Legacy image-sharing website Flickr suffered a data breach, according to customers emails seen by The Register.β¦
Cloudflare says DDoS crews ended 2025 by pushing traffic floods to new extremes, while Britain made an unwelcome leap of 36 places to become the world's sixth-most targeted location.β¦
Released an open-source security scanner designed for AI coding agent workflows.
Problem: AI assistants generate code with OWASP Top 10 vulnerabilities at alarming rates. They also "hallucinate" package names that could be registered by attackers.
Solution: MCP server that integrates with AI coding tools (Claude, Cursor, etc.) for real-time scanning.
Technical details:
- tree-sitter AST parsing for accurate detection (not just regex)
- Taint analysis for tracking user input to dangerous sinks
- 275+ rules covering: SQLi, XSS, command injection, SSRF, XXE, insecure deserialization, hardcoded secrets, weak crypto
- Package verification via bloom filters (4.3M packages, 7 ecosystems)
- Prompt injection detection for AI agent security
- CWE/OWASP metadata for compliance
Languages: Python, JavaScript/TypeScript, Java, Go, Ruby, PHP, C/C++, Rust, C#, Terraform, Kubernetes
No cloud dependencies - runs entirely local.
npx agent-security-scanner-mcp init
Feedback welcome, especially on rule coverage gaps.
I took apart a cheap Chinese toy drone (A17) and reverse-engineered how it works.
The drone exposes a Wi-Fi AP, the app sends raw UDP packets, and thereβs no encryption. I decoded the control protocol and flew it using Python.
Found arbitrary process termination that bypasses PPL (can kill any process on the system, including EDR/AV) and arbitrary process protection via ObRegisterCallbacks, all behind 4 layers of trivial authentication. It's a full BYOVD toolkit similar to the mhyprot2 situation from Genshin Impact that was also used by ransomware groups.
The best part is that the driver ships with every install and is never even loaded by the game.
Chrome's latest revision of its browser extension architecture, known as Manifest v3 (MV3), was widely expected to make content blocking and privacy extensions less effective than its predecessor, Manifest v2 (MV2).β¦
Last week, AI agents founded a lobster religion, started a drug trade (prompt injections), and began hiring humans to do physical tasks they canβt perform themselves.
If your feed told you this was an βAI awakening,β I get it. The screenshots were spooky on purpose.
I wrote a longform explainer on what actually happened with Moltbook and OpenClaw and why this wasnβt sentience or takeoff.
What weβre really seeing is something more mundane and more important: agents with memory and tools dropped into a social environment, stress-testing coordination, incentives, and security in public.
If youβve been confused, alarmed, or just fascinated by the last week of AI discourse, this is my attempt to separate signal from projection (with a lobster church along the way).
Another day, another vulnerability (or two, or 200) in the security nightmare that is OpenClaw.β¦
Newsletter platform Substack has admitted that an intruder swiped user contact details months before the company noticed, forcing it to warn writers and readers that their email addresses and other account metadata were accessed without permission.β¦
A state-aligned cyber group in Asia compromised government and critical infrastructure organizations across 37 countries in an ongoing espionage campaign, according to security researchers.β¦
Breach-tracking site Have I Been Pwned (HIBP) claims a cyberattack on Betterment affected roughly 1.4 million users β although the investment company has yet to publicly confirm how many customers were affected by January's intrusion.β¦
Version 5 of PacketSmith, codenamed Pinus strobus, is the result of extensive R&D to add unique, unparalleled features that matter to network detection engineers, SoC analysts, and malware and vulnerability researchers. In this release, weβre showcasing a very powerful new feature in PacketSmith: the integration of Yara-X, a state-of-the-art scanning engine and pattern-matching library.
Italy's foreign minister says the country has already started swatting away cyberattacks from Russia targeting the Milano Cortina Winter Olympics.β¦
Multiple newly disclosed bugs in the popular workflow automation tool n8n could allow attackers to hijack servers, steal credentials, and quietly disrupt AI-driven business processes.β¦
Interview Sovereignty remains a hot topic in the tech industry, but interpretations of what it actually means β and how much it matters β vary widely between organizations and sectors. While public bodies are often driven by regulation and national policy, the private sector tends to take a more pragmatic, cost-focused view.β¦
A flaw that exists within the handling of sch_cake can allow a local user under the CentOS 9 operating system to trigger an use-after-free. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Sleeper agent-style backdoors in AI large language models pose a straight-out-of-sci-fi security threat.β¦