InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Laurie Anderson Is Quoting Me

on 19/05/2026

Not by name, but Laurie Anderson quotes me in one of the tracks of her new album: My favorite quote is from a cryptologist who said “If you think technology will solve your problems, you don’t understand technology and you don’t understand your problems.” Also in interviews: “Of course, it’s ridiculous, outrageous, blah, blah, blah,” Anderson says about th [...]

See full content

CISA Admin Leaked AWS GovCloud Keys on Github

by BrianKrebs on 18/05/2026

Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly privileged AWS GovCloud accounts and a large number of internal CISA systems. Security experts said the public archive included files detailing how CISA builds, tests and deploys software internally, and that it rep [...]

See full content

Zero-Day Exploit Against Windows BitLocker

on 18/05/2026

It’s nasty, but it requires physical access to the computer: The exploit, named YellowKey, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11 deployments of BitLocker, the full-volume encryption protection Microsoft provides to make disk contents off-limits to anyone without the decryption key, which is stored in a [...]

See full content

What Your Board Gets Wrong About AI Security

by Tim Erlin on 18/05/2026

Editor's note: This article was originally published by Craig Riddell on LinkedIn. It has been republished here with the author's permission. Boards are giving AI security more airtime than ever. What they're not giving is the right framing. A year or two ago, AI was mostly a question of experimentation risk. Today, it's tied directly to revenue, customer experience, operational efficiency, [...]

See full content

CEO insights: beyond the AI model card

by Stijn Jans on 18/05/2026

As part of our AI series, I recently released a blog on the topic of keeping the human layer sacred in the AI era. There, I shared my thoughts on where human intelligence fits, the decisions I believe companies will face in the next 3 to 5 years, and explored what I deem to be the beating heart of the Bug Bounty industry.   Considering that discussion, I want to continue the conversation regarding [...]

See full content

Pathfinding Labs: Deploy, test, and learn from 100+ intentionally vulnerable AWS environments

on 18/05/2026

Introducing Pathfinding Labs, a collection of intentionally vulnerable AWS environments for red teamers and blue teamers to deploy, exploit, and use for detection validation. [...]

See full content

Trailing-dot IPv4 URL bypasses IP-address guard, allows wildcard DNS SAN match

on 17/05/2026

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734921 [...]

See full content

NULL pointer dereference in libcurl URL API redirect_url() with CURLU_DEFAULT_SCHEME

on 17/05/2026

curl disclosed a bug submitted by mulan_dh: https://hackerone.com/reports/3736234 [...]

See full content

Friday Squid Blogging: Bigfin Squid

on 16/05/2026

Article about the bigfin squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

SQL Injection in Column Type Parameter Allows Arbitrary SQL Execution

on 15/05/2026

Nextcloud disclosed a bug submitted by suul: https://hackerone.com/reports/3462991 [...]

See full content

Bypassing On-Camera Age-Verification Checks

on 15/05/2026

Some AI-based video age-verification checks can be fooled with a fake mustache. [...]

See full content

Upcoming Speaking Engagements

on 14/05/2026

This is a current list of where and when I am scheduled to speak: I’m giving a virtual talk on “The Security of Trust in the Age of AI,” hosted by the Financial Women’s Association of New York, at 6:00 PM ET on May 21, 2026. I’m speaking at the Potsdam Conference on National Cybersecurity at the Hasso Plattner Institut in Potsdam, Germany. The event runs June 24–25, 2026, and my talk will be the [...]

See full content

Origin IP Exposed waf bypass

on 14/05/2026

Yuga Labs disclosed a bug submitted by r00tsid: https://hackerone.com/reports/1821085 - Bounty: $250 [...]

See full content

How Dangerous Is Anthropic’s Mythos AI?

on 14/05/2026

Last month, Anthropic made a remarkable announcement about its new model, Claude Mythos Preview: it was so good at finding security vulnerabilities in software that the company would not release it to the general public. Instead, it would only be available to a select group of companies to scan and fix their own software. The announcement requires context—but it contained an essential truth. [...]

