OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554)
https://ift.tt/jFiHvxo
Submitted March 19, 2026 at 07:14PM by MegaManSec2
via reddit https://ift.tt/k6rIQGu
https://ift.tt/jFiHvxo
Submitted March 19, 2026 at 07:14PM by MegaManSec2
via reddit https://ift.tt/k6rIQGu
AISLE
OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554)
The AISLE analyzer discovered a high-severity vulnerability that enables SQL injection in OpenSIPS, a pillar of global communications used by over ...
BYOUD - Bring Your Own Unwind Data - By KlezVirus
https://klezvirus.github.io/posts/Byoud/
Submitted March 19, 2026 at 06:58PM by R3dCr0wn
via reddit https://ift.tt/BsZV7fM
https://klezvirus.github.io/posts/Byoud/
Submitted March 19, 2026 at 06:58PM by R3dCr0wn
via reddit https://ift.tt/BsZV7fM
klezVirus
Fantastic unwind information and where to find them
Foreword
I built a zero-knowledge CLI password manager from scratch. AES-256-GCM, Argon2id, 22 secret types, MCP support....
https://aaravmaloo.github.io/apm
Submitted March 19, 2026 at 06:46PM by aaravmaloo
via reddit https://ift.tt/l3DFnu6
https://aaravmaloo.github.io/apm
Submitted March 19, 2026 at 06:46PM by aaravmaloo
via reddit https://ift.tt/l3DFnu6
aaravmaloo.github.io
APM Documentation
Documentation for APM — a professional-grade, zero-knowledge CLI password manager.
Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
https://ift.tt/9UPyCfX
Submitted March 19, 2026 at 09:02PM by theMiddleBlue
via reddit https://ift.tt/qXNCHPT
https://ift.tt/9UPyCfX
Submitted March 19, 2026 at 09:02PM by theMiddleBlue
via reddit https://ift.tt/qXNCHPT
Sicuranext Blog
Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
WordPress plugin "Profile Builder Pro" (versions before 3.14.5) is susceptible to Unauthenticated PHP Object Injection. In this blog post, we discuss how we discovered and exploited the vulnerability using a novel POP chain, how AI helped in the process,…
Roundcube Webmail: three more sanitizer bypasses enable email tracking and phishing
https://ift.tt/bmZEs7U
Submitted March 19, 2026 at 02:08AM by [deleted]
via reddit https://ift.tt/O34fKgo
https://ift.tt/bmZEs7U
Submitted March 19, 2026 at 02:08AM by [deleted]
via reddit https://ift.tt/O34fKgo
NULL CATHEDRAL
Roundcube round two: three more sanitizer bypasses
Three more bypasses in Roundcube's HTML sanitizer: SMIL animation attributes load remote resources, unquoted body backgrounds enable CSS injection, and position:fixed !important enables phishing overlays.
we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius.
https://ift.tt/uCdXMEG
Submitted March 19, 2026 at 11:16PM by tobywilmox
via reddit https://ift.tt/pnLA0iX
https://ift.tt/uCdXMEG
Submitted March 19, 2026 at 11:16PM by tobywilmox
via reddit https://ift.tt/pnLA0iX
www.periphery.security
CVE-2026-33155 - 40 Bytes to Chaos - Periphery
CVE-2026-33155 - 40 Bytes to Chaos - Read the latest insights from Periphery on securing AI hardware, embedded systems, and critical infrastructure.
Sandboxing AI coding agents with kernel-level enforcement: built-in profiles for Claude Code, Codex, and OpenCode
https://ift.tt/TGNVnte
Submitted March 19, 2026 at 10:34PM by Remote_Parsnip_5827
via reddit https://ift.tt/3ApdLiV
https://ift.tt/TGNVnte
Submitted March 19, 2026 at 10:34PM by Remote_Parsnip_5827
via reddit https://ift.tt/3ApdLiV
nono.sh
How to Build nono Sandbox Profiles for AI Agents
Learn how to use nono learn, policy, and profile commands to build production-ready sandbox profiles for AI agents like Claude Code.
