The Age-Gated Internet: Child Safety, Identity Infrastructure, and the Not So Quiet Re-Architecting of the Web
https://ift.tt/Vwto6vX
Submitted March 26, 2026 at 09:40PM by wayne_horkan
via reddit https://ift.tt/ywB1pLC
https://ift.tt/Vwto6vX
Submitted March 26, 2026 at 09:40PM by wayne_horkan
via reddit https://ift.tt/ywB1pLC
Horkan
The Age-Gated Internet: Child Safety, Identity Infrastructure, and the Not So Quiet Re-Architecting of the Web
Governments around the world are introducing age-verification and youth social-media laws, but these policies may be doing far more than protecting children. They are quietly pushing identity into operating systems, app stores, and the core infrastructure…
What I Learned from a $2,000 Pen Test
https://ift.tt/4M13EzC
Submitted March 26, 2026 at 09:38PM by punkpeye
via reddit https://ift.tt/48VvH2E
https://ift.tt/4M13EzC
Submitted March 26, 2026 at 09:38PM by punkpeye
via reddit https://ift.tt/48VvH2E
Glama – MCP Hosting Platform
How a series of overnight attacks revealed a card testing vulnerability – and the countermeasures that actually worked.
PROTOCOLO DELTA SWORD: Full Disclosure de Persistência Zero-Day e Omissão Corporativa (Google/Samsung)
https://drive.google.com/drive/folders/1S5BTn5KxTmDEgrkjr2pIk3xanL05C9PG
Submitted March 27, 2026 at 01:53AM by PastAcanthisitta3863
via reddit https://ift.tt/IOvsGtp
https://drive.google.com/drive/folders/1S5BTn5KxTmDEgrkjr2pIk3xanL05C9PG
Submitted March 27, 2026 at 01:53AM by PastAcanthisitta3863
via reddit https://ift.tt/IOvsGtp
Reddit
From the netsec community on Reddit: PROTOCOLO DELTA SWORD: Full Disclosure de Persistência Zero-Day e Omissão Corporativa (Google/Samsung)
Posted by PastAcanthisitta3863 - 3 votes and 0 comments
Disabling Security Features in a Locked BIOS
https://ift.tt/NBZuIHD
Submitted March 27, 2026 at 03:28AM by AlmondOffSec
via reddit https://ift.tt/nUSPgx2
https://ift.tt/NBZuIHD
Submitted March 27, 2026 at 03:28AM by AlmondOffSec
via reddit https://ift.tt/nUSPgx2
MDSec
Disabling Security Features in a Locked BIOS - MDSec
Overview This post explores how modifying a Dell UEFI firmware image at the flash level can fundamentally undermine platform security without leaving visible traces in the firmware interface. By directly...
China-linked Red Menshen using BPFdoor kernel backdoor in telecom networks
https://ift.tt/1cB4rV0
Submitted March 27, 2026 at 10:35AM by raptorhunter22
via reddit https://ift.tt/nKVXOF3
https://ift.tt/1cB4rV0
Submitted March 27, 2026 at 10:35AM by raptorhunter22
via reddit https://ift.tt/nKVXOF3
The CyberSec Guru
China-Linked 'Red Menshen' Plants BPFDoor Sleeper Cells in Global Telecom Networks | The CyberSec Guru
Discover how China-linked Red Menshen uses the stealthy, kernel-level BPFDoor backdoor to infiltrate global telecom networks and spy on users
Abusing Modern Browser Features for Phishing
https://ift.tt/d5xRJDj
Submitted March 27, 2026 at 03:16PM by s3curi1y_by_d3s1gn
via reddit https://ift.tt/hbeRBmr
https://ift.tt/d5xRJDj
Submitted March 27, 2026 at 03:16PM by s3curi1y_by_d3s1gn
via reddit https://ift.tt/hbeRBmr
DVRTC: intentionally vulnerable VoIP/WebRTC lab with SIP enumeration, RTP bleed, TURN abuse, and credential cracking exercises
https://ift.tt/zS8w1ZD
Submitted March 27, 2026 at 03:52PM by EnableSecurity
via reddit https://ift.tt/nsbkKOY
https://ift.tt/zS8w1ZD
Submitted March 27, 2026 at 03:52PM by EnableSecurity
via reddit https://ift.tt/nsbkKOY
Enable Security
Introducing DVRTC: a vulnerable lab for RTC security
DVRTC is a vulnerable VoIP and WebRTC lab for hands-on security training, with exercises covering SIP enumeration, RTP attacks, TURN abuse, and more.
ІТ блог про кібербезпеку, сервери та реальні технології
https://kaljan747.pp.ua/2026/02/03/%d1%96%d1%82-%d0%b1%d0%bb%d0%be%d0%b3-%d0%bf%d1%80%d0%be-%d0%ba%d1%96%d0%b1%d0%b5%d1%80%d0%b1%d0%b5%d0%b7%d0%bf%d0%b5%d0%ba%d1%83-%d1%81%d0%b5%d1%80%d0%b2%d0%b5%d1%80%d0%b8-%d1%82%d0%b0-%d1%80%d0%b5/
Submitted March 27, 2026 at 05:49PM by Comfortable-Ad2512
via reddit https://ift.tt/gyBnYHb
https://kaljan747.pp.ua/2026/02/03/%d1%96%d1%82-%d0%b1%d0%bb%d0%be%d0%b3-%d0%bf%d1%80%d0%be-%d0%ba%d1%96%d0%b1%d0%b5%d1%80%d0%b1%d0%b5%d0%b7%d0%bf%d0%b5%d0%ba%d1%83-%d1%81%d0%b5%d1%80%d0%b2%d0%b5%d1%80%d0%b8-%d1%82%d0%b0-%d1%80%d0%b5/
Submitted March 27, 2026 at 05:49PM by Comfortable-Ad2512
via reddit https://ift.tt/gyBnYHb
Слава Україні!
ІТ блог про кібербезпеку, сервери та реальні технології - Слава Україні!
Ласкаво просимо до нашого ІТ-блогу — незалежного кіберпростору для тих, хто хоче розуміти, як насправді працюють технології, сервери та безпека в сучасному
Testing AprielGuard Against 1,500 Adversarial Attacks
https://ift.tt/RygP51w
Submitted March 27, 2026 at 04:51PM by RasheedaDeals
via reddit https://ift.tt/bhUFl8B
https://ift.tt/RygP51w
Submitted March 27, 2026 at 04:51PM by RasheedaDeals
via reddit https://ift.tt/bhUFl8B
www.lasso.security
Testing AprielGuard Against 1,500 Adversarial Attacks
Lasso research reveals a 42% bypass rate in ServiceNow’s AprielGuard. Discover why standalone guardrails often fail in enterprise AI environments.
TeamPCP strikes again - telnyx popular PyPI library compromised
https://ift.tt/B9HpnaQ
Submitted March 27, 2026 at 05:53PM by SRMish3
via reddit https://ift.tt/dvFiwT1
https://ift.tt/B9HpnaQ
Submitted March 27, 2026 at 05:53PM by SRMish3
via reddit https://ift.tt/dvFiwT1
Jfrog
TeamPCP strikes again - telnyx popular PyPI library compromised | JFrog
On March 27th, the telnyx popular PyPI library was compromised. new versions of telnyx were uploaded to PyPI, 4.87.1 and 4.87.2. Both contains malicous payload, this compromise is linked to TeamPCP
ClickFix in the PhishU Framework
https://ift.tt/PKJpO6n
Submitted March 28, 2026 at 06:20AM by IndySecMan
via reddit https://ift.tt/fE5loyd
https://ift.tt/PKJpO6n
Submitted March 28, 2026 at 06:20AM by IndySecMan
via reddit https://ift.tt/fE5loyd
PhishU
ClickFix in the PhishU Framework
How the PhishU Framework simulates ClickFix with callback analytics, reporting, and campaign-specific training.
Microsoft Entra OAuth Consent Grant Attack Simulation in the PhishU Framework
https://ift.tt/nRK4mMD
Submitted March 28, 2026 at 06:19AM by IndySecMan
via reddit https://ift.tt/JcdRKrW
https://ift.tt/nRK4mMD
Submitted March 28, 2026 at 06:19AM by IndySecMan
via reddit https://ift.tt/JcdRKrW
PhishU
Microsoft Entra OAuth Consent Grant Attack Simulation in the PhishU Framework
How the PhishU Framework simulates Microsoft Entra OAuth Consent Grant phishing with persistent token capture, live notifications and an interactive Token Explorer.
Transparent AiTM Proxying in the PhishU Framework
https://ift.tt/Lvx4gRw
Submitted March 28, 2026 at 06:17AM by IndySecMan
via reddit https://ift.tt/TdK5qa3
https://ift.tt/Lvx4gRw
Submitted March 28, 2026 at 06:17AM by IndySecMan
via reddit https://ift.tt/TdK5qa3
PhishU
Transparent AiTM Proxying in the PhishU Framework
A high-level look at one-click transparent AiTM proxying, Google support, and Chrome heuristic evasion in the PhishU Framework.
