InfoSec Planet
A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.
Keeping Google Play & Android app ecosystems safe in 2025
on 19/02/2026
Posted by Vijaya Kaza, VP and GM, App & Ecosystem Trust
The Android ecosystem is a thriving global community built on trust, giving billions of users the confidence to download the latest apps. In order to maintain that trust, we’re focused on ensuring that apps do not cause real-world harm, such as malware, financial fraud, hidden subscriptions, and privacy invasions. As bad actors leverage [...]
See full content
Russia is hacking zero-days again
on 19/02/2026
See full content
Malicious AI
on 19/02/2026
Interesting:
Summary: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me into accepting its changes into a mainstream python library. This represents a first-of-its-kind case study of misaligned AI behavior in the wild, and raises serious concerns about currently deployed AI [...]
See full content
IoT Hacking Stream
on 19/02/2026
See full content
Splatoon 3 Anticheat Seed Randomization Weakness
on 19/02/2026
Nintendo disclosed a bug submitted by hana2736: https://hackerone.com/reports/3042475 [...]
See full content
ASLR leak in Mario Kart World through LAN mode
on 19/02/2026
Nintendo disclosed a bug submitted by kinnay: https://hackerone.com/reports/3463719 [...]
See full content
Kubernetes project issues warning on Ingress NGINX retirement
on 19/02/2026
The Kubernetes project is urging organizations to migrate away from Ingress NGINX before its retirement in March 2026, with new high-severity CVEs underscoring the urgency. [...]
See full content
Learn PowerShell!
on 18/02/2026
See full content
Inside H1-65: Inside OKX’s Live Hacking Event in Singapore
on 18/02/2026
See full content
XSS Vulnerability on Pressable/Atomic Hosting Platform via unescaped admin notices leads to code execution
on 18/02/2026
Automattic disclosed a bug submitted by georgestephanis: https://hackerone.com/reports/3447021 [...]
See full content
ContinuumCon is back for 2026!
on 18/02/2026
See full content
AI Found Twelve New Vulnerabilities in OpenSSL
on 18/02/2026
The title of the post is”What AI Security Research Looks Like When It Works,” and I agree:
In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL te [...]
See full content
From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses
by Tim Erlin on 18/02/2026
The shadow technology problem is getting worse.
Over the past few years, organizations have scaled microservices, cloud-native apps, and partner integrations faster than corporate governance models could keep up, resulting in undocumented or shadow APIs.
We’re now seeing this pattern all over again with AI systems. And, even worse, AI introduces non-deterministic behavior, autonomous [...]
See full content
Carelessness versus craftsmanship in cryptography
on 18/02/2026
Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bugs potentially affect thousands of downstream projects. When we shared one of these bugs with an affected vendor, strongSwan, the maintainer provided a model response for security vendors. The aes-js/pyaes maintainer, on the other hand, has tak [...]
See full content
AI Web App Testing: The Future of Security
on 17/02/2026
See full content
The Core Principle in Forensic Science
on 17/02/2026
See full content
How's your security posture?
on 17/02/2026
See full content
Improper State Validation on Sony WH-CH520 via BLE Command Service leads to unauthorized Bluetooth pairing and audio hijacking
on 17/02/2026
Sony disclosed a bug submitted by vortekx: https://hackerone.com/reports/3514490 [...]
See full content
Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report
by Tim Erlin on 17/02/2026
API security has been a growing concern for years. However, while it was always seen as important, it often came second to application security or hardening infrastructure.
In 2025, the picture changed. Wallarm’s 2026 API ThreatStats Report revealed that APIs are now the primary attack surface for digital business, and not because bad actors discovered new zero-days, but because of compo [...]
See full content
An Interview with Eva Benn!
on 17/02/2026
See full content
Side-Channel Attacks Against LLMs
on 17/02/2026
Here are three papers describing different side-channel attacks against LLMs.
“Remote Timing Attacks on Efficient Language Model Inference“:
Abstract: Scaling up language models has significantly increased their capabilities. But larger models are slower models, and so there is now an extensive body of work (e.g., speculative sampling or parallel decoding) that improves the (average ca [...]
See full content
How to use AI for improved vulnerability report writing
by Ayoub on 17/02/2026
Report writing is an integral part of bug bounty or any type of vulnerability assessment. In fact, sometimes, it can become the most important phase. Submitting a confusing report can often lead to misalignment and faulty interpretation of your reported vulnerability. On the contrary, a well-written submission that includes all the necessary details can help shorten the time to triage, lead to inc [...]
See full content
TiKTok needs to fix this vulnerability
on 16/02/2026
See full content
Can I Replace AI With My Recon Methodology?
on 16/02/2026
See full content
The Promptware Kill Chain
on 16/02/2026
Attacks against modern generative artificial intelligence (AI) large language models (LLMs) pose a real threat. Yet discussions around these attacks and their potential defenses are dangerously myopic. The dominant narrative focuses on “prompt injection,” a set of techniques to embed instructions into inputs to LLM intended to perform malicious activity. This term suggests a simple, s [...]
