CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE
https://ift.tt/Xdiwxcb
Submitted April 23, 2026 at 11:57PM by TakesThisSeriously
via reddit https://ift.tt/zjgPDWi
https://ift.tt/Xdiwxcb
Submitted April 23, 2026 at 11:57PM by TakesThisSeriously
via reddit https://ift.tt/zjgPDWi
Nefariousplan
CVE-2026-34621 Revisited: The 136-Day Detection Lie
On November 28, 2025, someone uploaded a PDF to VirusTotal. The filename was Invoice540.pdf. Thirteen of sixty-four antivirus engines flagged it. The other fifty-one saw a document.
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain ...
https://ift.tt/XAsOaHu
Submitted April 24, 2026 at 04:10AM by ApprehensiveEssay222
via reddit https://ift.tt/udhyLoK
https://ift.tt/XAsOaHu
Submitted April 24, 2026 at 04:10AM by ApprehensiveEssay222
via reddit https://ift.tt/udhyLoK
Socket
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain ...
Bitwarden CLI 2026.4.0 was compromised in the Checkmarx supply chain campaign after attackers abused a GitHub Action in Bitwarden’s CI/CD pipeline.
UK Biobank Health Data of 500K Listed for Sale in China
https://ift.tt/jqJuIAs
Submitted April 24, 2026 at 03:59AM by QuantumQuicksilver
via reddit https://ift.tt/Uki2ngA
https://ift.tt/jqJuIAs
Submitted April 24, 2026 at 03:59AM by QuantumQuicksilver
via reddit https://ift.tt/Uki2ngA
Verity
Verity - UK Biobank Health Data of 500K Listed for Sale in China
The U.K. government confirmed on Thursday that anonymized health data from UK Biobank had been found listed for sale on Xianyu, a Chinese e-commerce platform owned by Alibaba. Three separate listin...
Why Pure-LLM CTFs Don't Work: A Hybrid Architecture for AI Security Challenges
https://ift.tt/shqpeRL
Submitted April 24, 2026 at 07:35AM by harbinger-alpha
via reddit https://ift.tt/KmBk8so
https://ift.tt/shqpeRL
Submitted April 24, 2026 at 07:35AM by harbinger-alpha
via reddit https://ift.tt/KmBk8so
Wraith
Why Pure-LLM CTFs Don't Work: A Hybrid Architecture for AI Security Challenges
Pure-LLM CTFs are unreliable because model alignment training fights your characters. Pure-deterministic CTFs teach pattern matching, not attack patterns. Here's the hybrid approach the Wraith Academy uses, and why it took a few iterations to get there.
Fixing the Exploit Didn’t Fix the System: An Exploration of Trust Boundaries
https://ift.tt/ldYX54b
Submitted April 24, 2026 at 08:29AM by iamnotafermiparadox
via reddit https://ift.tt/sD5rkxA
https://ift.tt/ldYX54b
Submitted April 24, 2026 at 08:29AM by iamnotafermiparadox
via reddit https://ift.tt/sD5rkxA
Substack
The Internal Tool We All Build
Introduction: Why This Exists
What Really Happened In There? A Tamper-Evident Audit Trail for AI Agents
https://ift.tt/w1cXkSF
Submitted April 24, 2026 at 03:03PM by Remote_Parsnip_5827
via reddit https://ift.tt/qfNJSdK
https://ift.tt/w1cXkSF
Submitted April 24, 2026 at 03:03PM by Remote_Parsnip_5827
via reddit https://ift.tt/qfNJSdK
nono.sh
What Really Happened In There? A Tamper-Evident Audit Trail for AI Agents
How nono records every action an AI agent makes in an append-only Merkle tree the agent itself cannot reach, and lets anyone verify after the fact — with cryptographic proof — that the record was not forged, edited, or truncated.
ShinyHunters Claims Sale of Anthropic Claude Mythos AI Model Data and Internal Documents
https://ift.tt/tTPphJf
Submitted April 24, 2026 at 06:14PM by m00s3c
via reddit https://ift.tt/pNJ3qPk
https://ift.tt/tTPphJf
Submitted April 24, 2026 at 06:14PM by m00s3c
via reddit https://ift.tt/pNJ3qPk
BreachNews
ShinyHunters Claims Sale of Anthropic Claude Mythos AI Model Data and Internal Documents | BreachNews
ShinyHunters claims sale of Anthropic Claude Mythos AI model data, including internal documents and alleged system access.
Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes
https://ift.tt/PEc2bpd
Submitted April 24, 2026 at 07:50PM by LostPrune2143
via reddit https://ift.tt/28A7iul
https://ift.tt/PEc2bpd
Submitted April 24, 2026 at 07:50PM by LostPrune2143
via reddit https://ift.tt/28A7iul
blog.barrack.ai
Cohere, OpenAI, and the broken sandbox problem | Barrack AI
Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532) are two instances of the same industry-wide failure: sandboxes built to contain LLM-generated code that can't actually contain it. A cross-CVE breakdown, the Pyodide architecture problem…
Bitwarden CLI compromesso: attacco supply chain viola npm Trusted Publishing
https://ift.tt/V9wyx7k
Submitted April 24, 2026 at 10:17PM by Street_Grab7609
via reddit https://ift.tt/2DoFtUv
https://ift.tt/V9wyx7k
Submitted April 24, 2026 at 10:17PM by Street_Grab7609
via reddit https://ift.tt/2DoFtUv
www.deafnews.it
Bitwarden CLI compromesso: attacco supply chain viola npm Trusted Publishing
Bitwarden CLI v2026.4.0 compromesso in attacco supply chain: rubate credenziali e token. Primo caso documentato di violazione di npm Trusted Publishing: ecco c…
Backdoor FIRESTARTER: CISA aggiorna la direttiva dopo violazione federale
https://ift.tt/8yduwFe
Submitted April 24, 2026 at 10:03PM by Street_Grab7609
via reddit https://ift.tt/rY6fvno
https://ift.tt/8yduwFe
Submitted April 24, 2026 at 10:03PM by Street_Grab7609
via reddit https://ift.tt/rY6fvno
www.deafnews.it
Backdoor FIRESTARTER: CISA aggiorna la direttiva dopo violazione federale
CISA aggiorna l'Emergency Directive 25-03 dopo il ritrovamento del malware FIRESTARTER su dispositivi Cisco. Violazione persistita da settembre 2025 a marzo 20…
UNC6692: nuova minaccia Teams colpisce decisori aziendali
https://ift.tt/Yl2gE8Z
Submitted April 24, 2026 at 10:02PM by Street_Grab7609
via reddit https://ift.tt/Ksn01QJ
https://ift.tt/Yl2gE8Z
Submitted April 24, 2026 at 10:02PM by Street_Grab7609
via reddit https://ift.tt/Ksn01QJ
www.deafnews.it
UNC6692: nuova minaccia Teams colpisce decisori aziendali
Il cluster UNC6692 usa email bombing e impersonazione helpdesk su Teams per distribuire la suite malware SNOW. Il 77% dei target sono dipendenti senior. Ecco c…
App UE verifica età hackerata in 2 minuti: il gap tra promesse e realtà
https://ift.tt/PVDuCKf
Submitted April 24, 2026 at 09:54PM by Street_Grab7609
via reddit https://ift.tt/ZC7j8Tq
https://ift.tt/PVDuCKf
Submitted April 24, 2026 at 09:54PM by Street_Grab7609
via reddit https://ift.tt/ZC7j8Tq
www.deafnews.it
App UE verifica età hackerata in 2 minuti: il gap tra promesse e realtà
L'app europea per la verifica dell'età online, presentata come soluzione definitiva, è stata hackerata in 2 minuti. Ecco le vulnerabilità emerse e i rischi per…
Exploit su LMDeploy CVE-2026-33626: attacco SSRF immediato dopo disclosure
https://ift.tt/ESdUai1
Submitted April 24, 2026 at 09:50PM by Street_Grab7609
via reddit https://ift.tt/9ucxhGI
https://ift.tt/ESdUai1
Submitted April 24, 2026 at 09:50PM by Street_Grab7609
via reddit https://ift.tt/9ucxhGI
www.deafnews.it
Exploit su LMDeploy CVE-2026-33626: attacco SSRF immediato dopo disclosure
Rilevato exploit su LMDeploy CVE-2026-33626 a soli 12 ore e 31 minuti dal disclosure. L'attacco da IP 103.116.72.119 ha sfruttato una SSRF nella funzione load_…
Media player pivot: How I got back into my own server
https://addadi.github.io/2026/04/17/how-i-hacked-back-into-my-server-through-a-media-player/
Submitted April 25, 2026 at 01:14AM by addadi
via reddit https://ift.tt/TsUbtka
https://addadi.github.io/2026/04/17/how-i-hacked-back-into-my-server-through-a-media-player/
Submitted April 25, 2026 at 01:14AM by addadi
via reddit https://ift.tt/TsUbtka
addadi
How I Hacked Back Into My Server Through a Media Player
A headless Arch server, a kernel update gone wrong, no physical access, and the most creative use of a Jellyfin plugin I’ve ever seen.
