2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks to Real-World Risk
2,622 Valid Certificates Exposed: A Google-GitGuardian Study Maps Private Key Leaks to Real-World Risk
05.03.2026 14:09 —
👍 0
🔁 0
💬 0
📌 0
we at codeant found a bug in pac4j-jwt (auth bypass)
we at codeant found a bug in pac4j-jwt (auth bypass)
05.03.2026 10:24 —
👍 0
🔁 0
💬 0
📌 0
Normalized Certificate Transparency logs as a daily JSON dataset
Normalized Certificate Transparency logs as a daily JSON dataset
05.03.2026 07:39 —
👍 0
🔁 0
💬 0
📌 0
Using Zeek with AWS Traffic Mirroring and Kafka
Using Zeek with AWS Traffic Mirroring and Kafka
04.03.2026 23:39 —
👍 0
🔁 0
💬 0
📌 0
A single operator with basic skills used an open-source AI platform to breach 600+ FortiGate devices across 55 countries. No zero-days. Just weak passwords and an AI copilot. Full breakdown of CyberStrikeAI, the developer's MSS ties, and all 21 server IOCs.
A single operator with basic skills used an open-source AI platform to breach 600+ FortiGate devices across 55 countries. No zero-days. Just weak passwords and an AI copilot. Full breakdown of CyberStrikeAI, the developer's MSS ties, and all 21 server IOCs.
04.03.2026 13:39 —
👍 4
🔁 0
💬 3
📌 0
How we built high speed threat hunting for email security
How we built high speed threat hunting for email security
04.03.2026 08:54 —
👍 0
🔁 0
💬 0
📌 0
Red Teaming LLM Web Apps with Promptfoo: Writing a Custom Provider for Real-World Pentesting
Red Teaming LLM Web Apps with Promptfoo: Writing a Custom Provider for Real-World Pentesting
04.03.2026 02:39 —
👍 0
🔁 0
💬 0
📌 0
Free Exploit Development CTFs + Walkthroughs Based On Real CVEs
Free Exploit Development CTFs + Walkthroughs Based On Real CVEs
03.03.2026 21:54 —
👍 0
🔁 0
💬 0
📌 0
Phishing Lures Utilizing a Single Google Cloud Storage Bucket
Phishing Lures Utilizing a Single Google Cloud Storage Bucket
03.03.2026 20:39 —
👍 0
🔁 0
💬 0
📌 0
IPVanish VPN macOS Privilege Escalation
IPVanish VPN macOS Privilege Escalation
03.03.2026 17:54 —
👍 0
🔁 0
💬 0
📌 0
Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE) - watchTowr Labs
Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE) - watchTowr Labs
03.03.2026 14:39 —
👍 0
🔁 0
💬 0
📌 0
Built a free live CVE intelligence dashboard — looking for feedback
Built a free live CVE intelligence dashboard — looking for feedback
03.03.2026 13:24 —
👍 0
🔁 0
💬 0
📌 0
Google and Cloudflare testing Merkel Tree Certificates instead of normal signatures for TLS
Google and Cloudflare testing Merkel Tree Certificates instead of normal signatures for TLS
02.03.2026 16:09 —
👍 0
🔁 0
💬 0
📌 0
I used MCP Ghidra and Claude Code to find 9 kernel driver vulnerabilities on my gaming laptop
I used MCP Ghidra and Claude Code to find 9 kernel driver vulnerabilities on my gaming laptop
28.02.2026 16:39 —
👍 2
🔁 0
💬 1
📌 0
The Forgotten Bug: How a Node.js Core Design Flaw Enables HTTP Request Splitting
The Forgotten Bug: How a Node.js Core Design Flaw Enables HTTP Request Splitting
27.02.2026 18:54 —
👍 0
🔁 0
💬 0
📌 0
Bypassing Apache FOP Postscript Escaping to reach GhostScript
Bypassing Apache FOP Postscript Escaping to reach GhostScript
27.02.2026 17:39 —
👍 0
🔁 0
💬 0
📌 0
Uncovering a Global macOS Malware Campaign
Uncovering a Global macOS Malware Campaign
27.02.2026 13:54 —
👍 0
🔁 0
💬 0
📌 0
New Malware - Moonrise Analysis
New Malware - Moonrise Analysis
26.02.2026 21:54 —
👍 0
🔁 0
💬 0
📌 0
From DDS Packets to Robot Shells: Two RCEs in Unitree Robots (CVE-2026-27509 & CVE-2026-27510)
From DDS Packets to Robot Shells: Two RCEs in Unitree Robots (CVE-2026-27509 & CVE-2026-27510)
26.02.2026 20:39 —
👍 0
🔁 0
💬 0
📌 0
Reverse Engineering Garmin Watch Applications with Ghidra
Reverse Engineering Garmin Watch Applications with Ghidra
26.02.2026 18:54 —
👍 0
🔁 0
💬 0
📌 0
I made Mistral believe Donald Trump runs OpenAI, here's how
I made Mistral believe Donald Trump runs OpenAI, here's how
26.02.2026 14:54 —
👍 0
🔁 0
💬 0
📌 0
How likely is a man-in-the-middle attack?
How likely is a man-in-the-middle attack?
26.02.2026 14:09 —
👍 0
🔁 0
💬 0
📌 0
Google API Keys Weren't Secrets. But then Gemini Changed the Rules.
Google API Keys Weren't Secrets. But then Gemini Changed the Rules.
26.02.2026 10:24 —
👍 0
🔁 0
💬 0
📌 0
Buy A Help Desk, Bundle A Remote Access Solution? (SolarWinds Web Help Desk Pre-Auth RCE Chain(s)) - watchTowr Labs
Buy A Help Desk, Bundle A Remote Access Solution? (SolarWinds Web Help Desk Pre-Auth RCE Chain(s)) - watchTowr Labs
25.02.2026 21:24 —
👍 0
🔁 0
💬 0
📌 0
Active deception against AI pentesting agents: context saturation, tarpitting benchmarks, and cited research
Active deception against AI pentesting agents: context saturation, tarpitting benchmarks, and cited research
25.02.2026 19:24 —
👍 0
🔁 0
💬 0
📌 0
Large-Scale Online Deanonymization with LLMs
Large-Scale Online Deanonymization with LLMs
25.02.2026 14:39 —
👍 0
🔁 0
💬 0
📌 0
Tracking DPRK operator IPs over time by snooping on mailboxes
Tracking DPRK operator IPs over time by snooping on mailboxes
25.02.2026 13:54 —
👍 1
🔁 0
💬 0
📌 0
I rendered 1,418 Unicode confusable pairs across 230 system fonts. 82 are pixel-identical, and the font your site uses determines which ones.
I rendered 1,418 Unicode confusable pairs across 230 system fonts. 82 are pixel-identical, and the font your site uses determines which ones.
25.02.2026 13:09 —
👍 0
🔁 0
💬 0
📌 0
TURN Server Security Best Practices - hardening checklist, IP range tables, and deployment patterns
TURN Server Security Best Practices - hardening checklist, IP range tables, and deployment patterns
25.02.2026 10:54 —
👍 0
🔁 0
💬 0
📌 0
Starkiller Phishing Kit: Why MFA Fails Against Real-Time Reverse Proxies — Technical Analysis + Rust PoC for TLS Fingerprinting
Starkiller Phishing Kit: Why MFA Fails Against Real-Time Reverse Proxies — Technical Analysis + Rust PoC for TLS Fingerprinting
25.02.2026 07:24 —
👍 0
🔁 0
💬 0
📌 0