InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Keeping Google Play & Android app ecosystems safe in 2025

on 19/02/2026

Posted by Vijaya Kaza, VP and GM, App & Ecosystem Trust The Android ecosystem is a thriving global community built on trust, giving billions of users the confidence to download the latest apps. In order to maintain that trust, we’re focused on ensuring that apps do not cause real-world harm, such as malware, financial fraud, hidden subscriptions, and privacy invasions. As bad actors leverage [...]

See full content

Russia is hacking zero-days again

on 19/02/2026

See full content

Malicious AI

on 19/02/2026

Interesting: Summary: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me into accepting its changes into a mainstream python library. This represents a first-of-its-kind case study of misaligned AI behavior in the wild, and raises serious concerns about currently deployed AI [...]

See full content

IoT Hacking Stream

on 19/02/2026

See full content

Splatoon 3 Anticheat Seed Randomization Weakness

on 19/02/2026

Nintendo disclosed a bug submitted by hana2736: https://hackerone.com/reports/3042475 [...]

See full content

ASLR leak in Mario Kart World through LAN mode

on 19/02/2026

Nintendo disclosed a bug submitted by kinnay: https://hackerone.com/reports/3463719 [...]

See full content

Kubernetes project issues warning on Ingress NGINX retirement

on 19/02/2026

The Kubernetes project is urging organizations to migrate away from Ingress NGINX before its retirement in March 2026, with new high-severity CVEs underscoring the urgency. [...]

See full content

Learn PowerShell!

on 18/02/2026

See full content

Inside H1-65: Inside OKX’s Live Hacking Event in Singapore

on 18/02/2026

See full content

XSS Vulnerability on Pressable/Atomic Hosting Platform via unescaped admin notices leads to code execution

on 18/02/2026

Automattic disclosed a bug submitted by georgestephanis: https://hackerone.com/reports/3447021 [...]

See full content

ContinuumCon is back for 2026!

on 18/02/2026

See full content

AI Found Twelve New Vulnerabilities in OpenSSL

on 18/02/2026

The title of the post is”What AI Security Research Looks Like When It Works,” and I agree: In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL te [...]

See full content

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

by Tim Erlin on 18/02/2026

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled microservices, cloud-native apps, and partner integrations faster than corporate governance models could keep up, resulting in undocumented or shadow APIs.  We’re now seeing this pattern all over again with AI systems. And, even worse, AI introduces non-deterministic behavior, autonomous [...]

See full content

Carelessness versus craftsmanship in cryptography

on 18/02/2026

Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bugs potentially affect thousands of downstream projects. When we shared one of these bugs with an affected vendor, strongSwan, the maintainer provided a model response for security vendors. The aes-js/pyaes maintainer, on the other hand, has tak [...]

See full content

AI Web App Testing: The Future of Security

on 17/02/2026

See full content

The Core Principle in Forensic Science

on 17/02/2026

See full content

How's your security posture?

on 17/02/2026

See full content

Improper State Validation on Sony WH-CH520 via BLE Command Service leads to unauthorized Bluetooth pairing and audio hijacking

on 17/02/2026

Sony disclosed a bug submitted by vortekx: https://hackerone.com/reports/3514490 [...]

See full content

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

by Tim Erlin on 17/02/2026

API security has been a growing concern for years. However, while it was always seen as important, it often came second to application security or hardening infrastructure.  In 2025, the picture changed. Wallarm’s 2026 API ThreatStats Report revealed that APIs are now the primary attack surface for digital business, and not because bad actors discovered new zero-days, but because of compo [...]

See full content

An Interview with Eva Benn!

on 17/02/2026

See full content

Side-Channel Attacks Against LLMs

on 17/02/2026

Here are three papers describing different side-channel attacks against LLMs. “Remote Timing Attacks on Efficient Language Model Inference“: Abstract: Scaling up language models has significantly increased their capabilities. But larger models are slower models, and so there is now an extensive body of work (e.g., speculative sampling or parallel decoding) that improves the (average ca [...]

