InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

BSides Dublin 2026 Talk Slides

on 23/05/2026

🩗 There hasn’t been a post here in years and I really should do something about this, but in the meantime here are my slides for my BSides Dublin 2026 talk Fighting Fire with Fire: Using AI to Scale Your Product Security Team https://docs.google.com/presentation/d/1zuB920nmw4UtKP3ZsHoUT9Eqi04NVLD7upWK6C9Vmhg I will update this post when the recording is posted on YouTube. [...]

See full content

Friday Squid Blogging: Regulating Squid Fishing in the South Pacific

on 22/05/2026

The South Pacific Regional Fisheries Management Organization (SPRFMO) needs to regulate squid fishing in the South Pacific. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

Lawmakers Demand Answers as CISA Tries to Contain Data Leak

by BrianKrebs on 22/05/2026

Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity & Infrastructure Security Agency (CISA) after KrebsOnSecurity reported this week that a CISA contractor intentionally published AWS GovCloud keys and a vast trove of other agency secrets on a public GitHub account. The inquiry comes as CISA is still struggling to contain the breach and invalidate the leaked [...]

See full content

Soft Skills for the Job Market: Communication

on 22/05/2026

See full content

CISA Security Leak

on 22/05/2026

Crazy story: Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly privileged AWS GovCloud accounts and a large number of internal CISA systems. Security experts said the public archive included files detailing how CISA builds, tests and deploys software internally, a [...]

See full content

We hardened zizmor's GitHub Actions static analyzer

on 22/05/2026

In March 2026, attackers exploited a pull_request_target misconfiguration in the aquasecurity/trivy-action GitHub Action to exfiltrate organization and repository secrets, then used those credentials to backdoor LiteLLM on PyPI (see Trivy’s post-mortem for the full timeline). zizmor is a static analyzer that GitHub Actions users run to catch exactly these misconfigurations before they ship. [...]

See full content

Your Security Stack Is Already Obsolete.

on 22/05/2026

See full content

The harsh reality of cybersecurity

on 21/05/2026

See full content

Group restriction bypass via bearer token in user_oidc (SETTING_RESTRICT_LOGIN_TO_GROUPS not enforced in Backend::getCurrentUserId)

on 21/05/2026

Nextcloud disclosed a bug submitted by msatz: https://hackerone.com/reports/3572848 [...]

See full content

Alleged Kimwolf Botmaster ‘Dort’ Arrested, Charged in U.S. and Canada

by BrianKrebs on 21/05/2026

Canadian authorities on Wednesday arrested a 23-year-old Ottawa man on suspicion of building and operating Kimwolf, a fast spreading Internet-of-Things botnet that enslaved millions of devices for use in a series of massive distributed denial-of-service (DDoS) attacks over the past six months. KrebsOnSecurity publicly named the suspect in February 2026 after the accused launched a volley of DDoS, [...]

See full content

macOS Kernel Memory Corruption Exploit

on 21/05/2026

A group used Anthropic’s Mythos AI model to help find a kernel memory corruption vulnerability and exploit on Apple’s M5. News article. [...]

See full content

One Dev Just Broke Your Security.

on 21/05/2026

See full content

Vibe Coding, AppSec, and the New Threat Surface

on 21/05/2026

See full content

How Triage Assist is raising the bar in crowdsourced security

by Stijn Bogaerts on 21/05/2026

AI is changing the volume and accelerating the pace of vulnerability submissions. If you've been following our recent AI series, you already know that submission growth isn't a quality problem; it's a coordination problem. As Head of Triage, Lennaert Oudshoorn, outlines in his recent post, ‘The AI impact: A triager’s perspective’, the security industry is experiencing a surge in vulnerability disc [...]

See full content

Unpatchable Vulnerabilities of Kubernetes: CVE-2021-25740

on 21/05/2026

A look at how Kubernetes CVE-2021-25740 allows users with EndpointSlice access to redirect traffic via shared ingress and load balancer services. [...]

See full content

curl --skip-existing has a TOCTOU race that lets a post-check symlink redirect the later download write

on 20/05/2026

curl disclosed a bug submitted by sdjasj: https://hackerone.com/reports/3747959 [...]

See full content

Credentials forwarded to HTTP after HTTPSHTTP same-port redirect url_set_data_creds uses scheme-blind comparator

on 20/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3733946 [...]

