AI can be used to create working exploits for published CVEs in a few minutes and for a few dollars
https://ift.tt/4bkaMng
Submitted August 21, 2025 at 09:49PM by valmarelox
via reddit https://ift.tt/rfQMAEK
https://ift.tt/4bkaMng
Submitted August 21, 2025 at 09:49PM by valmarelox
via reddit https://ift.tt/rfQMAEK
Substack
Can AI weaponize new CVEs in under 15 minutes?
If AI can mass-produce exploits, how much time do defenders really have left?
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074)
https://ift.tt/3JL7oMA
Submitted August 21, 2025 at 10:59PM by Wanazabadee
via reddit https://ift.tt/yjWAKEJ
https://ift.tt/3JL7oMA
Submitted August 21, 2025 at 10:59PM by Wanazabadee
via reddit https://ift.tt/yjWAKEJ
CaMeL Security Demonstration - Defending Against (most) Prompt Injections by Design
https://camel-security.github.io/
Submitted August 22, 2025 at 03:35AM by ok_bye_now_
via reddit https://ift.tt/qGtZprQ
https://camel-security.github.io/
Submitted August 22, 2025 at 03:35AM by ok_bye_now_
via reddit https://ift.tt/qGtZprQ
Reddit
From the netsec community on Reddit: CaMeL Security Demonstration - Defending Against (most) Prompt Injections by Design
Posted by ok_bye_now_ - 1 vote and 0 comments
Silent Harvest: Extracting Windows Secrets Under the Radar
https://ift.tt/oClksij
Submitted August 22, 2025 at 10:47PM by mepper
via reddit https://ift.tt/vwdQj6M
https://ift.tt/oClksij
Submitted August 22, 2025 at 10:47PM by mepper
via reddit https://ift.tt/vwdQj6M
Sud0Ru
Silent Harvest: Extracting Windows Secrets Under the Radar
Once you gain a foothold on a Windows host, the next objective is often to compromise additional machines. The fastest way to achieve this is by harvesting credentials and other secrets for reuse. However, nowadays, most known techniques for collecting Windows…
MCP Hub > hackerone-mcp
https://ift.tt/086VzGS
Submitted August 23, 2025 at 11:51AM by Equal-Strike-2540
via reddit https://ift.tt/zMwjdsZ
https://ift.tt/086VzGS
Submitted August 23, 2025 at 11:51AM by Equal-Strike-2540
via reddit https://ift.tt/zMwjdsZ
MCP Hub
MCP Hub > hackerone-mcp
HackerOne API를 활용하여 버그 바운티 프로그램 정보, 공개된 보고서, 범위 등 다양한 데이터를 조회하고 분석하는 파이썬 기반 도구입니다.
Countering EDRs With The Backing Of Protected Process Light (PPL)
https://ift.tt/mzf4h9I
Submitted August 23, 2025 at 02:27PM by Cold-Dinosaur
via reddit https://ift.tt/OVvNjhl
https://ift.tt/mzf4h9I
Submitted August 23, 2025 at 02:27PM by Cold-Dinosaur
via reddit https://ift.tt/OVvNjhl
Zerosalarium
Countering EDRs With The Backing Of Protected Process Light (PPL)
Abusing the Clipup.exe program by using the CreateProcessAsPPL.exe tool to destroy the executable file of the EDRs, Antivirus.
New Algorithm Detects Active Hacking Groups Targeting Companies
https://ift.tt/crKTaJN
Submitted August 23, 2025 at 04:39PM by Disscom
via reddit https://ift.tt/GdmQez4
https://ift.tt/crKTaJN
Submitted August 23, 2025 at 04:39PM by Disscom
via reddit https://ift.tt/GdmQez4
Deepspecter
Deepspecter | Technical Due Diligence & Corporate Intelligence
Exposing digital fraud, regulatory evasion, and corporate manipulation through cyber intelligence. We investigate what others ignore.
VibeCoding VPN Deployment
https://ift.tt/cMlYyuh
Submitted August 23, 2025 at 10:43PM by Fit-Cut9562
via reddit https://ift.tt/Ab4JLt7
https://ift.tt/cMlYyuh
Submitted August 23, 2025 at 10:43PM by Fit-Cut9562
via reddit https://ift.tt/Ab4JLt7
ZephrSec - Adventures In Information Security
AI Assisted Dev aka Vibecoding
I used Claude to build ProxyGen, a multi-cloud WireGuard VPN tool. It needed tweaks but showed how far AI vibecoding can go, flaws and all.
