InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Double fdrop on a socket through sys_netcontrol

on 01/05/2026

PlayStation disclosed a bug submitted by slidybat: https://hackerone.com/reports/3320669 - Bounty: $10000 [...]

See full content

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

by BrianKrebs on 30/04/2026

A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work of a compet [...]

See full content

Fast16 Malware

on 30/04/2026

Researchers have reverse-engineered a piece of malware named Fast16. It’s almost certainly state-sponsored, probably US in origin, and was deployed against Iran years before Stuxnet: “…the Fast16 malware was designed to carry out the most subtle form of sabotage ever seen in an in-the-wild malware tool: By automatically spreading across networks and then silently manipulating com [...]

See full content

Josh Mason | Real Folks of Cyber | DITL

on 30/04/2026

See full content

Exploiting SQL injection vulnerabilities

by Ayoub on 30/04/2026

Most assume that SQL injection is a solved problem in today's application landscape, especially with increased awareness of secure coding practices (such as resorting to prepared statements or parameterized queries) and the widespread adoption of NoSQL databases. However, in practice, SQLi vulnerabilities continue to surface in modern applications, often hiding in legacy code components, custom qu [...]

See full content

MQTT state machine confusion: PINGRESP/DISCONNECT with non-zero remaining_length dispatches to stale nextstate

on 29/04/2026

curl disclosed a bug submitted by fxv_ray_st: https://hackerone.com/reports/3702718 [...]

See full content

Extending Ruzzy with LibAFL

on 29/04/2026

LibAFL is all the rage in the fuzzing community these days, especially with LLVM’s libFuzzer being placed in maintenance mode. Written in Rust, LibAFL claims improved performance, modularity, state-of-the-art fuzzing techniques, and libFuzzer compatibility. For these reasons, I set out to add LibAFL support to Ruzzy, our coverage-guided fuzzer for pure Ruby code and Ruby C extensions. This gives R [...]

See full content

Claude Mythos Has Found 271 Zero-Days in Firefox

on 29/04/2026

That’s a lot. No, it’s an extraordinary number: Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previously about our collaboration with Anthropic to scan Firefox with Opus 4.6, which led to fixes for 22 security-sensitive bugs in Firefox 148. As part of our continued col [...]

See full content

Use-After-Free in SMB connection reuse (req->path dangling pointer after needle destruction)

on 29/04/2026

curl disclosed a bug submitted by nadsec42: https://hackerone.com/reports/3591956 [...]

See full content

Negotiate connection reuse with wrong credentials when using CURLAUTH_ANY

on 29/04/2026

curl disclosed a bug submitted by anonymous_237: https://hackerone.com/reports/3646072 [...]

See full content

Negotiate Authentication Premature on Connection Reuse

on 29/04/2026

curl disclosed a bug submitted by sdainard: https://hackerone.com/reports/3666576 [...]

See full content

CVE-2026-7168: cross-proxy Digest auth state leak

on 29/04/2026

curl disclosed a bug submitted by xkilua: https://hackerone.com/reports/3697719 [...]

See full content

CVE-2026-7009: OCSP stapling bypass with Apple SecTrust

on 29/04/2026

curl disclosed a bug submitted by 3lcarry: https://hackerone.com/reports/3694390 [...]

See full content

CVE-2026-6253: proxy credentials leak over redirect-to proxy

on 29/04/2026

curl disclosed a bug submitted by joesephdiver: https://hackerone.com/reports/3669637 [...]

See full content

CVE-2026-5545: wrong reuse of HTTP Negotiate connection

on 29/04/2026

curl disclosed a bug submitted by quaccws: https://hackerone.com/reports/3642555 [...]

See full content

CVE-2026-6276: stale custom cookie host causes cookie leak

on 29/04/2026

curl disclosed a bug submitted by arkss: https://hackerone.com/reports/3671818 [...]

See full content

CVE-2026-6429: netrc credential leak with reused proxy connection

on 29/04/2026

curl disclosed a bug submitted by nobcoderr: https://hackerone.com/reports/3677759 [...]

See full content

CVE-2026-4873: connection reuse ignores TLS requirement

on 29/04/2026

curl disclosed a bug submitted by bonaire: https://hackerone.com/reports/3621851 [...]

