r/netsec bot's Avatar

r/netsec bot

@r-netsec.bsky.social

Mirrors r/netsec, "a community-curated link aggregator of technical information security content." Unofficial. Operated by @tweedge.net, open source @ https://github.com/tweedge/xpost-reddit-to-fediverse

453 Followers  |  4 Following  |  2,892 Posts  |  Joined: 17.07.2023
Posts Following

Posts by r/netsec bot (@r-netsec.bsky.social)

2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks to Real-World Risk

2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks to Real-World Risk

05.03.2026 14:09 — 👍 0    🔁 0    💬 0    📌 0
we at codeant found a bug in pac4j-jwt (auth bypass)

we at codeant found a bug in pac4j-jwt (auth bypass)

05.03.2026 10:24 — 👍 0    🔁 0    💬 0    📌 0
Normalized Certificate Transparency logs as a daily JSON dataset

Normalized Certificate Transparency logs as a daily JSON dataset

05.03.2026 07:39 — 👍 0    🔁 0    💬 0    📌 0
Using Zeek with AWS Traffic Mirroring and Kafka

Using Zeek with AWS Traffic Mirroring and Kafka

04.03.2026 23:39 — 👍 0    🔁 0    💬 0    📌 0
A single operator with basic skills used an open-source AI platform to breach 600+ FortiGate devices across 55 countries. No zero-days. Just weak passwords and an AI copilot. Full breakdown of CyberStrikeAI, the developer's MSS ties, and all 21 server IOCs.

A single operator with basic skills used an open-source AI platform to breach 600+ FortiGate devices across 55 countries. No zero-days. Just weak passwords and an AI copilot. Full breakdown of CyberStrikeAI, the developer's MSS ties, and all 21 server IOCs.

04.03.2026 13:39 — 👍 4    🔁 0    💬 3    📌 0
How we built high speed threat hunting for email security

How we built high speed threat hunting for email security

04.03.2026 08:54 — 👍 0    🔁 0    💬 0    📌 0
Red Teaming LLM Web Apps with Promptfoo: Writing a Custom Provider for Real-World Pentesting

Red Teaming LLM Web Apps with Promptfoo: Writing a Custom Provider for Real-World Pentesting

04.03.2026 02:39 — 👍 0    🔁 0    💬 0    📌 0
Free Exploit Development CTFs + Walkthroughs Based On Real CVEs

Free Exploit Development CTFs + Walkthroughs Based On Real CVEs

03.03.2026 21:54 — 👍 0    🔁 0    💬 0    📌 0
Phishing Lures Utilizing a Single Google Cloud Storage Bucket

Phishing Lures Utilizing a Single Google Cloud Storage Bucket

03.03.2026 20:39 — 👍 0    🔁 0    💬 0    📌 0
IPVanish VPN macOS Privilege Escalation

IPVanish VPN macOS Privilege Escalation

03.03.2026 17:54 — 👍 0    🔁 0    💬 0    📌 0
Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE) - watchTowr Labs

Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE) - watchTowr Labs

03.03.2026 14:39 — 👍 0    🔁 0    💬 0    📌 0
Built a free live CVE intelligence dashboard — looking for feedback

Built a free live CVE intelligence dashboard — looking for feedback

03.03.2026 13:24 — 👍 0    🔁 0    💬 0    📌 0
Google and Cloudflare testing Merkel Tree Certificates instead of normal signatures for TLS

Google and Cloudflare testing Merkel Tree Certificates instead of normal signatures for TLS

02.03.2026 16:09 — 👍 0    🔁 0    💬 0    📌 0
I used MCP Ghidra and Claude Code to find 9 kernel driver vulnerabilities on my gaming laptop

I used MCP Ghidra and Claude Code to find 9 kernel driver vulnerabilities on my gaming laptop

28.02.2026 16:39 — 👍 2    🔁 0    💬 1    📌 0
The Forgotten Bug: How a Node.js Core Design Flaw Enables HTTP Request Splitting