See full content

How to use AI for improved vulnerability report writing

by Ayoub on 17/02/2026

Report writing is an integral part of bug bounty or any type of vulnerability assessment. In fact, sometimes, it can become the most important phase. Submitting a confusing report can often lead to misalignment and faulty interpretation of your reported vulnerability. On the contrary, a well-written submission that includes all the necessary details can help shorten the time to triage, lead to inc [...]

See full content

TiKTok needs to fix this vulnerability

on 16/02/2026

See full content

Can I Replace AI With My Recon Methodology?

on 16/02/2026

See full content

The Promptware Kill Chain

on 16/02/2026

Attacks against modern generative artificial intelligence (AI) large language models (LLMs) pose a real threat. Yet discussions around these attacks and their potential defenses are dangerously myopic. The dominant narrative focuses on “prompt injection,” a set of techniques to embed instructions into inputs to LLM intended to perform malicious activity. This term suggests a simple, s [...]

See full content

Chaining in action: techniques, terminology, and real-world impact on business

by Eleanor Barlow on 16/02/2026

What you will learn in this blog What chaining is and how combining lower-severity issues can create a high-impact security risk. Key chaining techniques and terminology, such as pivoting, lateral movement, and privilege escalation. How chaining is identified and prioritized in practice, including the role of PTaaS and how researchers can use chaining to uncover critical attack paths and guide n [...]

See full content

AI wrote a hit piece

on 15/02/2026

See full content

Bad Bash! FREE FULL 1 Hour Bash Course For Ethical Hackers

on 14/02/2026

See full content

Upcoming Speaking Engagements

on 14/02/2026

This is a current list of where and when I am scheduled to speak: I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, 2026. I’m speaking at the Personal AI Summit in Los Angeles, California, USA, on Thursday, March 5, 2026. I’m speaking at Tech Live: Cybersecurity in New York City, USA, on Wednesday, March 11, 2026. I’m giving the Ross An [...]

See full content

this is really funny

on 14/02/2026

See full content

Friday Squid Blogging: Do Squid Dream?

on 13/02/2026

An exploration of the interesting question. [...]

See full content

A Practical Intro to Digital Forensics

on 13/02/2026

See full content

Moltbook is still weird (and AI skills suck)

on 13/02/2026

See full content

In love with hacking

on 12/02/2026

See full content

TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak

on 12/02/2026

Node.js disclosed a bug submitted by 0xmaxhax: https://hackerone.com/reports/3473882 [...]

See full content

Node.js permission model bypass via unchecked Unix Domain Socket connections (UDS)

on 12/02/2026

Node.js disclosed a bug submitted by winfunc: https://hackerone.com/reports/3465156 [...]

See full content

Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers

on 12/02/2026

Node.js disclosed a bug submitted by aaron_vercel: https://hackerone.com/reports/3456295 [...]

See full content

Memory leak that enables remote Denial of Service against applications processing TLS client certificates

on 12/02/2026

Node.js disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3357723 [...]

See full content

Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled

on 12/02/2026

Node.js disclosed a bug submitted by chalker: https://hackerone.com/reports/3405778 [...]

See full content

FS Permissions Bypass

on 12/02/2026

Node.js disclosed a bug submitted by natann: https://hackerone.com/reports/3417819 [...]

See full content

Mail stored HTML injection in subject text

on 12/02/2026

Nextcloud disclosed a bug submitted by se1en: https://hackerone.com/reports/3357036 - Bounty: $350 [...]

See full content

3D Printer Surveillance

on 12/02/2026

New York is contemplating a bill that adds surveillance to 3D printers: New York’s 2026­2027 executive budget bill (S.9005 / A.10005) includes language that should alarm every maker, educator, and small manufacturer in the state. Buried in Part C is a provision requiring all 3D printers sold or delivered in New York to include “blocking technology.” This is defined as software or firmw [...]

See full content

Cache Pollution via Unkeyed GET Parameters on www.omise.co

on 11/02/2026

Omise disclosed a bug submitted by alitoni224: https://hackerone.com/reports/3183046 [...]

See full content

AI Red Teaming: Beyond Safety to Security

on 11/02/2026

See full content

Kimwolf Botnet Swamps Anonymity Network I2P

by BrianKrebs on 11/02/2026

For the past week, the massive “Internet of Things” (IoT) botnet known as Kimwolf has been disrupting The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attem [...]

See full content

Rewiring Democracy Ebook is on Sale

on 11/02/2026

I just noticed that the ebook version of Rewiring Democracy is on sale for $5 on Amazon, Apple Books, Barnes & Noble, Books A Million, Google Play, Kobo, and presumably everywhere else in the US. I have no idea how long this will last. Also, Amazon has a coupon that brings the hardcover price down to $20. You’ll see the discount at checkout. [...]

See full content

Quick tip!

on 11/02/2026

See full content

Prompt Injection Via Road Signs

on 11/02/2026

Interesting research: “CHAI: Command Hijacking Against Embodied AI.” Abstract: Embodied Artificial Intelligence (AI) promises to handle edge cases in robotic vehicle systems where data is scarce by using common-sense reasoning grounded in perception and action to generalize beyond training distributions and adapt to novel real-world situations. These capabilities, however, also create [...]

See full content

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

by Tim Erlin on 11/02/2026

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his new role as Wallarm’s Global Field CISO. It’s a position that suits him down to the ground, blending technical depth, empathy, business acumen, and, what Craig believes, the most underrated skill in cybersecurity: curiosity.  Like so many of us, Craig got into cybersecurity by accident. He first learned Un [...]

See full content

Patch Tuesday, February 2026 Edition

by BrianKrebs on 10/02/2026

Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six “zero-day” vulnerabilities that attackers are already exploiting in the wild. Zero-day #1 this month is CVE-2026-21510, a security feature bypass vulnerability in Windows Shell wherein a single click on a malicious link can quiet [...]

See full content

Your environment doesn’t sit still

on 10/02/2026

See full content

Choosing Red Team or Blue Team in 2026

on 10/02/2026

See full content

AI-Generated Text and the Detection Arms Race

on 10/02/2026

In 2023, the science fiction literary magazine Clarkesworld stopped accepting new submissions because so many were generated by artificial intelligence. Near as the editors could tell, many submitters pasted the magazine’s detailed story guidelines into an AI and sent in the results. And they weren’t alone. Other fiction magazines have also reported a high number of AI-generated submissions. This [...]

See full content

Tech impersonators: ClickFix and MacOS infostealers

on 10/02/2026

Datadog identified an active campaign employing fake GitHub repositories impersonating software companies and leveraging the ClickFix initial access technique to deliver macOS infostealers. [...]

See full content

Where are hackers located?

on 09/02/2026

See full content

Unlimited Reuse of Coupon Code Allows Free Shipping on All Orders on

on 09/02/2026

AWS VDP disclosed a bug submitted by aneeeketh: https://hackerone.com/reports/3426839 [...]

See full content

How AI Gets Tested in the Real World | Salesforce Live Hacking Event

on 09/02/2026

See full content

ASGIRequest header concatenation quadratic CPU DoS on Django via repeated headers leads to worker exhaustion

on 09/02/2026

Django disclosed a bug submitted by sy2n0: https://hackerone.com/reports/3426417 [...]

See full content

10+ Daily Essentials As An Ethical Hacker

on 09/02/2026

See full content

The Myth of “Known APIs”: Why Inventory-First Security Models Are Already Obsolete

by Tim Erlin on 09/02/2026

You probably think the security mantra “you can’t protect what you don’t know about” is an inarguable truth. But you would be wrong. It doesn’t hold water in today’s threat landscape. Of course, it sounds reasonable. Before you secure APIs, you must first discover, inventory, and document them exhaustively. The problem is that this way of thinking has hardened into dogma and ignores how attack [...]