See full content

CVE-2026-5773: wrong reuse of SMB connection

on 29/04/2026

curl disclosed a bug submitted by osama-hamad: https://hackerone.com/reports/3650689 [...]

See full content

Use-after-free in `curl_easy_ssls_export()` during callback re-entrancy

on 29/04/2026

curl disclosed a bug submitted by m1llie: https://hackerone.com/reports/3682666 [...]

See full content

Heap-buffer-overflow in `Curl_ssl_push_certinfo_len()` sole bounds check is `DEBUGASSERT`

on 29/04/2026

curl disclosed a bug submitted by h3zh3z: https://hackerone.com/reports/3684614 [...]

See full content

Stack exhaustion in MIME multipart reading with deeply nested subparts

on 29/04/2026

curl disclosed a bug submitted by wi110w: https://hackerone.com/reports/3684603 [...]

See full content

PS4 BD-J privilege escalation using nested JAR

on 29/04/2026

PlayStation disclosed a bug submitted by gezine: https://hackerone.com/reports/3452696 - Bounty: $2500 [...]

See full content

What Anthropic’s Mythos Means for the Future of Cybersecurity

on 28/04/2026

Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabilities in key software like operating systems and internet infrastructure that thousands of software developers working on those systems failed to find. This capability will have m [...]

See full content

6 Lessons Security Leaders Must Learn About AI and APIs

by Tim Erlin on 28/04/2026

Most organizations treating AI security as a model problem are defending the wrong layer. Security teams filter prompts, patch jailbreaks, and tune model behavior, which is all necessary work, while the actual attack surface sits largely unexamined underneath. That surface is the API layer: the endpoints AI systems use to retrieve data, call tools, and take action on behalf of users. This isn' [...]

See full content

PortSwigger recognized at the Northern Tech Awards 2026.

on 28/04/2026

We’re proud to announce that PortSwigger recently won the Overall Judges’ Award at the Northern Tech Awards 2026. The Northern Tech Awards are run by GP Bullhound, the tech advisory and investment fir [...]

See full content

IBM Aspera HTTP Gateway stores sensitive information in clear text in easily obtainable files which can be read by an unauthenticated user.

on 27/04/2026

IBM disclosed a bug submitted by jhon1231248e: https://hackerone.com/reports/3340797 [...]

See full content

This hacker made $40,000 using Claude #ai #hacking #bugbounty

on 27/04/2026

See full content

My Friend Made $40,000 Using Claude Code (Here's How)

on 27/04/2026

See full content

Medieval Encrypted Letter Decoded

on 27/04/2026

Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860. [...]

See full content

Bypass of Restricted Keyword "Mozilla" in Display Name Field via Unicode Homoglyphs on addons.allizom.org

on 27/04/2026

Mozilla disclosed a bug submitted by icecream_23: https://hackerone.com/reports/3279441 - Bounty: $500 [...]

See full content

Bypassing Inbox Privacy Settings and Enabling Spam on Pixiv.net

on 27/04/2026

pixiv disclosed a bug submitted by aaqibhussain: https://hackerone.com/reports/3100570 - Bounty: $200 [...]

See full content

Non-premium user can disable Ads in japanese version of dic.pixiv.net

on 27/04/2026

pixiv disclosed a bug submitted by lainkusanagi: https://hackerone.com/reports/3183520 - Bounty: $3000 [...]

See full content

Argument Injection in /manage/ssh/ via host parameter leads to sensitive file disclosure on Weblate

on 26/04/2026

Weblate disclosed a bug submitted by alexb_616: https://hackerone.com/reports/3518571 [...]

See full content

mruby-engine: UAF in MRubyEngine#initialize enables local RCE

on 24/04/2026

Shopify disclosed a bug submitted by 0xd0ff9: https://hackerone.com/reports/3679660 [...]

See full content

Friday Squid Blogging: How Squid Survived Extinction Events

on 24/04/2026

Science news: Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intelligent creatures likely originated deep in the ocean over 100 million years ago, surviving mass extinction events by retreating into oxygen-rich deep-sea refuges. For millions of year [...]