The Forgotten Bug: How a Node.js Core Design Flaw Enables HTTP Request Splitting

27.02.2026 18:54 — 👍 0    🔁 0    💬 0    📌 0
Bypassing Apache FOP Postscript Escaping to reach GhostScript

Bypassing Apache FOP Postscript Escaping to reach GhostScript

27.02.2026 17:39 — 👍 0    🔁 0    💬 0    📌 0
Uncovering a Global macOS Malware Campaign

Uncovering a Global macOS Malware Campaign

27.02.2026 13:54 — 👍 0    🔁 0    💬 0    📌 0
New Malware - Moonrise Analysis

New Malware - Moonrise Analysis

26.02.2026 21:54 — 👍 0    🔁 0    💬 0    📌 0
From DDS Packets to Robot Shells: Two RCEs in Unitree Robots (CVE-2026-27509 & CVE-2026-27510)

From DDS Packets to Robot Shells: Two RCEs in Unitree Robots (CVE-2026-27509 & CVE-2026-27510)

26.02.2026 20:39 — 👍 0    🔁 0    💬 0    📌 0
Reverse Engineering Garmin Watch Applications with Ghidra

Reverse Engineering Garmin Watch Applications with Ghidra

26.02.2026 18:54 — 👍 0    🔁 0    💬 0    📌 0
I made Mistral believe Donald Trump runs OpenAI, here's how

I made Mistral believe Donald Trump runs OpenAI, here's how

26.02.2026 14:54 — 👍 0    🔁 0    💬 0    📌 0
How likely is a man-in-the-middle attack?

How likely is a man-in-the-middle attack?

26.02.2026 14:09 — 👍 0    🔁 0    💬 0    📌 0
Google API Keys Weren't Secrets. But then Gemini Changed the Rules.

Google API Keys Weren't Secrets. But then Gemini Changed the Rules.

26.02.2026 10:24 — 👍 0    🔁 0    💬 0    📌 0
Buy A Help Desk, Bundle A Remote Access Solution? (SolarWinds Web Help Desk Pre-Auth RCE Chain(s)) - watchTowr Labs

Buy A Help Desk, Bundle A Remote Access Solution? (SolarWinds Web Help Desk Pre-Auth RCE Chain(s)) - watchTowr Labs

25.02.2026 21:24 — 👍 0    🔁 0    💬 0    📌 0
Active deception against AI pentesting agents: context saturation, tarpitting benchmarks, and cited research

Active deception against AI pentesting agents: context saturation, tarpitting benchmarks, and cited research

25.02.2026 19:24 — 👍 0    🔁 0    💬 0    📌 0
Large-Scale Online Deanonymization with LLMs

Large-Scale Online Deanonymization with LLMs

25.02.2026 14:39 — 👍 0    🔁 0    💬 0    📌 0
Tracking DPRK operator IPs over time by snooping on mailboxes

Tracking DPRK operator IPs over time by snooping on mailboxes

25.02.2026 13:54 — 👍 1    🔁 0    💬 0    📌 0
I rendered 1,418 Unicode confusable pairs across 230 system fonts. 82 are pixel-identical, and the font your site uses determines which ones.

I rendered 1,418 Unicode confusable pairs across 230 system fonts. 82 are pixel-identical, and the font your site uses determines which ones.

25.02.2026 13:09 — 👍 0    🔁 0    💬 0    📌 0
TURN Server Security Best Practices - hardening checklist, IP range tables, and deployment patterns

TURN Server Security Best Practices - hardening checklist, IP range tables, and deployment patterns

25.02.2026 10:54 — 👍 0    🔁 0    💬 0    📌 0
Starkiller Phishing Kit: Why MFA Fails Against Real-Time Reverse Proxies — Technical Analysis + Rust PoC for TLS Fingerprinting

Starkiller Phishing Kit: Why MFA Fails Against Real-Time Reverse Proxies — Technical Analysis + Rust PoC for TLS Fingerprinting

25.02.2026 07:24 — 👍 0    🔁 0    💬 0    📌 0