Getting LLMs Drunk to Find Remote Linux Kernel OOB Writes (and More)
https://ift.tt/JW1kfjq
Submitted May 10, 2026 at 12:01AM by ablasionet
via reddit https://ift.tt/eL6I9JV
https://ift.tt/JW1kfjq
Submitted May 10, 2026 at 12:01AM by ablasionet
via reddit https://ift.tt/eL6I9JV
Hey, it's Asim
Getting LLMs Drunk to Find Remote Linux Kernel OOB Writes (and More)
Using a self-orchestrating team of agents, with a dash of activation steering, to find vulnerabilities in everything from the Linux kernel to Docker and OpenSSL.
Memory Poisoning AI Agents via ChromaDB
https://ift.tt/A3sa72T
Submitted May 10, 2026 at 01:13AM by Big_Impression_410
via reddit https://ift.tt/SZOjksA
https://ift.tt/A3sa72T
Submitted May 10, 2026 at 01:13AM by Big_Impression_410
via reddit https://ift.tt/SZOjksA
The Secure AI Blog
Understanding Memory Poisoning: Risks and Defenses in AI Agents
Discover the risks of memory poisoning in AI agents and learn effective defenses against this critical security threat in our detailed guide.
Defence in Depth: A Practical Secure Corporate Network Topology
https://ift.tt/LM0VoW1
Submitted May 10, 2026 at 01:01AM by Biswadeb_Mukherjee
via reddit https://ift.tt/D06zJqG
https://ift.tt/LM0VoW1
Submitted May 10, 2026 at 01:01AM by Biswadeb_Mukherjee
via reddit https://ift.tt/D06zJqG
Outrunning SHA256 with Physics
https://ift.tt/xqaGgAP
Submitted May 10, 2026 at 01:25PM by AntithesisOf
via reddit https://ift.tt/LVl3NsX
https://ift.tt/xqaGgAP
Submitted May 10, 2026 at 01:25PM by AntithesisOf
via reddit https://ift.tt/LVl3NsX
blog.floatingpragma.io
Outrunning SHA-256 with Physics
Wave chamber: built and producing pool-accepted shares. Single-photon successor: 65,000× faster again. SHA-256 is not broken; the substrate it assumed is.
The compression of the exploit timeline: Why n-day gaps and 90-day embargoes are failing in practice.
https://ift.tt/QhV0YTr
Submitted May 10, 2026 at 03:16PM by unknownhad
via reddit https://ift.tt/qUshFV6
https://ift.tt/QhV0YTr
Submitted May 10, 2026 at 03:16PM by unknownhad
via reddit https://ift.tt/qUshFV6
Himanshu Anand :: Threat Notes
the 90 day disclosure policy is dead
TLDR The 90 day responsible disclosure window was built for a world where bug finders were rare and exploit development was slow. That world is gone. LLMs have compressed both timelines to near-zero. I have seen it first hand, and so has everyone else paying…
Data in Use Protection: How MPC Keeps Inputs Hidden from the Cloud - Stoffel - MPC Made Simple
https://ift.tt/834dWQs
Submitted May 10, 2026 at 05:59PM by badcryptobitch
via reddit https://ift.tt/ohZFe3W
https://ift.tt/834dWQs
Submitted May 10, 2026 at 05:59PM by badcryptobitch
via reddit https://ift.tt/ohZFe3W
Stoffelmpc
Data in Use Protection: How MPC Keeps Inputs Hidden from the Cloud - Stoffel - MPC Made Simple | Privacy-First Application Development
See how MPC protects data in use by letting distributed machines compute on protected inputs without exposing plaintext to the cloud.