See full content

On AI Security

on 20/05/2026

Good report: Executive Summary: Let’s say you wanted to make sure that your AI is secure. Can you just maximize the security and privacy benchmark and call it a day? Nope, because benchmarks don’t actually work for measuring AI capabilities (even when they are NOT emergent systemic properties like security). So let’s take a step back: how do you measure security in the first plac [...]

See full content

Building Secure AI Systems: What Security Leaders Know That Builders Don't | HumanX 2026

on 20/05/2026

See full content

POST /api/bitcoinWithdrawalFees returns financial data without authentication despite being documented as a USER OPERATION (private endpoint)

on 20/05/2026

CoinMate.io disclosed a bug submitted by glferreira-devsecops: https://hackerone.com/reports/3676308 [...]

See full content

HMAC signature verification omits endpoint and payload allowing request forgery on CoinMate API

on 20/05/2026

CoinMate.io disclosed a bug submitted by glferreira-devsecops: https://hackerone.com/reports/3670955 [...]

See full content

Busy submitting P1s

on 19/05/2026

See full content

HTTP/3 paused transfer buffers incoming data without bound up to ~1 GiB

on 19/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734947 [...]

See full content

Schannel custom-CA path skips Extended Key Usage enforcement

on 19/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734992 [...]

See full content

Connection reuse ignores haproxyprotocol and HAPROXY_CLIENT_IP settings, allowing PROXY context to persist across transfers

on 19/05/2026

curl disclosed a bug submitted by 7omoo: https://hackerone.com/reports/3741135 [...]

See full content

SSL session-cache peer key omits signature_algorithms: strict-sigalg handle silently resumes a permissive sibling's session

on 19/05/2026

curl disclosed a bug submitted by hexproof: https://hackerone.com/reports/3739561 [...]

See full content

CURLOPT_PROXY_CAINFO_BLOB silently activates native CA store on Apple builds

on 19/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3735179 [...]

See full content

TLS peer-verification bypass via mid-transfer ssl_config mutation

on 19/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3735276 [...]

See full content

TLS verifyhost bypass in rustls, mbedTLS, and wolfSSL when verifypeer=0

on 19/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734095 [...]

See full content

HTTP/2 proxy CONNECT tunnel unbounded 1xx chain (missing Curl_bump_headersize cap in cf-h2-proxy.c)

on 19/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734020 [...]

See full content

Laurie Anderson Is Quoting Me

on 19/05/2026

Not by name, but Laurie Anderson quotes me in one of the tracks of her new album: My favorite quote is from a cryptologist who said “If you think technology will solve your problems, you don’t understand technology and you don’t understand your problems.” Also in interviews: “Of course, it’s ridiculous, outrageous, blah, blah, blah,” Anderson says about th [...]

See full content

Cross-repository IDOR in `/settings/security_analysis/bypass_reviewers` allows unauthorized delegated bypass reviewer modification

on 19/05/2026

GitHub disclosed a bug submitted by ahacker1: https://hackerone.com/reports/3560256 [...]

See full content

Stop Measuring Time to Detect Start Measuring Time to Validate

on 18/05/2026

See full content

CISA Admin Leaked AWS GovCloud Keys on Github

by BrianKrebs on 18/05/2026

Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly privileged AWS GovCloud accounts and a large number of internal CISA systems. Security experts said the public archive included files detailing how CISA builds, tests and deploys software internally, and that it rep [...]

See full content

CURLOPT_HSTS_CTRL disables shared HSTS without share guard use-after-free and double-free

on 18/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3733934 [...]

See full content

cookie: case-insensitive path comparison in replace_existing() allows cookie eviction across distinct paths

on 18/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3735238 [...]

See full content

libssh SFTP initialization ignores CURLOPT_TIMEOUT, hangs indefinitely

on 18/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3735080 [...]

See full content

rustls backend silently ignores CURLOPT_CRLFILE when native CA store is active

on 18/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734935 [...]

See full content

HSTS multi-trailing-dot bypass-ish: possible incomplete fix for CVE-2022-30115

on 18/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3733984 [...]