See full content

Kerberos/SPNEGO Connection Reuse Vulnerability

on 14/05/2026

curl disclosed a bug submitted by rootofpi_ramesh: https://hackerone.com/reports/3725659 [...]

See full content

Backdoored Cemu release linked to TanStack and Mistral supply chain campaign

on 14/05/2026

We investigate how a coordinated supply chain campaign that compromised npm and PyPI packages also backdoored the official Cemu Nintendo Wii U emulator GitHub release, reaching nearly 20,000 Linux users. [...]

See full content

Backdoored node-ipc npm releases steal developer credentials through DNS queries

on 14/05/2026

An analysis of backdoored node-ipc npm releases that add an obfuscated credential collection and DNS exfiltration payload to the CommonJS entrypoint. [...]

See full content

OpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities

on 13/05/2026

The UK’s AI Security Institute evaluated GPT-5.5’s ability to find security vulnerabilities, and found that it is comparable to Claude Mythos. Note that the OpenAI model is generally available. Here is the Institute’s evaluation of Mythos. And here is an analysis of a smaller, cheaper model. It requires more scaffolding from the prompter, but it is also just as good. [...]

See full content

Shai-Hulud Goes Open Source

on 13/05/2026

A static analysis of the open-sourced Shai-Hulud offensive framework attributed to TeamPCP, covering its credential harvesting, supply chain poisoning, and exfiltration capabilities. [...]

See full content

Patch Tuesday, May 2026 Edition

by BrianKrebs on 12/05/2026

Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this month with some of the more widely-used software makers — including Apple, Google, Microsoft, Mozilla and Oracle — fixing near record volumes of secu [...]

See full content

Extending Security to MCP Servers: Closing a Critical Gap

by Tim Erlin on 12/05/2026

The Model Context Protocol (MCP) is a de facto standard for providing structured access to privileged systems for AI agents and external integrations. It acts as a USB-C port for AI, enabling faster innovation by allowing organizations to expose tools, resources, and workflows without the time-consuming work of building APIs.  Adoption has surged in recent months, and categories like payments, [...]

See full content

QuickSight Authorization Bypass: Chat Agents Accessible Despite Custom Permissions Denial

on 12/05/2026

AWS VDP disclosed a bug submitted by jcow: https://hackerone.com/reports/3577145 [...]

See full content

The beast needs a cage: What's next for AppSec post-Mythos

on 12/05/2026

Now that the dust has settled on Mythos dropping, there is space for more considered reflection on the direction of travel. Mythos wasn't a surprise; it's another data point on a trajectory that's bee [...]

See full content

Copy.Fail Linux Vulnerability

on 12/05/2026

This is the worst Linux vulnerability in years. TL;DR copy.fail is a Linux kernel local privilege escalation, not a browser or clipboard attack. Disclosed by Theori on 29 April 2026 with a working PoC. It abuses the kernel crypto API (AF_ALG sockets) plus splice() to write four bytes at a time straight into the page cache of a file the attacker does not own. The exploit works unmodified across Ub [...]

See full content

Go fuzzing was missing half the toolkit. We forked the toolchain to fix it.

on 12/05/2026

Go’s native fuzzing is useful, but it stands far behind state-of-the-art tooling that the Rust, C, and C++ ecosystems offer with LibAFL and AFL++. Path constraints are hard to solve. Structured inputs usually need handmade parsing. It doesn’t even detect several common bug classes, such as integer overflows, goroutine leaks, data races, and execution timeouts. So to make it better, we built [...]

See full content

NIS2 compliance beyond the April 2026 deadline

by Eleanor Barlow on 12/05/2026

With the deadline passing for NIS2 compliance, many companies have shifted focus from becoming prepared to proving compliance. This post outlines the top 10 tasks for doing so and provides insights on how crowdsourced security platforms can assist in designing programs relevant to their circumstances and compliance requirements. The April NIS2 compliance deadline has come and gone, but where does [...]

