InfoSec Planet
A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.
Patch Tuesday, February 2026 Edition
by BrianKrebs on 10/02/2026
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six “zero-day” vulnerabilities that attackers are already exploiting in the wild.
Zero-day #1 this month is CVE-2026-21510, a security feature bypass vulnerability in Windows Shell wherein a single click on a malicious link can quiet [...]
See full content
Your environment doesn’t sit still
on 10/02/2026
See full content
Choosing Red Team or Blue Team in 2026
on 10/02/2026
See full content
AI-Generated Text and the Detection Arms Race
on 10/02/2026
In 2023, the science fiction literary magazine Clarkesworld stopped accepting new submissions because so many were generated by artificial intelligence. Near as the editors could tell, many submitters pasted the magazine’s detailed story guidelines into an AI and sent in the results. And they weren’t alone. Other fiction magazines have also reported a high number of AI-generated submissions.
This [...]
See full content
Tech impersonators: ClickFix and MacOS infostealers
on 10/02/2026
Datadog identified an active campaign employing fake GitHub repositories impersonating software companies and leveraging the ClickFix initial access technique to deliver macOS infostealers. [...]
See full content
Where are hackers located?
on 09/02/2026
See full content
Unlimited Reuse of Coupon Code Allows Free Shipping on All Orders on
on 09/02/2026
AWS VDP disclosed a bug submitted by aneeeketh: https://hackerone.com/reports/3426839 [...]
See full content
How AI Gets Tested in the Real World | Salesforce Live Hacking Event
on 09/02/2026
See full content
ASGIRequest header concatenation quadratic CPU DoS on Django via repeated headers leads to worker exhaustion
on 09/02/2026
Django disclosed a bug submitted by sy2n0: https://hackerone.com/reports/3426417 [...]
See full content
10+ Daily Essentials As An Ethical Hacker
on 09/02/2026
See full content
The Myth of “Known APIs”: Why Inventory-First Security Models Are Already Obsolete
by Tim Erlin on 09/02/2026
You probably think the security mantra “you can’t protect what you don’t know about” is an inarguable truth. But you would be wrong. It doesn’t hold water in today’s threat landscape.
Of course, it sounds reasonable. Before you secure APIs, you must first discover, inventory, and document them exhaustively. The problem is that this way of thinking has hardened into dogma and ignores how attack [...]
See full content
LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days
on 09/02/2026
This is amazing:
Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models and a sign of how quickly things are moving. Security teams have been automating vulnerability discovery for years, investing heavily in fuzzing infrastructure and custom harnesses to find bugs at scale. But what stood out in early testing is how quickly Opus 4.6 found vulnerabilities out of t [...]
See full content
Bundle Up With Our Biggest Discounts Ever!
on 07/02/2026
See full content
Friday Squid Blogging: Squid Fishing Tips
on 06/02/2026
This is a video of advice for squid fishing in Puget Sound.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Blog moderation policy.
[...]
See full content
I Am in the Epstein Files
on 06/02/2026
Once. Someone named “Vincenzo lozzo” wrote to Epstein in email, in 2016: “I wouldn’t pay too much attention to this, Schneier has a long tradition of dramatizing and misunderstanding things.” The topic of the email is DDoS attacks, and it is unclear what I am dramatizing and misunderstanding.
Rabbi Schneier is also mentioned, also incidentally, also once. As far as ei [...]
See full content
JHT Course Launch: Dark Web 2 - CTI Researcher
on 06/02/2026
See full content
We take security seriously at Bugcrowd
on 06/02/2026
See full content
iPhone Lockdown Mode Protects Washington Post Reporter
on 06/02/2026
404Media is reporting that the FBI could not access a reporter’s iPhone because it had Lockdown Mode enabled:
The court record shows what devices and data the FBI was able to ultimately access, and which devices it could not, after raiding the home of the reporter, Hannah Natanson, in January as part of an investigation into leaks of classified information. It also provides rare insight into [...]
See full content
WebAuthn app was updated based on public key
on 06/02/2026
Nextcloud disclosed a bug submitted by se1en: https://hackerone.com/reports/3360354 - Bounty: $750 [...]
See full content
The Payload Podcast #001 with Jonny Johnson & Max Harley
on 06/02/2026
See full content
Backdoor in Notepad++
on 05/02/2026
Hackers associated with the Chinese government used a Trojaned version of Notepad++ to deliver malware to selected users.
Notepad++ said that officials with the unnamed provider hosting the update infrastructure consulted with incident responders and found that it remained compromised until September 2. Even then, the attackers maintained credentials to the internal services until December 2, a ca [...]
See full content
LIVE: 🕵️ Forensicating | HackTheBox | Cybersecurity
on 05/02/2026
See full content
MQTT Protocol Packet Injection via Unchecked CONNACK Remaining Length
on 05/02/2026
curl disclosed a bug submitted by pajarori: https://hackerone.com/reports/3531216 [...]
