Using Cloudflare’s Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NAS
https://ift.tt/4YgcMlp
Submitted April 6, 2026 at 08:46PM by IndySecMan
via reddit https://ift.tt/vMpCoRU
https://ift.tt/4YgcMlp
Submitted April 6, 2026 at 08:46PM by IndySecMan
via reddit https://ift.tt/vMpCoRU
Medium
Using Cloudflare’s Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NAS
Future-proofing Plex traffic in transit, avoiding public port exposure, and letting modern clients use PQC with TLS 1.3 fallback for…
Responsible disclosure is structurally dead — not dying. Here's the analysis and what replaces it.
https://ift.tt/rDqW3BP
Submitted April 7, 2026 at 12:45AM by PhilosophyExternal97
via reddit https://ift.tt/F9eJE1m
https://ift.tt/rDqW3BP
Submitted April 7, 2026 at 12:45AM by PhilosophyExternal97
via reddit https://ift.tt/F9eJE1m
www.thecrucible.systems
Crucible — The Answer That Survives Everything
AI-powered decision intelligence through elimination-based reasoning. Four engines. One direction. What cannot be destroyed is revealed.
DeepZero: An automated LLM/Ghidra pipeline for finding BYOVD zero-days in Windows drivers
https://ift.tt/HzsjMw0
Submitted April 7, 2026 at 07:46AM by watchdogsrox
via reddit https://ift.tt/Y7l04tw
https://ift.tt/HzsjMw0
Submitted April 7, 2026 at 07:46AM by watchdogsrox
via reddit https://ift.tt/Y7l04tw
Rehman's Blog
Building an Automated Pipeline with LangChain DeepAgents to Find Zero-Days in Kernel Drivers. It Found One in ASUS.
I had $100 in unused Google Cloud credits from my Google One Ultra plan and figured I’d put them toward something interesting. Over the long weekend I ended up building an automated pipeline that scans thousands of Windows kernel drivers for exploitable vulnerabilities…
I was targeted by a fake job interview on Wellfound. Instead of becoming a victim I reverse-engineered the malware. Here's the full analysis: 571 encrypted config values decrypted, C2 and Sentry DSN exposed, DPRK/Contagious Interview attribution.
https://ift.tt/yQEAFu1
Submitted April 7, 2026 at 09:39AM by SD483
via reddit https://ift.tt/C3d0MH7
https://ift.tt/yQEAFu1
Submitted April 7, 2026 at 09:39AM by SD483
via reddit https://ift.tt/C3d0MH7
Detecting CI/CD Supply Chain Attacks with Canary Credentials
https://ift.tt/WjTui0Z
Submitted April 7, 2026 at 12:57PM by tracebit
via reddit https://ift.tt/GOmHfJg
https://ift.tt/WjTui0Z
Submitted April 7, 2026 at 12:57PM by tracebit
via reddit https://ift.tt/GOmHfJg
Tracebit
Detecting CI/CD Supply Chain Attacks with Canary Credentials | Tracebit
A single threat actor - TeamPCP - compromised a chain of widely-used open source tools: Trivy, KICS, LiteLLM, and Telnyx. This post looks at the campaign and explores the question: once you've pinned your actions and hardened your runners, what actually detects…
Microsoft Speech - Lateral Movement
https://ift.tt/4S0eivp
Submitted April 7, 2026 at 05:25PM by netbiosX
via reddit https://ift.tt/IWMKhN2
https://ift.tt/4S0eivp
Submitted April 7, 2026 at 05:25PM by netbiosX
via reddit https://ift.tt/IWMKhN2
Purple Team
Microsoft Speech
SpeechRuntime is a legitimate Windows component that supports Microsoft’s speech-related capabilities, including voice input and speech recognition features used across modern Windows experie…
JavaScript runtime instrumentation via Chrome DevTools Protocol
https://fcavallarin.github.io/wirebrowser/CDP-as-a-Runtime-Instrumentation-Engine
Submitted April 7, 2026 at 09:17PM by filippo_cavallarin
via reddit https://ift.tt/6bvBSFE
https://fcavallarin.github.io/wirebrowser/CDP-as-a-Runtime-Instrumentation-Engine
Submitted April 7, 2026 at 09:17PM by filippo_cavallarin
via reddit https://ift.tt/6bvBSFE
wirebrowser
CDP as a Runtime Instrumentation Engine
Wirebrowser is a CDP-based runtime instrumentation platform for the browser. Think Frida, but for JavaScript running in Chrome — without monkeypatching.