See full content

I Built an AI Cybersecurity Research Factory (for CTFs & Vulnerabilities)

on 18/05/2026

See full content

This GitHub README Hijacks Your AI and Spreads Like a Virus

on 18/05/2026

See full content

New video: hacking AI coding assistants and IDEs. #bugbounty #ai

on 18/05/2026

See full content

Zero-Day Exploit Against Windows BitLocker

on 18/05/2026

It’s nasty, but it requires physical access to the computer: The exploit, named YellowKey, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11 deployments of BitLocker, the full-volume encryption protection Microsoft provides to make disk contents off-limits to anyone without the decryption key, which is stored in a [...]

See full content

What Your Board Gets Wrong About AI Security

by Tim Erlin on 18/05/2026

Editor's note: This article was originally published by Craig Riddell on LinkedIn. It has been republished here with the author's permission. Boards are giving AI security more airtime than ever. What they're not giving is the right framing. A year or two ago, AI was mostly a question of experimentation risk. Today, it's tied directly to revenue, customer experience, operational efficiency, [...]

See full content

Unauthenticated File Upload to CDN

on 18/05/2026

Enjin disclosed a bug submitted by ph0r3nsic: https://hackerone.com/reports/3589247 [...]

See full content

IDOR: autotranslate.translateMessage Full Message Content Leak

on 18/05/2026

Rocket.Chat disclosed a bug submitted by josan_george: https://hackerone.com/reports/3713682 [...]

See full content

CEO insights: beyond the AI model card

by Stijn Jans on 18/05/2026

As part of our AI series, I recently released a blog on the topic of keeping the human layer sacred in the AI era. There, I shared my thoughts on where human intelligence fits, the decisions I believe companies will face in the next 3 to 5 years, and explored what I deem to be the beating heart of the Bug Bounty industry.   Considering that discussion, I want to continue the conversation regarding [...]

See full content

Pathfinding Labs: Deploy, test, and learn from 100+ intentionally vulnerable AWS environments

on 18/05/2026

Introducing Pathfinding Labs, a collection of intentionally vulnerable AWS environments for red teamers and blue teamers to deploy, exploit, and use for detection validation. [...]

See full content

The Security Buffer Is Gone

on 17/05/2026

See full content

Trailing-dot IPv4 URL bypasses IP-address guard, allows wildcard DNS SAN match

on 17/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734921 [...]

See full content

NULL pointer dereference in libcurl URL API redirect_url() with CURLU_DEFAULT_SCHEME

on 17/05/2026

curl disclosed a bug submitted by mulan_dh: https://hackerone.com/reports/3736234 [...]

See full content

RatCTF.com - The BEST cybersecurity training platform

on 17/05/2026

See full content

What Part of AI Hacking Actually Moves the Needle?

on 16/05/2026

See full content

Hack a Drug Lord's Smart Toilet!

on 16/05/2026

See full content

Friday Squid Blogging: Bigfin Squid

on 16/05/2026

Article about the bigfin squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

The AI Tried to Escape Our Own Infrastructure.

on 15/05/2026

See full content

SQL Injection in Column Type Parameter Allows Arbitrary SQL Execution

on 15/05/2026

Nextcloud disclosed a bug submitted by suul: https://hackerone.com/reports/3462991 [...]

See full content

[DUTCH] RatCTF - Wat is het en hoe gebruik je het? + Machine hacken

on 15/05/2026

See full content

Bypassing On-Camera Age-Verification Checks

on 15/05/2026

Some AI-based video age-verification checks can be fooled with a fake mustache. [...]

See full content

The Payload Podcast 006

on 15/05/2026

See full content

Mythos Didn’t Change What Gets Found It Changed How Reliably It Gets Found

on 14/05/2026

See full content

Keep up the great work, hackers 👏

on 14/05/2026

See full content

Upcoming Speaking Engagements

on 14/05/2026

This is a current list of where and when I am scheduled to speak: I’m giving a virtual talk on “The Security of Trust in the Age of AI,” hosted by the Financial Women’s Association of New York, at 6:00 PM ET on May 21, 2026. I’m speaking at the Potsdam Conference on National Cybersecurity at the Hasso Plattner Institut in Potsdam, Germany. The event runs June 24–25, 2026, and my talk will be the [...]

See full content

Origin IP Exposed waf bypass

on 14/05/2026

Yuga Labs disclosed a bug submitted by r00tsid: https://hackerone.com/reports/1821085 - Bounty: $250 [...]