See full content

Hiding Bluetooth Trackers in Mail

on 24/04/2026

It was used to track a Dutch naval ship: Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch government website and mailed a postcard with a hidden tracker inside. Because of this, they were able to track the ship for about a day, watching it sail from Heraklion, Crete, before it turned towards Cyprus. While it only show [...]

See full content

The Governance Gap: How the EU AI Act Makes API Security a Compliance Imperative

by Julian Richter on 24/04/2026

Your legal team just handed you a 400-page document and said "figure out compliance." The EU AI Act is live, your organization falls under its scope, which is broader than many expect. Even non‑EU companies must comply if their AI systems are used, deployed, or produce effects within the European Union. In practice, that means that global organizations building or integrating AI models cannot tre [...]

See full content

Intigriti Bug Bytes #235 - April 2026 🚀

by Ayoub on 24/04/2026

Hi hackers,  Welcome to the latest edition of Bug Bytes! In this month's issue, we'll be featuring:   Compromising an NPM package with 40M weekly downloads Bypassing Cloudflare WAF for a full ATO 20-part series on exploiting JWT vulnerabilities First Intigriti Bug Bounty Meetup And so much more! Let's dive in! Common misconceptions about bug bounty, debugged  Bug bounty still gets misundersto [...]

See full content

Incomplete fix for CVE-2026-21637: loadSNI() in _tls_wrap.js lacks try/catch leading to Remote DoS

on 23/04/2026

Node.js disclosed a bug submitted by mbarbs: https://hackerone.com/reports/3556769 [...]

See full content

AI threats in the wild: The current state of prompt injections on the web

on 23/04/2026

Posted by Thomas Brunner, Yu-Han Liu, Moni PandeAt Google, our Threat Intelligence teams are dedicated to staying ahead of real-world adversarial activity, proactively monitoring emerging threats before they can impact users. Right now, Indirect Prompt Injection (IPI) is a top priority for the security community, anticipating it as a primary attack vector for adversaries to target and compromise A [...]

See full content

Trailmark turns code into graphs

on 23/04/2026

We’re open-sourcing Trailmark, a library that parses source code into a queryable call graph of functions, classes, call relationships, and semantic metadata, then exposes that graph through a Python API that Claude skills can call directly. Install it now: uv pip install trailmark “Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.” John [...]

See full content

FBI Extracts Deleted Signal Messages from iPhone Notification Database

on 23/04/2026

404 Media reports (alternate site): The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database…. The news shows how forensic extraction—­when someone has physical access to a device and is able to run specialized software on it& [...]

See full content

RBAC bypass on App log endpoints via `permissionRequired` typo any authenticated user reads admin-only Enterprise App logs

on 23/04/2026

Rocket.Chat disclosed a bug submitted by arccode: https://hackerone.com/reports/3589551 [...]

See full content

Vulnpocalypse Now? How AI is changing vulnerability discovery

by Ed Parsons on 23/04/2026

What you will learn  How vulnerability research and security testing may evolve in the future, based on expert insights and reflections from Intigriti COO Ed Parsons.  How AI is reshaping vulnerability discovery, including the major trends and developments security teams should understand today.  The ‘vulnpocalypse’, and what it signals about the future of AI-assisted hacking.  The risks, oppor [...]

See full content

Attacking the MCP Trust Boundary

by Chandler Johnson on 22/04/2026

Every secure API draws a line between code and data. HTTP separates headers from bodies. SQL has prepared statements. Even email distinguishes the envelope from the message. The Model Context Protocol (MCP), the fast-growing standard for connecting AI agents to external services, inherits that gap from the models it sits on top of. Its central premise is that a language model reads tool descripti [...]

See full content

ICE Uses Graphite Spyware

on 22/04/2026

ICE has admitted that it uses spyware from the Israeli company Graphite. [...]

See full content

Complete authentication bypass to admin permissions

on 22/04/2026

Rocket.Chat disclosed a bug submitted by npc: https://hackerone.com/reports/3564655 [...]

See full content

Use BLUR-IT to Increase Your OPSEC

on 21/04/2026

See full content

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

by BrianKrebs on 21/04/2026

A 24-year-old British national and senior member of the cybercrime group “Scattered Spider” has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of doll [...]