See full content

LLMs and Text-in-Text Steganography

on 11/05/2026

Turns out that LLMs are really good at hiding text messages in other text messages. [...]

See full content

CEO insights: holding the human layer sacred in the AI era

by Stijn Jans on 11/05/2026

As founder and CEO of Intigriti, I've spent a long time around hackers, and one thing is clear. The best ones don't fear AI. They use it.   What they do fear, however, and what I take seriously as a founder, is a world where platforms quietly replace them under the banner of efficiency. Where their work trains models they don't benefit from, and where the economics of the craft erode while everyon [...]

See full content

Malicious Coding Agent Skills and the Risk of Dynamic Context

on 11/05/2026

Learn how malicious Claude Code skills can abuse dynamic context commands to execute before model-level prompt injection defenses can intervene. [...]

See full content

another liberapay member team twitter account broken Link Hijacking via Expired Twitter Account Link

on 09/05/2026

Liberapay disclosed a bug submitted by rox-11: https://hackerone.com/reports/3723002 [...]

See full content

Liberapay member team twitter account broken Link Hijacking via Expired Twitter Account Link

on 09/05/2026

Liberapay disclosed a bug submitted by rox-11: https://hackerone.com/reports/3721519 [...]

See full content

Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia

on 08/05/2026

Evidence of them has been found by analyzing DNA in the seawater. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

Private circle can be added to another circle via API despite visibility restriction

on 08/05/2026

Nextcloud disclosed a bug submitted by vidang04: https://hackerone.com/reports/3511998 - Bounty: $150 [...]

See full content

Files drop share links for end-to-end encrypted folders allowed to drop files into other folders of the share owner

on 08/05/2026

Nextcloud disclosed a bug submitted by 0x0doteth: https://hackerone.com/reports/3304830 [...]

See full content

View-only guests could see deleted Collectives pages in the trashbin

on 08/05/2026

Nextcloud disclosed a bug submitted by yoyomiski: https://hackerone.com/reports/3521434 [...]

See full content

Canvas Breach Disrupts Schools & Colleges Nationwide

by BrianKrebs on 08/05/2026

An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service’s login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions. A sc [...]

See full content

Kubernetes security fundamentals: Secrets

on 08/05/2026

A look at how to secure Kubernetes secrets [...]

See full content

mbedTLS private-key blob null-termination asymmetry in lib/vtls/mbedtls.c (mbed_load_privkey)

on 07/05/2026

curl disclosed a bug submitted by shecantcode2: https://hackerone.com/reports/3717365 [...]

See full content

ActiveStorage Disk Service Path Traversal via Custom Blob Key Injection

on 07/05/2026

Ruby on Rails disclosed a bug submitted by ksw9722: https://hackerone.com/reports/3580511 [...]

See full content

Critical Deadlock Vulnerability in Monero RPC Leading to Complete Node Paralysis

on 06/05/2026

Monero disclosed a bug submitted by rorkh: https://hackerone.com/reports/3307874 [...]

See full content

Connection Count Bug in Monero Node Enables Outbound Peer Reset Attack

on 06/05/2026

Monero disclosed a bug submitted by yulge: https://hackerone.com/reports/3185083 [...]

See full content

wcurl treats some URL operands after -- as curl options

on 06/05/2026

curl disclosed a bug submitted by p4p3r_hak: https://hackerone.com/reports/3708482 [...]

See full content

Out of scope: Improper Input Validation Order on /api-internal/login via password field leads to unnecessary resource consumption

on 05/05/2026

PortSwigger Web Security disclosed a bug submitted by bereza4321: https://hackerone.com/reports/3625600 - Bounty: $200 [...]

