FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” February 8th 2026Your RSS feeds

OverTheWire Bandit: a complete walkthrough with in-depth explanations

Hey,

A couple of years ago I wrote solutions for the OverTheWire Bandit wargame. Recently, while reorganizing my documentation, I revisited that material and decided to properly clean it up and restructure it into a single, coherent walkthrough. This isn’t a formal course, it’s a complete Bandit walkthrough with in-depth explanations, written to extract as much understanding as possible from each level, not just to get the flag.

For every level, I included:

  • hints and spoiler warnings, so you can try before reading the solution
  • intermediate reasoning when it makes sense
  • links to official documentation and primary sources

The intent was to make this usable by someone starting from zero, but also detailed enough that you can finish Bandit feeling like you’ve actually milked it for all the knowledge it has to offer. Commands, patterns, and underlying UNIX concepts.

This is probably most useful if you:

  • are new to CTFs or system/security basics
  • want to understand what you’re doing instead of copying commands
  • plan to move on to harder OverTheWire games later

And to be fair, I think that even people that are more used to working with UNIX might actually learn a thing or two from these

submitted by /u/shelltief
[link] [comments]

Defense Evasion: The Service Run Failed Successfully

You can exploit the Service Failure Recovery feature of Windows Service to execute a payload without ever touching the ImagePath. The biggest issue when exploiting Service Failure Recovery to execute a payload is figuring out how to trigger a "crash".

submitted by /u/Cold-Dinosaur
[link] [comments]

OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

OpenClaw (formerly Moltbot and Clawdbot) has announced that it's partnering with Google-owned VirusTotal to scan skills that are being uploaded to ClawHub, its skill marketplace, as part of broader efforts to bolster the security of the agentic ecosystem. "All skills published to ClawHub are now scanned using VirusTotal's threat intelligence, including their new Code Insight capability,"

Asterisk Security Release 23.2.2

Posted by Asterisk Development Team via Fulldisclosure on Feb 07

The Asterisk Development Team would like to announce security release
Asterisk 23.2.2.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/23.2.2
and
https://downloads.asterisk.org/pub/telephony/asterisk

Repository: https://github.com/asterisk/asterisk
Tag: 23.2.2

## Change Log for Release asterisk-23.2.2

### Links:

- [Full ChangeLog](...

Asterisk Security Release 21.12.1

Posted by Asterisk Development Team via Fulldisclosure on Feb 07

The Asterisk Development Team would like to announce security release
Asterisk 21.12.1.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/21.12.1
and
https://downloads.asterisk.org/pub/telephony/asterisk

Repository: https://github.com/asterisk/asterisk
Tag: 21.12.1

## Change Log for Release asterisk-21.12.1

### Links:

- [Full ChangeLog](...

Asterisk Security Release 22.8.2

Posted by Asterisk Development Team via Fulldisclosure on Feb 07

The Asterisk Development Team would like to announce security release
Asterisk 22.8.2.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/22.8.2
and
https://downloads.asterisk.org/pub/telephony/asterisk

Repository: https://github.com/asterisk/asterisk
Tag: 22.8.2

## Change Log for Release asterisk-22.8.2

### Links:

- [Full ChangeLog](...

Asterisk Security Release 20.18.2

Posted by Asterisk Development Team via Fulldisclosure on Feb 07

The Asterisk Development Team would like to announce security release
Asterisk 20.18.2.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/20.18.2
and
https://downloads.asterisk.org/pub/telephony/asterisk

Repository: https://github.com/asterisk/asterisk
Tag: 20.18.2

## Change Log for Release asterisk-20.18.2

### Links:

- [Full ChangeLog](...

Certified Asterisk Security Release certified-20.7-cert9

Posted by Asterisk Development Team via Fulldisclosure on Feb 07

The Asterisk Development Team would like to announce security release
Certified Asterisk 20.7-cert9.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/certified-20.7-cert9
and
https://downloads.asterisk.org/pub/telephony/certified-asterisk

Repository: https://github.com/asterisk/asterisk
Tag: certified-20.7-cert9

## Change Log for Release asterisk-certified-20.7-cert9

###...
Yesterday β€” February 7th 2026Your RSS feeds

Cloud Deception Management Platform (Open-source Cloud Canaries)

Hi folks, I wanted to share a project of mine and get some feedback from the community.

Coalmine is a canary management platform I've built to let security admins deploy canary tokens (and objects) easily in there cloud environments.

Currently its early alpha and supports S3, GCS, AWS IAM, and GCP Service accounts.

