InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Welcoming Megan to TCM! | Cybersecurity | AMA

on 25/03/2026

See full content

HTTP/1.1 Response Desynchronization via conflicting CL/TE headers in Proxy CONNECT

on 25/03/2026

curl disclosed a bug submitted by 3lcarry: https://hackerone.com/reports/3623064 [...]

See full content

Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android

on 25/03/2026

Posted by Eric Lynch, Product Manager, Android and Dom Elliot, Group Product Manager, Google Play Modern digital security is at a turning point. We are on the threshold of using quantum computers to solve "impossible" problems in drug discovery, materials science, and energy—tasks that even the most powerful classical supercomputers cannot handle. However, the same unique ability to consider dif [...]

See full content

Sen. Wyden Warns of Another Section 702 Abuse

on 25/03/2026

Sen. Ron Wyden is warning us of an abuse of Section 702: Wyden took to the Senate floor to deliver a lengthy speech, ostensibly about the since approved (with support of many Democrats) nomination of Joshua Rudd to lead the NSA. Wyden was protesting that nomination, but in the context of Rudd being unwilling to agree to basic constitutional limitations on NSA surveillance. But that’s just a [...]

See full content

Try our new dimensional analysis Claude plugin

on 25/03/2026

We’re releasing a new Claude plugin for developing and auditing code that implements dimensional analysis, a technique we explored in our most recent blog post. Most LLM-based security skills ask the model to find bugs. Our new dimensional-analysis plugin for Claude Code takes a different approach: it uses the LLM to annotate your codebase with dimensional types, then flags mismatches mechanically [...]

See full content

Function `do_pubkey()` can have out-of-bound read issue

on 25/03/2026

curl disclosed a bug submitted by tynus: https://hackerone.com/reports/3617719 [...]

See full content

Intigriti 0326 CTF Challenge: Chaining DOM clobbering and CSP bypasses for XSS

by Ayoub on 25/03/2026

At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. This month's challenge, brought forward by Kulindu, presented us with a Secure Search Portal that, on the surface, appeared to be well protected. A strict Content Security Policy and DOMPurify sanitization gave the impression that this month's task of executing an XS [...]

See full content

Potential Subdomain Takeover on IBM.com domain.

on 24/03/2026

IBM disclosed a bug submitted by bugmithalchemist: https://hackerone.com/reports/3592387 [...]

See full content

3 Reasons IoT Security Will Explode in 2026

on 24/03/2026

See full content

Team Mirai and Democracy

on 24/03/2026

Japan’s election last month and the rise of the country’s newest and most innovative political party, Team Mirai, illustrates the viability of a different way to do politics. In this model, technology is used to make democratic processes stronger, instead of undermining them. It is harnessed to root out corruption, instead of serving as a cash cow for campaign donations. Imagine an election where [...]

See full content

Spotting issues in DeFi with dimensional analysis

on 24/03/2026

Using dimensional analysis, you can categorically rule out a whole category of logic and arithmetic bugs that plague DeFi formulas. No code changes required, just better reasoning! One of the first lessons in physics is learning to think in terms of dimensions. Physicists can often spot a flawed formula in seconds just by checking whether the dimensions make sense. I once had a teacher who even ke [...]

See full content

Access to Deactivated LinkedIn Company Pages via Competitor Analytics API

on 24/03/2026

LinkedIn disclosed a bug submitted by riadalrashed: https://hackerone.com/reports/3604288 [...]

See full content

Vulnerability disclosure for AI safeguards. How open should programs be and what incentives are necessary?

by Ed Parsons on 24/03/2026

What you will learn How vulnerability disclosure applies specifically to AI safeguards and systems. The pros and cons of making AI disclosure programs more open/restricted. The kinds of incentives that motivate researchers. Which disclosure program structures can help organizations improve their AI security. In a recent NCSC blog post on adapting vulnerability disclosure for AI safeguards, [...]

See full content

LiteLLM compromised on PyPI: Tracing the March 2026 TeamPCP supply chain campaign

on 24/03/2026

On March 24, 2026, two PyPI releases of LiteLLM were published with malicious code. We trace the full TeamPCP supply chain campaign from Trivy through npm, Checkmarx, and into LiteLLM. [...]

See full content

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

by BrianKrebs on 23/03/2026

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran’s time zone or have Farsi set as the default language. Experts say the wiper campaign against Iran materialized this past weekend and came from a relatively new cybercrime [...]

