InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Telnet Suboption Buffer Pointer Underflow in lib/telnet.c leads to Out-of-Bounds Read

on 29/12/2025

curl disclosed a bug submitted by stif: https://hackerone.com/reports/3480712 [...]

See full content

Are We Ready to Be Governed by Artificial Intelligence?

on 29/12/2025

Artificial Intelligence (AI) overlords are a common trope in science-fiction dystopias, but the reality looks much more prosaic. The technologies of artificial intelligence are already pervading many aspects of democratic government, affecting our lives in ways both large and small. This has occurred largely without our notice or consent. The result is a government incrementally transformed by AI [...]

See full content

Developer geographic

on 29/12/2025

See full content

CrossLayer State Confusion in libcurl: Credential & KeyMaterial Persistence Across Redirect / Connection Reuse Boundaries

on 28/12/2025

curl disclosed a bug submitted by onevone: https://hackerone.com/reports/3480641 [...]

See full content

WebSocket Logic Error: Control Frame (PING/PONG) Starvation causes Connection Drop (DoS) during large transfers

on 28/12/2025

curl disclosed a bug submitted by efrsxcv: https://hackerone.com/reports/3480039 [...]

See full content

Heap Buffer Over-read in lib/http2.c (on_header) handling PUSH_PROMISE frames

on 28/12/2025

curl disclosed a bug submitted by efrsxcv: https://hackerone.com/reports/3480078 [...]

See full content

CRLF Injection / Protocol Smuggling in libcurl via CURLOPT_USERNAME (IMAP)

on 28/12/2025

curl disclosed a bug submitted by efrsxcv: https://hackerone.com/reports/3479984 [...]

See full content

HTTP/3 Protocol Smuggling and Header Injection via CRLF in QPACK value conversion

on 27/12/2025

curl disclosed a bug submitted by 0x0000nosfu: https://hackerone.com/reports/3479203 [...]

See full content

Security hardening: missing integer overflow check in curl_load_library()

on 27/12/2025

curl disclosed a bug submitted by y_security: https://hackerone.com/reports/3479019 [...]

See full content

Friday Squid Blogging: Squid Camouflage

on 26/12/2025

New research: Abstract: Coleoid cephalopods have the most elaborate camouflage system in the animal kingdom. This enables them to hide from or deceive both predators and prey. Most studies have focused on benthic species of octopus and cuttlefish, while studies on squid focused mainly on the chromatophore system for communication. Camouflage adaptations to the substrate while moving has been recen [...]

See full content

Where to Find Cybersecurity News

on 26/12/2025

See full content

IoT Hack

on 26/12/2025

Someone hacked an Italian ferry. It looks like the malware was installed by someone on the ferry, and not remotely. [...]

See full content

Protocol Smuggling / CRLF Injection via Gopher Protocol allows Arbitrary Command Injection

on 25/12/2025

curl disclosed a bug submitted by 0x0000nosfu: https://hackerone.com/reports/3477023 [...]

See full content

Integer Overflow in `curl_easy_escape()` may lead to heap buffer overflow and stack memory disclosure on 32-bit platforms

on 25/12/2025

curl disclosed a bug submitted by vovohelo: https://hackerone.com/reports/3476928 [...]

See full content

Public-suffix cookie injection when libpsl is disabled

on 25/12/2025

curl disclosed a bug submitted by pwnie: https://hackerone.com/reports/3475472 [...]

See full content

Heap Buffer Over-Read via Malicious SMB Server READ_ANDX Response

on 25/12/2025

curl disclosed a bug submitted by strokep: https://hackerone.com/reports/3470073 [...]

See full content

How To: Use the best hacking tool around

on 25/12/2025

See full content

Urban VPN Proxy Surreptitiously Intercepts AI Chats

on 24/12/2025

This is pretty scary: Urban VPN Proxy targets conversations across ten AI platforms: ChatGPT, Claude, Gemini, Microsoft Copilot, Perplexity, DeepSeek, Grok (xAI), Meta AI. For each platform, the extension includes a dedicated “executor” script designed to intercept and capture conversations. The harvesting is enabled by default through hardcoded flags in the extension’s configura [...]

See full content

Hero highlight -Zack0x01

on 24/12/2025

See full content

I have INCREDIBLE news

on 24/12/2025

See full content

Check out brutelogic ❤️❤️

on 24/12/2025

See full content

tabnabbing in roundcube webmail

on 24/12/2025

Nextcloud disclosed a bug submitted by waloodi109: https://hackerone.com/reports/3367676 [...]