See full content

How Dangerous Is Anthropic’s Mythos AI?

on 14/05/2026

Last month, Anthropic made a remarkable announcement about its new model, Claude Mythos Preview: it was so good at finding security vulnerabilities in software that the company would not release it to the general public. Instead, it would only be available to a select group of companies to scan and fix their own software. The announcement requires context—but it contained an essential truth. [...]

See full content

Mythos, Glasswing, and the New Velocity of Cyber Risk

on 14/05/2026

See full content

Kerberos/SPNEGO Connection Reuse Vulnerability

on 14/05/2026

curl disclosed a bug submitted by rootofpi_ramesh: https://hackerone.com/reports/3725659 [...]

See full content

LIVE: đŸ•”ïž HTB Sherlocks! | Cybersecurity | Blue Team

on 14/05/2026

See full content

Backdoored Cemu release linked to TanStack and Mistral supply chain campaign

on 14/05/2026

We investigate how a coordinated supply chain campaign that compromised npm and PyPI packages also backdoored the official Cemu Nintendo Wii U emulator GitHub release, reaching nearly 20,000 Linux users. [...]

See full content

Backdoored node-ipc npm releases steal developer credentials through DNS queries

on 14/05/2026

An analysis of backdoored node-ipc npm releases that add an obfuscated credential collection and DNS exfiltration payload to the CommonJS entrypoint. [...]

See full content

Shai-Hulud Goes Open Source

on 13/05/2026

A static analysis of the open-sourced Shai-Hulud offensive framework attributed to TeamPCP, covering its credential harvesting, supply chain poisoning, and exfiltration capabilities. [...]

See full content

Patch Tuesday, May 2026 Edition

by BrianKrebs on 12/05/2026

Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this month with some of the more widely-used software makers — including Apple, Google, Microsoft, Mozilla and Oracle — fixing near record volumes of secu [...]

See full content

Hackers are Using AI (much scary, very wow)

on 12/05/2026

See full content

A Quick Way to Prove Your Cybersecurity Skillset!

on 12/05/2026

See full content

Extending Security to MCP Servers: Closing a Critical Gap

by Tim Erlin on 12/05/2026

The Model Context Protocol (MCP) is a de facto standard for providing structured access to privileged systems for AI agents and external integrations. It acts as a USB-C port for AI, enabling faster innovation by allowing organizations to expose tools, resources, and workflows without the time-consuming work of building APIs.  Adoption has surged in recent months, and categories like payments, [...]

See full content

QuickSight Authorization Bypass: Chat Agents Accessible Despite Custom Permissions Denial

on 12/05/2026

AWS VDP disclosed a bug submitted by jcow: https://hackerone.com/reports/3577145 [...]

See full content

The beast needs a cage: What's next for AppSec post-Mythos

on 12/05/2026

Now that the dust has settled on Mythos dropping, there is space for more considered reflection on the direction of travel. Mythos wasn't a surprise; it's another data point on a trajectory that's bee [...]

See full content

Very Simple Real Bug Bounty Exploit - API Scope Bypass

on 12/05/2026

See full content

Go fuzzing was missing half the toolkit. We forked the toolchain to fix it.

on 12/05/2026

Go’s native fuzzing is useful, but it stands far behind state-of-the-art tooling that the Rust, C, and C++ ecosystems offer with LibAFL and AFL++. Path constraints are hard to solve. Structured inputs usually need handmade parsing. It doesn’t even detect several common bug classes, such as integer overflows, goroutine leaks, data races, and execution timeouts. So to make it better, we built [...]

See full content

NIS2 compliance beyond the April 2026 deadline

by Eleanor Barlow on 12/05/2026

With the deadline passing for NIS2 compliance, many companies have shifted focus from becoming prepared to proving compliance. This post outlines the top 10 tasks for doing so and provides insights on how crowdsourced security platforms can assist in designing programs relevant to their circumstances and compliance requirements. The April NIS2 compliance deadline has come and gone, but where does [...]