See full content

C/C++ checklist challenges, solved

on 05/05/2026

We recently added a C/C++ security checklist to the Testing Handbook and challenged readers to spot the bugs in two code samples: a deceptively simple Linux ping program and a Windows driver registry handler. If you found the inet_ntoa global buffer gotcha or the missing RTL_QUERY_REGISTRY_TYPECHECK flag, nice work. If not, here’s a full walkthrough of both challenges, plus a deep dive into [...]

See full content

Potential Resource Leak in tool_parsecfg.c at line 279 during fileerror

on 05/05/2026

curl disclosed a bug submitted by ravindrasl2026: https://hackerone.com/reports/3710209 [...]

See full content

libcurl 8.20.0 incomplete fix for CVE-2026-7168: changing only CURLOPT_PROXYPORT leaks stale Proxy Digest auth to a different proxy

on 05/05/2026

curl disclosed a bug submitted by codexxxx: https://hackerone.com/reports/3707747 [...]

See full content

MQTT CONNACK Packet Type Bypass leads to RCE via Malicious Broker

on 05/05/2026

curl disclosed a bug submitted by orelbn7: https://hackerone.com/reports/3712343 [...]

See full content

The AI impact: a triager’s perspective

by Eleanor Barlow on 05/05/2026

As part of our recent AI blog series, and in addition to content on ‘How AI is leveraged to enhance the Intigriti platform’, we have provided multiple insights from the Intigriti team on the development and future of AI, how it impacts programs, and the Bug Bounty community. So far, we have explored:   ‘How AI is changing vulnerability discovery’, with COO, Ed Parsons. ‘Common AI misconceptions [...]

See full content

Introducing Wallarm Middle East Cloud: Built for Data Residency Compliance

by Tim Erlin on 04/05/2026

As API and AI adoption grows across the Middle East, so do the expectations around how data is handled. For many organizations operating in this region, it’s not just about securing applications. It’s about doing it in a way that keeps data in-country and aligned with local requirements. Today, we’re introducing the Wallarm Middle East Cloud Point of Presence (POP), giving organizations a n [...]

See full content

Improper input validation On Exported deep-link handler crashes `FileDisplayActivity` on crafted external URL Denial-of-Service

on 01/05/2026

Nextcloud disclosed a bug submitted by khoof: https://hackerone.com/reports/3399016 [...]

See full content

3 ways custom scan checks turn practitioner knowledge into scalable automation

on 01/05/2026

Senior pentesters have a deeply refined intuition about what is vulnerable in an environment. The problem? That expertise is often siloed with an individual and trapped in their notes or Python scripts. [...]

See full content

Double fdrop on a socket through sys_netcontrol

on 01/05/2026

PlayStation disclosed a bug submitted by slidybat: https://hackerone.com/reports/3320669 - Bounty: $10000 [...]

See full content

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

by BrianKrebs on 30/04/2026

A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work of a compet [...]

See full content

Exploiting SQL injection vulnerabilities

by Ayoub on 30/04/2026

Most assume that SQL injection is a solved problem in today's application landscape, especially with increased awareness of secure coding practices (such as resorting to prepared statements or parameterized queries) and the widespread adoption of NoSQL databases. However, in practice, SQLi vulnerabilities continue to surface in modern applications, often hiding in legacy code components, custom qu [...]

See full content

MQTT state machine confusion: PINGRESP/DISCONNECT with non-zero remaining_length dispatches to stale nextstate

on 29/04/2026

curl disclosed a bug submitted by fxv_ray_st: https://hackerone.com/reports/3702718 [...]

See full content

Extending Ruzzy with LibAFL

on 29/04/2026

LibAFL is all the rage in the fuzzing community these days, especially with LLVM’s libFuzzer being placed in maintenance mode. Written in Rust, LibAFL claims improved performance, modularity, state-of-the-art fuzzing techniques, and libFuzzer compatibility. For these reasons, I set out to add LibAFL support to Ruzzy, our coverage-guided fuzzer for pure Ruby code and Ruby C extensions. This gives R [...]