See full content

Why API Discovery Is the First Step to Securing AI

by Tim Erlin on 21/04/2026

TL;DR AI risk doesn’t live in the model. It lives in the APIs behind it. Every AI interaction triggers a chain of API calls across your environment. Many of those APIs aren’t documented or tracked. That’s your real exposure. Shadow API discovery gives you visibility into those hidden endpoints, so you can find them before attackers do. If you don’t know which APIs your AI relies on, you can [...]

See full content

Mexican Surveillance Company

on 21/04/2026

Grupo Seguritech is a Mexican surveillance company that is expanding into the US. [...]

See full content

SVG filter primitives bypass remote image blocking, enabling email tracking without consent.

on 20/04/2026

Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3486747 [...]

See full content

I Learned How to Jailbreak AI Chatbots

on 20/04/2026

See full content

position: fixed !important bypasses CSS sanitizer's fixed-position mitigation, enabling full-viewport phishing overlays.

on 20/04/2026

Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590586 [...]

See full content

Unquoted body background attribute enables CSS injection that bypasses remote image blocking

on 20/04/2026

Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590583 [...]

See full content

SMIL values and by attributes bypass remote image blocking via unvalidated resource-loading animations, enabling email tracking without consent

on 20/04/2026

Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590576 [...]

See full content

Is “Satoshi Nakamoto” Really Adam Back?

on 20/04/2026

The New York Times has a long article where the author lays out an impressive array of circumstantial evidence that the inventor of Bitcoin is the cypherpunk Adam Back. I don’t know. The article is convincing, but it’s written to be convincing. I can’t remember if I ever met Adam. I was a member of the Cypherpunks mailing list for a while, but I was never really an active partici [...]

See full content

libcurl omits IPv6 zoneid from host identity and leaks credentials/cookies across scoped link-local realms

on 19/04/2026

curl disclosed a bug submitted by valvelvel: https://hackerone.com/reports/3680680 [...]

See full content

Digest Auth State Leak on Cross-Origin Redirect via Netrc - Username and Password Hash Sent to Wrong Host

on 19/04/2026

curl disclosed a bug submitted by fg0x0: https://hackerone.com/reports/3680038 [...]

See full content

Stored XSS in attachment-display exploitable through SameSite

on 19/04/2026

Nextcloud disclosed a bug submitted by aikido_security: https://hackerone.com/reports/3594137 [...]

See full content

libcurl reuses a learned RTSP Session header across different hosts on the same easy handle, enabling cross-host session leak and replay

on 18/04/2026

curl disclosed a bug submitted by skksndk: https://hackerone.com/reports/3680234 [...]

See full content

Rails::HTML::Sanitizer.allowed_uri? returns true for entity-encoded control-character-split javascript: URLs

on 18/04/2026

Ruby on Rails disclosed a bug submitted by smlee: https://hackerone.com/reports/3601655 [...]

See full content

libcurl stale CURLOPT_AUTOREFERER leaks a previous request URL to a different origin on a reused easy handle

on 17/04/2026

curl disclosed a bug submitted by asdwe: https://hackerone.com/reports/3673277 [...]

See full content

How to Investigate with Windows Prefetch Files

on 17/04/2026

See full content

We beat Google’s zero-knowledge proof of quantum cryptanalysis

on 17/04/2026

Two weeks ago, Google’s Quantum AI group published a zero-knowledge proof of a quantum circuit so optimized, they concluded that first-generation quantum computers will break elliptic curve cryptography keys in as little as 9 minutes. Today, Trail of Bits is publishing our own zero-knowledge proof that significantly improves Google’s on all metrics. Our result is not due to some quantum breakthrou [...]

See full content

Common AI misconceptions debugged!

by Greg Jenkins on 17/04/2026

What you will learn How AI is boosting researcher productivity How new researchers are approaching bug bounties Why the quality of submissions is not declining How effective triage and coordination are crucial AI and the growing ecosystem of tools built around it have now moved beyond early experimentation and into everyday use across the bug bounty community. What initially showed up as AI- [...]

See full content

Introducing the official Burp Ambassador Program

on 16/04/2026

Why we’re launching the program What it means to be a Burp Ambassador What we’re aiming for Our Burp Ambassadors Alan Levy Corey Ball Federico Dotta Rana Khalil Tib3rius Looking ahead Get Involved - B [...]