See full content
Chaining in action: techniques, terminology, and real-world impact on business
by Eleanor Barlow on 16/02/2026
What you will learn in this blog
What chaining is and how combining lower-severity issues can create a high-impact security risk.
Key chaining techniques and terminology, such as pivoting, lateral movement, and privilege escalation.
How chaining is identified and prioritized in practice, including the role of PTaaS and how researchers can use chaining to uncover critical attack paths and guide n [...]
See full content
AI wrote a hit piece
on 15/02/2026
See full content
Bad Bash! FREE FULL 1 Hour Bash Course For Ethical Hackers
on 14/02/2026
See full content
Upcoming Speaking Engagements
on 14/02/2026
This is a current list of where and when I am scheduled to speak:
I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, 2026.
I’m speaking at the Personal AI Summit in Los Angeles, California, USA, on Thursday, March 5, 2026.
I’m speaking at Tech Live: Cybersecurity in New York City, USA, on Wednesday, March 11, 2026.
I’m giving the Ross An [...]
See full content
this is really funny
on 14/02/2026
See full content
Friday Squid Blogging: Do Squid Dream?
on 13/02/2026
An exploration of the interesting question.
[...]
See full content
A Practical Intro to Digital Forensics
on 13/02/2026
See full content
Moltbook is still weird (and AI skills suck)
on 13/02/2026
See full content
In love with hacking
on 12/02/2026
See full content
TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak
on 12/02/2026
Node.js disclosed a bug submitted by 0xmaxhax: https://hackerone.com/reports/3473882 [...]
See full content
Node.js permission model bypass via unchecked Unix Domain Socket connections (UDS)
on 12/02/2026
Node.js disclosed a bug submitted by winfunc: https://hackerone.com/reports/3465156 [...]
See full content
Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers
on 12/02/2026
Node.js disclosed a bug submitted by aaron_vercel: https://hackerone.com/reports/3456295 [...]
See full content
Memory leak that enables remote Denial of Service against applications processing TLS client certificates
on 12/02/2026
Node.js disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3357723 [...]
See full content
Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled
on 12/02/2026
Node.js disclosed a bug submitted by chalker: https://hackerone.com/reports/3405778 [...]
See full content
FS Permissions Bypass
on 12/02/2026
Node.js disclosed a bug submitted by natann: https://hackerone.com/reports/3417819 [...]
See full content
Mail stored HTML injection in subject text
on 12/02/2026
Nextcloud disclosed a bug submitted by se1en: https://hackerone.com/reports/3357036 - Bounty: $350 [...]
See full content
3D Printer Surveillance
on 12/02/2026
New York is contemplating a bill that adds surveillance to 3D printers:
New York’s 20262027 executive budget bill (S.9005 / A.10005) includes language that should alarm every maker, educator, and small manufacturer in the state. Buried in Part C is a provision requiring all 3D printers sold or delivered in New York to include “blocking technology.” This is defined as software or firmw [...]
See full content
Cache Pollution via Unkeyed GET Parameters on www.omise.co
on 11/02/2026
Omise disclosed a bug submitted by alitoni224: https://hackerone.com/reports/3183046 [...]
See full content
AI Red Teaming: Beyond Safety to Security
on 11/02/2026
See full content
Kimwolf Botnet Swamps Anonymity Network I2P
by BrianKrebs on 11/02/2026
For the past week, the massive “Internet of Things” (IoT) botnet known as Kimwolf has been disrupting The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attem [...]
See full content
Rewiring Democracy Ebook is on Sale
on 11/02/2026
I just noticed that the ebook version of Rewiring Democracy is on sale for $5 on Amazon, Apple Books, Barnes & Noble, Books A Million, Google Play, Kobo, and presumably everywhere else in the US. I have no idea how long this will last.
Also, Amazon has a coupon that brings the hardcover price down to $20. You’ll see the discount at checkout.
[...]
See full content
Quick tip!
on 11/02/2026
See full content
Prompt Injection Via Road Signs
on 11/02/2026
Interesting research: “CHAI: Command Hijacking Against Embodied AI.”
Abstract: Embodied Artificial Intelligence (AI) promises to handle edge cases in robotic vehicle systems where data is scarce by using common-sense reasoning grounded in perception and action to generalize beyond training distributions and adapt to novel real-world situations. These capabilities, however, also create [...]
See full content
CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative
by Tim Erlin on 11/02/2026
It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his new role as Wallarm’s Global Field CISO. It’s a position that suits him down to the ground, blending technical depth, empathy, business acumen, and, what Craig believes, the most underrated skill in cybersecurity: curiosity.