See full content

Use-After-Free in SMB connection reuse (req->path dangling pointer after needle destruction)

on 29/04/2026

curl disclosed a bug submitted by nadsec42: https://hackerone.com/reports/3591956 [...]

See full content

Negotiate connection reuse with wrong credentials when using CURLAUTH_ANY

on 29/04/2026

curl disclosed a bug submitted by anonymous_237: https://hackerone.com/reports/3646072 [...]

See full content

Negotiate Authentication Premature on Connection Reuse

on 29/04/2026

curl disclosed a bug submitted by sdainard: https://hackerone.com/reports/3666576 [...]

See full content

CVE-2026-7168: cross-proxy Digest auth state leak

on 29/04/2026

curl disclosed a bug submitted by xkilua: https://hackerone.com/reports/3697719 [...]

See full content

CVE-2026-7009: OCSP stapling bypass with Apple SecTrust

on 29/04/2026

curl disclosed a bug submitted by 3lcarry: https://hackerone.com/reports/3694390 [...]

See full content

CVE-2026-6253: proxy credentials leak over redirect-to proxy

on 29/04/2026

curl disclosed a bug submitted by joesephdiver: https://hackerone.com/reports/3669637 [...]

See full content

CVE-2026-5545: wrong reuse of HTTP Negotiate connection

on 29/04/2026

curl disclosed a bug submitted by quaccws: https://hackerone.com/reports/3642555 [...]

See full content

CVE-2026-6276: stale custom cookie host causes cookie leak

on 29/04/2026

curl disclosed a bug submitted by arkss: https://hackerone.com/reports/3671818 [...]

See full content

CVE-2026-6429: netrc credential leak with reused proxy connection

on 29/04/2026

curl disclosed a bug submitted by nobcoderr: https://hackerone.com/reports/3677759 [...]

See full content

CVE-2026-4873: connection reuse ignores TLS requirement

on 29/04/2026

curl disclosed a bug submitted by bonaire: https://hackerone.com/reports/3621851 [...]

See full content

CVE-2026-5773: wrong reuse of SMB connection

on 29/04/2026

curl disclosed a bug submitted by osama-hamad: https://hackerone.com/reports/3650689 [...]

See full content

Use-after-free in `curl_easy_ssls_export()` during callback re-entrancy

on 29/04/2026

curl disclosed a bug submitted by m1llie: https://hackerone.com/reports/3682666 [...]

See full content

Heap-buffer-overflow in `Curl_ssl_push_certinfo_len()` sole bounds check is `DEBUGASSERT`

on 29/04/2026

curl disclosed a bug submitted by h3zh3z: https://hackerone.com/reports/3684614 [...]

See full content

Stack exhaustion in MIME multipart reading with deeply nested subparts

on 29/04/2026

curl disclosed a bug submitted by wi110w: https://hackerone.com/reports/3684603 [...]

See full content

PS4 BD-J privilege escalation using nested JAR

on 29/04/2026

PlayStation disclosed a bug submitted by gezine: https://hackerone.com/reports/3452696 - Bounty: $2500 [...]

See full content

6 Lessons Security Leaders Must Learn About AI and APIs

by Tim Erlin on 28/04/2026

Most organizations treating AI security as a model problem are defending the wrong layer. Security teams filter prompts, patch jailbreaks, and tune model behavior, which is all necessary work, while the actual attack surface sits largely unexamined underneath. That surface is the API layer: the endpoints AI systems use to retrieve data, call tools, and take action on behalf of users. This isn' [...]

See full content

PortSwigger recognized at the Northern Tech Awards 2026.

on 28/04/2026

We’re proud to announce that PortSwigger recently won the Overall Judges’ Award at the Northern Tech Awards 2026. The Northern Tech Awards are run by GP Bullhound, the tech advisory and investment fir [...]

See full content

IBM Aspera HTTP Gateway stores sensitive information in clear text in easily obtainable files which can be read by an unauthenticated user.

on 27/04/2026

IBM disclosed a bug submitted by jhon1231248e: https://hackerone.com/reports/3340797 [...]

