7-day intensive for security professionals looking to upskill on securing frontier AI systems (Apr 20-26 | Singapore)
https://aisb.dev
Submitted March 4, 2026 at 01:06PM by POPTARTdoesTAEKWONDO
via reddit https://ift.tt/sujIX6W
https://aisb.dev
Submitted March 4, 2026 at 01:06PM by POPTARTdoesTAEKWONDO
via reddit https://ift.tt/sujIX6W
aisb.dev
AI Security Bootcamp
A 7-day intensive program for security professionals shaping how we secure emerging AI systems.
Using Zeek with AWS Traffic Mirroring and Kafka
https://ift.tt/nwb5RXz
Submitted March 4, 2026 at 03:14PM by awlzl
via reddit https://ift.tt/xm2yfBY
https://ift.tt/nwb5RXz
Submitted March 4, 2026 at 03:14PM by awlzl
via reddit https://ift.tt/xm2yfBY
A single operator with basic skills used an open-source AI platform to breach 600+ FortiGate devices across 55 countries. No zero-days. Just weak passwords and an AI copilot. Full breakdown of CyberStrikeAI, the developer's MSS ties, and all 21 server IOCs.
https://ift.tt/E1RP4Ls
Submitted March 4, 2026 at 06:47PM by LostPrune2143
via reddit https://ift.tt/CHRsn5D
https://ift.tt/E1RP4Ls
Submitted March 4, 2026 at 06:47PM by LostPrune2143
via reddit https://ift.tt/CHRsn5D
blog.barrack.ai
CyberStrikeAI: the AI Attack Platform Behind the 600+ FortiGate Breach | Barrack.ai
An open-source AI offensive security platform, built by a developer with ties to China's MSS, was used in a campaign that compromised 600+ FortiGate devices across 55 countries. Full technical breakdown.
Built a header echo + TLS interception detector to score ISP-level surveillance — looking for feedback on the methodology
https://ift.tt/bKjISwl
Submitted March 5, 2026 at 04:47AM by Beneficial-Jelly3365
via reddit https://ift.tt/0WP9iVE
https://ift.tt/bKjISwl
Submitted March 5, 2026 at 04:47AM by Beneficial-Jelly3365
via reddit https://ift.tt/0WP9iVE
ismyispspying.com
Is My ISP Spying? — Free Privacy Test
Test for supercookies, header injection, DNS hijacking, and TLS interception in seconds.
Your Duolingo Is Talking to ByteDance: Cracking the Pangle SDK's Encryption
https://ift.tt/IdwMsLZ
Submitted March 5, 2026 at 06:32AM by AdTemporary2475
via reddit https://ift.tt/z3woxet
https://ift.tt/IdwMsLZ
Submitted March 5, 2026 at 06:32AM by AdTemporary2475
via reddit https://ift.tt/z3woxet
Buchodi's Threat Intel
Your Duolingo Is Talking to ByteDance: Cracking the Pangle SDK's Encryption
When you open Duolingo to practice Spanish, BeReal to share a photo, or Character.AI to chat with a bot, you probably don't expect your battery level, storage capacity, and internal IP address to be sent to ByteDance, the company behind TikTok.
But that's…
But that's…
Normalized Certificate Transparency logs as a daily JSON dataset
https://ift.tt/1Dh4QkJ
Submitted March 5, 2026 at 07:44AM by heffmann
via reddit https://ift.tt/6dEOVzg
https://ift.tt/1Dh4QkJ
Submitted March 5, 2026 at 07:44AM by heffmann
via reddit https://ift.tt/6dEOVzg
hefftools.dev
ct-cert-feed
Bulk download normalized Certificate Transparency (CT) log snapshots as deterministic daily JSON.
we at codeant found a bug in pac4j-jwt (auth bypass)
https://ift.tt/ce0B6x4
Submitted March 5, 2026 at 01:01PM by charankmed
via reddit https://ift.tt/rTg3zsX
https://ift.tt/ce0B6x4
Submitted March 5, 2026 at 01:01PM by charankmed
via reddit https://ift.tt/rTg3zsX
www.codeant.ai
Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key
CodeAnt AI found a critical authentication bypass in pac4j-jwt where an attacker can impersonate any user using only the RSA public key. Full PoC and disclosure.
How I automated a full recon → secrets scan → cloud misconfiguration pipeline without writing a single parser
https://ift.tt/z1JpZA3
Submitted March 5, 2026 at 06:26PM by Deep-Bandicoot-7090
via reddit https://ift.tt/hd1S7It
https://ift.tt/z1JpZA3
Submitted March 5, 2026 at 06:26PM by Deep-Bandicoot-7090
via reddit https://ift.tt/hd1S7It
ShipSec Studio
ShipSec Studio | No-Code Security Automation Platform
Build reliable security workflows without code. Visual automation, Temporal-powered execution, and AI assistance.
