โŒ

Normal view

Received today โ€” 17 March 2026 โญ /r/netsec - Information Security News & Discussion

Hypervisor Based Defense

I wanted to start posting again, and I also wanted to share something that includes technical details about hypervisors, my thoughts on using hypervisors for defensive purposes (how it is done today and what can be done with it), and an estimated roadmap alongside the design choices behind my hypervisor, Nova (https://github.com/idov31/NovaHypervisor).

As always, let me know what you think, and feel free to point out any inaccuracies or ask any questions you may have.

submitted by /u/Idov31
[link] [comments]
Received yesterday โ€” 16 March 2026 โญ /r/netsec - Information Security News & Discussion

We audited authorization in 30 AI agent frameworks โ€” 93% rely on unscoped API keys

Published a research report auditing how popular AI agent projects (OpenClaw, AutoGen, CrewAI, LangGraph, MetaGPT, AutoGPT, etc.) handle authorization.

Key findings:

- 93% use unscoped API keys as the only auth mechanism

- 0% have per-agent cryptographic identity

- 100% have no per-agent revocation โ€” one agent misbehaves, rotate the key for all

- In multi-agent systems, child agents inherit full parent credentials with no scope narrowing

Mapped findings to OWASP Agentic Top 10 (ASI01 Agent Goal Hijacking, ASI03 Identity & Privilege Abuse, ASI05 Privilege Escalation, ASI10 Rogue Agents).

Real incidents included: 21k exposed OpenClaw instances leaking credentials, 492 MCP servers with zero auth, 1.5M API tokens exposed in Moltbook breach.

Full report: https://grantex.dev/report/state-of-agent-security-2026

submitted by /u/MousseSad4993
[link] [comments]
Received โ€” 15 March 2026 โญ /r/netsec - Information Security News & Discussion

Quick question for people running CrowdStrike, Zscaler, Netskope or similar in production.

As these platforms add more AI-driven automation: autonomous triage, auto-response, AI-based policy changes, how are you currently keeping track of what these AI components are actually doing?

Not asking about threat detection quality. More about the operational side, do you know when an AI feature took an automated action? Do you review it? Is there any process around it or is it pretty much set and forget?

Genuinely curious how teams are handling this in practice.

submitted by /u/makial00
[link] [comments]

Phishing campaign abusing Google Cloud Storage redirectors to multiple scam pages

Iโ€™ve been analyzing a phishing campaign that abuses Google Cloud Storage (storage.googleapis.com) as a redirect layer to send victims to multiple scam pages hosted mostly on .autos domains.

The phishing themes include fake Walmart surveys, Dell giveaways, Netflix rewards, antivirus renewal alerts, storage full warnings, and fake job lures.

submitted by /u/anuraggawande
[link] [comments]
Received โ€” 13 March 2026 โญ /r/netsec - Information Security News & Discussion
โŒ