See full content
From niche to necessity: global bug bounty adoption accelerates, led by the U.S.
by Eleanor Barlow on 05/02/2026
Bug bounty growth insights across the US
Bug bounty programs have evolved from a niche security tactic into a core component of modern defense strategies worldwide. In this blog, we focus on the US: one of the most invested and fastest-adopting markets, where organizations, driven by higher security maturity, are increasingly using bug bounty to uncover complex vulnerabilities that traditional t [...]
See full content
Bugcrowd’s new Security Inbox
on 04/02/2026
See full content
How To Approach ANY Bug Bounty Target In 2026
on 04/02/2026
See full content
User enumeration via timing attack in Django mod_wsgi authentication backend leads to account discovery
on 04/02/2026
Django disclosed a bug submitted by stackered: https://hackerone.com/reports/3424977 [...]
See full content
US Declassifies Information on JUMPSEAT Spy Satellites
on 04/02/2026
The US National Reconnaissance Office has declassified information about a fleet of spy satellites operating between 1971 and 2006.
I’m actually impressed to see a declassification only two decades after decommission.
[...]
See full content
Information Disclosure via Logback Configuration Injection in GoCD Agent
on 04/02/2026
GoCD disclosed a bug submitted by aigirl: https://hackerone.com/reports/3509632 [...]
See full content
Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious
on 04/02/2026
Datadog Security Research has identified an active web traffic hijacking campaign that targets NGINX installations and management panels like Baota (BT). In this post, we provide our analysis of the techniques this campaign uses and share indicators of compromise you can check for in your NGINX configurations. [...]
See full content
Security folks
on 03/02/2026
See full content
The Most Common IoT Security Flaws
on 03/02/2026
See full content
Microsoft is Giving the FBI BitLocker Keys
on 03/02/2026
Microsoft gives the FBI the ability to decrypt BitLocker in response to court orders: about twenty times per year.
It’s possible for users to store those keys on a device they own, but Microsoft also recommends BitLocker users store their keys on its servers for convenience. While that means someone can access their data if they forget their password, or if repeated failed attempts to login [...]
See full content
Previous commentor on post can still comment even after comment permission is changed to disabled
on 03/02/2026
LinkedIn disclosed a bug submitted by allenjo: https://hackerone.com/reports/3151001 [...]
See full content
Improper Access Control - Access to "Active Hiring" (Premium feature) filter results
on 03/02/2026
LinkedIn disclosed a bug submitted by minex627: https://hackerone.com/reports/3235855 [...]
See full content
Please Don’t Feed the Scattered Lapsus ShinyHunters
by BrianKrebs on 02/02/2026
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators about the extent of the intrusion. Some victims reportedly are paying — perhaps as much to contain the stolen data [...]
See full content
Hacking a Windows Web Application
on 02/02/2026
See full content
Live Hacking 2025: $4.3M in Bounties, Tested Around the World
on 02/02/2026
See full content
AI Coding Assistants Secretly Copying All Code to China
on 02/02/2026
There’s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China.
Maybe avoid using them.
[...]
See full content
Every organization is vulnerable.
on 02/02/2026
See full content
Exploiting PostMessage vulnerabilities: A complete guide
by Ayoub on 31/01/2026
PostMessage vulnerabilities arise when developers fail to properly validate message origins or sanitize content within cross-origin communication handlers. As modern web applications increasingly rely on the postMessage API for cross-origin communication, whether for embedded widgets, OAuth flows, third-party integrations, or iframe-based components, the attack surface continues to grow. While pos [...]
See full content
Friday Squid Blogging: New Squid Species Discovered
on 30/01/2026
A new species of squid. pretends to be a plant:
Scientists have filmed a never-before-seen species of deep-sea squid burying itself upside down in the seafloor—a behavior never documented in cephalopods. They captured the bizarre scene while studying the depths of the Clarion-Clipperton Zone (CCZ), an abyssal plain in the Pacific Ocean targeted for deep-sea mining.
The team described the enc [...]
See full content
Inside the Mind of a Hacker is a Bugcrowd staple
on 30/01/2026
See full content
How Hackers Defeated Our AI
on 30/01/2026
See full content
Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead
by Annette Reed on 30/01/2026
APIs are one of the most important technologies in digital business ecosystems. And yet, the responsibility for their security often falls to AppSec teams – and that’s a problem.
This organizational mismatch creates systemic risk: business teams assume APIs are “secured,” while attackers exploit logic flaws, authorization gaps, and automated attacks in production. As Tim Erlin noted rece [...]
See full content
Celebrating our 2025 open-source contributions
on 30/01/2026
Last year, our engineers submitted over 375 pull requests that were merged into non–Trail of Bits repositories, touching more than 90 projects from cryptography libraries to the Rust compiler.
