CVE-2026-2103 - Infor Syteline ERP - Keys Included: No Assembly Required
https://ift.tt/lBdNK9L
Submitted February 09, 2026 at 08:03PM by aconite33
via reddit https://ift.tt/32VaBb4
https://ift.tt/lBdNK9L
Submitted February 09, 2026 at 08:03PM by aconite33
via reddit https://ift.tt/32VaBb4
Blacklanternsecurity
CVE-2026-2103 - Infor Syteline ERP
Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools
https://matheuzsecurity.github.io/hacking/ebpf-security-tools-hacking/
Submitted February 10, 2026 at 02:41AM by Worldly-Fruit5174
via reddit https://ift.tt/5pO6th2
https://matheuzsecurity.github.io/hacking/ebpf-security-tools-hacking/
Submitted February 10, 2026 at 02:41AM by Worldly-Fruit5174
via reddit https://ift.tt/5pO6th2
0xMatheuZ
Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools
Deep technical analysis of bypassing eBPF-based security solutions through kernel-level hooks targeting BPF iterators, ringbuffers, and perf events
Augustus: Open Source LLM Prompt Injection Tool
https://ift.tt/sFyd8Ii
Submitted February 10, 2026 at 02:56AM by Praetorian_Security
via reddit https://ift.tt/f93jci8
https://ift.tt/sFyd8Ii
Submitted February 10, 2026 at 02:56AM by Praetorian_Security
via reddit https://ift.tt/f93jci8
Praetorian
Introducing Augustus: Open Source LLM Prompt Injection Tool | Praetorian
From LLM Fingerprinting to LLM Prompt Injection LLMs Are Deployed Faster Than They're Tested Introducing Augustus How It Works Buff Transformations 28 LLM Providers Quick Start What's Next Contributing & Community
We scanned 8,000+ MCP servers, this is what we learned.
http://mcp-trust.com
Submitted February 10, 2026 at 04:44AM by Upstairs_Safe2922
via reddit https://ift.tt/AEjW3BT
http://mcp-trust.com
Submitted February 10, 2026 at 04:44AM by Upstairs_Safe2922
via reddit https://ift.tt/AEjW3BT
Reddit
From the netsec community on Reddit: We scanned 8,000+ MCP servers, this is what we learned.
Explore this post and more from the netsec community
Http11Probe - Probe for Http 1.1 compliance
https://mda2av.github.io/Http11Probe/
Submitted February 10, 2026 at 04:24PM by MDA2AV
via reddit https://ift.tt/Qh2mbIo
https://mda2av.github.io/Http11Probe/
Submitted February 10, 2026 at 04:24PM by MDA2AV
via reddit https://ift.tt/Qh2mbIo
mda2av.github.io
Http11Probe
Open Source HTTP/1.1 Compliance Platform An open testing platform that probes HTTP/1.1 servers against RFC 9110/9112 requirements, smuggling vectors, and malformed input handling. Add your framework, get compliance results automatically.
GAC Hijacking
https://ift.tt/hDvz0Id
Submitted February 10, 2026 at 05:35PM by netbiosX
via reddit https://ift.tt/FYNCU3e
https://ift.tt/hDvz0Id
Submitted February 10, 2026 at 05:35PM by netbiosX
via reddit https://ift.tt/FYNCU3e
Purple Team
GAC Hijacking
The Global Assembly Cache is a system-wide repository in the .NET framework that stores strong named (name + version + culture + public key token identity) assemblies so multiple applications can u…
We hid backdoors in binaries — Opus 4.6 found 49% of them
https://ift.tt/SAiBCWm
Submitted February 10, 2026 at 07:48PM by jakozaur
via reddit https://ift.tt/rPT0ZbN
https://ift.tt/SAiBCWm
Submitted February 10, 2026 at 07:48PM by jakozaur
via reddit https://ift.tt/rPT0ZbN
Quesma
We hid backdoors in binaries — Opus 4.6 found 49% of them - Quesma Blog
BinaryAudit benchmarks AI agents using Ghidra to find backdoors in compiled binaries of real open-source servers, proxies, and network infrastructure.
