Honey Tokens: Bait Credentials That Catch Breaches
https://ift.tt/sODkMgH
Submitted May 7, 2026 at 10:42PM by finncmdbar
via reddit https://ift.tt/Gfbvj4N
https://ift.tt/sODkMgH
Submitted May 7, 2026 at 10:42PM by finncmdbar
via reddit https://ift.tt/Gfbvj4N
Infisical Blog
Infisical Honey Tokens: Bait Credentials That Catch Breaches
Honey tokens are fake credentials that alert you of breaches when attackers use them.
Dirty Frag - Linux LPE similiar to Copy Fail
https://ift.tt/lVONU9X
Submitted May 8, 2026 at 01:19AM by sheepfiend
via reddit https://ift.tt/K2MwUsB
https://ift.tt/lVONU9X
Submitted May 8, 2026 at 01:19AM by sheepfiend
via reddit https://ift.tt/K2MwUsB
Vuink.com
Search code, repositories, users, issues, pull requests...
This document describes the Dirty Frag vulnerability class, first discovered and reported by Hyunwoo Kim (@v4bel), which can obtain root privileges on.
Kernel LPE Vulnerability Published Early Due To Third-Party Breaking Embargo
https://ift.tt/54VMNw8
Submitted May 8, 2026 at 02:52AM by LordAlfredo
via reddit https://ift.tt/bFcWEvT
https://ift.tt/54VMNw8
Submitted May 8, 2026 at 02:52AM by LordAlfredo
via reddit https://ift.tt/bFcWEvT
LWN.net
Dirty Frag: a zero-day universal Linux LPE
Hyunwoo Kim has announced the Dirty Frag security flaw, a local-privilege-escalation (LPE) vuln [...]
Needle crypto-stealer C2 analysis: API key embedded in plain text inside the Rust malware unlocked 1,932 victims and the operator's withdrawal config
https://ift.tt/hrXLBZa
Submitted May 8, 2026 at 04:00PM by M4r10_h4ck
via reddit https://ift.tt/Z6f1tbN
https://ift.tt/hrXLBZa
Submitted May 8, 2026 at 04:00PM by M4r10_h4ck
via reddit https://ift.tt/Z6f1tbN
ShinyHunters breached Canvas/Instructure — 275M student records stolen from 8,809 schools, ransom deadline May 12
https://ift.tt/mtPh8ZG
Submitted May 8, 2026 at 06:12PM by dhakalster123
via reddit https://ift.tt/m7i5uMG
https://ift.tt/mtPh8ZG
Submitted May 8, 2026 at 06:12PM by dhakalster123
via reddit https://ift.tt/m7i5uMG
Hitechies — AI, Crypto, Security & Dev News for Tech Profession
275 million student records. 8,809 schools. Ransom deadline Tuesday. Here's everything you need to know.
ShinyHunters breached Canvas — the LMS used by 41% of North American universities. Harvard, Penn, Duke, K-12 schools. Private messages, grades, student records. May 12 ransom deadline. Full breakdown at Hitechies.
Securing CI/CD for an open source project: lessons from Cilium
https://ift.tt/JKG2EuU
Submitted May 9, 2026 at 02:16AM by xmull1gan
via reddit https://ift.tt/o3TACsn
https://ift.tt/JKG2EuU
Submitted May 9, 2026 at 02:16AM by xmull1gan
via reddit https://ift.tt/o3TACsn
cilium.io
Securing CI/CD for an open source project: lessons from Cilium
A case study of how Cilium secures its CI/CD pipeline end to end: SHA-pinned actions, two-phase checkouts for pull_request_target, Re...
Seclens: Role-specific Evaluation of LLM's for security vulnerablity detection
https://ift.tt/HDz9y5i
Submitted May 9, 2026 at 05:18AM by subho007
via reddit https://ift.tt/aoW5STi
https://ift.tt/HDz9y5i
Submitted May 9, 2026 at 05:18AM by subho007
via reddit https://ift.tt/aoW5STi
arXiv.org
Seclens: Role-specific Evaluation of LLM's for security...
Existing benchmarks for LLM-based vulnerability detection compress model performance into a single metric, which fails to reflect the distinct priorities of different stakeholders. For example, a...