See full content

December CTF Challenge: Chaining XS leaks and postMessage XSS

by Ayoub on 24/12/2025

At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. December's challenge by Renwa took inspiration from the Marvel Cinematic Universe, specifically Thanos's quest to collect all six Infinity Stones. This challenge required us to chain multiple client-side vulnerabilities across different subdomains to ultimately achie [...]

See full content

When It's an Engineer's Turn to do Elf on the Shelf 🎅

on 23/12/2025

See full content

HAProxy Connection Reuse leads to IP Spoofing and mTLS Context Smuggling

on 23/12/2025

curl disclosed a bug submitted by anonymous_237: https://hackerone.com/reports/3475613 [...]

See full content

The Rise of the Bionic Hacker: Real Data Shaping Cybersecurity in 2026

on 23/12/2025

See full content

libcurl WebSocket handshake accepts any Sec-WebSocket-Accept

on 23/12/2025

curl disclosed a bug submitted by pwnie: https://hackerone.com/reports/3474865 [...]

See full content

Denmark Accuses Russia of Conducting Two Cyberattacks

on 23/12/2025

News: The Danish Defence Intelligence Service (DDIS) announced on Thursday that Moscow was behind a cyber-attack on a Danish water utility in 2024 and a series of distributed denial-of-service (DDoS) attacks on Danish websites in the lead-up to the municipal and regional council elections in November. The first, it said, was carried out by the pro-Russian group known as Z-Pentest and the second by [...]

See full content

From Agent2Agent Prompt Injection to Runtime Self-Defense: How Wallarm Redefines Agentic AI Security

by Tim Erlin on 23/12/2025

Is an AI-to-AI attack scenario a science fiction possibility only for blockbusters like the Terminator series of movies? Well, maybe not! Researchers recently discovered that one AI agent can “inject malicious instructions into a conversation, hiding them among otherwise benign client requests and server responses.” While known AI threats involve tricking an agent with malicious data, this [...]

See full content

[nextcloud/mail] Blind SSRF to Internal Network via "List-Unsubscribe" SMTP Header when allow_local_remote_servers is allowed

on 23/12/2025

Nextcloud disclosed a bug submitted by lauritz: https://hackerone.com/reports/2902856 [...]

See full content

Inside H1-6102: Live Hacking Event with Salesforce in Sydney

on 22/12/2025

See full content

Link unfurling calls out to arbitrary URLs and the private-network guard misses link-local addresses

on 22/12/2025

Basecamp disclosed a bug submitted by brumbelow: https://hackerone.com/reports/3445890 [...]

See full content

Microsoft Is Finally Killing RC4

on 22/12/2025

After twenty-six years, Microsoft is finally upgrading the last remaining instance of the encryption algorithm RC4 in Windows. of the most visible holdouts in supporting RC4 has been Microsoft. Eventually, Microsoft upgraded Active Directory to support the much more secure AES encryption standard. But by default, Windows servers have continued to respond to RC4-based authentication requests and re [...]

See full content

well

on 22/12/2025

See full content

Functional Regression in Digest Authentication: Failure to handle optional spaces and escaped quotes

on 21/12/2025

curl disclosed a bug submitted by herdiyanitdev: https://hackerone.com/reports/3473384 [...]

See full content

A logic error in detect_proxy caused truncation of environment variable names for long protocol schemes.

on 21/12/2025

curl disclosed a bug submitted by herdiyanitdev: https://hackerone.com/reports/3473182 [...]

See full content

The perfect tool ——- wait what’s that?

on 21/12/2025

See full content

The perfect toolkit doesn’t exist

on 21/12/2025

See full content

Unbounded memory consumption via compressed HTTP responses (gzip/brotli/zstd)

on 21/12/2025

curl disclosed a bug submitted by gaurav0212: https://hackerone.com/reports/3471553 [...]

See full content

I asked 10+ hunters who made 500K$+ what their secret is

on 20/12/2025

See full content

I need some help

on 20/12/2025

See full content

Heap Buffer Over-Read via Malicious SMB Server READ_ANDX Response

on 20/12/2025

curl disclosed a bug submitted by strokep: https://hackerone.com/reports/3470095 [...]

See full content

Learn Cyber Deception!

on 20/12/2025

See full content

Friday Squid Blogging: Petting a Squid

on 19/12/2025

Video from Reddit shows what could go wrong when you try to pet a—looks like a Humboldt—squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

Missing AES-GCM Authentication Tag Validation and Improper Deprecation Handling

on 19/12/2025

Node.js disclosed a bug submitted by sideni: https://hackerone.com/reports/3463949 [...]

