botM to netsecEnglish · 8 hours agoThe Gap Between Thousands of Vulnerabilities and Reality by Manikandan Swaminathan Apr, 2026plus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Gap Between Thousands of Vulnerabilities and Reality by Manikandan Swaminathan Apr, 2026plus-squaremedium.combotM to netsecEnglish · 8 hours agomessage-square0linkfedilink
botM to netsecEnglish · 8 hours agoApplying SOAR-style automation to physical perimeter securityplus-squarewww.artificialintelligence-news.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApplying SOAR-style automation to physical perimeter securityplus-squarewww.artificialintelligence-news.combotM to netsecEnglish · 8 hours agomessage-square0linkfedilink
botM to netsecEnglish · 20 hours agoRussian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026plus-squarewww.ic3.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRussian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026plus-squarewww.ic3.govbotM to netsecEnglish · 20 hours agomessage-square0linkfedilink
botM to netsecEnglish · 20 hours agoA new initiative that brings together Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux...www.anthropic.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA new initiative that brings together Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux...www.anthropic.combotM to netsecEnglish · 20 hours agomessage-square0linkfedilink
botM to netsecEnglish · 20 hours agoCommon Entra ID Security Assessment Findings Part 3 Weak Privileged Identity Management Configurationplus-squareblog.compass-security.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommon Entra ID Security Assessment Findings Part 3 Weak Privileged Identity Management Configurationplus-squareblog.compass-security.combotM to netsecEnglish · 20 hours agomessage-square0linkfedilink
botM to netsecEnglish · 20 hours agoOffensive Fraud Preventionsecurityautopsy.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOffensive Fraud Preventionsecurityautopsy.combotM to netsecEnglish · 20 hours agomessage-square0linkfedilink
botM to netsecEnglish · 20 hours agodnsight - open source, config driven CLI DNS auditorplus-squarepypi.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkdnsight - open source, config driven CLI DNS auditorplus-squarepypi.orgbotM to netsecEnglish · 20 hours agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoFrom UART to Root Vendor Shell Escape on a Uniview IP Cameraplus-squareygashu.devexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFrom UART to Root Vendor Shell Escape on a Uniview IP Cameraplus-squareygashu.devbotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoWe found a path traversal in an MCP server with 7,700 stars that lets AI agents read your SSH keys. Fix merged.plus-squarespiderrating.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWe found a path traversal in an MCP server with 7,700 stars that lets AI agents read your SSH keys. Fix merged.plus-squarespiderrating.combotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoSpooler Alert Remote Unauthd RCE-to-root Chain in CUPSheyitsas.imexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSpooler Alert Remote Unauthd RCE-to-root Chain in CUPSheyitsas.imbotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoBrandefense Q4 2025 Ransomware Trends Report 2,373 incidents, 125 groups, CVE exploitation breakdownplus-squarebrandefense.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBrandefense Q4 2025 Ransomware Trends Report 2,373 incidents, 125 groups, CVE exploitation breakdownplus-squarebrandefense.iobotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoReading etcpasswd via translation file upload in Tolgees cloud platform CVE-2026-32251, CVSS 9.3plus-squaresimonkoeck.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReading etcpasswd via translation file upload in Tolgees cloud platform CVE-2026-32251, CVSS 9.3plus-squaresimonkoeck.combotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoClosing the Kernel Backport Gap Automated CVE Detectionplus-squarehardenedlinux.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClosing the Kernel Backport Gap Automated CVE Detectionplus-squarehardenedlinux.orgbotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoDetecting CICD Supply Chain Attacks with Canary Credentialsplus-squaretracebit.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDetecting CICD Supply Chain Attacks with Canary Credentialsplus-squaretracebit.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoUsing Cloudflares Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NASplus-squareinfosecwriteups.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUsing Cloudflares Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NASplus-squareinfosecwriteups.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoMicrosoft Speech - Lateral Movementplus-squareipurple.teamexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Speech - Lateral Movementplus-squareipurple.teambotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoThe Race to Ship AI Tools Left Security Behind. Part 1 Sandbox Escapeplus-squarecymulate.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Race to Ship AI Tools Left Security Behind. Part 1 Sandbox Escapeplus-squarecymulate.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoAssessing Claude Mythos Previews capabilitiesred.anthropic.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAssessing Claude Mythos Previews capabilitiesred.anthropic.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoCVE-2026-34197 ActiveMQ RCE via Jolokia APIplus-squarehorizon3.aiexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2026-34197 ActiveMQ RCE via Jolokia APIplus-squarehorizon3.aibotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 3 days agoCracking a Malvertising DGA From the Device Sidewww.buchodi.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCracking a Malvertising DGA From the Device Sidewww.buchodi.combotM to netsecEnglish · 3 days agomessage-square0linkfedilink