InfoSec Planet
A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.
weekend mode on 01/05/2026
A Guide to LNK File Forensics on 01/05/2026
Improper input validation On Exported deep-link handler crashes `FileDisplayActivity` on crafted external URL Denial-of-Service on 01/05/2026
Nextcloud disclosed a bug submitted by khoof: https://hackerone.com/reports/3399016 [...]
A Ransomware Negotiator Was Working for a Ransomware Gang on 01/05/2026
Someone pleaded guilty to secretly working for a ransomware gang as he negotiated ransomware payments for clients. [...]
76% More Valid Vulnerabilities. This Is Not Hype. on 01/05/2026
3 ways custom scan checks turn practitioner knowledge into scalable automation on 01/05/2026
Senior pentesters have a deeply refined intuition about what is vulnerable in an environment. The problem? That expertise is often siloed with an individual and trapped in their notes or Python scripts. [...]
Double fdrop on a socket through sys_netcontrol on 01/05/2026
PlayStation disclosed a bug submitted by slidybat: https://hackerone.com/reports/3320669 - Bounty: $10000 [...]
If you want hackers to hunt on your program on 30/04/2026
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs by BrianKrebs on 30/04/2026
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work of a compet [...]
NEW! FREE! From 0 - OSCP! [RatCTF] on 30/04/2026
Fast16 Malware on 30/04/2026
Researchers have reverse-engineered a piece of malware named Fast16. It’s almost certainly state-sponsored, probably US in origin, and was deployed against Iran years before Stuxnet: “…the Fast16 malware was designed to carry out the most subtle form of sabotage ever seen in an in-the-wild malware tool: By automatically spreading across networks and then silently manipulating com [...]
Discovery Is Not the Problem. Remediation Is. on 30/04/2026
Josh Mason | Real Folks of Cyber | DITL on 30/04/2026
Exploiting SQL injection vulnerabilities by Ayoub on 30/04/2026
Most assume that SQL injection is a solved problem in today's application landscape, especially with increased awareness of secure coding practices (such as resorting to prepared statements or parameterized queries) and the widespread adoption of NoSQL databases. However, in practice, SQLi vulnerabilities continue to surface in modern applications, often hiding in legacy code components, custom qu [...]
MQTT state machine confusion: PINGRESP/DISCONNECT with non-zero remaining_length dispatches to stale nextstate on 29/04/2026
curl disclosed a bug submitted by fxv_ray_st: https://hackerone.com/reports/3702718 [...]
Extending Ruzzy with LibAFL on 29/04/2026
LibAFL is all the rage in the fuzzing community these days, especially with LLVM’s libFuzzer being placed in maintenance mode. Written in Rust, LibAFL claims improved performance, modularity, state-of-the-art fuzzing techniques, and libFuzzer compatibility. For these reasons, I set out to add LibAFL support to Ruzzy, our coverage-guided fuzzer for pure Ruby code and Ruby C extensions. This gives R [...]
Claude Mythos Has Found 271 Zero-Days in Firefox on 29/04/2026
That’s a lot. No, it’s an extraordinary number: Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previously about our collaboration with Anthropic to scan Firefox with Opus 4.6, which led to fixes for 22 security-sensitive bugs in Firefox 148. As part of our continued col [...]
Agentic Speed. Zero Human Delay. on 29/04/2026
Use-After-Free in SMB connection reuse (req->path dangling pointer after needle destruction) on 29/04/2026
curl disclosed a bug submitted by nadsec42: https://hackerone.com/reports/3591956 [...]
Negotiate connection reuse with wrong credentials when using CURLAUTH_ANY on 29/04/2026
curl disclosed a bug submitted by anonymous_237: https://hackerone.com/reports/3646072 [...]
Negotiate Authentication Premature on Connection Reuse on 29/04/2026
curl disclosed a bug submitted by sdainard: https://hackerone.com/reports/3666576 [...]
CVE-2026-7168: cross-proxy Digest auth state leak on 29/04/2026
curl disclosed a bug submitted by xkilua: https://hackerone.com/reports/3697719 [...]
CVE-2026-7009: OCSP stapling bypass with Apple SecTrust on 29/04/2026
curl disclosed a bug submitted by 3lcarry: https://hackerone.com/reports/3694390 [...]