This work reflects one of our driving values: “share what others can use.” The measure isn’t whether you share something, but whether it’s actually useful to someone else. This princi [...]
See full content
The Rise of the Bionic Hacker: AI, Autonomy & the Future of Offensive Security | Black Hat Europe
on 29/01/2026
See full content
Annual testing vs daily change
on 29/01/2026
See full content
Building cryptographic agility into Sigstore
on 29/01/2026
Software signatures carry an invisible expiration date. The container image or firmware you sign today might be deployed for 20 years, but the cryptographic signature protecting it may become untrustworthy within 10 years. SHA-1 certificates become worthless, weak RSA keys are banned, and quantum computers may crack today’s elliptic curve cryptography. The question isn’t whether our cu [...]
See full content
Exciting Announcement With an Upcoming Capture the Flag!
on 28/01/2026
See full content
Intigriti 0126 CTF Challenge: Exploiting insecure postMessage handlers
by Ayoub on 28/01/2026
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. January's challenge presented participants with CRYPTIGRITI, a cryptocurrency trading platform where users could buy and trade Bitcoin (BTC), Monero (XMR), and a custom digital currency, 1337COIN.
This article provides a step-by-step walkthrough for solving January's [...]
See full content
Clawdbot Malware
on 27/01/2026
See full content
Chip-Off Firmware Extraction: 1-Minute Guide
on 27/01/2026
See full content
New Android Theft Protection Feature Updates: Smarter, Stronger
on 27/01/2026
Posted by Nataliya Stanetsky, Fabricio Ferracioli, Elliot Sisteron, Irene Ang of the Android Security Team
Phone theft is more than just losing a device; it's a form of financial fraud that can leave you suddenly vulnerable to personal data and financial theft. That’s why we're committed to providing multi-layered defenses that help protect you before, during, and after a theft attempt.
Today, [...]
See full content
Part 3: Why CISOs Must Rethink Trust in AI
on 27/01/2026
See full content
OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows
on 27/01/2026
A deep dive into OpenSSL’s January 2026 CMS and PKCS#12 vulnerabilities, including a pre-auth stack overflow and a PKCS#12 parsing bug. [...]
See full content
🦞🤖MOAR CLAWDBOT CRAP🦞🤖
on 26/01/2026
See full content
SQL injection in structure plugin
on 26/01/2026
ExpressionEngine disclosed a bug submitted by fed01k: https://hackerone.com/reports/3249794 [...]
See full content
🦞🤖CLAWDBOT SECURITY??🦞🤖
on 26/01/2026
See full content
Who Operates the Badbox 2.0 Botnet?
by BrianKrebs on 26/01/2026
The cybercriminals in control of Kimwolf — a disruptive botnet that has infected more than 2 million devices — recently shared a screenshot indicating they’d compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people b [...]
See full content
HackerOne Agentic PTaaS Demo: Continuous Validation for Real-World Risk
on 26/01/2026
See full content
AI can move fast
on 26/01/2026
See full content
How to Become a Top Bug Bounty Hunter in 2026
on 26/01/2026
See full content
wcurl Argument Injection via Unquoted Variable
on 26/01/2026
curl disclosed a bug submitted by playerofficial19: https://hackerone.com/reports/3523953 [...]
See full content
Integer Underflow in src/var.c
on 26/01/2026
curl disclosed a bug submitted by f_i_h: https://hackerone.com/reports/3523349 [...]
See full content
Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE
on 26/01/2026
IDE-SHEPHERD is an open-source IDE security extension that provides real-time monitoring and protection for VS Code and Cursor. It intercepts malicious process executions, monitors network activity, and blocks dangerous workspace tasks before they can compromise your development environment. [...]
See full content
🤖🤖🤖
on 23/01/2026
See full content
I am a scammer?
on 23/01/2026
See full content
What exploit to hunt for when everything is tested #bugbounty
on 23/01/2026
See full content
How to pick an exploit in #bugbounty
on 23/01/2026
See full content
🤖🤖
on 22/01/2026
See full content
How I sped up exploit validation in Repeater using Burp AI
on 22/01/2026
Note: This is a guest post by IT security consultant Adarsh Kumar. I’ve been using Burp Suite day to day for years, so when Burp AI was introduced, I was curious how it would actually hold up dur [...]
See full content
A tech issue alone does not = risk
on 22/01/2026
See full content
IoT Hacking Stream
on 22/01/2026
See full content
31 bite-sized tips, techniques, and bug bounty resources to kick off 2026!
by Eleanor Barlow on 22/01/2026
What you will learn
Practical, bite-sized bug bounty tips and techniques you can apply immediately, whether you’re just starting or sharpening your skills.
Proven approaches for finding, prioritizing, and validating vulnerabilities more efficiently in real-world programs.