The tool provides a webui, CLI and API, allowing you to integrate it with your custom tooling (when its production ready)

Example use for API: have your CICD pipelines request an canary token to embed in code, so you can Identify when the source has been exposed and attacks are testing credentials

Coalmine - Github

submitted by /u/John_Earle
[link] [comments]

New OSS secret scanner: Kingfisher (Rust) validates exposed creds + maps permissions

Disclosure: I’m the author/maintainer of Kingfisher.

Kingfisher is an Apache-2.0 OSS secret scanner built in Rust that combines Hyperscan (SIMD regex) with tree-sitter parsing to improve context/accuracy, and it can validate detected creds in real time against provider APIs so you can prioritize active leaks. It’s designed to run entirely on-prem so secrets don’t get shipped to a third-party service.

Core Features

  • Hundreds of built-in rules (AI APIs, cloud providers, databases, DevOps tools)
  • Live validation against third-party APIs confirms credentials are active
  • Direct revocation of leaked creds: kingfisher revoke --rule github "ghp_..."
  • Can scan for secrets locally, github, gitlab, azure repos, bitbucket, gitea, hugging face, s3, gcs, docker, jira, confluence, slack
  • Built-in local-only HTML findings viewer kingfisher scan /tmp --view-report
  • Blast Radius mapping to show what a credential could actually access: kingfisher scan /tmp --access-map --view-report

Scan Targets

  • Git repos (full history), GitHub/GitLab/Azure Repos/Bitbucket/Gitea/Hugging Face orgs
  • AWS S3, GCS, Docker images, Jira, Confluence, Slack

Try It

  • brew install kingfisher or uv tool install kingfisher-bin
  • github.com/mongodb/kingfisher

Apache 2 Open-Source

submitted by /u/micksmix
[link] [comments]

trappsec: open source framework for API deception

I've just released trappsec v0.1 - an experimental open-source framework that helps developers detect attackers who probe API business logic. By embedding realistic decoy routes and honey fields that are difficult to distinguish from real API constructs, attackers are nudged to authenticate β€” converting reconnaissance into actionable security telemetry.

submitted by /u/nikhil-salgaonkar
[link] [comments]

The best HR software of 2026: Expert reviewed

I tested top HR platforms like BambooHR, Deel, Rippling, and Workday to find solutions that simplify employee management for all types of businesses.

Study confirms experience beats youthful enthusiasm

Research shows productivity and judgment peak decades after graduation

A growing body of research continues to show that older workers are generally more productive than younger employees.…

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

Germany's Federal Office for the Protection of the Constitution (aka Bundesamt fΓΌr Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely state-sponsored threat actor that involves carrying out phishing attacks over the Signal messaging app. "The focus is on high-ranking targets in

crypto-scanner: Open-source CLI tool to find quantum-vulnerable cryptography in your codebase

Hey r/netsec,

I built an open-source tool called crypto-scanner that scans codebases for cryptographic usage and flags algorithms vulnerable to quantum computing attacks.

What it does:

  • Scans source code (Python, JS/TS, Java, Go, Rust, C/C++, and more)
  • Parses X.509 certificates and config files (YAML, JSON, ENV, INI)
  • 4-tier risk classification: Critical (quantum-vulnerable), High (deprecated), Medium (monitor), Low (adequate)
  • Outputs JSON for CI/CD automation or styled HTML reports
  • Works as a pre-commit hook or GitHub Action

Why I built it:

NIST finalized post-quantum cryptography standards in 2024, and organizations need to start inventorying their cryptographic assets before migrating. Most teams have no idea what algorithms are actually running in their codebases. This tool gives you that visibility.

Install:

pip install crypto-scanner crypto-scanner scan /path/to/project --html --output report.html 

GitHub: https://github.com/mbennett-labs/crypto-scanner PyPI: https://pypi.org/project/crypto-scanner/

MIT licensed. Python 3.10+. Feedback and contributions welcome.

Would love to hear what you find when you run it on your projects.

submitted by /u/MindlessConclusion42
[link] [comments]

This 85-inch Sony Bravia TV dropped to less than $1,000 at Amazon - and I can vouch for it

The Sony Bravia 3 may be a base model LED TV, but it still offers plenty of premium-grade features. Amazon is selling an 85-inch version for just under $1,000.