ShinyHunters / AT&T ransom payment traced on-chain — paper draft, seeking arXiv cs.CR endorsement
https://ift.tt/l3Fg5OP
Submitted May 10, 2026 at 11:44PM by Visual_Course6624
via reddit https://ift.tt/ShBpsel
https://ift.tt/l3Fg5OP
Submitted May 10, 2026 at 11:44PM by Visual_Course6624
via reddit https://ift.tt/ShBpsel
Autonomous Vulnerability Hunting with MCP
https://ift.tt/sM4Z2eE
Submitted May 11, 2026 at 03:30AM by ZephrX112
via reddit https://ift.tt/bdaKIYj
https://ift.tt/sM4Z2eE
Submitted May 11, 2026 at 03:30AM by ZephrX112
via reddit https://ift.tt/bdaKIYj
ZephrSec - Adventures In Information Security
Autonomous Vulnerability Hunting with MCP
Alt title: Bullying LLMs into submission to find 0days at scale
Mythos, MOAK, CTEM and the End of CVE Chasing
https://ift.tt/Tuhrpsm
Submitted May 11, 2026 at 04:43AM by Correct_Quit_7554
via reddit https://ift.tt/BPX9cTZ
https://ift.tt/Tuhrpsm
Submitted May 11, 2026 at 04:43AM by Correct_Quit_7554
via reddit https://ift.tt/BPX9cTZ
CyCognito Blog
Mythos, MOAK, CTEM and the End of CVE Chasing | CyCognito Blog
The instinctive reaction to Mythos is: we need to patch faster. That instinct is understandable. It is also exactly the wrong frame. The real question isn't how many CVEs are in your queue. It's how many of your exposed assets can actually be exploited right…
Giving Claude Code Full Control of a Hardware Fault Injection Setup to Bypass Secure Boot
https://ift.tt/VQfYsAG
Submitted May 11, 2026 at 01:30PM by tieknimmers
via reddit https://ift.tt/Q1tPYx7
https://ift.tt/VQfYsAG
Submitted May 11, 2026 at 01:30PM by tieknimmers
via reddit https://ift.tt/Q1tPYx7
Raelize
AI-FI: Giving Claude Code Glitch Skills for Bypassing Secure Boot
Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training.
MyAudi app:Security issues in Audi Connected Vehicle experience
https://ift.tt/H1CiLxv
Submitted May 11, 2026 at 01:50PM by decoder-ap
via reddit https://ift.tt/V5MZ2w7
https://ift.tt/H1CiLxv
Submitted May 11, 2026 at 01:50PM by decoder-ap
via reddit https://ift.tt/V5MZ2w7
Decoder's Blog
Oh MyAudi!
This is quite a different post as it is not related as usual to Windows vulnerabilities 😉. In the past period, I have been looking into the myAudi connected vehicle platform “Audi Connect and…
How I Defeat Passkeys Nearly Every Time in Phishing Assessments
https://ift.tt/xRjXwda
Submitted May 11, 2026 at 10:19PM by Hot_Tiger_6024
via reddit https://ift.tt/qvKuHZi
https://ift.tt/xRjXwda
Submitted May 11, 2026 at 10:19PM by Hot_Tiger_6024
via reddit https://ift.tt/qvKuHZi
Medium
How I Defeat Passkeys Nearly Every Time
AiTM Phishing FIDO2 MFA
GhostLock: SMB Deny-Share Handles as a Zero-Privilege Availability Weapon
https://ift.tt/NiYBwhD
Submitted May 12, 2026 at 03:14AM by MelangeBot
via reddit https://ift.tt/vPYFVOR
https://ift.tt/NiYBwhD
Submitted May 12, 2026 at 03:14AM by MelangeBot
via reddit https://ift.tt/vPYFVOR
Zenodo
GhostLock: SMB Deny-Share Handles as a Zero-Privilege Availability Weapon
Traditional ransomware disrupts organizations by encrypting data and demanding payment for decryption keys. This paper presents a fundamentally different availability attack that achieves the same business disruption without writing a single encrypted byte…
OpenAI announces Daybreak, "frontier AI for defenders"
https://ift.tt/4m8hRue
Submitted May 12, 2026 at 04:52AM by medoic
via reddit https://ift.tt/MFhieSw
https://ift.tt/4m8hRue
Submitted May 12, 2026 at 04:52AM by medoic
via reddit https://ift.tt/MFhieSw
OpenAI
Daybreak | OpenAI for cybersecurity
Deploy AI for cyber defense with GPT-5.5 and Codex Security to identify threats, generate patches, and verify remediation across code and systems.