Adbleed: partially de-anonymizing VPN users with adblock filter lists
https://ift.tt/bFcwmBW
Submitted February 10, 2026 at 09:34PM by TroubleNo3411
via reddit https://ift.tt/6qge9nd
https://ift.tt/bFcwmBW
Submitted February 10, 2026 at 09:34PM by TroubleNo3411
via reddit https://ift.tt/6qge9nd
LOTUSLITE: Targeted espionage leveraging geopolitical themes
https://ift.tt/7jhU8ot
Submitted February 10, 2026 at 11:22PM by bagaudin
via reddit https://ift.tt/6jXLOEC
https://ift.tt/7jhU8ot
Submitted February 10, 2026 at 11:22PM by bagaudin
via reddit https://ift.tt/6jXLOEC
Acronis
LOTUSLITE: Targeted espionage leveraging geopolitical themes
Acronis Threat Research Unit (TRU) observed a targeted malware campaign against U.S. government entities leveraging a politically themed ZIP archive containing a loader executable and a malicious DLL. The executable is used to sideload and execute the DLL…
I let Claude Code with 150+ offensive security MCP tools loose on my homelab
https://ift.tt/HyGm6c4
Submitted February 11, 2026 at 01:45AM by Mindless-Study1898
via reddit https://ift.tt/VczmoWL
https://ift.tt/HyGm6c4
Submitted February 11, 2026 at 01:45AM by Mindless-Study1898
via reddit https://ift.tt/VczmoWL
Cred Relay
I Let Claude Code Hack My Homelab | Cred Relay
Letting AI Loose in My Homelab
Confused Deputy Problem – How to Hack Cloud Integrations
https://ift.tt/VrNSe52
Submitted February 11, 2026 at 01:26AM by x0zayl
via reddit https://ift.tt/b1LqIzA
https://ift.tt/VrNSe52
Submitted February 11, 2026 at 01:26AM by x0zayl
via reddit https://ift.tt/b1LqIzA
zayl.dk
Confused Deputy Problem – How to Hack Cloud Integrations | Zayl Security
Securing Digital Assets in an Evolving Threat Landscape — analysis of DPRK/Lazarus operations, DaaS proliferation, and defense-in-depth architecture [PDF]
https://ift.tt/fPdXiL1
Submitted February 12, 2026 at 01:23AM by FireblocksHQ
via reddit https://ift.tt/lUFzRkM
https://ift.tt/fPdXiL1
Submitted February 12, 2026 at 01:23AM by FireblocksHQ
via reddit https://ift.tt/lUFzRkM
Microsoft's Notepad Got Pwned (CVE-2026-20841)
https://ift.tt/gTeJkXQ
Submitted February 12, 2026 at 01:05PM by pipewire
via reddit https://ift.tt/LjpZQys
https://ift.tt/gTeJkXQ
Submitted February 12, 2026 at 01:05PM by pipewire
via reddit https://ift.tt/LjpZQys
FOSS Daily!
Microsoft's Notepad Got Pwned (They Added AI To It, So...)
Notepad RCE vulnerability CVE-2026-20841 explained. How a text editor became a remote code execution vector. What you need to know.
Quick IAM fundamentals knowledge check for security practitioners
https://ift.tt/yd5F6wz
Submitted February 12, 2026 at 01:29PM by Big_Hour_2429
via reddit https://ift.tt/GKeu5kw
https://ift.tt/yd5F6wz
Submitted February 12, 2026 at 01:29PM by Big_Hour_2429
via reddit https://ift.tt/GKeu5kw
ETCISO.in
Cyber Decoded
No Legs, No Problem: Dumping BGA MCP NAND Flash
https://ift.tt/Q5PbECL
Submitted February 11, 2026 at 01:17AM by fatpengoo
via reddit https://ift.tt/fQreacs
https://ift.tt/Q5PbECL
Submitted February 11, 2026 at 01:17AM by fatpengoo
via reddit https://ift.tt/fQreacs
pengoo.fr
No Legs, No Problem: Dumping BGA MCP NAND Flash
How to dump BGA MCP NAND Flash with
the Xgecu T48 Flash programmer. Dead-bug style (microscope required).
the Xgecu T48 Flash programmer. Dead-bug style (microscope required).
YAML Merge Tags and More Parser Differentials
https://ift.tt/ZaNhTno
Submitted February 12, 2026 at 04:10PM by Moopanger
via reddit https://ift.tt/xuQnGUb
https://ift.tt/ZaNhTno
Submitted February 12, 2026 at 04:10PM by Moopanger
via reddit https://ift.tt/xuQnGUb
TURN Security Threats: A Hacker's View
https://ift.tt/XLcxlA4
Submitted February 12, 2026 at 03:50PM by EnableSecurity
via reddit https://ift.tt/FLDCbAN
https://ift.tt/XLcxlA4
Submitted February 12, 2026 at 03:50PM by EnableSecurity
via reddit https://ift.tt/FLDCbAN
Enable Security
TURN Security Threats: A Hacker's View
TURN servers are powerful proxies abused for internal network access, C2 operations, and DDoS attacks. Threat analysis from years of research and pentesting.
I kept finding security issues in AI-generated code, so I built a scanner for it
https://codearmor-ai.vercel.app/
Submitted February 12, 2026 at 05:28PM by AdnanBasil
via reddit https://ift.tt/RYrlof1
https://codearmor-ai.vercel.app/
Submitted February 12, 2026 at 05:28PM by AdnanBasil
via reddit https://ift.tt/RYrlof1
codearmor-ai.vercel.app
CodeArmor AI Security Dashboard
Security-hardened baseline with scoring and Supabase-ready integration.