New ipTIME Pre-Auth RCE in CWMP
https://ift.tt/g8SlxuJ
Submitted May 12, 2026 at 01:46PM by SSDisclosure
via reddit https://ift.tt/s1cSQlh
https://ift.tt/g8SlxuJ
Submitted May 12, 2026 at 01:46PM by SSDisclosure
via reddit https://ift.tt/s1cSQlh
SSD Secure Disclosure
ipTIME Pre-Auth RCE in CWMP - SSD Secure Disclosure
Summary An unauthenticated attacker can remotely execute arbitrary code via the CWMP protocol on the ipTIME router. Vendor Response We have tried to reach out to the vendor through multiple channels (email and via KISA) but have not been able to receive any…
Postmortem: TanStack npm supply-chain compromise
https://ift.tt/43hL28p
Submitted May 12, 2026 at 01:46PM by Code-Painting-8294
via reddit https://ift.tt/E8M3DTI
https://ift.tt/43hL28p
Submitted May 12, 2026 at 01:46PM by Code-Painting-8294
via reddit https://ift.tt/E8M3DTI
Tanstack
Postmortem: TanStack npm supply-chain compromise | TanStack Blog
On 2026-05-11, an attacker chained a pull_request_target Pwn Request, GitHub Actions cache poisoning across the fork↔base trust boundary, and OIDC token extraction from runner memory to publish 84 malicious versions across 42 @tanstack/* packages on npm.…
Curl lead developer Daniel Stenberg provides insightful feedbacks from Mythos analysis results
https://ift.tt/KiYA8x5
Submitted May 12, 2026 at 03:06PM by qwerty0x41
via reddit https://ift.tt/3cV6hKI
https://ift.tt/KiYA8x5
Submitted May 12, 2026 at 03:06PM by qwerty0x41
via reddit https://ift.tt/3cV6hKI
daniel.haxx.se
Mythos finds a curl vulnerability
yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not…
I spent a weekend trying to get OpenClaw to leak my own personal data and it caught me immediately...
https://ift.tt/PToI2D0
Submitted May 12, 2026 at 06:03PM by choochilla44
via reddit https://ift.tt/iP7Zyap
https://ift.tt/PToI2D0
Submitted May 12, 2026 at 06:03PM by choochilla44
via reddit https://ift.tt/iP7Zyap
ShiftMag
I Tried to Get OpenClaw to Betray Me. The Model Caught Me on the First Try - ShiftMag
A hands-on OpenClaw experiment reveals that AI agent security hinges on model quality, showing how prompt injection defenses weaken across cheaper LLM tiers.
AI Vulnerability Research and the Fuzzer Era Déjà Vu
https://ift.tt/kPbcR1p
Submitted May 12, 2026 at 09:28PM by Void_Sec
via reddit https://ift.tt/W1D7OIL
https://ift.tt/kPbcR1p
Submitted May 12, 2026 at 09:28PM by Void_Sec
via reddit https://ift.tt/W1D7OIL
VoidSec
AI Vulnerability Research and the Fuzzer Era Déjà Vu: Why the Numbers Are Only Half the Story - VoidSec
AI-assisted vulnerability research is the fuzzer era all over again. Same spike, same plateau. Here is why bug counts are only half the story.
Malicious Coding Agent Skills and the Risk of Dynamic Context | Datadog Security Labs
https://ift.tt/heAn8Ns
Submitted May 12, 2026 at 09:40PM by RedTermSession
via reddit https://ift.tt/b6s52RO
https://ift.tt/heAn8Ns
Submitted May 12, 2026 at 09:40PM by RedTermSession
via reddit https://ift.tt/b6s52RO
Datadoghq
Malicious Coding Agent Skills and the Risk of Dynamic Context
Learn how malicious Claude Code skills can abuse dynamic context commands to execute before model-level prompt injection defenses can intervene.
Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim
https://ift.tt/g2QCP5V
Submitted May 12, 2026 at 11:11PM by fede_k
via reddit https://ift.tt/ZEfNVQ1
https://ift.tt/g2QCP5V
Submitted May 12, 2026 at 11:11PM by fede_k
via reddit https://ift.tt/ZEfNVQ1
Xbow
XBOW - Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim
XBOW discovered CVE-2026-45185, a critical unauthenticated RCE in Exim, and used the disclosure window to test how far human and autonomous exploit development could go.
The Algorithm Goes to War: Inside the AI Cyberweapon Revolution That Governments Cannot Stop
https://ift.tt/d4QtKHL
Submitted May 12, 2026 at 11:07PM by monotvtv
via reddit https://ift.tt/jfgXIoa
https://ift.tt/d4QtKHL
Submitted May 12, 2026 at 11:07PM by monotvtv
via reddit https://ift.tt/jfgXIoa
Novara Press
The Algorithm Goes to War: Inside the AI Cyberweapon Revolution That Governments Cannot Stop - Novarapress
AI cyberwar autonomous agents are already inside US infrastructure. How nation-states weaponize AI — and what comes next.
