Building a simple GRC tool for startups — what I learned so far
https://ift.tt/qzsZvp6
Submitted March 20, 2026 at 09:47AM by thehgtech
via reddit https://ift.tt/p2OAISi
https://ift.tt/qzsZvp6
Submitted March 20, 2026 at 09:47AM by thehgtech
via reddit https://ift.tt/p2OAISi
Thehgtech
Enterprise GRC Gap Analysis | ISO 27001 & NIST CSF 2.0 Readiness
Free, offline-first GRC engine. Generate gap analysis for ISO 27001, NIST CSF 2.0, and CIS v8 instantly.
I built a time-based encryption algorithm where the key changes every second — try it live
https://piyush-mishra-00.github.io/Kaalka-Encryption-Algorithm/
Submitted March 20, 2026 at 02:27PM by Consistent-Ruin1868
via reddit https://ift.tt/fiJPX5j
https://piyush-mishra-00.github.io/Kaalka-Encryption-Algorithm/
Submitted March 20, 2026 at 02:27PM by Consistent-Ruin1868
via reddit https://ift.tt/fiJPX5j
Reddit
From the netsec community on Reddit: I built a time-based encryption algorithm where the key changes every second — try it live
Posted by Consistent-Ruin1868 - 0 votes and 1 comment
Lookout's LLM-assistance findings in DarkSword iOS exploit kit: a source-by-source breakdown of what each research team actually said
https://ift.tt/xpkCfNw
Submitted March 20, 2026 at 08:11PM by LostPrune2143
via reddit https://ift.tt/yVexO0n
https://ift.tt/xpkCfNw
Submitted March 20, 2026 at 08:11PM by LostPrune2143
via reddit https://ift.tt/yVexO0n
blog.barrack.ai
DarkSword and the LLM Question: What Every Outlet Mentioned but Nobody Wrote About | Barrack AI
Eight outlets reported signs of LLM-assisted code in the DarkSword iOS exploit kit. None wrote the standalone analysis. This is that piece. A deep dive into Lookout's findings, prior art, and what it means for mobile threat landscape.
Claude Code workspace trust dialog bypass via repository settings loading order [CVE-2026-33068, CVSS 7.7]. Settings resolved before trust dialog shown.
https://ift.tt/r8YQjKI
Submitted March 20, 2026 at 11:10PM by cyberamyntas
via reddit https://ift.tt/xNzMqUG
https://ift.tt/r8YQjKI
Submitted March 20, 2026 at 11:10PM by cyberamyntas
via reddit https://ift.tt/xNzMqUG
RAXE
RAXE-2026-040: Claude Code Workspace Trust Dialog Bypass via Repository Settings (CVE-2026-33068) | RAXE Labs
A high-severity configuration loading order defect (`CVE-2026-33068`, CVSS v4.0 7.7 HIGH) in Anthropic's Claude Code CLI tool allows a malicious repository to bypass the workspace trust confirmation dialog.
Attack surface analysis of 5,121 MCP servers: 555 have toxic data flows where safe tools combine into dangerous paths
https://ift.tt/U2qwPsM
Submitted March 21, 2026 at 02:03AM by Kind-Release-3817
via reddit https://ift.tt/N0qGv3M
https://ift.tt/U2qwPsM
Submitted March 21, 2026 at 02:03AM by Kind-Release-3817
via reddit https://ift.tt/N0qGv3M
agentseal.org
AgentSeal - AI Agent Security Scanner
Break your AI agents before someone else does. Security scanning for system prompts, MCP servers, and AI coding agents.
Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets Attackers
https://ift.tt/hYKBoPI
Submitted March 21, 2026 at 10:31AM by ScottContini
via reddit https://ift.tt/xkBfM4w
https://ift.tt/hYKBoPI
Submitted March 21, 2026 at 10:31AM by ScottContini
via reddit https://ift.tt/xkBfM4w
Socket
Trivy Under Attack Again: Widespread GitHub Actions Tag Comp...
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.