CVE-2026-6253: proxy credentials leak over redirect-to proxy on 29/04/2026
curl disclosed a bug submitted by joesephdiver: https://hackerone.com/reports/3669637 [...]
CVE-2026-5545: wrong reuse of HTTP Negotiate connection on 29/04/2026
curl disclosed a bug submitted by quaccws: https://hackerone.com/reports/3642555 [...]
CVE-2026-6276: stale custom cookie host causes cookie leak on 29/04/2026
curl disclosed a bug submitted by arkss: https://hackerone.com/reports/3671818 [...]
CVE-2026-6429: netrc credential leak with reused proxy connection on 29/04/2026
curl disclosed a bug submitted by nobcoderr: https://hackerone.com/reports/3677759 [...]
CVE-2026-4873: connection reuse ignores TLS requirement on 29/04/2026
curl disclosed a bug submitted by bonaire: https://hackerone.com/reports/3621851 [...]
CVE-2026-5773: wrong reuse of SMB connection on 29/04/2026
curl disclosed a bug submitted by osama-hamad: https://hackerone.com/reports/3650689 [...]
Use-after-free in `curl_easy_ssls_export()` during callback re-entrancy on 29/04/2026
curl disclosed a bug submitted by m1llie: https://hackerone.com/reports/3682666 [...]
Heap-buffer-overflow in `Curl_ssl_push_certinfo_len()` sole bounds check is `DEBUGASSERT` on 29/04/2026
curl disclosed a bug submitted by h3zh3z: https://hackerone.com/reports/3684614 [...]
Stack exhaustion in MIME multipart reading with deeply nested subparts on 29/04/2026
curl disclosed a bug submitted by wi110w: https://hackerone.com/reports/3684603 [...]
PS4 BD-J privilege escalation using nested JAR on 29/04/2026
PlayStation disclosed a bug submitted by gezine: https://hackerone.com/reports/3452696 - Bounty: $2500 [...]
What Anthropic’s Mythos Means for the Future of Cybersecurity on 28/04/2026
Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabilities in key software like operating systems and internet infrastructure that thousands of software developers working on those systems failed to find. This capability will have m [...]
6 Lessons Security Leaders Must Learn About AI and APIs by Tim Erlin on 28/04/2026
Most organizations treating AI security as a model problem are defending the wrong layer. Security teams filter prompts, patch jailbreaks, and tune model behavior, which is all necessary work, while the actual attack surface sits largely unexamined underneath. That surface is the API layer: the endpoints AI systems use to retrieve data, call tools, and take action on behalf of users. This isn' [...]
PortSwigger recognized at the Northern Tech Awards 2026. on 28/04/2026
We’re proud to announce that PortSwigger recently won the Overall Judges’ Award at the Northern Tech Awards 2026. The Northern Tech Awards are run by GP Bullhound, the tech advisory and investment fir [...]
The Zero-Day Clock Just Hit 20 Hours on 28/04/2026
What Claude Mythos and Glasswing Mean for Security Leaders on 28/04/2026
The people, the culture, the mission... on 27/04/2026
IBM Aspera HTTP Gateway stores sensitive information in clear text in easily obtainable files which can be read by an unauthenticated user. on 27/04/2026
IBM disclosed a bug submitted by jhon1231248e: https://hackerone.com/reports/3340797 [...]
This hacker made $40,000 using Claude #ai #hacking #bugbounty on 27/04/2026
FAKE Zoom Taxes MALWARE on 27/04/2026
My Friend Made $40,000 Using Claude Code (Here's How) on 27/04/2026
Medieval Encrypted Letter Decoded on 27/04/2026
Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860. [...]
Periodic Testing Is Dead on 27/04/2026
Bypass of Restricted Keyword "Mozilla" in Display Name Field via Unicode Homoglyphs on addons.allizom.org on 27/04/2026
Mozilla disclosed a bug submitted by icecream_23: https://hackerone.com/reports/3279441 - Bounty: $500 [...]
Bypassing Inbox Privacy Settings and Enabling Spam on Pixiv.net on 27/04/2026
pixiv disclosed a bug submitted by aaqibhussain: https://hackerone.com/reports/3100570 - Bounty: $200 [...]
Non-premium user can disable Ads in japanese version of dic.pixiv.net on 27/04/2026
pixiv disclosed a bug submitted by lainkusanagi: https://hackerone.com/reports/3183520 - Bounty: $3000 [...]