AI-Coded App Vulnerability Checklist - 33 LLM-specific items with detection methods
https://ift.tt/g1XjUhN
Submitted May 13, 2026 at 02:39PM by 6biz
via reddit https://ift.tt/qoiYO5I
https://ift.tt/g1XjUhN
Submitted May 13, 2026 at 02:39PM by 6biz
via reddit https://ift.tt/qoiYO5I
z-ny.com
258 Vulnerabilities in AI-Generated Code (and a Scanner for All of Them) — z-ny.com
258 Vulnerabilities in AI-Generated Code (and a Scanner for All of Them) I saw a post recently listing 20 common vulnerabilities in AI-coded apps. Good list. Also wildly optimistic. I've been using AI coding assistants…
A year of Apple Security Bounty research — 16 closed findings, full disclosure
https://ift.tt/jmvFhB3
Submitted May 13, 2026 at 05:19PM by Prize-Unlucky
via reddit https://ift.tt/IFwZPNE
https://ift.tt/jmvFhB3
Submitted May 13, 2026 at 05:19PM by Prize-Unlucky
via reddit https://ift.tt/IFwZPNE
Stuart-Thomas
Are You There? — Security research notes by Stuart Paul Thomas
Findings, disclosures, methodology notes — sent into the dark like a PING.
A stealth approach to Process Injection - EntryPoint Hijacking
https://ift.tt/ALY10sj
Submitted May 13, 2026 at 08:10PM by netbiosX
via reddit https://ift.tt/VmNo68Y
https://ift.tt/ALY10sj
Submitted May 13, 2026 at 08:10PM by netbiosX
via reddit https://ift.tt/VmNo68Y
Purple Team
EntryPoint Hijacking
The technique of EntryPoint Hijacking introduces a stealthier approach to code injection as it doesn’t use API calls that create a new thread within the context of a process, and it independe…
On-prem vs IaaS vs PaaS vs SaaS for self-hosted IAM (Keycloak case study)
https://ift.tt/pUuv09x
Submitted May 13, 2026 at 09:25PM by Will-from-CloudIAM
via reddit https://ift.tt/G25ufkj
https://ift.tt/pUuv09x
Submitted May 13, 2026 at 09:25PM by Will-from-CloudIAM
via reddit https://ift.tt/G25ufkj
Cloud-Iam
Keycloak On-prem, IaaS, PaaS, SaaS or Marketplace | Cloud-IAM
Deploying Keycloak is easy. Running it in production is not. Compare on-prem, IaaS, Marketplace, PaaS, and SaaS to find the deployment model that fits your team, and your actual operational capacity.
On vendor disclosure timelines, bounty programme incentive misalignment, and the psychological contract
https://ift.tt/mqt2X14
Submitted May 14, 2026 at 01:54AM by Prize-Unlucky
via reddit https://ift.tt/A5s4YdD
https://ift.tt/mqt2X14
Submitted May 14, 2026 at 01:54AM by Prize-Unlucky
via reddit https://ift.tt/A5s4YdD
Stuart-Thomas
The Vendor Disclosure Gap — Stuart Thomas
On psychological contracts, timeline opacity, and the limits of researcher good faith in responsible vulnerability disclosure.
/sbin/ping -G sweepmax has no bounds check on macOS: deterministic BSS out-of-bounds write, confirmed by Apple
https://ift.tt/dOSAneq
Submitted May 14, 2026 at 01:53AM by Prize-Unlucky
via reddit https://ift.tt/Ah86ZKQ
https://ift.tt/dOSAneq
Submitted May 14, 2026 at 01:53AM by Prize-Unlucky
via reddit https://ift.tt/Ah86ZKQ
Apple's smbd has no FSCTL_SRV_COPYCHUNK limit enforcement: 256 bytes in, 64 GiB disk I/O out
https://ift.tt/Ks6HXP2
Submitted May 14, 2026 at 01:53AM by Prize-Unlucky
via reddit https://ift.tt/wM7f8Jt
https://ift.tt/Ks6HXP2
Submitted May 14, 2026 at 01:53AM by Prize-Unlucky
via reddit https://ift.tt/wM7f8Jt
WaSteal: 126 Chrome extensions, 148K installs, one Brazilian operator silently sending WhatsApp user data and ad cookies to its servers
https://ift.tt/6q0lubH
Submitted May 14, 2026 at 02:59AM by Huge-Skirt-6990
via reddit https://ift.tt/guZrc1D
https://ift.tt/6q0lubH
Submitted May 14, 2026 at 02:59AM by Huge-Skirt-6990
via reddit https://ift.tt/guZrc1D
malext.io
WaSteal: 126-Extension WhatsApp Data Collection Network — MalExt Sentry
Threat intelligence report: WaSteal: 126-Extension WhatsApp Data Collection Network. Research by MalExt Sentry.
Apple Maildrop lets you rewrite the filename, size, and icon on any icloud.com attachment link — no signature, no validation — reported July 2023, still live
https://ift.tt/UscZHLK
Submitted May 14, 2026 at 02:50AM by Prize-Unlucky
via reddit https://ift.tt/d5aFX6e
https://ift.tt/UscZHLK
Submitted May 14, 2026 at 02:50AM by Prize-Unlucky
via reddit https://ift.tt/d5aFX6e
Stuart-Thomas
MAILDROP-01 — Phishing-Grade Identity Spoofing on icloud.com — Thomas (2026)
MAILDROP-01 Public Disclosure: Apple Maildrop URLs expose unsigned, client-controlled filename, size, and icon parameters — phishing-grade identity spoofing on icloud.com. Apple Security Bounty case OE1950888220.