ICE Agent’s β€˜Dragging’ Case May Help Expose Evidence in Renee Good Shooting

The government has withheld details of the investigation of Renee Good’s killingβ€”but an unrelated case involving the ICE agent who shot her could force new revelations.
Before yesterdayYour RSS feeds

Apple Music vs. Spotify: I tested both music streaming services, and my choice is clear

Apple Music and Spotify are the two most popular music streaming platforms, so you should know what each has to offer before subscribing.

The HP Omen 17 gaming laptop gets my recommendation - especially at this price

The recent rise of RAM and GPU prices has made it hard to find good gaming laptop deals, but right now at Best Buy, you can save almost $1,100 on the HP Omen 17.

How to use Lockdown Mode: The extreme iPhone security feature that foiled even the FBI

Lockdown Mode defends your iPhone against cyber attacks and blocks forensic tools after a seizure. Here's how to quickly activate it.

Beyond gold:Β Why Team USA will be wearing titanium at these Olympics

US athletes will sport Oura Rings to track their health. Here's why sponsorships like these can inspire new features.

AT&T's new phone for kids might solve your biggest problem with parental controls - for $3 a month

With standard budget phone specs and a decent camera, the amiGO Jr. phone could become a go-to option for parents. There's a companion watch, too.

Flickr emails users about data breach, pins it on 3rd party

Attackers may have snapped user locations and activity information, message warns

Legacy image-sharing website Flickr suffered a data breach, according to customers emails seen by The Register.…

DDoS deluge: Brit biz battered as botnet blitzes break records

UK leaps to sixth in global flood charts as mega-swarm unleashes 31.4 Tbps Yuletide pummeling

Cloudflare says DDoS crews ended 2025 by pushing traffic floods to new extremes, while Britain made an unwelcome leap of 36 places to become the world's sixth-most targeted location.…

Tool: AST-based security scanner for AI-generated code (MCP server)

Released an open-source security scanner designed for AI coding agent workflows.

Problem: AI assistants generate code with OWASP Top 10 vulnerabilities at alarming rates. They also "hallucinate" package names that could be registered by attackers.

Solution: MCP server that integrates with AI coding tools (Claude, Cursor, etc.) for real-time scanning.

Technical details:

- tree-sitter AST parsing for accurate detection (not just regex)

- Taint analysis for tracking user input to dangerous sinks

- 275+ rules covering: SQLi, XSS, command injection, SSRF, XXE, insecure deserialization, hardcoded secrets, weak crypto

- Package verification via bloom filters (4.3M packages, 7 ecosystems)

- Prompt injection detection for AI agent security

- CWE/OWASP metadata for compliance

Languages: Python, JavaScript/TypeScript, Java, Go, Ruby, PHP, C/C++, Rust, C#, Terraform, Kubernetes

No cloud dependencies - runs entirely local.

npx agent-security-scanner-mcp init

Feedback welcome, especially on rule coverage gaps.

submitted by /u/NoButterfly9145
[link] [comments]

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to

This tiny travel adapter is my new must-have when flying out (and it's only $25)

The Anker Nano 5-port universal travel adapter is perfect for the lightweight traveler.

I built an iOS app in just two days thanks to AI - and it was exhilarating

Want to see what agentic coding really feels like? Come along on my wild, wonderful, and terrifying two-day vibe coding adventure with Xcode 26.3.

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months. The agency said the move is to drive down technical debt and minimize

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42. In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with 155

The best backup software of 2026: Expert tested and reviewed

I tested the top backup software for 2025 to help you protect your data. Here's my hands-on review of the best options for businesses and individuals.

How Samsung Knox Helps Stop Your Network Security Breach

By: Unknown
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However (and it’s a big β€œhowever”), the increasing use of mobile devices in business operations necessitates network security measures that are specifically

Forget OLED: I'd choose this TCL Mini LED TV deal over pricier models

It's the perfect time to pick up the TCL QM7K on sale at Best Buy for just $600, a ZDNET Editor's Choice Award winner.

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution. The compromised versions of the two packages are listed below - @dydxprotocol/v4-client-js (npm) - 3.4.1, 1.22.1, 1.15.2, 1.0.31&

Hacking a cheap Wi-Fi toy drone

I took apart a cheap Chinese toy drone (A17) and reverse-engineered how it works.

The drone exposes a Wi-Fi AP, the app sends raw UDP packets, and there’s no encryption. I decoded the control protocol and flew it using Python.

submitted by /u/fhackdroid
[link] [comments]

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source libraries, including Ghostscript, OpenSC, and CGIF. Claude Opus 4.6, which was launched Thursday, comes with improved coding skills, including code review and debugging capabilities, along with

How we test headphones at ZDNET in 2026

We travel, exercise, work, and live in the latest headphones and earbuds so we can recommend the best for you. Here's a look at our testing methodologies.