Argument Injection in /manage/ssh/ via host parameter leads to sensitive file disclosure on Weblate on 26/04/2026
Weblate disclosed a bug submitted by alexb_616: https://hackerone.com/reports/3518571 [...]
mruby-engine: UAF in MRubyEngine#initialize enables local RCE on 24/04/2026
Shopify disclosed a bug submitted by 0xd0ff9: https://hackerone.com/reports/3679660 [...]
Friday Squid Blogging: How Squid Survived Extinction Events on 24/04/2026
Science news: Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intelligent creatures likely originated deep in the ocean over 100 million years ago, surviving mass extinction events by retreating into oxygen-rich deep-sea refuges. For millions of year [...]
the WORST phishing email i've ever seen on 24/04/2026
Hiding Bluetooth Trackers in Mail on 24/04/2026
It was used to track a Dutch naval ship: Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch government website and mailed a postcard with a hidden tracker inside. Because of this, they were able to track the ship for about a day, watching it sail from Heraklion, Crete, before it turned towards Cyprus. While it only show [...]
Do you know how to hack with AI? 😣 on 24/04/2026
CISO Vulnerability Pressure on 24/04/2026
The Governance Gap: How the EU AI Act Makes API Security a Compliance Imperative by Julian Richter on 24/04/2026
Your legal team just handed you a 400-page document and said "figure out compliance." The EU AI Act is live, your organization falls under its scope, which is broader than many expect. Even non‑EU companies must comply if their AI systems are used, deployed, or produce effects within the European Union. In practice, that means that global organizations building or integrating AI models cannot tre [...]
Chained AI Attacks Go Mainstream on 24/04/2026
Intigriti Bug Bytes #235 - April 2026 🚀 by Ayoub on 24/04/2026
Hi hackers, Welcome to the latest edition of Bug Bytes! In this month's issue, we'll be featuring: Compromising an NPM package with 40M weekly downloads Bypassing Cloudflare WAF for a full ATO 20-part series on exploiting JWT vulnerabilities First Intigriti Bug Bounty Meetup And so much more! Let's dive in! Common misconceptions about bug bounty, debugged Bug bounty still gets misundersto [...]
Incomplete fix for CVE-2026-21637: loadSNI() in _tls_wrap.js lacks try/catch leading to Remote DoS on 23/04/2026
Node.js disclosed a bug submitted by mbarbs: https://hackerone.com/reports/3556769 [...]
AI threats in the wild: The current state of prompt injections on the web on 23/04/2026
Posted by Thomas Brunner, Yu-Han Liu, Moni PandeAt Google, our Threat Intelligence teams are dedicated to staying ahead of real-world adversarial activity, proactively monitoring emerging threats before they can impact users. Right now, Indirect Prompt Injection (IPI) is a top priority for the security community, anticipating it as a primary attack vector for adversaries to target and compromise A [...]
We are the vibe on 23/04/2026
Hackers Stole Your Account (for free) on 23/04/2026
Trailmark turns code into graphs on 23/04/2026
We’re open-sourcing Trailmark, a library that parses source code into a queryable call graph of functions, classes, call relationships, and semantic metadata, then exposes that graph through a Python API that Claude skills can call directly. Install it now: uv pip install trailmark “Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.” John [...]
FBI Extracts Deleted Signal Messages from iPhone Notification Database on 23/04/2026
404 Media reports (alternate site): The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database…. The news shows how forensic extraction—when someone has physical access to a device and is able to run specialized software on it& [...]
Stay Ahead of Cyber Threats on 23/04/2026
RBAC bypass on App log endpoints via `permissionRequired` typo any authenticated user reads admin-only Enterprise App logs on 23/04/2026
Rocket.Chat disclosed a bug submitted by arccode: https://hackerone.com/reports/3589551 [...]
AI Powered Vulnerability Remediation on 23/04/2026
Vulnpocalypse Now? How AI is changing vulnerability discovery by Ed Parsons on 23/04/2026
What you will learn How vulnerability research and security testing may evolve in the future, based on expert insights and reflections from Intigriti COO Ed Parsons. How AI is reshaping vulnerability discovery, including the major trends and developments security teams should understand today. The ‘vulnpocalypse’, and what it signals about the future of AI-assisted hacking. The risks, oppor [...]