Anthropic Opus 4.6 is less good at finding vulns than you might think
https://ift.tt/eFqT2xa
Submitted April 7, 2026 at 11:18PM by Prior-Penalty
via reddit https://ift.tt/vXmkYKW
https://ift.tt/eFqT2xa
Submitted April 7, 2026 at 11:18PM by Prior-Penalty
via reddit https://ift.tt/vXmkYKW
Zeropath
Benchmarking Opus 4.6 For Vuln Detection: Flashes Of Brilliance But Lots of Noise - ZeroPath Blog
We tested Opus 4.6 against 435 known vulnerable C functions from real CVEs. With good prompting and tools, it found up to 28.5% of vulnerabilities — impressive compared to human review, but with high false positive rates and inconsistency that underline the…
The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape
https://ift.tt/1gn5N42
Submitted April 8, 2026 at 12:24AM by Fun_Preference1113
via reddit https://ift.tt/EidTnwy
https://ift.tt/1gn5N42
Submitted April 8, 2026 at 12:24AM by Fun_Preference1113
via reddit https://ift.tt/EidTnwy
Cymulate
The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape
Ilan Kalendarov, Security Research Team Lead Ben Zamir, Security Researcher Elad Beber, Security Researcher Cymulate Research Labs uncovered a range of vulnerability classes across multiple different AI tools that allow attackers to bypass trust boundaries…
CVE-2026-34197: ActiveMQ RCE via Jolokia API
https://ift.tt/Yu8s23t
Submitted April 8, 2026 at 02:01AM by scopedsecurity
via reddit https://ift.tt/beLR9Ex
https://ift.tt/Yu8s23t
Submitted April 8, 2026 at 02:01AM by scopedsecurity
via reddit https://ift.tt/beLR9Ex
Horizon3.ai
CVE-2026-34197 ActiveMQ RCE via Jolokia API
CVE-2026-34197 is an ActiveMQ RCE flaw exploiting Jolokia to execute remote commands. Learn how it works, affected versions, and detection steps.
Assessing Claude Mythos Preview’s capabilities
https://ift.tt/oVx4GkX
Submitted April 8, 2026 at 01:58AM by dookie1481
via reddit https://ift.tt/7UoAIVZ
https://ift.tt/oVx4GkX
Submitted April 8, 2026 at 01:58AM by dookie1481
via reddit https://ift.tt/7UoAIVZ
From UART to Root: Vendor Shell Escape on a Uniview IP Camera
https://ift.tt/FMejsfX
Submitted April 8, 2026 at 06:19AM by Vymmy
via reddit https://ift.tt/jd2t9GF
https://ift.tt/FMejsfX
Submitted April 8, 2026 at 06:19AM by Vymmy
via reddit https://ift.tt/jd2t9GF
Strengthen Linux Security: CIS Hardening Guide (2026)
https://ift.tt/NqDXy8E
Submitted April 8, 2026 at 06:29AM by galaxymusicpromo
via reddit https://ift.tt/R7rHNb8
https://ift.tt/NqDXy8E
Submitted April 8, 2026 at 06:29AM by galaxymusicpromo
via reddit https://ift.tt/R7rHNb8
NEXOBITS
Strengthen Linux Security: CIS Hardening Guide (2026)
Strengthen your server defenses with our comprehensive cis hardening linux guide. Follow these professional steps to secure your systems against all threats.
We found a path traversal in an MCP server with 7,700 stars that lets AI agents read your SSH keys. Fix merged.
https://ift.tt/TZdGNHt
Submitted April 8, 2026 at 08:56AM by No-Investment-1140
via reddit https://ift.tt/i8lCN6j
https://ift.tt/TZdGNHt
Submitted April 8, 2026 at 08:56AM by No-Investment-1140
via reddit https://ift.tt/i8lCN6j
SpiderRating
AgentEscape: How MCP Servers Let AI Agents Read Your Private Keys
We found a vulnerability in a 49,000-star project that lets an attacker trick your AI agent into reading SSH keys, .env files, and database passwords. The fix is merged — but the pattern exists in hundreds of other MCP servers.
Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS
https://ift.tt/LMtd5kv
Submitted April 8, 2026 at 12:31PM by buherator
via reddit https://ift.tt/qE9n1YU
https://ift.tt/LMtd5kv
Submitted April 8, 2026 at 12:31PM by buherator
via reddit https://ift.tt/qE9n1YU
Hey, it's Asim
Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS
CVE-2026-34980 + CVE-2026-34990: two CUPS vulnerabilities, discovered by an autonomous LLM pipeline, chainable from unaut'd remote print job to root file (over)write.