Evaluating AI and ML in Network Security: A Comprehensive Literature Review
https://ift.tt/J9P4BCn
Submitted March 21, 2026 at 11:09AM by dondusi
via reddit https://ift.tt/cYhKaB2
https://ift.tt/J9P4BCn
Submitted March 21, 2026 at 11:09AM by dondusi
via reddit https://ift.tt/cYhKaB2
ONNX Hub silent=True suppresses all trust verification, enabling supply chain attacks on ML model loading (CVE-2026-28500, CVSS 9.1, no patch available)
https://ift.tt/beVNqXa
Submitted March 22, 2026 at 02:26AM by cyberamyntas
via reddit https://ift.tt/x3bpoF8
https://ift.tt/beVNqXa
Submitted March 22, 2026 at 02:26AM by cyberamyntas
via reddit https://ift.tt/x3bpoF8
RAXE
RAXE-2026-039: ONNX Hub Silent Security Warning Bypass Enables Supply Chain Attacks (CVE-2026-28500) | RAXE Labs
A critical security control bypass in the ONNX (Open Neural Network Exchange) Python library allows the `onnx.hub.load()` function's `silent=True` parameter to suppress all trust verification warnings and user confirmation prompts, enabling silent loading…
LLVM Adventures: Fuzzing Apache Modules
https://ift.tt/7N8qHAf
Submitted March 22, 2026 at 03:26AM by pwntheplanet
via reddit https://ift.tt/gvX15P3
https://ift.tt/7N8qHAf
Submitted March 22, 2026 at 03:26AM by pwntheplanet
via reddit https://ift.tt/gvX15P3
( ͡◕ _ ͡◕)👌
LLVM Adventures: Fuzzing Apache Modules
Agent skill marketplace supply chain attack: 121 skills across 7 repos vulnerable to GitHub username hijacking, 5 scanners disagree by 10x on malicious skill rates (arXiv:2603.16572)
https://ift.tt/igFfL2S
Submitted March 22, 2026 at 11:11AM by cyberamyntas
via reddit https://ift.tt/n4s1PuJ
https://ift.tt/igFfL2S
Submitted March 22, 2026 at 11:11AM by cyberamyntas
via reddit https://ift.tt/n4s1PuJ
RAXE
Research Radar #2: 2026-03-22 | RAXE Labs
RAXE Research Radar Issue #2: 7 papers reviewed. The agent skill supply chain is broken — and automated scanners cannot tell you how.
EmEditor Supply Chain Analysis: Why "Publisher Authorization" isn't the silver bullet we think it is
https://ift.tt/zMkFKjs
Submitted March 22, 2026 at 06:34PM by TruthOk1914
via reddit https://ift.tt/9x2mVAt
https://ift.tt/zMkFKjs
Submitted March 22, 2026 at 06:34PM by TruthOk1914
via reddit https://ift.tt/9x2mVAt
TECHCOMMUNITY.MICROSOFT.COM
When Trust Becomes the Attack Vector: Analysis of the EmEditor Supply-Chain Compromise | Microsoft Community Hub
Attackers compromised the upstream distribution mechanism for EmEditor, a widely used Windows text editor. Instead of delivering malware through phishing or...
CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran
https://ift.tt/Kuq4XhM
Submitted March 22, 2026 at 07:08PM by DebugDucky
via reddit https://ift.tt/khonK3J
https://ift.tt/Kuq4XhM
Submitted March 22, 2026 at 07:08PM by DebugDucky
via reddit https://ift.tt/khonK3J
www.aikido.dev
CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran
No Zero-Day Needed: Russian Phishers Swipe Signal & WhatsApp Accounts with Plain Old Lies
https://ift.tt/ABexSik
Submitted March 22, 2026 at 09:10PM by hayrimavi1
via reddit https://ift.tt/H2pbYKq
https://ift.tt/ABexSik
Submitted March 22, 2026 at 09:10PM by hayrimavi1
via reddit https://ift.tt/H2pbYKq
Factide
No Zero-Day Needed: Russian Phishers Swipe Signal & WhatsApp Accounts with Plain Old Lies
Russian phishers steal Signal & WhatsApp accounts with fake support chats—no code crack needed, just human trust.
Langflow Got Hacked Twice Through the Same exec() Call - CVE-2026-33017 (CVSS 9.3) exploited in 20 hours with no public PoC
https://ift.tt/hAI9doQ
Submitted March 22, 2026 at 10:25PM by LostPrune2143
via reddit https://ift.tt/7wGI4kx
https://ift.tt/hAI9doQ
Submitted March 22, 2026 at 10:25PM by LostPrune2143
via reddit https://ift.tt/7wGI4kx
blog.barrack.ai
Langflow Got Hacked Twice Through the Same exec() Call. Your AI Stack Probably Has the Same Problem. | Barrack AI
CVE-2026-33017 (CVSS 9.3) is an unauthenticated RCE in Langflow exploited within 20 hours of disclosure. Attackers harvested OpenAI, Anthropic, and AWS keys from live instances.
