botM to netsecEnglish · 8 hours agoThreat Model Discrepancy Google Password Manager leaks cleartext passwords via Task Switcher Wont Fix - Violates German BSI Standardsplus-squaredrive.google.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Model Discrepancy Google Password Manager leaks cleartext passwords via Task Switcher Wont Fix - Violates German BSI Standardsplus-squaredrive.google.combotM to netsecEnglish · 8 hours agomessage-square0linkfedilink
botM to netsecEnglish · 8 hours agoThe NaClCON Salt Con speaker list is out! May 31June 2, Carolina Beach NCplus-squarenaclcon.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe NaClCON Salt Con speaker list is out! May 31June 2, Carolina Beach NCplus-squarenaclcon.combotM to netsecEnglish · 8 hours agomessage-square0linkfedilink
botM to netsecEnglish · 20 hours agoThe Gap Between Thousands of Vulnerabilities and Reality by Manikandan Swaminathan Apr, 2026plus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Gap Between Thousands of Vulnerabilities and Reality by Manikandan Swaminathan Apr, 2026plus-squaremedium.combotM to netsecEnglish · 20 hours agomessage-square0linkfedilink
botM to netsecEnglish · 20 hours agoApplying SOAR-style automation to physical perimeter securityplus-squarewww.artificialintelligence-news.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApplying SOAR-style automation to physical perimeter securityplus-squarewww.artificialintelligence-news.combotM to netsecEnglish · 20 hours agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoRussian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026plus-squarewww.ic3.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRussian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026plus-squarewww.ic3.govbotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoA new initiative that brings together Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux...www.anthropic.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA new initiative that brings together Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux...www.anthropic.combotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoCommon Entra ID Security Assessment Findings Part 3 Weak Privileged Identity Management Configurationplus-squareblog.compass-security.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommon Entra ID Security Assessment Findings Part 3 Weak Privileged Identity Management Configurationplus-squareblog.compass-security.combotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agoOffensive Fraud Preventionsecurityautopsy.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOffensive Fraud Preventionsecurityautopsy.combotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 1 day agodnsight - open source, config driven CLI DNS auditorplus-squarepypi.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkdnsight - open source, config driven CLI DNS auditorplus-squarepypi.orgbotM to netsecEnglish · 1 day agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoFrom UART to Root Vendor Shell Escape on a Uniview IP Cameraplus-squareygashu.devexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFrom UART to Root Vendor Shell Escape on a Uniview IP Cameraplus-squareygashu.devbotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoWe found a path traversal in an MCP server with 7,700 stars that lets AI agents read your SSH keys. Fix merged.plus-squarespiderrating.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWe found a path traversal in an MCP server with 7,700 stars that lets AI agents read your SSH keys. Fix merged.plus-squarespiderrating.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoSpooler Alert Remote Unauthd RCE-to-root Chain in CUPSheyitsas.imexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSpooler Alert Remote Unauthd RCE-to-root Chain in CUPSheyitsas.imbotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoBrandefense Q4 2025 Ransomware Trends Report 2,373 incidents, 125 groups, CVE exploitation breakdownplus-squarebrandefense.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBrandefense Q4 2025 Ransomware Trends Report 2,373 incidents, 125 groups, CVE exploitation breakdownplus-squarebrandefense.iobotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoReading etcpasswd via translation file upload in Tolgees cloud platform CVE-2026-32251, CVSS 9.3plus-squaresimonkoeck.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReading etcpasswd via translation file upload in Tolgees cloud platform CVE-2026-32251, CVSS 9.3plus-squaresimonkoeck.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoClosing the Kernel Backport Gap Automated CVE Detectionplus-squarehardenedlinux.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClosing the Kernel Backport Gap Automated CVE Detectionplus-squarehardenedlinux.orgbotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoDetecting CICD Supply Chain Attacks with Canary Credentialsplus-squaretracebit.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDetecting CICD Supply Chain Attacks with Canary Credentialsplus-squaretracebit.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoUsing Cloudflares Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NASplus-squareinfosecwriteups.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUsing Cloudflares Post-Quantum Tunnel to Protect Plex Remote Access on a Synology NASplus-squareinfosecwriteups.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoMicrosoft Speech - Lateral Movementplus-squareipurple.teamexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Speech - Lateral Movementplus-squareipurple.teambotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoThe Race to Ship AI Tools Left Security Behind. Part 1 Sandbox Escapeplus-squarecymulate.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Race to Ship AI Tools Left Security Behind. Part 1 Sandbox Escapeplus-squarecymulate.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink
botM to netsecEnglish · 2 days agoAssessing Claude Mythos Previews capabilitiesred.anthropic.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAssessing Claude Mythos Previews capabilitiesred.anthropic.combotM to netsecEnglish · 2 days agomessage-square0linkfedilink