See full content

Inside H1-468: Live Hacking Event with Epic Games in Stockholm

on 23/03/2026

See full content

I’m speaking at r19.io conference

on 23/03/2026

See full content

Microsoft Xbox One Hacked

on 23/03/2026

It’s an impressive feat, over a decade after the box was released: Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching could do the trick. So, instead of tinkering with the system rest pin(s) the hacker targeted the momentary collapse of the CPU voltage rail. This was quite a feat, as Gaasedelen couldn’t ‘see’ into the Xbox One, so had to [...]

See full content

How To Get Into Bug Bounty In 2026

on 22/03/2026

See full content

Friday Squid Blogging: Jumbo Flying Squid in the South Pacific

on 20/03/2026

The population needs better conservation. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

Fail-Open in set_tlsext_servername_callback on pyopenssl via unhandled exceptions leads to security bypass

on 20/03/2026

Python Cryptographic Authority disclosed a bug submitted by uv3doble: https://hackerone.com/reports/3558277 [...]

See full content

Project Helix Walkthrough: Blue Team CTF

on 20/03/2026

See full content

ChatGPT For The Dark Web

on 20/03/2026

See full content

Proton Mail Shared User Information with the Police

on 20/03/2026

404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI. It’s metadata—payment information related to a particular account—but still important knowledge. This sort of thing happens, even to privacy-centric companies like Proton Mail. [...]

See full content

[Privilege Escalation] User can Pin|Unpin Any Comment on Any Project or Locale

on 20/03/2026

Mozilla disclosed a bug submitted by adilnbabras: https://hackerone.com/reports/3025797 [...]

See full content

Exposed .git/config File Leading to Potential Sensitive Information Disclosure

on 20/03/2026

curl disclosed a bug submitted by zoroo2: https://hackerone.com/reports/3612891 [...]

See full content

State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview

on 20/03/2026

See full content

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

by BrianKrebs on 20/03/2026

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets — named Aisuru, Kimwolf, JackSkid and Mossad — are responsible for a series of recent record-smashing [...]

See full content

Exploiting broken access control vulnerabilities

by Ayoub on 20/03/2026

Broken access control vulnerabilities have consistently remained at the top of the OWASP Top 10, and for a good reason. As web applications continue to grow in complexity, with the introduction of role-based access controls, multi-tenant support, and granular permission models, the likelihood of access control flaws increases significantly. Unlike other vulnerability classes that often rely on ins [...]

See full content

Add labels to arbitrary issues/prs & compromise github actions label checks

on 19/03/2026

GitHub disclosed a bug submitted by ahacker1: https://hackerone.com/reports/3527771 [...]

See full content

PATs without the required scope can leak issues

on 19/03/2026

GitHub disclosed a bug submitted by s3rdz0: https://hackerone.com/reports/3522254 [...]

See full content

Hacking a Robot Vacuum

on 19/03/2026

Someone tries to remote control his own DJI Romo vacuum, and ends up controlling 7,000 of them from all around the world. The IoT is horribly insecure, but we already knew that. [...]

See full content

Bloodhound OpenGraph

on 18/03/2026

See full content

BIG DAY TODAY

on 18/03/2026

See full content

BIG DAY TODAY

on 18/03/2026

See full content

Lack of Validation in Reward Redemption Allows Unlimited Burp Suite License Abuse

on 18/03/2026

HackerOne disclosed a bug submitted by theokeen: https://hackerone.com/reports/3378540 [...]

See full content

Meta’s AI Glasses and Privacy

on 18/03/2026

Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here. This is a technology that will exist, whether we like it or not. Meanwhile, there is a new Android app that detects when there are smart glasses nearby. [...]

See full content

HSTS accepted from HTTP origin behind HTTPS proxy

on 17/03/2026

curl disclosed a bug submitted by lg_oled77c5pua: https://hackerone.com/reports/3609505 [...]

See full content

The Importance of Forensic Soundness

on 17/03/2026

See full content

can AI eat its own tail? 🤖

on 17/03/2026

See full content

Unescaped username in SASL DIGEST-MD5 response allows injection

on 17/03/2026

curl disclosed a bug submitted by am-perip: https://hackerone.com/reports/3608522 [...]

