From Vercel Typosquatting to an Obfuscated macOS Malware Loader
https://ift.tt/EtXlkyV
Submitted May 15, 2026 at 11:48AM by bogatiAshiz
via reddit https://ift.tt/RZn54lx
https://ift.tt/EtXlkyV
Submitted May 15, 2026 at 11:48AM by bogatiAshiz
via reddit https://ift.tt/RZn54lx
Medium
From Vercel Typosquatting to an Obfuscated macOS Malware Loader
ux dictonary
Automating code security reviews with Claude Mythos-level capabilities
https://ift.tt/zq4bPDJ
Submitted May 15, 2026 at 07:27PM by ganziale
via reddit https://ift.tt/U7k5Q3X
https://ift.tt/zq4bPDJ
Submitted May 15, 2026 at 07:27PM by ganziale
via reddit https://ift.tt/U7k5Q3X
www.synthesia.io
Automating code security reviews with Claude Mythos-level capabilities
We’ve built an agent skill that approaches Mythos-levels of performance in uncovering complex security issues at a fraction of the cost of running such a model.
North Korean Hackers Now Using AI? Kaspersky Warns of New Threat Targeting South Korean Govt Systems
https://ift.tt/EBsGtFH
Submitted May 15, 2026 at 09:47PM by Connect-Mention5807
via reddit https://ift.tt/JZ6plCy
https://ift.tt/EBsGtFH
Submitted May 15, 2026 at 09:47PM by Connect-Mention5807
via reddit https://ift.tt/JZ6plCy
International Business Times
North Korean Hackers Now Using AI? Kaspersky Warns of New Cyber Threat Targeting South Korea
North Korean hackers linked to Kimsuky are using AI-generated code and stealth tools to target South Korea's government authentication systems, Kaspersky warns.
Apple Maildrop lets you rewrite the filename, size, and icon on any icloud.com attachment link — no signature, no validation — reported July 2023, still live
https://ift.tt/AmcvW5q
Submitted May 16, 2026 at 01:46AM by Prize-Unlucky
via reddit https://ift.tt/Xk4elPH
https://ift.tt/AmcvW5q
Submitted May 16, 2026 at 01:46AM by Prize-Unlucky
via reddit https://ift.tt/Xk4elPH
Stuart-Thomas
MAILDROP-01 — Phishing-Grade Identity Spoofing on icloud.com — Thomas (2026)
MAILDROP-01 Public Disclosure: Apple Maildrop URLs expose unsigned, client-controlled filename, size, and icon parameters — phishing-grade identity spoofing on icloud.com. Apple Security Bounty case OE1950888220.
AI-assisted cyberattacks are changing the threat landscape faster than most organizations realize.
https://ift.tt/mp0BG3S
Submitted May 16, 2026 at 08:06PM by Old-Wolverine-9896
via reddit https://ift.tt/SpFJPDg
https://ift.tt/mp0BG3S
Submitted May 16, 2026 at 08:06PM by Old-Wolverine-9896
via reddit https://ift.tt/SpFJPDg
Klimaatpunt
Blog - Dijital İstihbarat, Veri Analitiği ve Stratejik Güvenlik
BlognnQuick caption herennWe write things every now and againnnQuick caption herennFrom emerging technologies to strategic intelligence, this blog
Ansible security and compliance guide
https://ift.tt/Cofs8hO
Submitted May 17, 2026 at 10:13PM by swe129
via reddit https://ift.tt/6hZMJRk
https://ift.tt/Cofs8hO
Submitted May 17, 2026 at 10:13PM by swe129
via reddit https://ift.tt/6hZMJRk
slicker.me
Ansible Security & Compliance
Autonomous AI Penetration Testing with Consent-First Ethical Framework — Research Paper + Working Implementation
https://ift.tt/Ilv9aoD
Submitted May 18, 2026 at 12:08PM by No_Judgment3394
via reddit https://ift.tt/2Tq4u9d
https://ift.tt/Ilv9aoD
Submitted May 18, 2026 at 12:08PM by No_Judgment3394
via reddit https://ift.tt/2Tq4u9d
Zenodo
PhantomRed: An Autonomous AI-Powered Penetration Testing Platform with a Consent-First Ethical Framework
Penetration testing remains a cornerstone of modern cybersecurity practice, yet its adoption is hindered by high cost, scarce expertise, and time-intensive manual workflows. We present PhantomRed, an autonomous penetration testing platform that combines a…
Attacking Cloud Service Providers (ACSP) - An interactive textbook on control-plane intrusion and breaking cross-tenant isolation
https://senyuuri.github.io/acsp/book/index.html
Submitted May 18, 2026 at 02:57PM by senyuuri
via reddit https://ift.tt/GZpj5ab
https://senyuuri.github.io/acsp/book/index.html
Submitted May 18, 2026 at 02:57PM by senyuuri
via reddit https://ift.tt/GZpj5ab
Reddit
From the netsec community on Reddit: Attacking Cloud Service Providers (ACSP) - An interactive textbook on control-plane intrusion…
Posted by senyuuri - 3 votes and 2 comments
TanStack Supply Chain Attack (And How to Lock Down GitHub Actions)
https://ift.tt/PvgzEmD
Submitted May 18, 2026 at 04:58PM by Code-Painting-8294
via reddit https://ift.tt/kjAZ9yW
https://ift.tt/PvgzEmD
Submitted May 18, 2026 at 04:58PM by Code-Painting-8294
via reddit https://ift.tt/kjAZ9yW
www.copilotkit.ai
TanStack Supply Chain Attack (And How to Lock Down GitHub Actions) | Blog | CopilotKit
How TanStack got hit through GitHub Actions, the 8 vulnerabilities we found auditing 20 repos the next day, and the playbook we used to fix them all in 4 days.