See full content

Come check out my tool!!

on 19/12/2025

See full content

IoT & Hardware Hacking for Beginners - Learn Fundamentals in 9+ Hours

on 19/12/2025

See full content

Dismantling Defenses: Trump 2.0 Cyber Year in Review

by BrianKrebs on 19/12/2025

The Trump administration has pursued a staggering range of policy pivots this past year that threaten to weaken the nation’s ability and willingness to address a broad spectrum of technology challenges, from cybersecurity and privacy to countering disinformation, fraud and corruption. These shifts, along with the president’s efforts to restrict free speech and freedom of the press, hav [...]

See full content

CISO Spotlight: Lefteris Tzelepis on Leadership, Strategy, and the Modern Security Mandate

by Tim Erlin on 19/12/2025

Lefteris Tzelepis, CISO at Steelmet /Viohalco Companies, was shaped by cybersecurity. From his early exposure to real-world attacks at the Greek Ministry of Defense to building and leading security programs inside complex enterprises, his career mirrors the evolution of the CISO role itself. Now a group CISO overseeing security across multiple organizations, Lefteris brings a practitioner’s mi [...]

See full content

AI Advertising Company Hacked

on 19/12/2025

At least some of this is coming to light: Doublespeed, a startup backed by Andreessen Horowitz (a16z) that uses a phone farm to manage at least hundreds of AI-generated social media accounts and promote products has been hacked. The hack reveals what products the AI-generated accounts are promoting, often without the required disclosure that these are advertisements, and allowed the hacker to take [...]

See full content

Can chatbots craft correct code?

on 19/12/2025

I recently attended the AI Engineer Code Summit in New York, an invite-only gathering of AI leaders and engineers. One theme emerged repeatedly in conversations with attendees building with AI: the belief that we’re approaching a future where developers will never need to look at code again. When I pressed these proponents, several made a similar argument: Forty years ago, when high-level program [...]

See full content

RXSS in https://jp.mcafee.com/apps/mdm/jp/3.0_asp/

on 19/12/2025

Trellix disclosed a bug submitted by lemonoftroy: https://hackerone.com/reports/1068477 [...]

See full content

File URL UNC Path Access (Windows SSRF)

on 18/12/2025

curl disclosed a bug submitted by im4x: https://hackerone.com/reports/3470649 [...]

See full content

Economic DoS (Griefing) on IBC Relayers via `memo` Callback Gas Exploitation

on 18/12/2025

Cosmos disclosed a bug submitted by tychebe: https://hackerone.com/reports/3425308 [...]

See full content

3 Cybersecurity Myths I HATE

on 18/12/2025

See full content

Get off your ass and give your mom a real present for Christmas

on 18/12/2025

See full content

Someone Boarded a Plane at Heathrow Without a Ticket or Passport

on 18/12/2025

I’m sure there’s a story here: Sources say the man had tailgated his way through to security screening and passed security, meaning he was not detected carrying any banned items. The man deceived the BA check-in agent by posing as a family member who had their passports and boarding passes inspected in the usual way. [...]

See full content

[RCE] Remote Code Execution via React Server Components Vulnerability CVE-2025-55182

on 18/12/2025

IBM disclosed a bug submitted by kanon4: https://hackerone.com/reports/3458235 [...]

See full content

IoT Hacking Stream

on 18/12/2025

See full content

Intigriti Bug Bytes #231 - December 2025 🚀

by Ayoub on 18/12/2025

Hi hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:  React2Shell scanner (with WAF bypasses) Identifying server origin IP to bypass popular WAFs CSRF exploitation cheat sheet Finding vulnerabilities in sign-ups    And so much more! Let’s dive in! INTIGRITI 1125 results are in November’s Intigriti Challenge was on us. 1125 brought hundreds of hack [...]

See full content

My coaching students pay make 6 times their investment back 😶‍🌫️

on 17/12/2025

See full content

Certificate Pinning Bypass with wolfSSL backend over HTTP/3

on 17/12/2025

curl disclosed a bug submitted by anonymous_237: https://hackerone.com/reports/3468098 [...]

See full content

Heap buffer overflow in Curl_ipv4_resolve_r due to incorrect buffer alignment and size calculation on AmigaOS

on 17/12/2025

curl disclosed a bug submitted by badrodin22: https://hackerone.com/reports/3468410 [...]