See full content

Bugcrowd goes platinum

on 11/05/2026

See full content

The Bug Bounty Roadmap I'd Follow If I Started Over (With AI)

on 11/05/2026

See full content

Is the AI hype helping or killing your bug bounty dreams? #hacking #bugbounty

on 11/05/2026

See full content

CEO insights: holding the human layer sacred in the AI era

by Stijn Jans on 11/05/2026

As founder and CEO of Intigriti, I've spent a long time around hackers, and one thing is clear. The best ones don't fear AI. They use it.   What they do fear, however, and what I take seriously as a founder, is a world where platforms quietly replace them under the banner of efficiency. Where their work trains models they don't benefit from, and where the economics of the craft erode while everyon [...]

See full content

Malicious Coding Agent Skills and the Risk of Dynamic Context

on 11/05/2026

Learn how malicious Claude Code skills can abuse dynamic context commands to execute before model-level prompt injection defenses can intervene. [...]

See full content

another liberapay member team twitter account broken Link Hijacking via Expired Twitter Account Link

on 09/05/2026

Liberapay disclosed a bug submitted by rox-11: https://hackerone.com/reports/3723002 [...]

See full content

Liberapay member team twitter account broken Link Hijacking via Expired Twitter Account Link

on 09/05/2026

Liberapay disclosed a bug submitted by rox-11: https://hackerone.com/reports/3721519 [...]

See full content

AI tools are already part of everyday work, approved or not. đŸ€·

on 08/05/2026

See full content

Private circle can be added to another circle via API despite visibility restriction

on 08/05/2026

Nextcloud disclosed a bug submitted by vidang04: https://hackerone.com/reports/3511998 - Bounty: $150 [...]

See full content

Files drop share links for end-to-end encrypted folders allowed to drop files into other folders of the share owner

on 08/05/2026

Nextcloud disclosed a bug submitted by 0x0doteth: https://hackerone.com/reports/3304830 [...]

See full content

View-only guests could see deleted Collectives pages in the trashbin

on 08/05/2026

Nextcloud disclosed a bug submitted by yoyomiski: https://hackerone.com/reports/3521434 [...]

See full content

Canvas Breach Disrupts Schools & Colleges Nationwide

by BrianKrebs on 08/05/2026

An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service’s login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions. A sc [...]

See full content

Kubernetes security fundamentals: Secrets

on 08/05/2026

A look at how to secure Kubernetes secrets [...]

See full content

mbedTLS private-key blob null-termination asymmetry in lib/vtls/mbedtls.c (mbed_load_privkey)

on 07/05/2026

curl disclosed a bug submitted by shecantcode2: https://hackerone.com/reports/3717365 [...]

See full content

ActiveStorage Disk Service Path Traversal via Custom Blob Key Injection

on 07/05/2026

Ruby on Rails disclosed a bug submitted by ksw9722: https://hackerone.com/reports/3580511 [...]

See full content

hello, nostalgia

on 07/05/2026

See full content

Netwrix achieved a perfect 100% detection rate

on 06/05/2026

See full content

Critical Deadlock Vulnerability in Monero RPC Leading to Complete Node Paralysis

on 06/05/2026

Monero disclosed a bug submitted by rorkh: https://hackerone.com/reports/3307874 [...]

See full content

Connection Count Bug in Monero Node Enables Outbound Peer Reset Attack

on 06/05/2026

Monero disclosed a bug submitted by yulge: https://hackerone.com/reports/3185083 [...]

See full content

wcurl treats some URL operands after -- as curl options

on 06/05/2026

curl disclosed a bug submitted by p4p3r_hak: https://hackerone.com/reports/3708482 [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Schneier on Security
  4. Krebs on Security
  5. Google Online Security Blog
  6. $BLOG_TITLE
  7. Agarri : Sécurité informatique offensive
  8. Alex Chapman's Blog
  9. www.alphabot.com
  10. ziot
  11. Bug Bounty Reports Explained
  12. Bugcrowd
  13. cat ~/footstep.ninja/blog.txt
  14. Ezequiel Pereira
  15. HackerOne
  16. surajdisoja.me
  17. InsiderPhD
  18. Intigriti
  19. John Hammond
  20. LiveOverflow
  21. NahamSec
  22. PortSwigger Blog
  23. Rana Khalil
  24. Richard’s Infosec blog
  25. Ron Chan
  26. ropnop blog
  27. STÖK
  28. Sun Knudsen
  29. The Cyber Mentor
  30. The unofficial HackerOne disclosure timeline
  31. The XSS Rat
  32. TomNomNom
  33. Wallarm