Like so many of us, Craig got into cybersecurity by accident. He first learned Un [...]
See full content
Patch Tuesday, February 2026 Edition
by BrianKrebs on 10/02/2026
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six “zero-day” vulnerabilities that attackers are already exploiting in the wild.
Zero-day #1 this month is CVE-2026-21510, a security feature bypass vulnerability in Windows Shell wherein a single click on a malicious link can quiet [...]
See full content
Your environment doesn’t sit still
on 10/02/2026
See full content
Choosing Red Team or Blue Team in 2026
on 10/02/2026
See full content
AI-Generated Text and the Detection Arms Race
on 10/02/2026
In 2023, the science fiction literary magazine Clarkesworld stopped accepting new submissions because so many were generated by artificial intelligence. Near as the editors could tell, many submitters pasted the magazine’s detailed story guidelines into an AI and sent in the results. And they weren’t alone. Other fiction magazines have also reported a high number of AI-generated submissions.
This [...]
See full content
Tech impersonators: ClickFix and MacOS infostealers
on 10/02/2026
Datadog identified an active campaign employing fake GitHub repositories impersonating software companies and leveraging the ClickFix initial access technique to deliver macOS infostealers. [...]
See full content
Where are hackers located?
on 09/02/2026
See full content
Unlimited Reuse of Coupon Code Allows Free Shipping on All Orders on
on 09/02/2026
AWS VDP disclosed a bug submitted by aneeeketh: https://hackerone.com/reports/3426839 [...]
See full content
How AI Gets Tested in the Real World | Salesforce Live Hacking Event
on 09/02/2026
See full content
ASGIRequest header concatenation quadratic CPU DoS on Django via repeated headers leads to worker exhaustion
on 09/02/2026
Django disclosed a bug submitted by sy2n0: https://hackerone.com/reports/3426417 [...]
See full content
10+ Daily Essentials As An Ethical Hacker
on 09/02/2026
See full content
The Myth of “Known APIs”: Why Inventory-First Security Models Are Already Obsolete
by Tim Erlin on 09/02/2026
You probably think the security mantra “you can’t protect what you don’t know about” is an inarguable truth. But you would be wrong. It doesn’t hold water in today’s threat landscape.
Of course, it sounds reasonable. Before you secure APIs, you must first discover, inventory, and document them exhaustively. The problem is that this way of thinking has hardened into dogma and ignores how attack [...]
See full content
Bundle Up With Our Biggest Discounts Ever!
on 07/02/2026
See full content
JHT Course Launch: Dark Web 2 - CTI Researcher
on 06/02/2026
See full content
We take security seriously at Bugcrowd
on 06/02/2026
See full content
WebAuthn app was updated based on public key
on 06/02/2026
Nextcloud disclosed a bug submitted by se1en: https://hackerone.com/reports/3360354 - Bounty: $750 [...]
See full content
The Payload Podcast #001 with Jonny Johnson & Max Harley
on 06/02/2026
See full content
LIVE: 🕵️ Forensicating | HackTheBox | Cybersecurity
on 05/02/2026
See full content
MQTT Protocol Packet Injection via Unchecked CONNACK Remaining Length
on 05/02/2026
curl disclosed a bug submitted by pajarori: https://hackerone.com/reports/3531216 [...]
See full content
From niche to necessity: global bug bounty adoption accelerates, led by the U.S.
by Eleanor Barlow on 05/02/2026
Bug bounty growth insights across the US
Bug bounty programs have evolved from a niche security tactic into a core component of modern defense strategies worldwide. In this blog, we focus on the US: one of the most invested and fastest-adopting markets, where organizations, driven by higher security maturity, are increasingly using bug bounty to uncover complex vulnerabilities that traditional t [...]
See full content
Bugcrowd’s new Security Inbox
on 04/02/2026
See full content
How To Approach ANY Bug Bounty Target In 2026
on 04/02/2026
See full content
User enumeration via timing attack in Django mod_wsgi authentication backend leads to account discovery
on 04/02/2026
Django disclosed a bug submitted by stackered: https://hackerone.com/reports/3424977 [...]
See full content
Information Disclosure via Logback Configuration Injection in GoCD Agent
on 04/02/2026
GoCD disclosed a bug submitted by aigirl: https://hackerone.com/reports/3509632 [...]
See full content
Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious
on 04/02/2026
Datadog Security Research has identified an active web traffic hijacking campaign that targets NGINX installations and management panels like Baota (BT). In this post, we provide our analysis of the techniques this campaign uses and share indicators of compromise you can check for in your NGINX configurations. [...]
See full content
Security folks
on 03/02/2026
See full content
The Most Common IoT Security Flaws
on 03/02/2026
See full content
Previous commentor on post can still comment even after comment permission is changed to disabled
on 03/02/2026
LinkedIn disclosed a bug submitted by allenjo: https://hackerone.com/reports/3151001 [...]