22 security advisories covering AI/ML infrastructure: 40 CVEs, 94 Sigma detection rules (MLflow, vLLM, PyTorch, Flowise, MCP servers, LangGraph, HuggingFace tooling)
https://ift.tt/KpRWndA
Submitted March 20, 2026 at 01:07AM by cyberamyntas
via reddit https://ift.tt/CapgrWA
https://ift.tt/KpRWndA
Submitted March 20, 2026 at 01:07AM by cyberamyntas
via reddit https://ift.tt/CapgrWA
raxe.ai
RAXE — Runtime AI Security Platform
Runtime AI security across network, host, and application layers. 1,000+ threat signatures with 100% local processing — zero data leaves your environment.
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs
https://ift.tt/HrkBAY6
Submitted March 20, 2026 at 01:53AM by dx7r__
via reddit https://ift.tt/Hs0QhSo
https://ift.tt/HrkBAY6
Submitted March 20, 2026 at 01:53AM by dx7r__
via reddit https://ift.tt/Hs0QhSo
watchTowr Labs
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE)
A long, long time ago, in a land free of binary exploit mitigations, when Unix still roamed the Earth, there lived a pre-authentication Telnetd vulnerability.
In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than…
In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than…
Building a simple GRC tool for startups — what I learned so far
https://ift.tt/qzsZvp6
Submitted March 20, 2026 at 09:47AM by thehgtech
via reddit https://ift.tt/p2OAISi
https://ift.tt/qzsZvp6
Submitted March 20, 2026 at 09:47AM by thehgtech
via reddit https://ift.tt/p2OAISi
Thehgtech
Enterprise GRC Gap Analysis | ISO 27001 & NIST CSF 2.0 Readiness
Free, offline-first GRC engine. Generate gap analysis for ISO 27001, NIST CSF 2.0, and CIS v8 instantly.
I built a time-based encryption algorithm where the key changes every second — try it live
https://piyush-mishra-00.github.io/Kaalka-Encryption-Algorithm/
Submitted March 20, 2026 at 02:27PM by Consistent-Ruin1868
via reddit https://ift.tt/fiJPX5j
https://piyush-mishra-00.github.io/Kaalka-Encryption-Algorithm/
Submitted March 20, 2026 at 02:27PM by Consistent-Ruin1868
via reddit https://ift.tt/fiJPX5j
Reddit
From the netsec community on Reddit: I built a time-based encryption algorithm where the key changes every second — try it live
Posted by Consistent-Ruin1868 - 0 votes and 1 comment
Lookout's LLM-assistance findings in DarkSword iOS exploit kit: a source-by-source breakdown of what each research team actually said
https://ift.tt/xpkCfNw
Submitted March 20, 2026 at 08:11PM by LostPrune2143
via reddit https://ift.tt/yVexO0n
https://ift.tt/xpkCfNw
Submitted March 20, 2026 at 08:11PM by LostPrune2143
via reddit https://ift.tt/yVexO0n
blog.barrack.ai
DarkSword and the LLM Question: What Every Outlet Mentioned but Nobody Wrote About | Barrack AI
Eight outlets reported signs of LLM-assisted code in the DarkSword iOS exploit kit. None wrote the standalone analysis. This is that piece. A deep dive into Lookout's findings, prior art, and what it means for mobile threat landscape.
Claude Code workspace trust dialog bypass via repository settings loading order [CVE-2026-33068, CVSS 7.7]. Settings resolved before trust dialog shown.
https://ift.tt/r8YQjKI
Submitted March 20, 2026 at 11:10PM by cyberamyntas
via reddit https://ift.tt/xNzMqUG
https://ift.tt/r8YQjKI
Submitted March 20, 2026 at 11:10PM by cyberamyntas
via reddit https://ift.tt/xNzMqUG
RAXE
RAXE-2026-040: Claude Code Workspace Trust Dialog Bypass via Repository Settings (CVE-2026-33068) | RAXE Labs
A high-severity configuration loading order defect (`CVE-2026-33068`, CVSS v4.0 7.7 HIGH) in Anthropic's Claude Code CLI tool allows a malicious repository to bypass the workspace trust confirmation dialog.
Attack surface analysis of 5,121 MCP servers: 555 have toxic data flows where safe tools combine into dangerous paths
https://ift.tt/U2qwPsM
Submitted March 21, 2026 at 02:03AM by Kind-Release-3817
via reddit https://ift.tt/N0qGv3M
https://ift.tt/U2qwPsM
Submitted March 21, 2026 at 02:03AM by Kind-Release-3817
via reddit https://ift.tt/N0qGv3M
agentseal.org
AgentSeal - AI Agent Security Scanner
Break your AI agents before someone else does. Security scanning for system prompts, MCP servers, and AI coding agents.
Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets Attackers
https://ift.tt/hYKBoPI
Submitted March 21, 2026 at 10:31AM by ScottContini
via reddit https://ift.tt/xkBfM4w
https://ift.tt/hYKBoPI
Submitted March 21, 2026 at 10:31AM by ScottContini
via reddit https://ift.tt/xkBfM4w
Socket
Trivy Under Attack Again: Widespread GitHub Actions Tag Comp...
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.
Evaluating AI and ML in Network Security: A Comprehensive Literature Review
https://ift.tt/J9P4BCn
Submitted March 21, 2026 at 11:09AM by dondusi
via reddit https://ift.tt/cYhKaB2
https://ift.tt/J9P4BCn
Submitted March 21, 2026 at 11:09AM by dondusi
via reddit https://ift.tt/cYhKaB2
ONNX Hub silent=True suppresses all trust verification, enabling supply chain attacks on ML model loading (CVE-2026-28500, CVSS 9.1, no patch available)
https://ift.tt/beVNqXa
Submitted March 22, 2026 at 02:26AM by cyberamyntas
via reddit https://ift.tt/x3bpoF8
https://ift.tt/beVNqXa
Submitted March 22, 2026 at 02:26AM by cyberamyntas
via reddit https://ift.tt/x3bpoF8
RAXE
RAXE-2026-039: ONNX Hub Silent Security Warning Bypass Enables Supply Chain Attacks (CVE-2026-28500) | RAXE Labs
A critical security control bypass in the ONNX (Open Neural Network Exchange) Python library allows the `onnx.hub.load()` function's `silent=True` parameter to suppress all trust verification warnings and user confirmation prompts, enabling silent loading…
LLVM Adventures: Fuzzing Apache Modules
https://ift.tt/7N8qHAf
Submitted March 22, 2026 at 03:26AM by pwntheplanet
via reddit https://ift.tt/gvX15P3
https://ift.tt/7N8qHAf
Submitted March 22, 2026 at 03:26AM by pwntheplanet
via reddit https://ift.tt/gvX15P3
( ͡◕ _ ͡◕)👌
LLVM Adventures: Fuzzing Apache Modules
Agent skill marketplace supply chain attack: 121 skills across 7 repos vulnerable to GitHub username hijacking, 5 scanners disagree by 10x on malicious skill rates (arXiv:2603.16572)
https://ift.tt/igFfL2S
Submitted March 22, 2026 at 11:11AM by cyberamyntas
via reddit https://ift.tt/n4s1PuJ
https://ift.tt/igFfL2S
Submitted March 22, 2026 at 11:11AM by cyberamyntas
via reddit https://ift.tt/n4s1PuJ
RAXE
Research Radar #2: 2026-03-22 | RAXE Labs
RAXE Research Radar Issue #2: 7 papers reviewed. The agent skill supply chain is broken — and automated scanners cannot tell you how.
EmEditor Supply Chain Analysis: Why "Publisher Authorization" isn't the silver bullet we think it is
https://ift.tt/zMkFKjs
Submitted March 22, 2026 at 06:34PM by TruthOk1914
via reddit https://ift.tt/9x2mVAt
https://ift.tt/zMkFKjs
Submitted March 22, 2026 at 06:34PM by TruthOk1914
via reddit https://ift.tt/9x2mVAt
TECHCOMMUNITY.MICROSOFT.COM
When Trust Becomes the Attack Vector: Analysis of the EmEditor Supply-Chain Compromise | Microsoft Community Hub
Attackers compromised the upstream distribution mechanism for EmEditor, a widely used Windows text editor. Instead of delivering malware through phishing or...
CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran
https://ift.tt/Kuq4XhM
Submitted March 22, 2026 at 07:08PM by DebugDucky
via reddit https://ift.tt/khonK3J
https://ift.tt/Kuq4XhM
Submitted March 22, 2026 at 07:08PM by DebugDucky
via reddit https://ift.tt/khonK3J
www.aikido.dev
CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran