Microsoft Entra OAuth Consent Grant Attack Simulation in the PhishU Framework
https://ift.tt/nRK4mMD
Submitted March 28, 2026 at 06:19AM by IndySecMan
via reddit https://ift.tt/JcdRKrW
https://ift.tt/nRK4mMD
Submitted March 28, 2026 at 06:19AM by IndySecMan
via reddit https://ift.tt/JcdRKrW
PhishU
Microsoft Entra OAuth Consent Grant Attack Simulation in the PhishU Framework
How the PhishU Framework simulates Microsoft Entra OAuth Consent Grant phishing with persistent token capture, live notifications and an interactive Token Explorer.
Transparent AiTM Proxying in the PhishU Framework
https://ift.tt/Lvx4gRw
Submitted March 28, 2026 at 06:17AM by IndySecMan
via reddit https://ift.tt/TdK5qa3
https://ift.tt/Lvx4gRw
Submitted March 28, 2026 at 06:17AM by IndySecMan
via reddit https://ift.tt/TdK5qa3
PhishU
Transparent AiTM Proxying in the PhishU Framework
A high-level look at one-click transparent AiTM proxying, Google support, and Chrome heuristic evasion in the PhishU Framework.
Telnyx package on PyPI compromised by TeamPCP. WAV steganography used for payload delivery
https://ift.tt/L2aP4pr
Submitted March 28, 2026 at 09:57AM by raptorhunter22
via reddit https://ift.tt/Cw8Vyue
https://ift.tt/L2aP4pr
Submitted March 28, 2026 at 09:57AM by raptorhunter22
via reddit https://ift.tt/Cw8Vyue
The CyberSec Guru
PyPI telnyx Package Compromised: TeamPCP Supply Chain Attack | The CyberSec Guru
PyPI package 'telnyx' versions 4.87.1 and 4.87.2 contain malware from threat actor TeamPCP. Malware runs on import, uses WAV steganography for payloads
Title: Roast my resume– Security Analyst
https://ift.tt/BjfeMyX
Submitted March 28, 2026 at 01:11PM by kehndi-hundi_si
via reddit https://ift.tt/mW7JRKL
https://ift.tt/BjfeMyX
Submitted March 28, 2026 at 01:11PM by kehndi-hundi_si
via reddit https://ift.tt/mW7JRKL
LimeWire
Download redatcted_resume.pdf | LimeWire
Download redatcted_resume.pdf on LimeWire
Chaining file upload bypass and stored XSS to create admin accounts: walkthrough with Docker PoC lab
https://ift.tt/j5BJzDi
Submitted March 28, 2026 at 06:42PM by kurtisebear
via reddit https://ift.tt/dTPCfBj
https://ift.tt/j5BJzDi
Submitted March 28, 2026 at 06:42PM by kurtisebear
via reddit https://ift.tt/dTPCfBj
Kurtis Baron — Offensive Security & Pen Testing
Chaining file upload bypass and stored XSS to create admin accounts
Two medium-severity findings chained into full admin compromise on a SaaS pen test. Attack walkthrough, Docker PoC lab, and fixes.
pentest-ai - 6 Claude Code subagents for offensive security research (engagement planning, recon analysis, exploit methodology, detection engineering, STIG compliance, report writing)
https://0xsteph.github.io/pentest-ai/
Submitted March 28, 2026 at 11:26PM by stephnot
via reddit https://ift.tt/Ahx9eZU
https://0xsteph.github.io/pentest-ai/
Submitted March 28, 2026 at 11:26PM by stephnot
via reddit https://ift.tt/Ahx9eZU
0xsteph.github.io
pentest-ai -- Offensive Security Research Assistant for Claude Code
6 specialized AI subagents for penetration testing. Plan engagements, analyze recon, research exploits, build detections, check STIGs, and write reports -- all through Claude Code.
We Social Engineered Our Own AI
https://ift.tt/8cV25pK
Submitted March 29, 2026 at 01:14AM by Initial-Return8802
via reddit https://ift.tt/K9rjXt7
https://ift.tt/8cV25pK
Submitted March 29, 2026 at 01:14AM by Initial-Return8802
via reddit https://ift.tt/K9rjXt7
reikon.io
We Social Engineered Our Own AI | Reikon
We gave our AI agent admin access to production infrastructure. Then we tried to trick it into leaking everything. Here's what happened.
The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread) - watchTowr Labs
https://ift.tt/yMEhRag
Submitted March 29, 2026 at 02:10AM by dx7r__
via reddit https://ift.tt/zXiNwaB
https://ift.tt/yMEhRag
Submitted March 29, 2026 at 02:10AM by dx7r__
via reddit https://ift.tt/zXiNwaB
watchTowr Labs
The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread)
Sequels? Pain? We're obviously talking about Citrix NetScalers, yet again.
Welcome back to another watchTowr Labs blog post - pull up a chair, we always welcome new members to our group therapy sessions.
If you asked a C programmer what they most dislike…
Welcome back to another watchTowr Labs blog post - pull up a chair, we always welcome new members to our group therapy sessions.
If you asked a C programmer what they most dislike…
OAuth Consent and Device Code Phishing for Red Teams
https://ift.tt/yhsDe0Q
Submitted March 29, 2026 at 07:19AM by IndySecMan
via reddit https://ift.tt/uRSxblp
https://ift.tt/yhsDe0Q
Submitted March 29, 2026 at 07:19AM by IndySecMan
via reddit https://ift.tt/uRSxblp
PhishU
Microsoft Entra Device Code Phishing Simulation in the PhishU Framework
How the PhishU Framework simulates Microsoft Entra device code phishing with silent token capture, live notifications, and Token Explorer follow-on actions.
Breakdown: How TeamPCP hid malware inside WAV files using audio steganography
https://ift.tt/BxtRSrb
Submitted March 29, 2026 at 07:52PM by pwnguide
via reddit https://ift.tt/vnAoQKi
https://ift.tt/BxtRSrb
Submitted March 29, 2026 at 07:52PM by pwnguide
via reddit https://ift.tt/vnAoQKi
pwn.guide
Audio Steganography in Supply Chain Attacks
Learn how attackers hide malware inside WAV audio files using steganography, based on the real-world TeamPCP supply chain campaign.
Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2) - watchTowr Labs
https://ift.tt/7DRJw09
Submitted March 30, 2026 at 01:40AM by dx7r__
via reddit https://ift.tt/brK59d2
https://ift.tt/7DRJw09
Submitted March 30, 2026 at 01:40AM by dx7r__
via reddit https://ift.tt/brK59d2
watchTowr Labs
Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)
Today, we woke up with a nagging feeling: what if Citrix had, in fact, patched multiple Memory Overread vulnerabilities as part of CVE-2026-3055?
While we've been using our analysis from Part 1 (please read it first, as this post will be brief) to accurately…
While we've been using our analysis from Part 1 (please read it first, as this post will be brief) to accurately…
LangDrained: Path traversal, SQL injection, and Deserialization of untrusted data in LangChain
https://ift.tt/HcMxRt6
Submitted March 30, 2026 at 12:31PM by qwerty0x41
via reddit https://ift.tt/FLGWVNU
https://ift.tt/HcMxRt6
Submitted March 30, 2026 at 12:31PM by qwerty0x41
via reddit https://ift.tt/FLGWVNU
Cyera
LangDrained: 3 Paths to Your Data Through LangChain, the World’s Most Popular AI Framework | Cyera Research
AI middleware shouldn’t be a data drain. Cyera uncovers 3 critical LangChain vulnerabilities. See the research and learn how to patch your AI stack now.
The Team PCP Snowball Effect: A Quantitative Analysis
https://ift.tt/6VLT8ir
Submitted March 30, 2026 at 01:51PM by mabote
via reddit https://ift.tt/Id0x8V7
https://ift.tt/6VLT8ir
Submitted March 30, 2026 at 01:51PM by mabote
via reddit https://ift.tt/Id0x8V7
GitGuardian Blog - Take Control of Your Secrets Security
The Team PCP Snowball Effect: A Quantitative Analysis
Supply chain attacks cascade through ecosystems in ways traditional metrics hardly capture. GitGuardian evaluates the PCP Team incidents and finds damage spread to thousands of public targets.