The down fall of bug bounties
https://ift.tt/obTxZ7u
Submitted May 18, 2026 at 06:33PM by Mempodipper
via reddit https://ift.tt/RqWl2h7
https://ift.tt/obTxZ7u
Submitted May 18, 2026 at 06:33PM by Mempodipper
via reddit https://ift.tt/RqWl2h7
shubs
The down fall of bug bounties
A few days ago, I was reading a post by Kabir Acharya on how the CTF scene has died as a result of frontier models killing authentic competition. I couldn't really fault his points, but I started thinking about what could actually fix this. We're not going…
AudioHijack: adversarial audio attacks on generative voice models transfer from open weights to Microsoft and Mistral production systems
https://ift.tt/oiOwL7x
Submitted May 18, 2026 at 11:42PM by snackymann
via reddit https://ift.tt/DvQVahe
https://ift.tt/oiOwL7x
Submitted May 18, 2026 at 11:42PM by snackymann
via reddit https://ift.tt/DvQVahe
IEEE Spectrum
Voice AI Systems Are Vulnerable to Hidden Audio Attacks
Research shows sounds unheard by human ears can hijack models’ behavior
ShinyHunters Stole 275 Million Student Records. The Ransom Deadline Is May 12.
https://ift.tt/aQZ5yVK
Submitted May 18, 2026 at 11:04PM by dhakalster123
via reddit https://ift.tt/8REL5TD
https://ift.tt/aQZ5yVK
Submitted May 18, 2026 at 11:04PM by dhakalster123
via reddit https://ift.tt/8REL5TD
Hitechies — AI, Crypto, Security & Dev News for Tech Profession
275 million student records. 8,809 schools. Ransom deadline Tuesday. Here's everything you need to know.
ShinyHunters breached Canvas — the LMS used by 41% of North American universities. Harvard, Penn, Duke, K-12 schools. Private messages, grades, student records. May 12 ransom deadline. Full breakdown at Hitechies.
The quiet death of behavioral anti-bot and the pivot to hardware ZKPs
https://ift.tt/8kjLuCS
Submitted May 19, 2026 at 02:23AM by Italiancan
via reddit https://ift.tt/1K6QJTU
https://ift.tt/8kjLuCS
Submitted May 19, 2026 at 02:23AM by Italiancan
via reddit https://ift.tt/1K6QJTU
World
Find your nearest Orb | Verify your World ID
Find your nearest Orb and verify your World ID. See all countries where the Orb is available for human verification. Learn more.