See full content

Bundle Up With Our Biggest Discounts Ever!

on 07/02/2026

See full content

JHT Course Launch: Dark Web 2 - CTI Researcher

on 06/02/2026

See full content

We take security seriously at Bugcrowd

on 06/02/2026

See full content

WebAuthn app was updated based on public key

on 06/02/2026

Nextcloud disclosed a bug submitted by se1en: https://hackerone.com/reports/3360354 - Bounty: $750 [...]

See full content

The Payload Podcast #001 with Jonny Johnson & Max Harley

on 06/02/2026

See full content

LIVE: 🕵️ Forensicating | HackTheBox | Cybersecurity

on 05/02/2026

See full content

MQTT Protocol Packet Injection via Unchecked CONNACK Remaining Length

on 05/02/2026

curl disclosed a bug submitted by pajarori: https://hackerone.com/reports/3531216 [...]

See full content

From niche to necessity: global bug bounty adoption accelerates, led by the U.S.

by Eleanor Barlow on 05/02/2026

Bug bounty growth insights across the US   Bug bounty programs have evolved from a niche security tactic into a core component of modern defense strategies worldwide. In this blog, we focus on the US: one of the most invested and fastest-adopting markets, where organizations, driven by higher security maturity, are increasingly using bug bounty to uncover complex vulnerabilities that traditional t [...]

See full content

Bugcrowd’s new Security Inbox

on 04/02/2026

See full content

How To Approach ANY Bug Bounty Target In 2026

on 04/02/2026

See full content

User enumeration via timing attack in Django mod_wsgi authentication backend leads to account discovery

on 04/02/2026

Django disclosed a bug submitted by stackered: https://hackerone.com/reports/3424977 [...]

See full content

Information Disclosure via Logback Configuration Injection in GoCD Agent

on 04/02/2026

GoCD disclosed a bug submitted by aigirl: https://hackerone.com/reports/3509632 [...]

See full content

Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious

on 04/02/2026

Datadog Security Research has identified an active web traffic hijacking campaign that targets NGINX installations and management panels like Baota (BT). In this post, we provide our analysis of the techniques this campaign uses and share indicators of compromise you can check for in your NGINX configurations. [...]

See full content

Security folks

on 03/02/2026

See full content

The Most Common IoT Security Flaws

on 03/02/2026

See full content

Previous commentor on post can still comment even after comment permission is changed to disabled

on 03/02/2026

LinkedIn disclosed a bug submitted by allenjo: https://hackerone.com/reports/3151001 [...]

See full content

Improper Access Control - Access to "Active Hiring" (Premium feature) filter results

on 03/02/2026

LinkedIn disclosed a bug submitted by minex627: https://hackerone.com/reports/3235855 [...]

See full content

Please Don’t Feed the Scattered Lapsus ShinyHunters

by BrianKrebs on 02/02/2026

A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators about the extent of the intrusion. Some victims reportedly are paying — perhaps as much to contain the stolen data [...]

See full content

Hacking a Windows Web Application

on 02/02/2026

See full content

Live Hacking 2025: $4.3M in Bounties, Tested Around the World

on 02/02/2026

See full content

Every organization is vulnerable.

on 02/02/2026

See full content

Exploiting PostMessage vulnerabilities: A complete guide

by Ayoub on 31/01/2026

PostMessage vulnerabilities arise when developers fail to properly validate message origins or sanitize content within cross-origin communication handlers. As modern web applications increasingly rely on the postMessage API for cross-origin communication, whether for embedded widgets, OAuth flows, third-party integrations, or iframe-based components, the attack surface continues to grow. While pos [...]

See full content

Inside the Mind of a Hacker is a Bugcrowd staple

on 30/01/2026

See full content

How Hackers Defeated Our AI

on 30/01/2026

See full content

Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead

by Annette Reed on 30/01/2026

APIs are one of the most important technologies in digital business ecosystems. And yet, the responsibility for their security often falls to AppSec teams – and that’s a problem.  This organizational mismatch creates systemic risk: business teams assume APIs are “secured,” while attackers exploit logic flaws, authorization gaps, and automated attacks in production. As Tim Erlin noted rece [...]