See full content

Here’s everything I have learned from making $2M in bounties. #bugbounty

on 16/04/2026

See full content

Residual Malicious Payloads on HackerOne after Vulnerability Fixes

on 16/04/2026

HackerOne disclosed a bug submitted by joejoe5: https://hackerone.com/reports/3168691 [...]

See full content

DOS via Mutation Aliasing in GraphQL Account Recovery Phone Number Verification API

on 16/04/2026

HackerOne disclosed a bug submitted by hellokbit: https://hackerone.com/reports/3287208 - Bounty: $12500 [...]

See full content

lib/http2.c: SSL connections accept non-HTTP push schemes (incomplete fix for 2e8c922a)

on 16/04/2026

curl disclosed a bug submitted by hybirdss: https://hackerone.com/reports/3674275 [...]

See full content

The case for dependency cooldowns in a post-axios world

on 16/04/2026

Understanding npm and the importance of dependency cooldowns. [...]

See full content

Authorization header leak in ssrf_filter via cross-host redirect leads to credential theft and unauthorized access

on 15/04/2026

arkadiyt-projects disclosed a bug submitted by argareksapatii: https://hackerone.com/reports/3642600 [...]

See full content

SQL Injection Detection Bypass in AWS WAF Managed Rules (AWSManagedRulesSQLiRuleSet)

on 15/04/2026

AWS VDP disclosed a bug submitted by killnet-edc: https://hackerone.com/reports/3591725 [...]

See full content

Patch Tuesday, April 2026 Edition

by BrianKrebs on 14/04/2026

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed “BlueHammer.” Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited [...]

See full content

DOM XSS in `fizzy.do` import filename preview enables one-click victim account takeover

on 14/04/2026

Basecamp disclosed a bug submitted by xavlimsg: https://hackerone.com/reports/3608199 - Bounty: $500 [...]

See full content

Improper Access Control in `fizzy.do` import flow allows cross-tenant ActionText reference resolution and data disclosure

on 14/04/2026

Basecamp disclosed a bug submitted by xavlimsg: https://hackerone.com/reports/3543475 - Bounty: $218 [...]

See full content

BOLA/IDOR in Out-of-Office API allows any authenticated user to read other users' absence data

on 14/04/2026

Nextcloud disclosed a bug submitted by cyberjoker: https://hackerone.com/reports/3382343 [...]

See full content

Cybersecurity Books to Read: DFIR Investigative Mindset

on 14/04/2026

See full content

[Variation of #3321406] YetAnother 1-Click Chaining of Self-XSS, Cookie Tossing and AntiCSRF Token Prediction leads to auto approval in AccessTempAuth

on 14/04/2026

Cloudflare Public Bug Bounty disclosed a bug submitted by matured_kazama: https://hackerone.com/reports/3423950 [...]

See full content

[Variation of #1554049] 1-Click Chaining of Self-XSS, Cookie Tossing and AntiCSRF Token Prediction leads to auto approval in Access Temp Auth

on 14/04/2026

Cloudflare Public Bug Bounty disclosed a bug submitted by matured_kazama: https://hackerone.com/reports/3321406 [...]

See full content

Brave Shields Domain Reordering Leads to Origin Confusion

on 13/04/2026

Brave Software disclosed a bug submitted by mousepadkalilinux12: https://hackerone.com/reports/3665151 - Bounty: $100 [...]

See full content

Credential Disclosure via Unvalidated directDownloadUrl (Missing DontAddCredentialsAttribute)

on 13/04/2026

Nextcloud disclosed a bug submitted by py0zz1: https://hackerone.com/reports/3400143 - Bounty: $250 [...]

See full content

Is AI Killing Bug Bounty?

on 13/04/2026

See full content

Argument Injection via curl Short-Flag Grouping

on 13/04/2026

curl disclosed a bug submitted by midoussa7: https://hackerone.com/reports/3669305 [...]

See full content

Integer Overflow/Signedness Mismatch in Printf Precision for HTTP/2 Trailer Headers

on 11/04/2026

curl disclosed a bug submitted by pwnpwn: https://hackerone.com/reports/3665363 [...]