See full content
Improper Access Control - Access to "Active Hiring" (Premium feature) filter results
on 03/02/2026
LinkedIn disclosed a bug submitted by minex627: https://hackerone.com/reports/3235855 [...]
See full content
Please Don’t Feed the Scattered Lapsus ShinyHunters
by BrianKrebs on 02/02/2026
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators about the extent of the intrusion. Some victims reportedly are paying — perhaps as much to contain the stolen data [...]
See full content
Hacking a Windows Web Application
on 02/02/2026
See full content
Live Hacking 2025: $4.3M in Bounties, Tested Around the World
on 02/02/2026
See full content
Every organization is vulnerable.
on 02/02/2026
See full content
Exploiting PostMessage vulnerabilities: A complete guide
by Ayoub on 31/01/2026
PostMessage vulnerabilities arise when developers fail to properly validate message origins or sanitize content within cross-origin communication handlers. As modern web applications increasingly rely on the postMessage API for cross-origin communication, whether for embedded widgets, OAuth flows, third-party integrations, or iframe-based components, the attack surface continues to grow. While pos [...]
See full content
Inside the Mind of a Hacker is a Bugcrowd staple
on 30/01/2026
See full content
How Hackers Defeated Our AI
on 30/01/2026
See full content
Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead
by Annette Reed on 30/01/2026
APIs are one of the most important technologies in digital business ecosystems. And yet, the responsibility for their security often falls to AppSec teams – and that’s a problem.
This organizational mismatch creates systemic risk: business teams assume APIs are “secured,” while attackers exploit logic flaws, authorization gaps, and automated attacks in production. As Tim Erlin noted rece [...]
See full content
Celebrating our 2025 open-source contributions
on 30/01/2026
Last year, our engineers submitted over 375 pull requests that were merged into non–Trail of Bits repositories, touching more than 90 projects from cryptography libraries to the Rust compiler.
This work reflects one of our driving values: “share what others can use.” The measure isn’t whether you share something, but whether it’s actually useful to someone else. This princi [...]
See full content
The Rise of the Bionic Hacker: AI, Autonomy & the Future of Offensive Security | Black Hat Europe
on 29/01/2026
See full content
Annual testing vs daily change
on 29/01/2026
See full content
Building cryptographic agility into Sigstore
on 29/01/2026
Software signatures carry an invisible expiration date. The container image or firmware you sign today might be deployed for 20 years, but the cryptographic signature protecting it may become untrustworthy within 10 years. SHA-1 certificates become worthless, weak RSA keys are banned, and quantum computers may crack today’s elliptic curve cryptography. The question isn’t whether our cu [...]
See full content
Exciting Announcement With an Upcoming Capture the Flag!
on 28/01/2026
See full content
Intigriti 0126 CTF Challenge: Exploiting insecure postMessage handlers
by Ayoub on 28/01/2026
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. January's challenge presented participants with CRYPTIGRITI, a cryptocurrency trading platform where users could buy and trade Bitcoin (BTC), Monero (XMR), and a custom digital currency, 1337COIN.
This article provides a step-by-step walkthrough for solving January's [...]
See full content
Clawdbot Malware
on 27/01/2026
See full content
Chip-Off Firmware Extraction: 1-Minute Guide
on 27/01/2026
See full content
New Android Theft Protection Feature Updates: Smarter, Stronger
on 27/01/2026
Posted by Nataliya Stanetsky, Fabricio Ferracioli, Elliot Sisteron, Irene Ang of the Android Security Team
Phone theft is more than just losing a device; it's a form of financial fraud that can leave you suddenly vulnerable to personal data and financial theft. That’s why we're committed to providing multi-layered defenses that help protect you before, during, and after a theft attempt.
Today, [...]
See full content
Part 3: Why CISOs Must Rethink Trust in AI
on 27/01/2026
See full content
OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows
on 27/01/2026
A deep dive into OpenSSL’s January 2026 CMS and PKCS#12 vulnerabilities, including a pre-auth stack overflow and a PKCS#12 parsing bug. [...]
See full content
🦞🤖MOAR CLAWDBOT CRAP🦞🤖
on 26/01/2026
See full content
SQL injection in structure plugin
on 26/01/2026
ExpressionEngine disclosed a bug submitted by fed01k: https://hackerone.com/reports/3249794 [...]
See full content
🦞🤖CLAWDBOT SECURITY??🦞🤖
on 26/01/2026
See full content
Who Operates the Badbox 2.0 Botnet?
by BrianKrebs on 26/01/2026
The cybercriminals in control of Kimwolf — a disruptive botnet that has infected more than 2 million devices — recently shared a screenshot indicating they’d compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people b [...]
See full content