See full content

South Korean Police Accidentally Post Cryptocurrency Wallet Password

on 17/03/2026

An expensive mistake: Someone jumped at the opportunity to steal $4.4 million in crypto assets after South Korea’s National Tax Service exposed publicly the mnemonic recovery phrase of a seized cryptocurrency wallet. The funds were stored in a Ledger cold wallet seized in law enforcement raids at 124 high-value tax evaders that resulted in confiscating digital assets worth 8.1 billion won ( [...]

See full content

Session Cookie Leakage via Static Header Field in WebViewerFragment

on 17/03/2026

LinkedIn disclosed a bug submitted by dphoeniixx: https://hackerone.com/reports/3475626 [...]

See full content

new phone who dis?

on 17/03/2026

See full content

BECOMING AN AI HACKER (Episode 01)

on 16/03/2026

See full content

Business Logic Bypass Allows Setting Read Access Role Without Pro Plan Subscription

on 16/03/2026

Lovable VDP disclosed a bug submitted by ziadmomen: https://hackerone.com/reports/3591764 [...]

See full content

Possible New Result in Quantum Factorization

on 16/03/2026

I’m skeptical about—and not qualified to review—this new result in factorization with a quantum computer, but if it’s true it’s a theoretical improvement in the speed of factoring large numbers with a quantum computer. [...]

See full content

SMB READ_ANDX DataOffset not validated

on 16/03/2026

curl disclosed a bug submitted by tavro: https://hackerone.com/reports/3603300 [...]

See full content

Unauthenticated access to private files on app.fizzy.do via Active Storage URLs leads to information disclosure

on 16/03/2026

Basecamp disclosed a bug submitted by perxibes: https://hackerone.com/reports/3467641 - Bounty: $100 [...]

See full content

Upcoming Speaking Engagements

on 14/03/2026

This is a current list of where and when I am scheduled to speak: I’m giving the Ross Anderson Lecture at the University of Cambridge’s Churchill College at 5:30 PM GMT on Thursday, March 19, 2026. I’m speaking at RSAC 2026 in San Francisco, California, USA, on Wednesday, March 25, 2026. I’m part of an event on “Canada and AI Sovereignty,” hosted by the University of Toronto’s Munk School of Glob [...]

See full content

5 Cybersecurity Books That Made Me a Better Investigator

on 13/03/2026

See full content

NahamSec Teaches Me Bug Bounty Basics

on 13/03/2026

See full content

HTTP/1.1 Must Die: Conquering the 0.CL Challenge

on 13/03/2026

Note: This is a guest post by pentester Julen Garrido Estévez (@b3xal). 1. Acknowledgements 2. Intro 3. Required tools 4. Strategy to solve/exploit the lab 5. Detecting 0.CL 5.1. Practical confirmatio [...]

See full content

Authorization Bypass in Starknet Snap via enableAuthorize parameter leads to unauthorized transaction signing

on 13/03/2026

Consensys disclosed a bug submitted by aszx87410: https://hackerone.com/reports/3507241 [...]

See full content

SQL Injection vulnerability found on ibm.com endpoint

on 12/03/2026

IBM disclosed a bug submitted by cr3ckerxploit: https://hackerone.com/reports/3578842 [...]

See full content

Curl_compareheader() fails to match multi-value HTTP headers

on 12/03/2026

curl disclosed a bug submitted by henriqueg: https://hackerone.com/reports/3598444 [...]

See full content

urlapi: off-by-one in custom scheme validation skips last character

on 12/03/2026

curl disclosed a bug submitted by otiscui: https://hackerone.com/reports/3598358 [...]

See full content

Automation without alignment: The hidden cost of modern DAST

on 12/03/2026

Register for the webinar: Burp Suite DAST x Burp Suite Professional: Better Together (Thursday, March 19 2026 16:00 UTC) I'm a firm believer that if you want to understand how secure an application re [...]

See full content

The CISO’s Dilemma: How To Scale AI Securely

by Tim Erlin on 12/03/2026

Your board wants AI. Your developers are building with it. Your budget committee is asking for an ROI timeline. But as CISO, you're the one who has to answer when the inevitable question comes up: "How do we know this is secure?" If you're like most security leaders, you're caught between two impossible positions. Say yes to AI initiatives without proper security controls, and you're responsib [...]

See full content

Bypass of Open Redirect Fix on lovable.dev via /..// Path Traversal in redirect parameter

on 12/03/2026

Lovable VDP disclosed a bug submitted by marioniangi: https://hackerone.com/reports/3599248 [...]