See full content

Encryption context keys and values logged at INFO level

on 10/04/2026

AWS VDP disclosed a bug submitted by misop00p: https://hackerone.com/reports/3620760 [...]

See full content

Bringing Rust to the Pixel Baseband

on 10/04/2026

Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have been focusing on hardening the cellular baseband modem against exploitation. Recognizing the risks associated within the complex modem firmware, Pixel 9 shipped with mitigations against a range of memory-safety vulnerabilities. For Pixel 10, Google is advancing its p [...]

See full content

Open Redirect in Rocket.Chat

on 10/04/2026

Rocket.Chat disclosed a bug submitted by soohyun: https://hackerone.com/reports/3418031 [...]

See full content

[Vertical Privilege Escalation] User can Unapproved any Approved Translation at [/translations/unapprove/]

on 10/04/2026

Mozilla disclosed a bug submitted by adilnbabras: https://hackerone.com/reports/3020021 [...]

See full content

User Can Delete Other Users' Personal Access Tokens at /delete-token/{token_id}/ on Mozilla Pontoon

on 10/04/2026

Mozilla disclosed a bug submitted by adilnbabras: https://hackerone.com/reports/3325582 [...]

See full content

A(I) future of Bug Bounty

by Chris Holt on 10/04/2026

What you will learn How AI is changing bug bounty Where AI helps security teams Why human hackers matter What the future of bug bounty looks like AI and all the tools built around related technologies have been working their way into the Bug Bounty community for a little over a year now and by around March 2025 we started seeing notably AI-written reports. It is time to take stock of what imp [...]

See full content

Protecting Cookies with Device Bound Session Credentials

on 09/04/2026

Posted by Ben Ackerman, Chrome team, Daniel Rubery, Chrome team and Guillaume Ehinger, Google Account Security team Following our April 2024 announcement, Device Bound Session Credentials (DBSC) is now entering public availability for Windows users on Chrome 146, and expanding to macOS in an upcoming Chrome release. This project represents a significant step forward in our ongoing efforts to co [...]

See full content

Memory leak in gem decode logic can allow attacker to take down Rubygems.org application

on 09/04/2026

RubyGems disclosed a bug submitted by mclaren650sspider: https://hackerone.com/reports/3079931 [...]

See full content

Master C and C++ with our new Testing Handbook chapter

on 09/04/2026

We added a new chapter to our Testing Handbook: a comprehensive security checklist for C and C++ code. We’ve identified a broad range of common bug classes, known footguns, and API gotchas across C and C++ codebases and organized them into sections covering Linux, Windows, and seccomp. Whereas other handbook chapters focus on static and dynamic analysis, this chapter offers a strong basis for manu [...]

See full content

libcurl: Integer truncation in curl_easy_ssls_import() causes TLS sessions to never expire

on 09/04/2026

curl disclosed a bug submitted by adityasunny_06: https://hackerone.com/reports/3658049 [...]

See full content

Bye Bye Bellini! | Andrew Bellini's Farewell Stream | Cybersecurity | AMA

on 09/04/2026

See full content

Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8562

on 09/04/2026

A look at how Kubernetes CVE-2020-8562 allows attackers to bypass API server proxy protections using DNS rebinding [...]

See full content

wasResumeUsed on /api-internal/api.htm endpoint leaking other user's resume usage status

on 08/04/2026

Glassdoor disclosed a bug submitted by auxilus: https://hackerone.com/reports/909084 [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Schneier on Security
  4. Krebs on Security
  5. Google Online Security Blog
  6. $BLOG_TITLE
  7. Agarri : Sécurité informatique offensive
  8. Alex Chapman's Blog
  9. www.alphabot.com
  10. ziot
  11. cat ~/footstep.ninja/blog.txt
  12. Ezequiel Pereira
  13. surajdisoja.me
  14. Intigriti
  15. LiveOverflow
  16. NahamSec
  17. PortSwigger Blog
  18. Rana Khalil
  19. Richard’s Infosec blog
  20. Ron Chan
  21. ropnop blog
  22. STÖK
  23. The Cyber Mentor
  24. The unofficial HackerOne disclosure timeline
  25. Wallarm