An eye on what to look out for to stay consistent and motivated in 2026.
In the lead-up to the new year, we released a bug [...]
See full content
🤖
on 21/01/2026
See full content
Spam & Clearance checks disabled with existing referenced Message-ID
on 21/01/2026
Basecamp disclosed a bug submitted by northeastprince: https://hackerone.com/reports/2012659 [...]
See full content
"I made an Evil MCP server" (and AI fell for it)
on 21/01/2026
See full content
Will LLMs Always Hallucinate?
on 20/01/2026
See full content
Kimwolf Botnet Lurking in Corporate, Govt. Networks
by BrianKrebs on 20/01/2026
A new Internet-of-Things (IoT) botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf’s ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations [...]
See full content
[Critical] Unauthorized Cross-Tenant Data Access in Stripo AI Hub Campaign via Deleted Project.
on 20/01/2026
Stripo Inc disclosed a bug submitted by srcode: https://hackerone.com/reports/3459285 [...]
See full content
Memory Exhaustion in CometBFT v1.0.1 via malicious ProposalMessage leads to network-wide denial of service
on 20/01/2026
Cosmos disclosed a bug submitted by 0xjam: https://hackerone.com/reports/3510161 [...]
See full content
Crossorigin cookies leak and injection risk when using a custom Host header
on 20/01/2026
curl disclosed a bug submitted by ichise: https://hackerone.com/reports/3516878 [...]
See full content
SSL options ISSUERCERT, EC_CURVES and CRLFILE silently ignored by non-OpenSSL backends
on 20/01/2026
curl disclosed a bug submitted by foobar4213: https://hackerone.com/reports/3516974 [...]
See full content
Internal logs/info leaked via endpoint {https://203.137.128.240/server-status}
on 20/01/2026
pixiv disclosed a bug submitted by dexter34: https://hackerone.com/reports/2473173 [...]
See full content
This Simple Vulnerability Was Worth $70,000
on 19/01/2026
See full content
Cookie Replacement Use-After-Free Vulnerability
on 19/01/2026
curl disclosed a bug submitted by bhaskar_ram: https://hackerone.com/reports/3516202 [...]
See full content
Cookie Max-Age Integer Overflow Vulnerability
on 19/01/2026
curl disclosed a bug submitted by bhaskar_ram: https://hackerone.com/reports/3516186 [...]
See full content
Is @TheXSSRat a scammer?
on 18/01/2026
See full content
Disclose Hidden Comments on Media Section of hub.vroid.com
on 18/01/2026
pixiv disclosed a bug submitted by giwadaoud: https://hackerone.com/reports/2541962 - Bounty: $500 [...]
See full content
clickjacing can lead to account takeover
on 18/01/2026
pixiv disclosed a bug submitted by hyk3n: https://hackerone.com/reports/2119892 - Bounty: $200 [...]
See full content
libcurl: Improper Authentication State Management on Cross-Protocol Redirects
on 17/01/2026
curl disclosed a bug submitted by andrewml: https://hackerone.com/reports/3514263 [...]
See full content
I bought this tiny $40 ereader… Then rewrote It
on 16/01/2026
See full content
Easy way to create a new Deck board without permission
on 16/01/2026
Nextcloud disclosed a bug submitted by hakuna: https://hackerone.com/reports/2388183 - Bounty: $100 [...]
See full content
Can download files on Android app without permission
on 16/01/2026
Nextcloud disclosed a bug submitted by hakuna: https://hackerone.com/reports/2380133 - Bounty: $250 [...]
See full content
How I’m Approaching Cybersecurity Goals in 2026
on 16/01/2026
See full content
Locked in for 2026
on 16/01/2026
See full content
Command Injection on Amazon Q Developer CLI via malicious .amazonq/mcp.json leads to arbitrary code execution
on 16/01/2026
AWS VDP disclosed a bug submitted by farmer: https://hackerone.com/reports/3427370 [...]
See full content
Functional PoCs in less than a minute? Julen Garrido Estévez puts Burp AI to the test
on 16/01/2026
Note: This is a guest post by pentester Julen Garrido Estévez (@b3xal). Methodology Key results Examples Key learnings Prompt template A pentester's POV on Burp AI Pentester Julen Garrido Es [...]
See full content
Intigriti Bug Bytes #232 - January 2026 🚀
by Ayoub on 16/01/2026
Hi hackers,
Welcome to the latest edition of Bug Bytes (and the first of 2026)! In this month’s issue, we’ll be featuring:
Hijacking official AWS GitHub repositories
New anonymous bug bounty forum
Finding more IDORs & SSRFs using a unique methodology
New JavaScript file scanner to find hidden endpoints
And so much more! Let’s dive in!
Intigriti SantaCloud CTF results are in
December 20 [...]
See full content