See full content

Is #bugbounty Satured? Any Room For Beginners?

on 17/12/2025

See full content

Deliberate Internet Shutdowns

on 17/12/2025

For two days in September, Afghanistan had no internet. No satellite failed; no cable was cut. This was a deliberate outage, mandated by the Taliban government. It followed a more localized shutdown two weeks prior, reportedly instituted “to prevent immoral activities.” No additional explanation was given. The timing couldn’t have been worse: communities still reeling from a majo [...]

See full content

Introducing Pathfinding.cloud

on 17/12/2025

Introducing Pathfinding.cloud, a library of AWS IAM privilege escalation paths [...]

See full content

Do Cheap Hidden Camera Detectors Work?

on 16/12/2025

See full content

How To Set Yourself Up For Success In Bug Bounty

on 16/12/2025

See full content

Most Parked Domains Now Serving Malicious Content

by BrianKrebs on 16/12/2025

Direct navigation — the act of visiting a website by manually typing a domain name in a web browser — has never been riskier: A new study finds the vast majority of “parked” domains — mostly expired or dormant domain names, or common misspellings of popular websites — are now configured to redirect visitors to sites that foist scams and malware. A lookalike doma [...]

See full content

Use GWP-ASan to detect exploits in production environments

on 16/12/2025

Memory safety bugs like use-after-free and buffer overflows remain among the most exploited vulnerability classes in production software. While AddressSanitizer (ASan) excels at catching these bugs during development, its performance overhead (2 to 4 times) and security concerns make it unsuitable for production. What if you could detect many of the same critical bugs in live systems with virtuall [...]

See full content

Second-Order XSS via javascript protocol in MCP Server Portal Apps leads to ATO

on 16/12/2025

Cloudflare Public Bug Bounty disclosed a bug submitted by matured_kazama: https://hackerone.com/reports/3316910 [...]

See full content

Heap Overflow in cURL AmigaOS Socket Implementation

on 16/12/2025

curl disclosed a bug submitted by the-pink-panther: https://hackerone.com/reports/3466896 [...]

See full content

Curl Alt-Svc Parser Stack Buffer Overflow

on 16/12/2025

curl disclosed a bug submitted by the-pink-panther: https://hackerone.com/reports/3466883 [...]

See full content

The state of #bugbounty hunting in 2026

on 15/12/2025

See full content

Hackers 🙋

on 15/12/2025

See full content

Path Traversal Bypass in file:// URLs Due to Incomplete URL-Encoded Path Normalization

on 15/12/2025

curl disclosed a bug submitted by ba5: https://hackerone.com/reports/3465094 [...]

See full content

testing hackerone functions

on 13/12/2025

curl disclosed a bug submitted by qqqqqqqqqqqqqqqq: https://hackerone.com/reports/3463619 [...]

See full content

Denial of Service (DoS) vulnerability in dedotdotify() URL path normalization

on 13/12/2025

curl disclosed a bug submitted by sy2n0: https://hackerone.com/reports/3463608 [...]

See full content

Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"

on 13/12/2025

See full content

Infostealer Malware Logs Analyzed by... AI !?!

on 12/12/2025

See full content

Catching malicious package releases using a transparency log

on 12/12/2025

We’re getting Sigstore’s rekor-monitor ready for production use, making it easier for developers to detect tampering and unauthorized uses of their identities in the Rekor transparency log. This work, funded by the OpenSSF, includes support for the new Rekor v2 log, certificate validation, and integration with The Update Framework (TUF). For package maintainers that publish attestations signed usi [...]

See full content

Burp On Tour 2025: bringing the AppSec community together around the world

on 12/12/2025

In 2025, we set out with a simple mission: take Burp Suite on the road and meet the global AppSec community where you are. Burp On Tour was born from our desire to learn from you; the brilliant people [...]

See full content

Buffer Overflow in cURL Internal printf Function

on 12/12/2025

curl disclosed a bug submitted by mlgzackfly: https://hackerone.com/reports/3462525 [...]

See full content

How AI is Changing Cybersecurity

on 11/12/2025

See full content

Bonus points if they mention Bugcrowd 😉

on 11/12/2025

See full content

2026 API and AI Security Predictions: What Experts Expect in the Year Ahead

by Annette Reed on 11/12/2025

This is a predictions blog. We know, we know; everyone does them, and they can get a bit same-y. Chances are, you’re already bored with reading them. So, we’ve decided to do things a little bit differently this year.  Instead of bombarding you with just our own predictions, we’ve decided to cast the net far and wide. We’ve spoken to cybersecurity experts from around the world to answer wh [...]