Technical Analysis of EagleSpy V6.0 (CraxsRAT Rebrand) Distributed Through Odysee and Telegram
https://ift.tt/aIH9hLw
Submitted May 10, 2026 at 12:20AM by CranberryOk2634
via reddit https://ift.tt/0Lfhg5C
https://ift.tt/aIH9hLw
Submitted May 10, 2026 at 12:20AM by CranberryOk2634
via reddit https://ift.tt/0Lfhg5C
Odysee
- 安卓手机远控 Services We Offer :- Android/PC (RAT) / CraxsRat / Botnets Cracking , Bypassing Of any softwares Modification/Rebranding…
#RemoteAccessTrojan
Getting LLMs Drunk to Find Remote Linux Kernel OOB Writes (and More)
https://ift.tt/JW1kfjq
Submitted May 10, 2026 at 12:01AM by ablasionet
via reddit https://ift.tt/eL6I9JV
https://ift.tt/JW1kfjq
Submitted May 10, 2026 at 12:01AM by ablasionet
via reddit https://ift.tt/eL6I9JV
Hey, it's Asim
Getting LLMs Drunk to Find Remote Linux Kernel OOB Writes (and More)
Using a self-orchestrating team of agents, with a dash of activation steering, to find vulnerabilities in everything from the Linux kernel to Docker and OpenSSL.
Memory Poisoning AI Agents via ChromaDB
https://ift.tt/A3sa72T
Submitted May 10, 2026 at 01:13AM by Big_Impression_410
via reddit https://ift.tt/SZOjksA
https://ift.tt/A3sa72T
Submitted May 10, 2026 at 01:13AM by Big_Impression_410
via reddit https://ift.tt/SZOjksA
The Secure AI Blog
Understanding Memory Poisoning: Risks and Defenses in AI Agents
Discover the risks of memory poisoning in AI agents and learn effective defenses against this critical security threat in our detailed guide.
Defence in Depth: A Practical Secure Corporate Network Topology
https://ift.tt/LM0VoW1
Submitted May 10, 2026 at 01:01AM by Biswadeb_Mukherjee
via reddit https://ift.tt/D06zJqG
https://ift.tt/LM0VoW1
Submitted May 10, 2026 at 01:01AM by Biswadeb_Mukherjee
via reddit https://ift.tt/D06zJqG
Outrunning SHA256 with Physics
https://ift.tt/xqaGgAP
Submitted May 10, 2026 at 01:25PM by AntithesisOf
via reddit https://ift.tt/LVl3NsX
https://ift.tt/xqaGgAP
Submitted May 10, 2026 at 01:25PM by AntithesisOf
via reddit https://ift.tt/LVl3NsX
blog.floatingpragma.io
Outrunning SHA-256 with Physics
Wave chamber: built and producing pool-accepted shares. Single-photon successor: 65,000× faster again. SHA-256 is not broken; the substrate it assumed is.
The compression of the exploit timeline: Why n-day gaps and 90-day embargoes are failing in practice.
https://ift.tt/QhV0YTr
Submitted May 10, 2026 at 03:16PM by unknownhad
via reddit https://ift.tt/qUshFV6
https://ift.tt/QhV0YTr
Submitted May 10, 2026 at 03:16PM by unknownhad
via reddit https://ift.tt/qUshFV6
Himanshu Anand :: Threat Notes
the 90 day disclosure policy is dead
TLDR The 90 day responsible disclosure window was built for a world where bug finders were rare and exploit development was slow. That world is gone. LLMs have compressed both timelines to near-zero. I have seen it first hand, and so has everyone else paying…
Data in Use Protection: How MPC Keeps Inputs Hidden from the Cloud - Stoffel - MPC Made Simple
https://ift.tt/834dWQs
Submitted May 10, 2026 at 05:59PM by badcryptobitch
via reddit https://ift.tt/ohZFe3W
https://ift.tt/834dWQs
Submitted May 10, 2026 at 05:59PM by badcryptobitch
via reddit https://ift.tt/ohZFe3W
Stoffelmpc
Data in Use Protection: How MPC Keeps Inputs Hidden from the Cloud - Stoffel - MPC Made Simple | Privacy-First Application Development
See how MPC protects data in use by letting distributed machines compute on protected inputs without exposing plaintext to the cloud.