Attacking the MCP Trust Boundary by Chandler Johnson on 22/04/2026
Every secure API draws a line between code and data. HTTP separates headers from bodies. SQL has prepared statements. Even email distinguishes the envelope from the message. The Model Context Protocol (MCP), the fast-growing standard for connecting AI agents to external services, inherits that gap from the models it sits on top of. Its central premise is that a language model reads tool descripti [...]
ICE Uses Graphite Spyware on 22/04/2026
ICE has admitted that it uses spyware from the Israeli company Graphite. [...]
Evolving Beyond Bug Bounties on 22/04/2026
How to approach a bug bounty target on 22/04/2026
Cybersecurity certs on 22/04/2026
Complete authentication bypass to admin permissions on 22/04/2026
Rocket.Chat disclosed a bug submitted by npc: https://hackerone.com/reports/3564655 [...]
200 Critical Bugs Overnight on 22/04/2026
Bug Bounty Guide - SSRF 101 on 21/04/2026
Use BLUR-IT to Increase Your OPSEC on 21/04/2026
CTF? on 21/04/2026
‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty by BrianKrebs on 21/04/2026
A 24-year-old British national and senior member of the cybercrime group “Scattered Spider” has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of doll [...]
The Dawn of AI Warfare (with Katrina Manson) on 21/04/2026
Why API Discovery Is the First Step to Securing AI by Tim Erlin on 21/04/2026
TL;DR AI risk doesn’t live in the model. It lives in the APIs behind it. Every AI interaction triggers a chain of API calls across your environment. Many of those APIs aren’t documented or tracked. That’s your real exposure. Shadow API discovery gives you visibility into those hidden endpoints, so you can find them before attackers do. If you don’t know which APIs your AI relies on, you can [...]
Mexican Surveillance Company on 21/04/2026
Grupo Seguritech is a Mexican surveillance company that is expanding into the US. [...]
The Vulnerability Apocalypse: How CISOs Can Stay Ahead of AI-Powered Threats on 21/04/2026
AI Is Creating New Security Risks on 21/04/2026
The Payload Podcast #005 - Casey Smith on 21/04/2026
Attack Surface Meets AI on 21/04/2026
Financial Services Is a Huge Target on 20/04/2026
SVG filter primitives bypass remote image blocking, enabling email tracking without consent. on 20/04/2026
Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3486747 [...]
I Learned How to Jailbreak AI Chatbots on 20/04/2026
position: fixed !important bypasses CSS sanitizer's fixed-position mitigation, enabling full-viewport phishing overlays. on 20/04/2026
Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590586 [...]
Unquoted body background attribute enables CSS injection that bypasses remote image blocking on 20/04/2026
Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590583 [...]
SMIL values and by attributes bypass remote image blocking via unvalidated resource-loading animations, enabling email tracking without consent on 20/04/2026
Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590576 [...]
libcurl omits IPv6 zoneid from host identity and leaks credentials/cookies across scoped link-local realms on 19/04/2026
curl disclosed a bug submitted by valvelvel: https://hackerone.com/reports/3680680 [...]
Digest Auth State Leak on Cross-Origin Redirect via Netrc - Username and Password Hash Sent to Wrong Host on 19/04/2026
curl disclosed a bug submitted by fg0x0: https://hackerone.com/reports/3680038 [...]
Stored XSS in attachment-display exploitable through SameSite on 19/04/2026
Nextcloud disclosed a bug submitted by aikido_security: https://hackerone.com/reports/3594137 [...]
libcurl reuses a learned RTSP Session header across different hosts on the same easy handle, enabling cross-host session leak and replay on 18/04/2026
curl disclosed a bug submitted by skksndk: https://hackerone.com/reports/3680234 [...]
Rails::HTML::Sanitizer.allowed_uri? returns true for entity-encoded control-character-split javascript: URLs on 18/04/2026
Ruby on Rails disclosed a bug submitted by smlee: https://hackerone.com/reports/3601655 [...]
Sould I focus on BAC or multiple exploits on 18/04/2026
libcurl stale CURLOPT_AUTOREFERER leaks a previous request URL to a different origin on a reused easy handle on 17/04/2026
curl disclosed a bug submitted by asdwe: https://hackerone.com/reports/3673277 [...]