Forwarded from Android Security & Malware
This media is not supported in your browser
VIEW IN TELEGRAM
Analysis of RCE of Xiaomi C400 camera by exploiting Vulnerability #1 and #3 combined together. Vulnerabilities are not patched!
Vulnerability #1: Xiaomi - miIO Protocol Authentication Bypass
Vulnerability #2: Xiaomi - miIO client cryptographically weak PRNG
Vulnerability #3: miIO client heap buffer overflow
Analysis: https://labs.taszk.io/articles/post/nowyouseemi/
Exploits and jailbreak for Xiaomi Smart Cameras: https://github.com/TaszkSecLabs/xiaomi-c400-pwn
Vulnerability #1: Xiaomi - miIO Protocol Authentication Bypass
Vulnerability #2: Xiaomi - miIO client cryptographically weak PRNG
Vulnerability #3: miIO client heap buffer overflow
Analysis: https://labs.taszk.io/articles/post/nowyouseemi/
Exploits and jailbreak for Xiaomi Smart Cameras: https://github.com/TaszkSecLabs/xiaomi-c400-pwn
❤6
Pentesting a pentest agent - Here's what I've found in AWS Security Agent
https://blog.richardfan.xyz/2026/03/14/pentesting-a-pentest-agent-heres-what-ive-found-in-aws-security-agent.html
https://blog.richardfan.xyz/2026/03/14/pentesting-a-pentest-agent-heres-what-ive-found-in-aws-security-agent.html
Virtual Security Car
Pentesting a pentest agent - Here’s what I’ve found in AWS Security Agent
Richard’s blogs on Cloud Security
❤3
CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store
https://blog.securelayer7.net/cve-2026-22730-sql-injection-spring-ai-mariadb/
https://blog.securelayer7.net/cve-2026-22730-sql-injection-spring-ai-mariadb/
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store
Contributors: Sandeep Kamble, BugDazz Autonomous Pentest AI, Rabit0 ModelPublication Date: March 19, 2026Severity Rating: High (CVSS Score: 8.8)Vulnerability Status: Zero-day at time of discovery A...
❤7👍1
Instagram Notes Audio Leakage via URL Extraction (Fixed & Rewarded)
https://github.com/i12gocaj/Instagram-Notes-Audio-Leakage-via-URL-Extraction-Fixed
https://github.com/i12gocaj/Instagram-Notes-Audio-Leakage-via-URL-Extraction-Fixed
GitHub
GitHub - i12gocaj/Instagram-Notes-Audio-Leakage-via-URL-Extraction-Fixed
Contribute to i12gocaj/Instagram-Notes-Audio-Leakage-via-URL-Extraction-Fixed development by creating an account on GitHub.
❤8👎4
How I Earned $76,000 From a Single Program on Bugcrowd
https://anonhunter.medium.com/how-i-earned-76-000-from-a-single-program-on-bugcrowd-adf2a0eeece0
https://anonhunter.medium.com/how-i-earned-76-000-from-a-single-program-on-bugcrowd-adf2a0eeece0
Medium
How I Earned $76,000 From a Single Program on Bugcrowd
Consistency and patience are not soft skills in bug bounty. They are the strategy.
❤18👎8👍3
Remote Command Execution in Google Cloud with Single Directory Deletion
https://flatt.tech/research/posts/remote-command-execution-in-google-cloud-with-single-directory-deletion/
https://flatt.tech/research/posts/remote-command-execution-in-google-cloud-with-single-directory-deletion/
GMO Flatt Security Research
Remote Command Execution in Google Cloud with Single Directory Deletion
Introduction
Hello, I’m RyotaK
(@ryotkak
), a security engineer at GMO Flatt Security Inc.
A while ago, I participated in the Google Cloud VRP bugSWAT,
a live hacking event organized by Google.
During this event, I discovered a remote command execution…
Hello, I’m RyotaK
(@ryotkak
), a security engineer at GMO Flatt Security Inc.
A while ago, I participated in the Google Cloud VRP bugSWAT,
a live hacking event organized by Google.
During this event, I discovered a remote command execution…
❤8
Breaking Pingora: HTTP Request Smuggling & Cache Poisoning in Cloudflare's Reverse Proxy
https://xclow3n.github.io/post/6/
https://xclow3n.github.io/post/6/
xclow3n.github.io
Breaking Pingora: HTTP Request Smuggling & Cache Poisoning in Cloudflare's Reverse Proxy | xclow3n
Found 3 HTTP request smuggling bugs and 1 cache poisoning vulnerability in Cloudflare's Pingora reverse proxy. All exploitable under default config. 3 CVEs, $5k bounty. Full technical breakdown and disclosure notes.
❤9💯1
ShadowPrompt: How Any Website Could Have Hijacked Claude's Chrome Extension
https://www.koi.ai/blog/shadowprompt-how-any-website-could-have-hijacked-anthropic-claude-chrome-extension
https://www.koi.ai/blog/shadowprompt-how-any-website-could-have-hijacked-anthropic-claude-chrome-extension
www.koi.ai
ShadowPrompt: How Any Website Could Have Hijacked Claude's Chrome Extension
We found a vulnerability in Claude's Chrome Extension that let any website silently inject prompts into your AI-powered browser session. By chaining a wildcard origin allowlist with a DOM-based XSS in a CAPTCHA subdomain, an attacker could steal credentials…
❤4
How Command Injection Vulnerability in OpenAI Codex Leads to GitHub Token Compromise
https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token
https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token
BeyondTrust
OpenAI Codex Command Injection Vulnerability | BeyondTrust
BeyondTrust Phantom Labs reveals a critical command injection vulnerability in OpenAI Codex. Learn how malicious GitHub branch names enable OAuth token…
❤6
Crafting a Full Read SSRF: A Journey Through Oauth DCR, Open URL Redirects, and Path Normalization
https://eib.hashnode.dev/crafting-a-full-read-ssrf-a-journey-through-oauth-dcr-open-url-redirects-and-path-normalization
https://eib.hashnode.dev/crafting-a-full-read-ssrf-a-journey-through-oauth-dcr-open-url-redirects-and-path-normalization
Eib's Blog
ssrf open redirect dynamic client registration oauth
The Bug
This blog post outlines the chains of multiple gadgets to achieve a full read ssrf on a target.