New Gmail Phishing Scam Uses AI-Style Prompt Injection to Evade Detection
https://ift.tt/MxFgmyi
Submitted August 24, 2025 at 02:07AM by anuraggawande
via reddit https://ift.tt/G6OkhRV
https://ift.tt/MxFgmyi
Submitted August 24, 2025 at 02:07AM by anuraggawande
via reddit https://ift.tt/G6OkhRV
Malware Analysis, Phishing, and Email Scams
Phishing Emails Are Now Aimed at Users and AI Defenses
Phishing has always been about deceiving people. But in this campaign, I discovered something new. The attackers weren’t only targeting users, they also attempted to manipulate AI-based defences. T…
Tracking malicious code execution in Python
https://ift.tt/hUPMDt8
Submitted August 25, 2025 at 01:05PM by rushter_
via reddit https://ift.tt/Ut0chgl
https://ift.tt/hUPMDt8
Submitted August 25, 2025 at 01:05PM by rushter_
via reddit https://ift.tt/Ut0chgl
Artem Golubin
Tracking malicious code execution in Python | Artem Golubin
Why code analysis can be hard when it comes to malicious code.
Vtenext 25.02: A three-way path to RCE
https://ift.tt/YeySfcw
Submitted August 25, 2025 at 03:55PM by theMiddleBlue
via reddit https://ift.tt/sYt3DMO
https://ift.tt/YeySfcw
Submitted August 25, 2025 at 03:55PM by theMiddleBlue
via reddit https://ift.tt/sYt3DMO
Sicuranext Blog
Vtenext 25.02: A three-way path to RCE
Multiple vulnerabilities in vtenext 25.02 and prior versions allow unauthenticated attackers to bypass authentication through three separate vectors, ultimately leading to remote code execution on the underlying server.
Build a new kind of browser security, care to try it? You have access to control a private key but cannot take it. Looking for things that break. No security knowledge needed to try it if you can copy paste and type you can try to break the new algorithm.
https://ift.tt/3uJPH6a
Submitted August 25, 2025 at 11:38PM by Dangerous-Middle922
via reddit https://ift.tt/LIEcNpP
https://ift.tt/3uJPH6a
Submitted August 25, 2025 at 11:38PM by Dangerous-Middle922
via reddit https://ift.tt/LIEcNpP
Safeguarding VS Code against prompt injections
https://ift.tt/7P9DIzj
Submitted August 26, 2025 at 12:34AM by artsploit
via reddit https://ift.tt/jYAMvWI
https://ift.tt/7P9DIzj
Submitted August 26, 2025 at 12:34AM by artsploit
via reddit https://ift.tt/jYAMvWI
The GitHub Blog
Safeguarding VS Code against prompt injections
See how to reduce the risks of an indirect prompt injection, such as the exposure of confidential files or the execution of code without the user's consent.
CPF a framework that predicts security vulnerabilities using psychology and psychoanalysis.
https://cpf3.org
Submitted August 26, 2025 at 03:41AM by kaolay
via reddit https://ift.tt/vaDIPiN
https://cpf3.org
Submitted August 26, 2025 at 03:41AM by kaolay
via reddit https://ift.tt/vaDIPiN
cpf3.org
CPF3: Psychological Vulnerability Assessment Framework
First systematic integration of psychoanalytic theory with cybersecurity practice. Identifies unconscious vulnerabilities 300ms before conscious awareness.