I reversed Tower of Fantasy's kernel anti-cheat driver while waiting for the game to install. It's a full BYOVD toolkit that's never even loaded.

Found arbitrary process termination that bypasses PPL (can kill any process on the system, including EDR/AV) and arbitrary process protection via ObRegisterCallbacks, all behind 4 layers of trivial authentication. It's a full BYOVD toolkit similar to the mhyprot2 situation from Genshin Impact that was also used by ransomware groups.

The best part is that the driver ships with every install and is never even loaded by the game.

Full PoC: https://github.com/svespalec/TowerOfFlaws

submitted by /u/RadioactiveBlanket
[link] [comments]

I found the best Sonos Arc soundbar deal right now, and it takes $200 off (no strings attached)

Upgrade any TV with Sonos' best soundbar. For $200 off, it's the best price you'll find.

Ad blocking is alive and well, despite Chrome's attempts to make it harder

The end isn't nigh after all

Chrome's latest revision of its browser extension architecture, known as Manifest v3 (MV3), was widely expected to make content blocking and privacy extensions less effective than its predecessor, Manifest v2 (MV2).…

Sentience, Allegedly

Last week, AI agents founded a lobster religion, started a drug trade (prompt injections), and began hiring humans to do physical tasks they can’t perform themselves.

If your feed told you this was an β€œAI awakening,” I get it. The screenshots were spooky on purpose.

I wrote a longform explainer on what actually happened with Moltbook and OpenClaw and why this wasn’t sentience or takeoff.

What we’re really seeing is something more mundane and more important: agents with memory and tools dropped into a social environment, stress-testing coordination, incentives, and security in public.

If you’ve been confused, alarmed, or just fascinated by the last week of AI discourse, this is my attempt to separate signal from projection (with a lobster church along the way).

submitted by /u/RMunizIII
[link] [comments]

OpenClaw reveals meaty personal information after simple cracks

Skills marketplace is full of stuff - like API keys and credit card numbers - that crims will find tasty

Another day, another vulnerability (or two, or 200) in the security nightmare that is OpenClaw.…

OpenAI's Frontier looks like another AI agent tool - but it's really an enterprise power play

Emulating Palantir's use of forward-deployed AI engineers, OpenAI's framework is both an opportunity and a threat for commercial software firms.

ICE and CBP’s Face-Recognition App Can’t Actually Verify Who People Are

ICE has used Mobile Fortify to identify immigrants and citizens alike over 100,000 times, by one estimate. It wasn't built to work like thatβ€”and only got approved after DHS abandoned its own privacy rules.

Substack says intruder lifted emails, phone numbers in months-old breach

Contact details were accessed in an intrusion that went undetected for months, the blogging outfit says

Newsletter platform Substack has admitted that an intruder swiped user contact details months before the company noticed, forcing it to warn writers and readers that their email addresses and other account metadata were accessed without permission.…

One of the best-looking Windows laptops I've tested lately isn't made by Dell or Lenovo

The Acer Swift Edge 14 is a great-looking midranger with a vibrant OLED and outstanding battery life.

Which AI chatbots have ads? Comparing ChatGPT, Claude, Gemini, and more

Wondering which AI chatbots are still ad-free in 2026? There aren't many. Here's a quick rundown of the top ones.

Asia-based government spies quietly broke into critical networks across 37 countries

And their toolkit includes a new, Linux kernel rootkit

A state-aligned cyber group in Asia compromised government and critical infrastructure organizations across 37 countries in an ongoing espionage campaign, according to security researchers.…

Finally, I found a highly functional multitool that isn't a gimmick - and it's on sale

Bibury's Multitool Pliers Pro is a fraction of the price of the big brand names, but no less handy with 31 different tools.

Spotify's new Page Match feature fixes my biggest frustration with audiobooks - here's how

Spotify's latest feature lets you switch easily between reading a physical book and an audiobook - here's how to try it yourself.

OpenAI's new GPT-5.3-Codex is 25% faster and goes way beyond coding now - what's new

The Codex team said GPT-5.3-Codex even helped build itself.

Anthropic says its new Claude Opus 4.6 can nail your work deliverables on the first try

The frontier model can handle complex, end-to-end enterprise workflows and take on the autonomous tasks you usually do yourself.
❌