2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks to Real-World Risk
https://ift.tt/YtKUj08
Submitted March 5, 2026 at 07:18PM by guedou
via reddit https://ift.tt/1JINYDX
https://ift.tt/YtKUj08
Submitted March 5, 2026 at 07:18PM by guedou
via reddit https://ift.tt/1JINYDX
GitGuardian Blog - Take Control of Your Secrets Security
2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks to Real-World Risk
GitGuardian partnered with Google to answer: what happens when private keys leak? Using Certificate Transparency, we mapped about 1M leaked keys to 140k certificates. Result: 2,622 were valid as of September 2025, exposing major organizations. Our disclosure…
YGGtorrent — Fin de partie [French]
https://yggleak.top/fr/home/ygg-dossier
Submitted March 5, 2026 at 06:47PM by moviuro
via reddit https://ift.tt/xutqUS8
https://yggleak.top/fr/home/ygg-dossier
Submitted March 5, 2026 at 06:47PM by moviuro
via reddit https://ift.tt/xutqUS8
yggleak.top
YGGtorrent — Fin de partie — YGGLeak
Exposer ce qui devrait l'etre.
HPD (Hex Packet Decoder) now have AI feature – looking for feedback
https://hpd.gasmi.net
Submitted March 5, 2026 at 08:22PM by Secure-Ad2104
via reddit https://ift.tt/9sWdBjZ
https://hpd.gasmi.net
Submitted March 5, 2026 at 08:22PM by Secure-Ad2104
via reddit https://ift.tt/9sWdBjZ
hpd.gasmi.net
Hex Packet Decoder
Network packet decoder
Credential Protection for AI Agents: The Phantom Token Pattern
https://ift.tt/HY92zfq
Submitted March 5, 2026 at 10:27PM by DecodeBytes
via reddit https://ift.tt/y7q2ZMX
https://ift.tt/HY92zfq
Submitted March 5, 2026 at 10:27PM by DecodeBytes
via reddit https://ift.tt/y7q2ZMX
nono.sh
nono - Next-Generation Agent Security
Kernel-enforced isolation, network filtering, immutable auditing, and atomic rollbacks for AI agents - built into the nono CLI and native SDKs.
Model Context Protocol (MCP) Authentication and Authorization
https://ift.tt/89NkIO0
Submitted March 6, 2026 at 06:13PM by nibblesec
via reddit https://ift.tt/Qz8dgIr
https://ift.tt/89NkIO0
Submitted March 6, 2026 at 06:13PM by nibblesec
via reddit https://ift.tt/Qz8dgIr
Doyensec
The MCP AuthN/Z Nightmare
This article shares our perspective on the current state of authentication and authorization in enterprise-ready, remote MCP server deployments.
Hardening Firefox with Anthropic’s Red Team
https://ift.tt/TRNzgfE
Submitted March 6, 2026 at 07:57PM by evilpies
via reddit https://ift.tt/y8Yid0k
https://ift.tt/TRNzgfE
Submitted March 6, 2026 at 07:57PM by evilpies
via reddit https://ift.tt/y8Yid0k
The Mozilla Blog
An emerging technique, pressure-tested by Firefox engineers
For more than two decades, Firefox has been one of the most scrutinized and security-hardened codebases on the web. Open source means our code is visible,
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets
https://ift.tt/afAYxXi
Submitted March 7, 2026 at 04:12AM by maurosoria
via reddit https://ift.tt/Yk14PAt
https://ift.tt/afAYxXi
Submitted March 7, 2026 at 04:12AM by maurosoria
via reddit https://ift.tt/Yk14PAt
blog.calif.io
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets
A step-by-step guide to exploiting a 20-year-old bug in the Linux kernel to achieve full privilege escalation and container escape, plus a cool bug-hunting heuristic.
We (at Tachyon) found an auth bypass in MLflow
https://ift.tt/vRtrLQs
Submitted March 7, 2026 at 05:13AM by securely-vibe
via reddit https://ift.tt/NZYEG96
https://ift.tt/vRtrLQs
Submitted March 7, 2026 at 05:13AM by securely-vibe
via reddit https://ift.tt/NZYEG96
tachyon.so
CVE-2025-14297: MLflow Authorization Bypass | Tachyon Blog
How Tachyon's autonomous security researcher found an authorization bypass in the open-source MLflow tracking server by reasoning across protocols and surfaces—and why this class of bug is so hard to catch.
Need feedback from security specialists
https://ift.tt/fDL42mq
Submitted March 7, 2026 at 05:58AM by Witty-Passenger5391
via reddit https://ift.tt/qhX7jzE
https://ift.tt/fDL42mq
Submitted March 7, 2026 at 05:58AM by Witty-Passenger5391
via reddit https://ift.tt/qhX7jzE
38 researchers red-teamed AI agents for 2 weeks. Here's what broke. (Agents of Chaos, Feb 2026)AI Security
https://ift.tt/dFJ4BmN
Submitted March 7, 2026 at 01:32PM by Kind-Release-3817
via reddit https://ift.tt/cb5swfj
https://ift.tt/dFJ4BmN
Submitted March 7, 2026 at 01:32PM by Kind-Release-3817
via reddit https://ift.tt/cb5swfj
arXiv.org
Agents of Chaos
We report an exploratory red-teaming study of autonomous language-model-powered agents deployed in a live laboratory environment with persistent memory, email accounts, Discord access, file...