Two poems with opposite registers flipped answers across 4 LLMs on the same question. Filed with OWASP as a new attack class.
https://ift.tt/yYfSvJj
Submitted March 22, 2026 at 09:53PM by lurkyloon
via reddit https://ift.tt/IyCj9W8
https://ift.tt/yYfSvJj
Submitted March 22, 2026 at 09:53PM by lurkyloon
via reddit https://ift.tt/IyCj9W8
Shapingrooms
Postural Manipulation
Ordinary content — including art — changes what AI systems decide, and the humans working with those systems have no way to see it happening.
A YC-Backed Startup Left Production AWS Keys Public for 5 Months.
https://ift.tt/w4Tn0Ir
Submitted March 23, 2026 at 01:02PM by Grand_Fan_9804
via reddit https://ift.tt/ji0HvEB
https://ift.tt/w4Tn0Ir
Submitted March 23, 2026 at 01:02PM by Grand_Fan_9804
via reddit https://ift.tt/ji0HvEB
benzimmermann.dev
A YC-Backed Startup Left Production AWS Keys Public for 5 Months. Their VDP Was Silent. - Ben Zimmermann
Pump.co's full production environment file was publicly exposed for 5 months. They silently fixed it and never responded to the disclosure.
BoxPwnr: AI Agent Benchmark (HTB, TryHackMe, BSidesSF CTF 2026 etc.)
https://0ca.github.io/BoxPwnr-Traces/stats/index.html
Submitted March 23, 2026 at 08:12PM by si9int
via reddit https://ift.tt/QoW3Ulh
https://0ca.github.io/BoxPwnr-Traces/stats/index.html
Submitted March 23, 2026 at 08:12PM by si9int
via reddit https://ift.tt/QoW3Ulh
Reddit
From the netsec community on Reddit: BoxPwnr: AI Agent Benchmark (HTB, TryHackMe, BSidesSF CTF 2026 etc.)
Posted by si9int - 1 vote and 0 comments
Remote Command Execution in Google Cloud with Single Directory Deletion
https://ift.tt/CaHknJM
Submitted March 23, 2026 at 08:04PM by toyojuni
via reddit https://ift.tt/cS9wjYD
https://ift.tt/CaHknJM
Submitted March 23, 2026 at 08:04PM by toyojuni
via reddit https://ift.tt/cS9wjYD
GMO Flatt Security Research
Remote Command Execution in Google Cloud with Single Directory Deletion
Introduction
Hello, I’m RyotaK
(@ryotkak
), a security engineer at GMO Flatt Security Inc.
A while ago, I participated in the Google Cloud VRP bugSWAT,
a live hacking event organized by Google.
During this event, I discovered a remote command execution…
Hello, I’m RyotaK
(@ryotkak
), a security engineer at GMO Flatt Security Inc.
A while ago, I participated in the Google Cloud VRP bugSWAT,
a live hacking event organized by Google.
During this event, I discovered a remote command execution…
OpenClaw CVE-2026-25253 is worse than it looks (quick security checklist)
https://ift.tt/WkEsqvn
Submitted March 23, 2026 at 07:42PM by NotFunnyVipul
via reddit https://ift.tt/YsTxmSB
https://ift.tt/WkEsqvn
Submitted March 23, 2026 at 07:42PM by NotFunnyVipul
via reddit https://ift.tt/YsTxmSB
Blink Blog
OpenClaw Security Audit Checklist: 10 Steps to Harden Your Instance (2026)
Run the full OpenClaw security audit: 10 actionable steps covering CVE-2026-25253, skill vetting, network exposure, and auth hardening. Check yours today.
Vulnerability Disclosure - SCHNEIDER ELECTRIC Modicon Controllers M241 / M251 / M262
https://ift.tt/ipQsOjL
Submitted March 24, 2026 at 12:45AM by clarotyofficial
via reddit https://ift.tt/a8dwEvi
https://ift.tt/ipQsOjL
Submitted March 24, 2026 at 12:45AM by clarotyofficial
via reddit https://ift.tt/a8dwEvi
Claroty
XIoT Vulnerability Disclosure Dashboard
Track all XIoT vulnerabilities disclosed by Team82, the industry’s best cybersecurity vulnerability and threat research team. Team82 finds software and firmware vulnerabilities before threat actors can exploit them.
Why Your Brain is a Security Risk
https://ift.tt/L2kTXlM
Submitted March 24, 2026 at 12:12AM by untraceable-tortoise
via reddit https://ift.tt/ha13irf
https://ift.tt/L2kTXlM
Submitted March 24, 2026 at 12:12AM by untraceable-tortoise
via reddit https://ift.tt/ha13irf
www.marisec.ca
Why your brain is a Cyber Security Risk
Human thought is still evolving to handle the digital world. We act instinctively when we should act deliberately — and under pressure, we rarely consider all the options available to us. This article examines how we think under stress and outlines practical…