See full content

Bypass of Restricted Keyword "Mozilla" in Display Name Field via Unicode Homoglyphs on addons.allizom.org

on 27/04/2026

Mozilla disclosed a bug submitted by icecream_23: https://hackerone.com/reports/3279441 - Bounty: $500 [...]

See full content

Bypassing Inbox Privacy Settings and Enabling Spam on Pixiv.net

on 27/04/2026

pixiv disclosed a bug submitted by aaqibhussain: https://hackerone.com/reports/3100570 - Bounty: $200 [...]

See full content

Non-premium user can disable Ads in japanese version of dic.pixiv.net

on 27/04/2026

pixiv disclosed a bug submitted by lainkusanagi: https://hackerone.com/reports/3183520 - Bounty: $3000 [...]

See full content

Argument Injection in /manage/ssh/ via host parameter leads to sensitive file disclosure on Weblate

on 26/04/2026

Weblate disclosed a bug submitted by alexb_616: https://hackerone.com/reports/3518571 [...]

See full content

mruby-engine: UAF in MRubyEngine#initialize enables local RCE

on 24/04/2026

Shopify disclosed a bug submitted by 0xd0ff9: https://hackerone.com/reports/3679660 [...]

See full content

The Governance Gap: How the EU AI Act Makes API Security a Compliance Imperative

by Julian Richter on 24/04/2026

Your legal team just handed you a 400-page document and said "figure out compliance." The EU AI Act is live, your organization falls under its scope, which is broader than many expect. Even non‑EU companies must comply if their AI systems are used, deployed, or produce effects within the European Union. In practice, that means that global organizations building or integrating AI models cannot tre [...]

See full content

Intigriti Bug Bytes #235 - April 2026 🚀

by Ayoub on 24/04/2026

Hi hackers,  Welcome to the latest edition of Bug Bytes! In this month's issue, we'll be featuring:   Compromising an NPM package with 40M weekly downloads Bypassing Cloudflare WAF for a full ATO 20-part series on exploiting JWT vulnerabilities First Intigriti Bug Bounty Meetup And so much more! Let's dive in! Common misconceptions about bug bounty, debugged  Bug bounty still gets misundersto [...]

See full content

Incomplete fix for CVE-2026-21637: loadSNI() in _tls_wrap.js lacks try/catch leading to Remote DoS

on 23/04/2026

Node.js disclosed a bug submitted by mbarbs: https://hackerone.com/reports/3556769 [...]

See full content

AI threats in the wild: The current state of prompt injections on the web

on 23/04/2026

Posted by Thomas Brunner, Yu-Han Liu, Moni PandeAt Google, our Threat Intelligence teams are dedicated to staying ahead of real-world adversarial activity, proactively monitoring emerging threats before they can impact users. Right now, Indirect Prompt Injection (IPI) is a top priority for the security community, anticipating it as a primary attack vector for adversaries to target and compromise A [...]

See full content

Trailmark turns code into graphs

on 23/04/2026

We’re open-sourcing Trailmark, a library that parses source code into a queryable call graph of functions, classes, call relationships, and semantic metadata, then exposes that graph through a Python API that Claude skills can call directly. Install it now: uv pip install trailmark “Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.” John [...]

See full content

RBAC bypass on App log endpoints via `permissionRequired` typo any authenticated user reads admin-only Enterprise App logs

on 23/04/2026

Rocket.Chat disclosed a bug submitted by arccode: https://hackerone.com/reports/3589551 [...]

See full content

Vulnpocalypse Now? How AI is changing vulnerability discovery

by Ed Parsons on 23/04/2026

What you will learn  How vulnerability research and security testing may evolve in the future, based on expert insights and reflections from Intigriti COO Ed Parsons.  How AI is reshaping vulnerability discovery, including the major trends and developments security teams should understand today.  The ‘vulnpocalypse’, and what it signals about the future of AI-assisted hacking.  The risks, oppor [...]

See full content

Attacking the MCP Trust Boundary

by Chandler Johnson on 22/04/2026

Every secure API draws a line between code and data. HTTP separates headers from bodies. SQL has prepared statements. Even email distinguishes the envelope from the message. The Model Context Protocol (MCP), the fast-growing standard for connecting AI agents to external services, inherits that gap from the models it sits on top of. Its central premise is that a language model reads tool descripti [...]

See full content

Complete authentication bypass to admin permissions

on 22/04/2026

Rocket.Chat disclosed a bug submitted by npc: https://hackerone.com/reports/3564655 [...]

See full content

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

by BrianKrebs on 21/04/2026

A 24-year-old British national and senior member of the cybercrime group “Scattered Spider” has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of doll [...]

See full content

Why API Discovery Is the First Step to Securing AI

by Tim Erlin on 21/04/2026

TL;DR AI risk doesn’t live in the model. It lives in the APIs behind it. Every AI interaction triggers a chain of API calls across your environment. Many of those APIs aren’t documented or tracked. That’s your real exposure. Shadow API discovery gives you visibility into those hidden endpoints, so you can find them before attackers do. If you don’t know which APIs your AI relies on, you can [...]

See full content

SVG filter primitives bypass remote image blocking, enabling email tracking without consent.

on 20/04/2026

Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3486747 [...]

See full content

position: fixed !important bypasses CSS sanitizer's fixed-position mitigation, enabling full-viewport phishing overlays.

on 20/04/2026

Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590586 [...]

See full content

Unquoted body background attribute enables CSS injection that bypasses remote image blocking

on 20/04/2026

Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590583 [...]

See full content

SMIL values and by attributes bypass remote image blocking via unvalidated resource-loading animations, enabling email tracking without consent

on 20/04/2026

Nextcloud disclosed a bug submitted by nullcathedral: https://hackerone.com/reports/3590576 [...]

See full content

libcurl omits IPv6 zoneid from host identity and leaks credentials/cookies across scoped link-local realms

on 19/04/2026

curl disclosed a bug submitted by valvelvel: https://hackerone.com/reports/3680680 [...]

See full content

Digest Auth State Leak on Cross-Origin Redirect via Netrc - Username and Password Hash Sent to Wrong Host

on 19/04/2026

curl disclosed a bug submitted by fg0x0: https://hackerone.com/reports/3680038 [...]

See full content

Stored XSS in attachment-display exploitable through SameSite

on 19/04/2026

Nextcloud disclosed a bug submitted by aikido_security: https://hackerone.com/reports/3594137 [...]

See full content

libcurl reuses a learned RTSP Session header across different hosts on the same easy handle, enabling cross-host session leak and replay

on 18/04/2026

curl disclosed a bug submitted by skksndk: https://hackerone.com/reports/3680234 [...]

See full content

Rails::HTML::Sanitizer.allowed_uri? returns true for entity-encoded control-character-split javascript: URLs

on 18/04/2026

Ruby on Rails disclosed a bug submitted by smlee: https://hackerone.com/reports/3601655 [...]

See full content

libcurl stale CURLOPT_AUTOREFERER leaks a previous request URL to a different origin on a reused easy handle

on 17/04/2026

curl disclosed a bug submitted by asdwe: https://hackerone.com/reports/3673277 [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Schneier on Security
  4. Krebs on Security
  5. Google Online Security Blog
  6. $BLOG_TITLE
  7. Agarri : Sécurité informatique offensive
  8. Alex Chapman's Blog
  9. www.alphabot.com
  10. ziot
  11. cat ~/footstep.ninja/blog.txt
  12. Ezequiel Pereira
  13. surajdisoja.me
  14. Intigriti
  15. PortSwigger Blog
  16. Richard’s Infosec blog
  17. Ron Chan
  18. ropnop blog
  19. The unofficial HackerOne disclosure timeline
  20. Wallarm