ShinyHunters / AT&T ransom payment traced on-chain — paper draft, seeking arXiv cs.CR endorsement
https://ift.tt/l3Fg5OP
Submitted May 10, 2026 at 11:44PM by Visual_Course6624
via reddit https://ift.tt/ShBpsel
https://ift.tt/l3Fg5OP
Submitted May 10, 2026 at 11:44PM by Visual_Course6624
via reddit https://ift.tt/ShBpsel
Autonomous Vulnerability Hunting with MCP
https://ift.tt/sM4Z2eE
Submitted May 11, 2026 at 03:30AM by ZephrX112
via reddit https://ift.tt/bdaKIYj
https://ift.tt/sM4Z2eE
Submitted May 11, 2026 at 03:30AM by ZephrX112
via reddit https://ift.tt/bdaKIYj
ZephrSec - Adventures In Information Security
Autonomous Vulnerability Hunting with MCP
Alt title: Bullying LLMs into submission to find 0days at scale
Mythos, MOAK, CTEM and the End of CVE Chasing
https://ift.tt/Tuhrpsm
Submitted May 11, 2026 at 04:43AM by Correct_Quit_7554
via reddit https://ift.tt/BPX9cTZ
https://ift.tt/Tuhrpsm
Submitted May 11, 2026 at 04:43AM by Correct_Quit_7554
via reddit https://ift.tt/BPX9cTZ
CyCognito Blog
Mythos, MOAK, CTEM and the End of CVE Chasing | CyCognito Blog
The instinctive reaction to Mythos is: we need to patch faster. That instinct is understandable. It is also exactly the wrong frame. The real question isn't how many CVEs are in your queue. It's how many of your exposed assets can actually be exploited right…
Giving Claude Code Full Control of a Hardware Fault Injection Setup to Bypass Secure Boot
https://ift.tt/VQfYsAG
Submitted May 11, 2026 at 01:30PM by tieknimmers
via reddit https://ift.tt/Q1tPYx7
https://ift.tt/VQfYsAG
Submitted May 11, 2026 at 01:30PM by tieknimmers
via reddit https://ift.tt/Q1tPYx7
Raelize
AI-FI: Giving Claude Code Glitch Skills for Bypassing Secure Boot
Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training.
MyAudi app:Security issues in Audi Connected Vehicle experience
https://ift.tt/H1CiLxv
Submitted May 11, 2026 at 01:50PM by decoder-ap
via reddit https://ift.tt/V5MZ2w7
https://ift.tt/H1CiLxv
Submitted May 11, 2026 at 01:50PM by decoder-ap
via reddit https://ift.tt/V5MZ2w7
Decoder's Blog
Oh MyAudi!
This is quite a different post as it is not related as usual to Windows vulnerabilities 😉. In the past period, I have been looking into the myAudi connected vehicle platform “Audi Connect and…
How I Defeat Passkeys Nearly Every Time in Phishing Assessments
https://ift.tt/xRjXwda
Submitted May 11, 2026 at 10:19PM by Hot_Tiger_6024
via reddit https://ift.tt/qvKuHZi
https://ift.tt/xRjXwda
Submitted May 11, 2026 at 10:19PM by Hot_Tiger_6024
via reddit https://ift.tt/qvKuHZi
Medium
How I Defeat Passkeys Nearly Every Time
AiTM Phishing FIDO2 MFA
GhostLock: SMB Deny-Share Handles as a Zero-Privilege Availability Weapon
https://ift.tt/NiYBwhD
Submitted May 12, 2026 at 03:14AM by MelangeBot
via reddit https://ift.tt/vPYFVOR
https://ift.tt/NiYBwhD
Submitted May 12, 2026 at 03:14AM by MelangeBot
via reddit https://ift.tt/vPYFVOR
Zenodo
GhostLock: SMB Deny-Share Handles as a Zero-Privilege Availability Weapon
Traditional ransomware disrupts organizations by encrypting data and demanding payment for decryption keys. This paper presents a fundamentally different availability attack that achieves the same business disruption without writing a single encrypted byte…