New Age of Collisions: Reading Arbitrary Files Pre-Auth as root in cPanel (CVE-2026-29205)
https://ift.tt/zpePiXH
Submitted May 19, 2026 at 07:53AM by Mempodipper
via reddit https://ift.tt/c04Tunj
https://ift.tt/zpePiXH
Submitted May 19, 2026 at 07:53AM by Mempodipper
via reddit https://ift.tt/c04Tunj
Searchlight Cyber
New Age of Collisions: Reading Arbitrary Files Pre-Auth as root in cPanel (CVE-2026-29205) › Searchlight Cyber
Times Are Changing These last few months have been super weird. We've ended up in a situation several times where we have learnt that an exploits life cycle has significantly been reduced due to the introduction of frontier models that are extremely capable…
Instrumenting QT6 desktop apps with Frida - Part 2: Building the Bypass Chain
https://ift.tt/42pDNlS
Submitted May 17, 2026 at 05:27PM by samanl33t
via reddit https://ift.tt/meDA3lx
https://ift.tt/42pDNlS
Submitted May 17, 2026 at 05:27PM by samanl33t
via reddit https://ift.tt/meDA3lx
Samanl33T
Runtime Instrumentation of Qt6 Apps with Frida - Part 2: Building the Bypass Chain
Leaving something for LLMs to ponder upon — Hacks, AppSec, life and learnings
RCE and arbitrary file write in Vitess vtbackup via untrusted MANIFEST fields
https://ift.tt/Wdz7RZF
Submitted May 19, 2026 at 03:04PM by TheSilenceOfWinter
via reddit https://ift.tt/Kq7fO9n
https://ift.tt/Wdz7RZF
Submitted May 19, 2026 at 03:04PM by TheSilenceOfWinter
via reddit https://ift.tt/Kq7fO9n
Alex Manson
RCE and arbitrary file write in Vitess vtbackup via untrusted MANIFEST fields
CVE-2026-27965 and CVE-2026-27969 - Vitess vtbackup trusted restore-time fields from the backup MANIFEST, allowing RCE via ExternalDecompressor and arbitrary path writes via FileEntries[].Name.
Pathfinding Labs: Deploy, test, and learn from 100+ intentionally vulnerable AWS environments
https://ift.tt/Sj5alwF
Submitted May 19, 2026 at 04:43PM by sethsec
via reddit https://ift.tt/i4hQ6D2
https://ift.tt/Sj5alwF
Submitted May 19, 2026 at 04:43PM by sethsec
via reddit https://ift.tt/i4hQ6D2
Datadoghq
Pathfinding Labs: Deploy, test, and learn from 100+ intentionally vulnerable AWS environments
Introducing Pathfinding Labs, a collection of intentionally vulnerable AWS environments for red teamers and blue teamers to deploy, exploit, and use for detection validation.
CVE-2026-34473: Pre-auth ZTE H-series router DoS via CGILua request-body parsing
https://minanagehsalalma.github.io/cve-2026-34473-unauthenticated-dos-zte-routers/
Submitted May 19, 2026 at 04:38PM by TheReedemer69
via reddit https://ift.tt/WNjLyHM
https://minanagehsalalma.github.io/cve-2026-34473-unauthenticated-dos-zte-routers/
Submitted May 19, 2026 at 04:38PM by TheReedemer69
via reddit https://ift.tt/WNjLyHM
minanagehsalalma.github.io
CVE-2026-34473: Unauthenticated Denial of Service in ZTE Routers affecting 140K+ devices worldwide (17+ models)
Technical breakdown of the unauthenticated ZTE router DoS published as CVE-2026-34473.
How Storm-2949 turned a compromised identity into a cloud-wide breach
https://ift.tt/EK2VqS8
Submitted May 19, 2026 at 08:29PM by thewhippersnapper4
via reddit https://ift.tt/PiYxAN2
https://ift.tt/EK2VqS8
Submitted May 19, 2026 at 08:29PM by thewhippersnapper4
via reddit https://ift.tt/PiYxAN2
Microsoft News
How Storm-2949 turned a compromised identity into a cloud-wide breach
Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft without using malware. This incident shows how threat actors can exploit trusted systems to operate undetected.
GhostTree: Unveiling Path Manipulation Techniques to Bypass Windows Security
https://ift.tt/ejZCJ3O
Submitted May 20, 2026 at 01:09AM by lohacker0
via reddit https://ift.tt/KjzPXJ4
https://ift.tt/ejZCJ3O
Submitted May 20, 2026 at 01:09AM by lohacker0
via reddit https://ift.tt/KjzPXJ4
Varonis
GhostTree: Unveiling Path Manipulation Techniques to Bypass Windows Security
Varonis Threat Labs discovered a new technique that abuses NTFS junctions to generate infinite file paths, causing EDR products to hang and leave files unscanned.
Sleeping Agent: Silent persistent C2 through Web Push
https://ift.tt/jVWPGig
Submitted May 20, 2026 at 02:28AM by More-Protection-821
via reddit https://ift.tt/WR9FV3G
https://ift.tt/jVWPGig
Submitted May 20, 2026 at 02:28AM by More-Protection-821
via reddit https://ift.tt/WR9FV3G
www.bountyy.fi
Sleeping Agent: Silent persistent C2 through Web Push
Web Push userVisibleOnly was unenforced on Chrome, Edge, and pre-26.5 Safari. A showNotification/close race made the Service Worker silently exploitable as a persistent C2 channel via FCM and WNS. Apple shipped a fix on May 11. The Chromium patch (CL 7767797)…