See full content

DAST without disruption: Burp Suite DAST winter update 2025

on 11/12/2025

AppSec teams are under constant pressure to secure fast-moving applications without slowing anything down. But scanning windows, fragile authentication, and sprawling API estates often get in the way [...]

See full content

Introducing mrva, a terminal-first approach to CodeQL multi-repo variant analysis

on 11/12/2025

In 2023 GitHub introduced CodeQL multi-repository variant analysis (MRVA). This functionality lets you run queries across thousands of projects using pre-built databases and drastically reduces the time needed to find security bugs at scale. There’s just one problem: it’s largely built on VS Code and I’m a Vim user and a terminal junkie. That’s why I built mrva, a composable, terminal-first altern [...]

See full content

Terminal Output Not Great

on 11/12/2025

curl disclosed a bug submitted by kelsier: https://hackerone.com/reports/3460184 [...]

See full content

LIVE: 🕵️ HTB Sherlocks! | Cybersecurity | Blue Team

on 11/12/2025

See full content

HTTPS certificate industry phasing out less secure domain validation methods

on 10/12/2025

Posted by Chrome Root Program Team Secure connections are the backbone of the modern web, but a certificate is only as trustworthy as the validation process and issuance practices behind it. Recently, the Chrome Root Program and the CA/Browser Forum have taken decisive steps toward a more secure internet by adopting new security requirements for HTTPS certificate issuers. These initiatives, d [...]

See full content

This Feature in Burp Suite Low-Key Changes Everything

on 10/12/2025

See full content

Bugcrowd Security Flash: CVE-2025-55182 (React2Shell) UPDATE

on 10/12/2025

See full content

Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users

on 10/12/2025

In this post, we investigate a recent phishing campaign that targets Microsoft 365 users. [...]

See full content

Certificate Hostname Validation Bypass via Leading Dot in Hostname

on 09/12/2025

curl disclosed a bug submitted by 4bccc: https://hackerone.com/reports/3455037 [...]

See full content

Microsoft Patch Tuesday, December 2025 Edition

by BrianKrebs on 09/12/2025

Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that is already being exploited, as well as two publicly disclosed vulnerabilities. Despite releasing a lower-than-normal number of security updates these past few months, Microsoft patched a whopping 1,129 vulnerabilit [...]

See full content

Stack Buffer Overflow in cURL wolfSSL Backend (lib/vtls/wolfssl.c)

on 09/12/2025

curl disclosed a bug submitted by lm3alm: https://hackerone.com/reports/3459636 [...]

See full content

Red Team vs. Blue Team Job Opportunities

on 09/12/2025

See full content

Further Hardening Android GPUs

on 09/12/2025

Posted by Liz Prucka, Hamzeh Zawawy, Rishika Hooda, Android Security and Privacy Team Last year, Google's Android Red Team partnered with Arm to conduct an in-depth security analysis of the Mali GPU, a component used in billions of Android devices worldwide. This collaboration was a significant step in proactively identifying and fixing vulnerabilities in the GPU software and firmware stack. [...]

See full content

Exploiting business logic error vulnerabilities

by Ayoub on 09/12/2025

It's no secret that complexity is the biggest rival of safe applications. As web apps become more sophisticated, they create countless opportunities for logic flaws to arise. Unlike technical vulnerabilities that can be easily automated, business logic errors emerge from the gap between how developers expect systems to behave and how attackers can manipulate them. In this article, we explore how t [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Phylum Research | Software Supply Chain Security
  4. Schneier on Security
  5. Krebs on Security
  6. Google Online Security Blog
  7. $BLOG_TITLE
  8. Agarri : Sécurité informatique offensive
  9. Alex Chapman's Blog
  10. www.alphabot.com
  11. ziot
  12. Bug Bounty Reports Explained
  13. Bugcrowd
  14. cat ~/footstep.ninja/blog.txt
  15. Ezequiel Pereira
  16. HackerOne
  17. surajdisoja.me
  18. InsiderPhD
  19. Intigriti
  20. John Hammond
  21. LiveOverflow
  22. NahamSec
  23. PortSwigger Blog
  24. Rana Khalil
  25. Richard’s Infosec blog
  26. Ron Chan
  27. ropnop blog
  28. STÖK
  29. Sun Knudsen
  30. The Cyber Mentor
  31. The unofficial HackerOne disclosure timeline
  32. The XSS Rat
  33. TomNomNom
  34. Wallarm