each month, we squad up with elite hackers to drop hot tips, platform news, shiny new programs, and community events you won’t want to miss. Let’s make this bug season one for the bounty books. 🐞💰 Hackdonalds Challenge results are in! An easier-than-usual challe… [...]

See full content

Oops: DanaBot Malware Devs Infected Their Own PCs

by BrianKrebs on 22/05/2025

The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants exposed their real-life identities after accidentally infecting their own sys [...]

See full content

Registry Hack: Clean Up Your Windows Search Bar!

on 22/05/2025

See full content

Attackers Abuse TikTok and Instagram APIs

by Tim Erlin on 22/05/2025

It must be the season for API security incidents. Hot on the heels of a developer leaking an API key for private Tesla and SpaceX LLMs, researchers have now discovered a set of tools for validating account information via API abuse, leveraging undocumented TikTok and Instagram APIs. The tools, and assumed exploitation, involve malicious Python packages - checker-SaGaF, stein lurks, and inner c [...]

See full content

Memory Leak in libcurl via Location Header Handling (CWE-770)

on 22/05/2025

curl disclosed a bug submitted by darkroomdragon: https://hackerone.com/reports/3158093 [...]

See full content

Mapping the Future of AI Security

by Ivan Novikov on 22/05/2025

AI security is one of the most pressing challenges facing the world today. Artificial intelligence is extraordinarily powerful, and, especially considering the advent of Agentic AI, growing more so by the day. But it is for this reason that securing it is so important. AI handles massive amounts of data and plays an increasingly important role in operations; should cybercriminals abuse it, the co [...]

See full content

LIVE: 🔎ForenSICK! | Cybersecurity | TryHackme | AMA

on 21/05/2025

See full content

An ATO that doesn’t make sense feat. Jasmin “JR0ch17” Landry #bugbounty #bugbountytips #bugbountyhun

on 21/05/2025

See full content

Elevate your testing with Burp AI: watch Clint Gibler’s exclusive interview with PortSwigger’s Dafydd Stuttard and James Kettle

on 21/05/2025

AI is transforming Application Security, and PortSwigger is leading the charge. In a must-watch interview, Clint Gibler - one of the leading voices in the AppSec industry - sat down with PortSwigger F [...]

See full content

The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions

on 21/05/2025

Analysis of a threat actor campaign targeting Solidity developers via three malicious VS Code extensions [...]

See full content

KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS

by BrianKrebs on 20/05/2025

KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things (IoT) botnet capable of launching crippling digital assaults that few web destinations can withstand. Read on for mo [...]

See full content

ThinkPad FDE vs Apple Data Protection and WT_ is Opal

on 20/05/2025

See full content

How to Write Shellcode in 3 Minutes!

on 20/05/2025

See full content

`Curl_socketpair()` fallback vulnerable to man-in-the-middle attack

on 20/05/2025

curl disclosed a bug submitted by jmanojlovich: https://hackerone.com/reports/3148937 [...]

See full content

CREST accreditation reinforces Intigriti’s pentesting excellence

by Eleanor Barlow on 20/05/2025

Intigriti, a global crowdsourced security provider, is delighted to announce that it is now CREST accredited. Who is CREST? CREST, a globally recognised not-for-profit authority in cyber security, rigorously assesses organisations against stringent standards for quality, technical proficiency, and operational integrity. This accreditation acknowledges that Intigriti meets CREST… [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Phylum Research | Software Supply Chain Security
  4. Schneier on Security
  5. Krebs on Security
  6. Google Online Security Blog
  7. $BLOG_TITLE
  8. Agarri : Sécurité informatique offensive
  9. Alex Chapman's Blog
  10. www.alphabot.com
  11. Brett Buerhaus
  12. Bug Bounty Reports Explained
  13. Bugcrowd
  14. cat ~/footstep.ninja/blog.txt
  15. Ezequiel Pereira
  16. HackerOne
  17. surajdisoja.me
  18. InsiderPhD
  19. Intigriti
  20. John Hammond
  21. LiveOverflow
  22. NahamSec
  23. PortSwigger Blog
  24. Rana Khalil
  25. Richard’s Infosec blog
  26. Ron Chan
  27. ropnop blog
  28. STÖK
  29. Sun Knudsen
  30. The Cyber Mentor
  31. The unofficial HackerOne disclosure timeline
  32. HackerRats (XSS Rat)
  33. TomNomNom
  34. Wallarm