Open Dynamic client registration on the MCP server to create an open redirect gadget
Path norm
This blog post outlines the chains of multiple gadgets to achieve a full read ssrf on a target.
Open Dynamic client registration on the MCP server to create an open redirect gadget
Path norm
❤6👍1
What we learned about TEE security from auditing WhatsApp
https://blog.trailofbits.com/2026/04/07/what-we-learned-about-tee-security-from-auditing-whatsapps-private-inference/
https://blog.trailofbits.com/2026/04/07/what-we-learned-about-tee-security-from-auditing-whatsapps-private-inference/
The Trail of Bits Blog
What we learned about TEE security from auditing WhatsApp's Private Inference
Our audit of WhatsApp’s new “Private Inference” feature shows that trusted execution environments (TEEs) aren’t a silver bullet.
❤5
Five takeaways from the UK’s Cyber Security & Resilience Bill
https://www.intigriti.com/blog/news/key-takeaways-from-the-uk-cyber-security-and-resilience-bill
https://www.intigriti.com/blog/news/key-takeaways-from-the-uk-cyber-security-and-resilience-bill
Intigriti
Five takeaways from the UK’s Cyber Security & Resilience Bill
The Cyber Security & Resilience Bill is both predictable and significant, here are five key takeaways that matter most for organizations trying to understand what this Bill really means in practice.
PortSwigger partners with Meta Bug Bounty to empower bug hunters with training and Pro licenses
https://portswigger.net/blog/portswigger-partners-with-meta-bug-bounty-to-empower-bug-hunters-with-training-and-pro-licenses
https://portswigger.net/blog/portswigger-partners-with-meta-bug-bounty-to-empower-bug-hunters-with-training-and-pro-licenses
PortSwigger Blog
PortSwigger partners with Meta Bug Bounty to empower bug hunters with training and Pro licenses
👎3👍1
Master C and C++ with our new Testing Handbook chapter
https://blog.trailofbits.com/2026/04/09/master-c-and-c-with-our-new-testing-handbook-chapter/
https://blog.trailofbits.com/2026/04/09/master-c-and-c-with-our-new-testing-handbook-chapter/
The Trail of Bits Blog
Master C and C++ with our new Testing Handbook chapter
We released a new Testing Handbook chapter providing a comprehensive security checklist for C and C++ code review, covering Linux, Windows, and seccomp environments.
❤8
How We Cut LLM Costs by 59% With Prompt Caching — ProjectDiscovery Blog
https://projectdiscovery.io/blog/how-we-cut-llm-cost-with-prompt-caching
https://projectdiscovery.io/blog/how-we-cut-llm-cost-with-prompt-caching
ProjectDiscovery
How We Cut LLM Costs by 59% With Prompt Caching — ProjectDiscovery Blog
At ProjectDiscovery, we've been building Neo, an autonomous security testing platform that runs multi-agent, multi-step workflows, routinely executing 20-40+ LLM steps per task. Vulnerability assessments, code reviews, and security audits at scale, enabling…
👍2❤1
Protecting Cookies with Device Bound Session Credentials
http://security.googleblog.com/2026/04/protecting-cookies-with-device-bound.html
http://security.googleblog.com/2026/04/protecting-cookies-with-device-bound.html
Google Online Security Blog
Protecting Cookies with Device Bound Session Credentials
Posted by Ben Ackerman, Chrome team, Daniel Rubery, Chrome team and Guillaume Ehinger, Google Account Security team Following our April ...
❤4👍1
Bringing Rust to the Pixel Baseband
http://security.googleblog.com/2026/04/bringing-rust-to-pixel-baseband.html
http://security.googleblog.com/2026/04/bringing-rust-to-pixel-baseband.html
Google Online Security Blog
Bringing Rust to the Pixel Baseband
Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have been f...
💯2❤1
Introducing the official Burp Ambassador Program
https://portswigger.net/blog/introducing-the-official-burp-ambassador-program
https://portswigger.net/blog/introducing-the-official-burp-ambassador-program
PortSwigger Blog
Introducing the official Burp Ambassador Program
Introducing the official Burp Suite Ambassador Program
❤2👎2
We beat Google’s zero-knowledge proof of quantum cryptanalysis
https://blog.trailofbits.com/2026/04/17/we-beat-googles-zero-knowledge-proof-of-quantum-cryptanalysis/
https://blog.trailofbits.com/2026/04/17/we-beat-googles-zero-knowledge-proof-of-quantum-cryptanalysis/
The Trail of Bits Blog
We beat Google’s zero-knowledge proof of quantum cryptanalysis
Trail of Bits discovered and exploited memory safety and logic vulnerabilities in Google’s Rust zero-knowledge proof code to forge a proof claiming better quantum circuit performance metrics than Google’s original results, demonstrating unique security risks…
❤10
Common misconceptions debugged!
https://www.intigriti.com/blog/business-insights/common-misconceptions-debugged
https://www.intigriti.com/blog/business-insights/common-misconceptions-debugged
Intigriti
Common misconceptions debugged!
AI and the growing ecosystem of tools built around it have now moved beyond early experimentation and into everyday use across the bug bounty community.
❤2🤔1