See full content

LIVE: On-Stream GIVEAWAY! | CTF Launch | AMA

on 12/03/2026

See full content

Hacking with permission: the rules that make it ethical

by Eleanor Barlow on 12/03/2026

Ethical hacking, often via Bug Bounty Programs or VDPs, operates within defined frameworks. These include a community Code of Conduct (CoC), setting program Rules of Engagement (RoE), and clarifying platform Terms of Service (ToS). Companies that invest in proactive security need to understand what these terms mean and the function they play in maintaining a secure and compliant program. The chall [...]

See full content

NULL Pointer Dereference (DoS) in libcurl SFTP QUOTE command parsing due to missing return statement

on 11/03/2026

curl disclosed a bug submitted by m777m0: https://hackerone.com/reports/3597359 [...]

See full content

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

by BrianKrebs on 11/03/2026

A hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker’s largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker’s main U. [...]

See full content

GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)

on 11/03/2026

See full content

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

by Tim Erlin on 11/03/2026

AI systems are no longer just isolated models responding to human prompts.  In modern production environments, they are increasingly chained together – delegating tasks, calling tools, and coordinating decisions with limited or no human oversight. Almost all that communication happens through APIs.  This shift offers enormous productivity benefits. But it has also complicated secu [...]

See full content

Six mistakes in ERC-4337 smart accounts

on 11/03/2026

Account abstraction transforms fixed “private key can do anything” models into programmable systems that enable batching, recovery and spending limits, and flexible gas payment. But that programmability introduces risks: a single bug can be as catastrophic as leaking a private key. After auditing dozens of ERC‑4337 smart accounts, we’ve identified six vulnerability patterns that frequently appear. [...]

See full content

PortSwigger X Intigriti: Burp Suite Professional licenses up for grabs with this new collaboration

on 11/03/2026

At PortSwigger, we’re always looking for ways to enable the world to secure the web, and today we’re excited to take that mission a step further. We’re pleased to announce a new collaboration bringing [...]

See full content

CVE-2026-3805: use after free in SMB connection reuse

on 11/03/2026

curl disclosed a bug submitted by rat5ak: https://hackerone.com/reports/3591944 [...]

See full content

CVE-2026-3784: wrong proxy connection reuse with credentials

on 11/03/2026

curl disclosed a bug submitted by nobcoder: https://hackerone.com/reports/3584903 [...]

See full content

CVE-2026-3783: token leak with redirect and netrc

on 11/03/2026

curl disclosed a bug submitted by spectreglobalsec: https://hackerone.com/reports/3583983 [...]

See full content

Microsoft Patch Tuesday, March 2026 Edition

by BrianKrebs on 11/03/2026

Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing “zero-day” flaws this month (compared to February’s five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Windows. Here are a few highlights from this month’s Patch Tue [...]

See full content

Intigriti collaborates with PortSwigger to support ethical hacking excellence

by Eleanor Barlow on 11/03/2026

Intigriti and PortSwigger collaborate to reward hard-working hackers Best known as the creator of Burp Suite, the industry-standard toolkit for manual web application security testing, PortSwigger is a UK-based cybersecurity company on a mission to help the world secure the web. Today, their tools are trusted by over 20,000 organizations worldwide to detect and prevent cyber threats. To further su [...]

See full content

Project Helix Blue Team CTF Teaser - Coming Wednesday!

on 10/03/2026

See full content

What turns a good hacker into a great hunter

on 10/03/2026

See full content

Connection Reuse Ignores OAuth Bearer Token Mismatch

on 10/03/2026

curl disclosed a bug submitted by sabari_n: https://hackerone.com/reports/3595753 [...]

See full content

CURLOPT_UNRESTRICTED_AUTH Dangerous Default Documentation Gap

on 10/03/2026

curl disclosed a bug submitted by sabari_n: https://hackerone.com/reports/3595764 [...]

See full content

Uncovering agent logging gaps in Copilot Studio

on 10/03/2026

During research, we sometimes encounter scenarios that remind us that it's a good idea to trust but verify. In September 2025, we noticed that certain Microsoft Copilot Studio agent settings did not log certain administrative actions related to sharing, authentication, logging, and publication of Copilot Studio agents. [...]