See full content

Celebrating our 2025 open-source contributions

on 30/01/2026

Last year, our engineers submitted over 375 pull requests that were merged into non–Trail of Bits repositories, touching more than 90 projects from cryptography libraries to the Rust compiler. This work reflects one of our driving values: “share what others can use.” The measure isn’t whether you share something, but whether it’s actually useful to someone else. This princi [...]

See full content

The Rise of the Bionic Hacker: AI, Autonomy & the Future of Offensive Security | Black Hat Europe

on 29/01/2026

See full content

Annual testing vs daily change

on 29/01/2026

See full content

Building cryptographic agility into Sigstore

on 29/01/2026

Software signatures carry an invisible expiration date. The container image or firmware you sign today might be deployed for 20 years, but the cryptographic signature protecting it may become untrustworthy within 10 years. SHA-1 certificates become worthless, weak RSA keys are banned, and quantum computers may crack today’s elliptic curve cryptography. The question isn’t whether our cu [...]

See full content

Exciting Announcement With an Upcoming Capture the Flag!

on 28/01/2026

See full content

Intigriti 0126 CTF Challenge: Exploiting insecure postMessage handlers

by Ayoub on 28/01/2026

At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. January's challenge presented participants with CRYPTIGRITI, a cryptocurrency trading platform where users could buy and trade Bitcoin (BTC), Monero (XMR), and a custom digital currency, 1337COIN. This article provides a step-by-step walkthrough for solving January's [...]

See full content

Clawdbot Malware

on 27/01/2026

See full content

Chip-Off Firmware Extraction: 1-Minute Guide

on 27/01/2026

See full content

New Android Theft Protection Feature Updates: Smarter, Stronger

on 27/01/2026

Posted by Nataliya Stanetsky, Fabricio Ferracioli, Elliot Sisteron, Irene Ang of the Android Security Team Phone theft is more than just losing a device; it's a form of financial fraud that can leave you suddenly vulnerable to personal data and financial theft. That’s why we're committed to providing multi-layered defenses that help protect you before, during, and after a theft attempt. Today, [...]

See full content

Part 3: Why CISOs Must Rethink Trust in AI

on 27/01/2026

See full content

OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows

on 27/01/2026

A deep dive into OpenSSL’s January 2026 CMS and PKCS#12 vulnerabilities, including a pre-auth stack overflow and a PKCS#12 parsing bug. [...]

See full content

🦞🤖MOAR CLAWDBOT CRAP🦞🤖

on 26/01/2026

See full content

SQL injection in structure plugin

on 26/01/2026

ExpressionEngine disclosed a bug submitted by fed01k: https://hackerone.com/reports/3249794 [...]

See full content

🦞🤖CLAWDBOT SECURITY??🦞🤖

on 26/01/2026

See full content

Who Operates the Badbox 2.0 Botnet?

by BrianKrebs on 26/01/2026

The cybercriminals in control of Kimwolf — a disruptive botnet that has infected more than 2 million devices — recently shared a screenshot indicating they’d compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people b [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Schneier on Security
  4. Krebs on Security
  5. Google Online Security Blog
  6. $BLOG_TITLE
  7. Agarri : Sécurité informatique offensive
  8. Alex Chapman's Blog
  9. www.alphabot.com
  10. ziot
  11. Bug Bounty Reports Explained
  12. Bugcrowd
  13. cat ~/footstep.ninja/blog.txt
  14. Ezequiel Pereira
  15. HackerOne
  16. surajdisoja.me
  17. InsiderPhD
  18. Intigriti
  19. John Hammond
  20. LiveOverflow
  21. NahamSec
  22. PortSwigger Blog
  23. Rana Khalil
  24. Richard’s Infosec blog
  25. Ron Chan
  26. ropnop blog
  27. STÖK
  28. Sun Knudsen
  29. The Cyber Mentor
  30. The unofficial HackerOne disclosure timeline
  31. The XSS Rat
  32. TomNomNom
  33. Wallarm