Detect Shulfar Malware Encrypted TCP C&C Traffic Using PacketSmith Yara-X Detection Module
https://ift.tt/hICHTyi
Submitted April 25, 2026 at 02:12AM by MFMokbel
via reddit https://ift.tt/AuhZYzx
https://ift.tt/hICHTyi
Submitted April 25, 2026 at 02:12AM by MFMokbel
via reddit https://ift.tt/AuhZYzx
I put Qwen3.5-9B inside Kali and let it target some Windows machines. Thoughts? Ideas? Opinions? Thanks!
https://ift.tt/qF0wgE2
Submitted April 25, 2026 at 06:33AM by sqeak
via reddit https://ift.tt/6WHQZ3I
https://ift.tt/qF0wgE2
Submitted April 25, 2026 at 06:33AM by sqeak
via reddit https://ift.tt/6WHQZ3I
Thepatrickfisher
Can Qwen3.5 9B Running Locally Hack an Old Machine? · Patrick Fisher
Patrick Fisher — SRE, DevOps, and Systems Engineer.
STIX Visualizer — Threat Intelligence Graph Explorer
https://ift.tt/pJzrLS7
Submitted April 25, 2026 at 09:12AM by Techmad99
via reddit https://ift.tt/hWpcnvS
https://ift.tt/pJzrLS7
Submitted April 25, 2026 at 09:12AM by Techmad99
via reddit https://ift.tt/hWpcnvS
CyberNetSec.io
STIX Visualizer — Threat Intelligence Graph Explorer
Explore STIX 2.1 threat intelligence bundles as interactive relationship graphs. Visualise threat actors, malware, campaigns, and attack patterns linked by relationships. Powered by CyberNetSec.io.
Large-scale security audit of 1,764 "vibe-coded" apps: 7% have wide-open Supabase DBs, 15% of Bolt apps ship hardcoded API keys, plus IDOR and zero-auth APIs
https://ift.tt/ojviFSX
Submitted April 25, 2026 at 01:56PM by Most_Ad_394
via reddit https://ift.tt/4Lt2BgY
https://ift.tt/ojviFSX
Submitted April 25, 2026 at 01:56PM by Most_Ad_394
via reddit https://ift.tt/4Lt2BgY
securityscanner.dev
State of Vibe-Coded Security — Q2 2026
1,766 apps scanned. 457 CRITs. 7% of Lovable/Bolt apps have wide-open databases. YC companies: 0%.
Comprehensive ransomware guide: How attacks work, real cases (WannaCry, Colonial Pipeline, Kaseya), and actual protection strategies
https://ift.tt/UNV0pBG
Submitted April 25, 2026 at 04:29PM by Beneficial-Spend-471
via reddit https://ift.tt/7XrkKfN
https://ift.tt/UNV0pBG
Submitted April 25, 2026 at 04:29PM by Beneficial-Spend-471
via reddit https://ift.tt/7XrkKfN
ExamineIP -
You click a link. Your screen locks. A timer counts down: “Pay $5,000 in Bitcoin or lose everything.” - ExamineIP
This is ransomware — malware that encrypts your files and demands payment to unlock them. Hospitals, schools, businesses, and regular people lose billions annually to these attacks. The worst part? Paying doesn't guarantee you'll get your files back. Here's…
Attempting to evade an AI SOC with offensive agents
https://ift.tt/BDibadO
Submitted April 25, 2026 at 09:19PM by Pitiful_Table_1870
via reddit https://ift.tt/HvLtX5s
https://ift.tt/BDibadO
Submitted April 25, 2026 at 09:19PM by Pitiful_Table_1870
via reddit https://ift.tt/HvLtX5s
Vulnetic.ai
The AI Hacking Agent
AI penetration testing agent that conducts professional-level security assessments. Autonomous exploitation, reconnaissance, and reporting with the expertise of experienced pentesters.