Normal view
-
/r/netsec - Information Security News & Discussion
- Post AI Agent Hacked Amazon & McKinsey, I compiled a list of 5 situations where deploying agents can be catastrophic
-
/r/netsec - Information Security News & Discussion
- CVE-2024-45163: Remote DoS in Mirai C2 β research writeup + what it led me to build
-
/r/netsec - Information Security News & Discussion
- Quick question for people running CrowdStrike, Zscaler, Netskope or similar in production.
Quick question for people running CrowdStrike, Zscaler, Netskope or similar in production.
As these platforms add more AI-driven automation: autonomous triage, auto-response, AI-based policy changes, how are you currently keeping track of what these AI components are actually doing?
Not asking about threat detection quality. More about the operational side, do you know when an AI feature took an automated action? Do you review it? Is there any process around it or is it pretty much set and forget?
Genuinely curious how teams are handling this in practice.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Analysis of 1,808 MCP servers: 66% had security findings, 427 critical (tool poisoning, toxic data flows, code execution)
-
/r/netsec - Information Security News & Discussion
- I Found 39 Algolia Admin Keys Exposed Across Open Source Documentation Sites
I Found 39 Algolia Admin Keys Exposed Across Open Source Documentation Sites
-
/r/netsec - Information Security News & Discussion
- Phishing campaign abusing Google Cloud Storage redirectors to multiple scam pages
Phishing campaign abusing Google Cloud Storage redirectors to multiple scam pages
Iβve been analyzing a phishing campaign that abuses Google Cloud Storage (storage.googleapis.com) as a redirect layer to send victims to multiple scam pages hosted mostly on .autos domains.
The phishing themes include fake Walmart surveys, Dell giveaways, Netflix rewards, antivirus renewal alerts, storage full warnings, and fake job lures.
[link] [comments]
RegPwn - Windows LPE vulnerability (now fixed)
-
/r/netsec - Information Security News & Discussion
- CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root
CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root
GlassWorm V2 Analysis
-
/r/netsec - Information Security News & Discussion
- Betterleaks: The Gitleaks Successor Built for Faster Secrets Scanning
Betterleaks: The Gitleaks Successor Built for Faster Secrets Scanning
-
/r/netsec - Information Security News & Discussion
- Co-Pilot, Disengage Autophish: The New Phishing Surface Hiding Inside AI Email Summaries
Findings Gadgets Like itβs 2026
Secrets are Rare not Random
-
/r/netsec - Information Security News & Discussion
- We used GenAI to find 38 vulnerabilities in consumer robots in ~7 hours
We used GenAI to find 38 vulnerabilities in consumer robots in ~7 hours
We recently published a paper showing how generative AI can dramatically reduce the barrier to entry for robot hacking.
Using Cybersecurity AI (CAI), we analyzed three real consumer robots:
β’ a robotic lawn mower
β’ a powered exoskeleton
β’ a window-cleaning robot
In ~7 hours the system identified 38 vulnerabilities including:
β firmware exploitation paths
β BLE command injection
β unauthenticated root access
β safety-critical control exposure
Historically, uncovering these kinds of vulnerabilities required weeks or months of specialized robotics security research.
The paper argues that we are entering a new phase where AI-assisted attackers can scale faster than traditional robot security defenses.
We also discuss the implications for consumer robotics privacy, safety and regulatory compliance (e.g. GDPR).
Paper (arXiv):
https://arxiv.org/pdf/2603.08665
Happy to answer technical questions.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- CVE-2026-21509: Actively Exploited Microsoft Office Security Feature Bypass β PoC Public, CISA KEV Listed
CVE-2026-21509: Actively Exploited Microsoft Office Security Feature Bypass β PoC Public, CISA KEV Listed
A high-severity (CVSS 7.8) security feature bypass in Microsoft Office is being actively exploited in the wild, with a public PoC already available and the vuln now on CISA's KEV catalog. Root cause is unvalidated input handling (CWE-807) that allows malicious OLE/COM objects in crafted documents to bypass built-in protections. Attack vector is local with no privileges required β just a user opening a phishing-delivered Office file. Affects Office 2016, 2019, LTSC 2021/2024, and Microsoft 365 Apps on x86/x64. Microsoft dropped an out-of-band emergency patch on January 26, 2026. Office 2016/2019 also require a registry-based mitigation. Confirmed targeting of government agencies, critical infrastructure, and maritime/transport sectors.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
- MicroStealer exposes a broader business risk by stealing browser credentials, active sessions, and other sensitive data tied to corporate access.
- The malware uses a layered NSIS β Electron β JAR chain that helps it stay unclear longer and slows confident detection.
- Distribution through compromised or impersonated accounts makes the initial infection look more trustworthy to victims.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Alipay (1B+ users) DeepLink+JSBridge Attack Chain: Silent GPS Exfiltration, 6 CVEs (CVSS 9.3)
Alipay (1B+ users) DeepLink+JSBridge Attack Chain: Silent GPS Exfiltration, 6 CVEs (CVSS 9.3)
Update (March 13, 2026):
Several major developments since this was posted:
Packet Storm Security β Advisory published: https://packetstorm.news/files/id/217089
Apple Product Security β Confirmed forwarding to investigation team (Ticket OE01052449093014). Apple is actively investigating Alipay iOS app.
Google Play β Policy violation investigation confirmed (Case #9-7515000040640).
Singapore PDPC β Formal investigation opened (Case #00629724).
HKCERT β Forwarded report to CNCERT (China National CERT).
MITRE CVE β 6 CVEs pending (Ticket #2005801), CVSS 7.4β9.3.
Vendor (Ant Group) continues to maintain these are "normal functionality" and has issued no patch.
Full report: https://innora.ai/zfb/
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Forensic analysis of LummaC2 infection unmasks DPRK operative behind Polyfill.io supply chain attack and Gate.us infiltration
-
/r/netsec - Information Security News & Discussion
- CFP: NaClCON 2026 β Conference on the History of Hacking (May 31 β June 2, Carolina Beach, NC)