ThreatPad — an open-source, self-hosted note-taking app for CTI teams.
https://threat-pad-web.vercel.app/login
Submitted March 30, 2026 at 07:04PM by Remarkable_Pop3697
via reddit https://ift.tt/LieKgpG
https://threat-pad-web.vercel.app/login
Submitted March 30, 2026 at 07:04PM by Remarkable_Pop3697
via reddit https://ift.tt/LieKgpG
threat-pad-web.vercel.app
ThreatPad
Collaborative threat intelligence note-taking platform
An attack class that passes every current LLM filter
https://ift.tt/984tf2L
Submitted March 30, 2026 at 08:12PM by lurkyloon
via reddit https://ift.tt/CA94SQv
https://ift.tt/984tf2L
Submitted March 30, 2026 at 08:12PM by lurkyloon
via reddit https://ift.tt/CA94SQv
Shapingrooms
The Atmosphere Attack — Research — shapingrooms.com
Postural manipulation as a new attack class. Empirical record across four frontier models, propagation findings, six-layer defensive architecture. AG Davidson, 2026.
One POST request, six API keys: breaking into popular MCP servers
https://ift.tt/nO6LgaR
Submitted March 30, 2026 at 09:05PM by Kind-Release-3817
via reddit https://ift.tt/MDuCj8v
https://ift.tt/nO6LgaR
Submitted March 30, 2026 at 09:05PM by Kind-Release-3817
via reddit https://ift.tt/MDuCj8v
agentseal.org
AgentSeal - AI Agent Security Scanner
Break your AI agents before someone else does. Security scanning for system prompts, MCP servers, and AI coding agents.
Vulnerability Research Is Cooked
https://ift.tt/Mvao5k0
Submitted March 31, 2026 at 12:18AM by YogiBerra88888
via reddit https://ift.tt/bxTA6Rg
https://ift.tt/Mvao5k0
Submitted March 31, 2026 at 12:18AM by YogiBerra88888
via reddit https://ift.tt/bxTA6Rg
sockpuppet.org
Vulnerability Research Is Cooked
red-run 2.0: Agent Teams
https://ift.tt/vubHMKf
Submitted March 31, 2026 at 12:14AM by aconite33
via reddit https://ift.tt/Qg8V03r
https://ift.tt/vubHMKf
Submitted March 31, 2026 at 12:14AM by aconite33
via reddit https://ift.tt/Qg8V03r
Blacklanternsecurity
red-run 2.0: Agent Teams
A Claude Code Agent Dashboard
OpenAI Codex: How a Branch Name Stole GitHub Tokens
https://ift.tt/GvykJnP
Submitted March 31, 2026 at 03:51AM by LostPrune2143
via reddit https://ift.tt/RlksfJ0
https://ift.tt/GvykJnP
Submitted March 31, 2026 at 03:51AM by LostPrune2143
via reddit https://ift.tt/RlksfJ0
blog.barrack.ai
OpenAI Codex: How a Branch Name Stole GitHub Tokens | Barrack AI
BeyondTrust Phantom Labs disclosed a critical command injection vulnerability in OpenAI Codex that allowed attackers to steal GitHub OAuth tokens through unsanitized branch names. The flaw affected ChatGPT, Codex CLI, SDK, and IDE extensions, and could scale…
Your Agent Runs Code You Never Wrote - Why agent isolation is a different problem
https://ift.tt/nt7J9Yp
Submitted March 31, 2026 at 10:41AM by bakibab
via reddit https://ift.tt/cvmb5qg
https://ift.tt/nt7J9Yp
Submitted March 31, 2026 at 10:41AM by bakibab
via reddit https://ift.tt/cvmb5qg
Substack
Your Agent Runs Code You Never Wrote
Containers, VMs, and serverless were built for code you wrote. Agents write their own.
Axios npm package compromised in supply chain attack. Downloads malware dropper package
https://ift.tt/erufC72
Submitted March 31, 2026 at 10:39AM by raptorhunter22
via reddit https://ift.tt/EI1tsSK
https://ift.tt/erufC72
Submitted March 31, 2026 at 10:39AM by raptorhunter22
via reddit https://ift.tt/EI1tsSK
The CyberSec Guru
Axios NPM Packages Compromised: Active Supply Chain Attack Alert | The CyberSec Guru
Axios NPM packages v1.14.1 and v0.30.4 compromised. Malicious plain-crypto-js@4.2.1 dependency injected. Full technical breakdown