Normal view
-
/r/netsec - Information Security News & Discussion
- BIGO Ads Deploys C2-Style Infrastructure to Survive Domain Bans. Here's the Decrypted Config.
-
/r/netsec - Information Security News & Discussion
- How to Apply VXLAN-GBP Encapsulation to PCAP Files Using PacketSmith
-
/r/netsec - Information Security News & Discussion
- Qihoo 360's AI Product Leaked the Platform's SSL Key, Issued by Its Own CA Banned for Fraud
Hypervisor Based Defense
I wanted to start posting again, and I also wanted to share something that includes technical details about hypervisors, my thoughts on using hypervisors for defensive purposes (how it is done today and what can be done with it), and an estimated roadmap alongside the design choices behind my hypervisor, Nova (https://github.com/idov31/NovaHypervisor).
As always, let me know what you think, and feel free to point out any inaccuracies or ask any questions you may have.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- GlassWorm: Part 3. Wave 3 Windows payload, sideloaded Chrome extension, two additional wallets
-
/r/netsec - Information Security News & Discussion
- Perfex CRM: Autologin cookie fed into unserialize() gives unauthenticated RCE
Perfex CRM: Autologin cookie fed into unserialize() gives unauthenticated RCE
The rise of malicious repositories on GitHub
-
/r/netsec - Information Security News & Discussion
- GlassWorm V2 analysis: Part 2. Infrastructure rotation and GitHub injection
-
/r/netsec - Information Security News & Discussion
- We audited authorization in 30 AI agent frameworks โ 93% rely on unscoped API keys
We audited authorization in 30 AI agent frameworks โ 93% rely on unscoped API keys
Published a research report auditing how popular AI agent projects (OpenClaw, AutoGen, CrewAI, LangGraph, MetaGPT, AutoGPT, etc.) handle authorization.
Key findings:
- 93% use unscoped API keys as the only auth mechanism
- 0% have per-agent cryptographic identity
- 100% have no per-agent revocation โ one agent misbehaves, rotate the key for all
- In multi-agent systems, child agents inherit full parent credentials with no scope narrowing
Mapped findings to OWASP Agentic Top 10 (ASI01 Agent Goal Hijacking, ASI03 Identity & Privilege Abuse, ASI05 Privilege Escalation, ASI10 Rogue Agents).
Real incidents included: 21k exposed OpenClaw instances leaking credentials, 492 MCP servers with zero auth, 1.5M API tokens exposed in Moltbook breach.
Full report: https://grantex.dev/report/state-of-agent-security-2026
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Post AI Agent Hacked Amazon & McKinsey, I compiled a list of 5 situations where deploying agents can be catastrophic
-
/r/netsec - Information Security News & Discussion
- CVE-2024-45163: Remote DoS in Mirai C2 โ research writeup + what it led me to build
-
/r/netsec - Information Security News & Discussion
- Quick question for people running CrowdStrike, Zscaler, Netskope or similar in production.
Quick question for people running CrowdStrike, Zscaler, Netskope or similar in production.
As these platforms add more AI-driven automation: autonomous triage, auto-response, AI-based policy changes, how are you currently keeping track of what these AI components are actually doing?
Not asking about threat detection quality. More about the operational side, do you know when an AI feature took an automated action? Do you review it? Is there any process around it or is it pretty much set and forget?
Genuinely curious how teams are handling this in practice.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Analysis of 1,808 MCP servers: 66% had security findings, 427 critical (tool poisoning, toxic data flows, code execution)
-
/r/netsec - Information Security News & Discussion
- I Found 39 Algolia Admin Keys Exposed Across Open Source Documentation Sites
I Found 39 Algolia Admin Keys Exposed Across Open Source Documentation Sites
-
/r/netsec - Information Security News & Discussion
- Phishing campaign abusing Google Cloud Storage redirectors to multiple scam pages
Phishing campaign abusing Google Cloud Storage redirectors to multiple scam pages
Iโve been analyzing a phishing campaign that abuses Google Cloud Storage (storage.googleapis.com) as a redirect layer to send victims to multiple scam pages hosted mostly on .autos domains.
The phishing themes include fake Walmart surveys, Dell giveaways, Netflix rewards, antivirus renewal alerts, storage full warnings, and fake job lures.
[link] [comments]
RegPwn - Windows LPE vulnerability (now fixed)
-
/r/netsec - Information Security News & Discussion
- CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root
CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root
GlassWorm V2 Analysis
-
/r/netsec - Information Security News & Discussion
- Betterleaks: The Gitleaks Successor Built for Faster Secrets Scanning