DIAC ∞ 2: A Post-Quantum, P=NP-Resistant Cryptosystem
https://ift.tt/KQi2lSL
Submitted August 26, 2025 at 08:36AM by No_Arachnid_5563
via reddit https://ift.tt/aRmAT07
https://ift.tt/KQi2lSL
Submitted August 26, 2025 at 08:36AM by No_Arachnid_5563
via reddit https://ift.tt/aRmAT07
OSF
DIAC ∞ 2: A Post-Quantum, P=NP-Resistant, Infinite Search Space Hybrid Encryption System
DIAC∞ 2 is an experimental novel hybrid post-quantum encryption system combining ML-KEM-512 (Kyber variant) for quantum-resistant key encapsulation, ChaCha20-Poly1305 for authenticated encryption, and a post-quantum AEAD layer. Its novel Transcendental Window…
IPv4/IPv6 Packet Fragmentation: Detection & Reassembly
https://ift.tt/kVwynzO
Submitted August 26, 2025 at 06:18PM by MFMokbel
via reddit https://ift.tt/nWuIFxa
https://ift.tt/kVwynzO
Submitted August 26, 2025 at 06:18PM by MFMokbel
via reddit https://ift.tt/nWuIFxa
PacketSmith
IP Fragmentation Detection & Reassembly - PacketSmith
IPv4/IPv6 Packet Fragmentation: Detection & Reassembly Introduction A packet can be broken into smaller pieces, or fragments, at the network layer (by the IPv4 and IPv6 protocols) to fit within a specific Maximum Transmission Unit (MTU). For IPv4, a packet’s…
This House is Haunted: a decade old RCE in the AION client
https://appsec.space/posts/aion-housing-exploit/
Submitted August 26, 2025 at 09:44PM by himazawa
via reddit https://ift.tt/jWdzV2J
https://appsec.space/posts/aion-housing-exploit/
Submitted August 26, 2025 at 09:44PM by himazawa
via reddit https://ift.tt/jWdzV2J
appsec & stuff
This House is Haunted: a decade old RCE in the AION client
TL;DR I found a RCE in the AION client starting from 3.0 (not confirmed the latest version vulnerable) using the built-in housing system. Private servers are still vulnerable. Important Note In the initial version of this post I wrote that the housing system…
The One Where We Just Steal The Vulnerabilities (CrushFTP CVE-2025-54309) - watchTowr Labs
https://ift.tt/FTvHDnr
Submitted August 27, 2025 at 10:23AM by dx7r__
via reddit https://ift.tt/TH5ebAf
https://ift.tt/FTvHDnr
Submitted August 27, 2025 at 10:23AM by dx7r__
via reddit https://ift.tt/TH5ebAf
watchTowr Labs
The One Where We Just Steal The Vulnerabilities (CrushFTP CVE-2025-54309)
On July 18, 2025, users of CrushFTP woke up to an announcement:
As we’ve all experienced in 2025, 2025 has been the year of vendors burying their heads in the sand with regard to in-the-wild exploitation, even in the face of impressively indisputable evidence…
As we’ve all experienced in 2025, 2025 has been the year of vendors burying their heads in the sand with regard to in-the-wild exploitation, even in the face of impressively indisputable evidence…
Why Relying on LLMs for Code Can Be a Security Nightmare
https://ift.tt/Xg7tbPI
Submitted August 27, 2025 at 08:05PM by unknownhad
via reddit https://ift.tt/97ipax1
https://ift.tt/Xg7tbPI
Submitted August 27, 2025 at 08:05PM by unknownhad
via reddit https://ift.tt/97ipax1
Terminal
Why Relying on LLMs for Code Can Be a Security Nightmare
LLM generated code can ships demo logic with security issues not defenses. Here is a real world example and how it could be abused.
NX Compromised to Check for Claude Code CLI and Explore Filesystem for Credentials
https://ift.tt/N3rVo2c
Submitted August 27, 2025 at 07:49PM by j12y
via reddit https://ift.tt/kXfqnJs
https://ift.tt/N3rVo2c
Submitted August 27, 2025 at 07:49PM by j12y
via reddit https://ift.tt/kXfqnJs
Semgrep
Security Alert | NX Compromised to Steal Wallets and Credentials
What is s1ngularity-repository? Nx is compromised and the malware steals wallets and API keys using Claude CLI or Gemini.
Referral Beware, Your Rewards are Mine (Part 1)
https://ift.tt/zfaCrlw
Submitted August 27, 2025 at 11:56PM by hackers_and_builders
via reddit https://ift.tt/ZW6FIge
https://ift.tt/zfaCrlw
Submitted August 27, 2025 at 11:56PM by hackers_and_builders
via reddit https://ift.tt/ZW6FIge
Rhino Security Labs
Referral Beware, Your Rewards are Mine (Part 1)
Referral rewards programs are nearly ubiquitous today, from consumer tech to SaaS companies, but are rarely given much security oversight.