How do Fortune 10 SOCs handle incident response with 15 people instead of 150? Energy-Based Models.
https://ift.tt/OjiBMP8
Submitted May 12, 2026 at 08:00AM by lord_sql
via reddit https://ift.tt/rPq576d
https://ift.tt/OjiBMP8
Submitted May 12, 2026 at 08:00AM by lord_sql
via reddit https://ift.tt/rPq576d
www.securesql.info
Autonomous Incident Response at Scale: How Energy-Based Models & TAME Replace LLM Guessing in Security
Why do Fortune 10 SOCs with 15 people outpace teams 10x their size? They've stopped using autoregressive LLMs for threat modeling, response, and recovery. Instead,...
New ipTIME Pre-Auth RCE in CWMP
https://ift.tt/g8SlxuJ
Submitted May 12, 2026 at 01:46PM by SSDisclosure
via reddit https://ift.tt/s1cSQlh
https://ift.tt/g8SlxuJ
Submitted May 12, 2026 at 01:46PM by SSDisclosure
via reddit https://ift.tt/s1cSQlh
SSD Secure Disclosure
ipTIME Pre-Auth RCE in CWMP - SSD Secure Disclosure
Summary An unauthenticated attacker can remotely execute arbitrary code via the CWMP protocol on the ipTIME router. Vendor Response We have tried to reach out to the vendor through multiple channels (email and via KISA) but have not been able to receive any…
Postmortem: TanStack npm supply-chain compromise
https://ift.tt/43hL28p
Submitted May 12, 2026 at 01:46PM by Code-Painting-8294
via reddit https://ift.tt/E8M3DTI
https://ift.tt/43hL28p
Submitted May 12, 2026 at 01:46PM by Code-Painting-8294
via reddit https://ift.tt/E8M3DTI
Tanstack
Postmortem: TanStack npm supply-chain compromise | TanStack Blog
On 2026-05-11, an attacker chained a pull_request_target Pwn Request, GitHub Actions cache poisoning across the fork↔base trust boundary, and OIDC token extraction from runner memory to publish 84 malicious versions across 42 @tanstack/* packages on npm.…
Curl lead developer Daniel Stenberg provides insightful feedbacks from Mythos analysis results
https://ift.tt/KiYA8x5
Submitted May 12, 2026 at 03:06PM by qwerty0x41
via reddit https://ift.tt/3cV6hKI
https://ift.tt/KiYA8x5
Submitted May 12, 2026 at 03:06PM by qwerty0x41
via reddit https://ift.tt/3cV6hKI
daniel.haxx.se
Mythos finds a curl vulnerability
yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not…
I spent a weekend trying to get OpenClaw to leak my own personal data and it caught me immediately...
https://ift.tt/PToI2D0
Submitted May 12, 2026 at 06:03PM by choochilla44
via reddit https://ift.tt/iP7Zyap
https://ift.tt/PToI2D0
Submitted May 12, 2026 at 06:03PM by choochilla44
via reddit https://ift.tt/iP7Zyap
ShiftMag
I Tried to Get OpenClaw to Betray Me. The Model Caught Me on the First Try - ShiftMag
A hands-on OpenClaw experiment reveals that AI agent security hinges on model quality, showing how prompt injection defenses weaken across cheaper LLM tiers.
AI Vulnerability Research and the Fuzzer Era Déjà Vu
https://ift.tt/kPbcR1p
Submitted May 12, 2026 at 09:28PM by Void_Sec
via reddit https://ift.tt/W1D7OIL
https://ift.tt/kPbcR1p
Submitted May 12, 2026 at 09:28PM by Void_Sec
via reddit https://ift.tt/W1D7OIL
VoidSec
AI Vulnerability Research and the Fuzzer Era Déjà Vu: Why the Numbers Are Only Half the Story - VoidSec
AI-assisted vulnerability research is the fuzzer era all over again. Same spike, same plateau. Here is why bug counts are only half the story.
Malicious Coding Agent Skills and the Risk of Dynamic Context | Datadog Security Labs
https://ift.tt/heAn8Ns
Submitted May 12, 2026 at 09:40PM by RedTermSession
via reddit https://ift.tt/b6s52RO
https://ift.tt/heAn8Ns
Submitted May 12, 2026 at 09:40PM by RedTermSession
via reddit https://ift.tt/b6s52RO
Datadoghq
Malicious Coding Agent Skills and the Risk of Dynamic Context
Learn how malicious Claude Code skills can abuse dynamic context commands to execute before model-level prompt injection defenses can intervene.