See full content

Arbitrary Code Execution via Scanner Bypass in **aws-diagram-mcp-server** `exec()` Namespace

on 09/03/2026

AWS VDP disclosed a bug submitted by locus-x64: https://hackerone.com/reports/3557138 [...]

See full content

Users can change project visibility which requires high subscription by just changing request body

on 09/03/2026

Lovable VDP disclosed a bug submitted by hossam25: https://hackerone.com/reports/3370430 [...]

See full content

An Interview with Allie Mellen (author: CODE WAR)

on 09/03/2026

See full content

LM Challenge-Response Hash Always Sent in SMB Authentication

on 09/03/2026

curl disclosed a bug submitted by brewm4ster: https://hackerone.com/reports/3584491 [...]

See full content

Was This Vulnerability Worth $15,000?

on 09/03/2026

See full content

Behind the console: Active phishing campaign targeting AWS console credentials

on 09/03/2026

Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS Console credentials via typosquatted domains that mimic AWS infrastructure. [...]

See full content

How AI Assistants are Moving the Security Goalposts

by BrianKrebs on 08/03/2026

AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priori [...]

See full content

In curl's SASL OAUTHBEARER authentication, including the SOH character (0x01) in the username corrupts the message structure.

on 08/03/2026

curl disclosed a bug submitted by y_security: https://hackerone.com/reports/3584865 [...]

See full content

What is inter tenant IDOR and why bug bounty hunters should care

on 08/03/2026

See full content

Injection in path parameter of Ingress-nginx

on 07/03/2026

Kubernetes disclosed a bug submitted by fisjkars: https://hackerone.com/reports/2701701 [...]

See full content

Hardware Hacking 101: with a custom physical kit!

on 07/03/2026

See full content

The Payload Podcast #003

on 06/03/2026

See full content

Catch us chillin' at The Hive during RSA. 🐝

on 06/03/2026

See full content

IDOR to make someone attend or leave an event

on 06/03/2026

LinkedIn disclosed a bug submitted by safehacker_2715: https://hackerone.com/reports/1734639 [...]

See full content

Blocking a company page admin prevents him from delete paid media admin or edit his roles

on 05/03/2026

LinkedIn disclosed a bug submitted by riadalrashed: https://hackerone.com/reports/2339192 [...]

See full content

Open Redirect on lovable.dev via redirect parameter leads to phishing attacks

on 05/03/2026

Lovable VDP disclosed a bug submitted by jdc94: https://hackerone.com/reports/3581815 [...]

See full content

DoS via Unbounded Memory Allocation in sendWebStream on Fastify v5.7.0+ leads to OOM crash when backpressure is ignored

on 05/03/2026

Fastify disclosed a bug submitted by onlybugs05: https://hackerone.com/reports/3524779 [...]

See full content

LIVE: 🕵️ Memory Forensics | Blue Cape | Cybersecurity

on 05/03/2026

See full content

Missing Access Control in MigrationFile allows attacker to upload files to any Migration

on 05/03/2026

GitHub disclosed a bug submitted by ahacker1: https://hackerone.com/reports/3506183 [...]

See full content

Security-driven Rapid Release - Pwn2Own Documentary (Part 4)

on 04/03/2026

See full content

crypto scammers phish with physical mail

on 04/03/2026

See full content

SSTI leads to Command injection

on 04/03/2026

curl disclosed a bug submitted by errorbehavior200: https://hackerone.com/reports/3584149 [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Schneier on Security
  4. Krebs on Security
  5. Google Online Security Blog
  6. $BLOG_TITLE
  7. Agarri : Sécurité informatique offensive
  8. Alex Chapman's Blog
  9. www.alphabot.com
  10. ziot
  11. Bug Bounty Reports Explained
  12. Bugcrowd
  13. cat ~/footstep.ninja/blog.txt
  14. Ezequiel Pereira
  15. HackerOne
  16. surajdisoja.me
  17. InsiderPhD
  18. Intigriti
  19. John Hammond
  20. LiveOverflow
  21. NahamSec
  22. PortSwigger Blog
  23. Rana Khalil
  24. Richard’s Infosec blog
  25. Ron Chan
  26. ropnop blog
  27. STÖK
  28. Sun Knudsen
  29. The Cyber Mentor
  30. The unofficial HackerOne disclosure timeline
  31. The XSS Rat
  32. TomNomNom
  33. Wallarm