Telnyx package on PyPI compromised by TeamPCP. WAV steganography used for payload delivery
https://ift.tt/L2aP4pr
Submitted March 28, 2026 at 09:57AM by raptorhunter22
via reddit https://ift.tt/Cw8Vyue
https://ift.tt/L2aP4pr
Submitted March 28, 2026 at 09:57AM by raptorhunter22
via reddit https://ift.tt/Cw8Vyue
The CyberSec Guru
PyPI telnyx Package Compromised: TeamPCP Supply Chain Attack | The CyberSec Guru
PyPI package 'telnyx' versions 4.87.1 and 4.87.2 contain malware from threat actor TeamPCP. Malware runs on import, uses WAV steganography for payloads
Title: Roast my resume– Security Analyst
https://ift.tt/BjfeMyX
Submitted March 28, 2026 at 01:11PM by kehndi-hundi_si
via reddit https://ift.tt/mW7JRKL
https://ift.tt/BjfeMyX
Submitted March 28, 2026 at 01:11PM by kehndi-hundi_si
via reddit https://ift.tt/mW7JRKL
LimeWire
Download redatcted_resume.pdf | LimeWire
Download redatcted_resume.pdf on LimeWire
Chaining file upload bypass and stored XSS to create admin accounts: walkthrough with Docker PoC lab
https://ift.tt/j5BJzDi
Submitted March 28, 2026 at 06:42PM by kurtisebear
via reddit https://ift.tt/dTPCfBj
https://ift.tt/j5BJzDi
Submitted March 28, 2026 at 06:42PM by kurtisebear
via reddit https://ift.tt/dTPCfBj
Kurtis Baron — Offensive Security & Pen Testing
Chaining file upload bypass and stored XSS to create admin accounts
Two medium-severity findings chained into full admin compromise on a SaaS pen test. Attack walkthrough, Docker PoC lab, and fixes.
pentest-ai - 6 Claude Code subagents for offensive security research (engagement planning, recon analysis, exploit methodology, detection engineering, STIG compliance, report writing)
https://0xsteph.github.io/pentest-ai/
Submitted March 28, 2026 at 11:26PM by stephnot
via reddit https://ift.tt/Ahx9eZU
https://0xsteph.github.io/pentest-ai/
Submitted March 28, 2026 at 11:26PM by stephnot
via reddit https://ift.tt/Ahx9eZU
0xsteph.github.io
pentest-ai -- Offensive Security Research Assistant for Claude Code
6 specialized AI subagents for penetration testing. Plan engagements, analyze recon, research exploits, build detections, check STIGs, and write reports -- all through Claude Code.
We Social Engineered Our Own AI
https://ift.tt/8cV25pK
Submitted March 29, 2026 at 01:14AM by Initial-Return8802
via reddit https://ift.tt/K9rjXt7
https://ift.tt/8cV25pK
Submitted March 29, 2026 at 01:14AM by Initial-Return8802
via reddit https://ift.tt/K9rjXt7
reikon.io
We Social Engineered Our Own AI | Reikon
We gave our AI agent admin access to production infrastructure. Then we tried to trick it into leaking everything. Here's what happened.
The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread) - watchTowr Labs
https://ift.tt/yMEhRag
Submitted March 29, 2026 at 02:10AM by dx7r__
via reddit https://ift.tt/zXiNwaB
https://ift.tt/yMEhRag
Submitted March 29, 2026 at 02:10AM by dx7r__
via reddit https://ift.tt/zXiNwaB
watchTowr Labs
The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread)
Sequels? Pain? We're obviously talking about Citrix NetScalers, yet again.
Welcome back to another watchTowr Labs blog post - pull up a chair, we always welcome new members to our group therapy sessions.
If you asked a C programmer what they most dislike…
Welcome back to another watchTowr Labs blog post - pull up a chair, we always welcome new members to our group therapy sessions.
If you asked a C programmer what they most dislike…
OAuth Consent and Device Code Phishing for Red Teams
https://ift.tt/yhsDe0Q
Submitted March 29, 2026 at 07:19AM by IndySecMan
via reddit https://ift.tt/uRSxblp
https://ift.tt/yhsDe0Q
Submitted March 29, 2026 at 07:19AM by IndySecMan
via reddit https://ift.tt/uRSxblp
PhishU
Microsoft Entra Device Code Phishing Simulation in the PhishU Framework
How the PhishU Framework simulates Microsoft Entra device code phishing with silent token capture, live notifications, and Token Explorer follow-on actions.
Breakdown: How TeamPCP hid malware inside WAV files using audio steganography
https://ift.tt/BxtRSrb
Submitted March 29, 2026 at 07:52PM by pwnguide
via reddit https://ift.tt/vnAoQKi
https://ift.tt/BxtRSrb
Submitted March 29, 2026 at 07:52PM by pwnguide
via reddit https://ift.tt/vnAoQKi
pwn.guide
Audio Steganography in Supply Chain Attacks
Learn how attackers hide malware inside WAV audio files using steganography, based on the real-world TeamPCP supply chain campaign.