Normal view
-
/r/netsec - Information Security News & Discussion
- Common Entra ID Security Assessment Findings β Part 3: Weak Privileged Identity Management Configuration
-
/r/netsec - Information Security News & Discussion
- A new initiative that brings together Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks in an effort to secure the worldβs most critical software.
-
/r/netsec - Information Security News & Discussion
- Russian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026
-
/r/netsec - Information Security News & Discussion
- Broken by Default: I formally proved that LLM-generated C/C++ code is broken by default β 55.8% vulnerable, 97.8% invisible to existing tools
Broken by Default: I formally proved that LLM-generated C/C++ code is broken by default β 55.8% vulnerable, 97.8% invisible to existing tools
I spent the last few months running Z3 SMT formal verification against 3,500 code artifacts generated by GPT-4o, Claude, Gemini, Llama, and Mistral.
β Results:
β - 55.8% contain at least one proven vulnerability
β - 1,055 findings with concrete exploitation witnesses
β - GPT-4o worst at 62.4% β no model scores below 48%
β - 6 industry tools combined (CodeQL, Semgrep, Cppcheck...) miss 97.8%
β - Models catch their own bugs 78.7% in review β but generate them anyway
β Paper: https://arxiv.org/html/2604.05292v1
β GitHub: https://github.com/dom-omg/broken-by-default
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Why i think Mythos is gonna be game changing after using Opus for a CTF
-
/r/netsec - Information Security News & Discussion
- Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3)
-
/r/netsec - Information Security News & Discussion
- Brandefense Q4 2025 Ransomware Trends Report β 2,373 incidents, 125 groups, CVE exploitation breakdown
Brandefense Q4 2025 Ransomware Trends Report β 2,373 incidents, 125 groups, CVE exploitation breakdown
Hi r/netsec community,
Q4 2025 data, monitoring dark web leak sites and criminal forums
throughout OctoberβDecember 2025.
Numbers:
- 2,373 confirmed victims
- 125 active ransomware groups
- 134 countries, 27 industries
Group highlights:
- Qilin peaked at 481 attacks in Q4, up from 113 in Q1
- Cl0p skipped encryption entirely in most campaigns β pure data theft + extortion via Oracle EBS and Cleo zero-days
- 46.3% of activity attributed to smaller/unnamed groups β RaaS commoditization is real
CVEs exploited this quarter (with group attribution):
RCE:
- CVE-2025-10035 (Fortra GoAnywhere MFT) β Medusa
- CVE-2025-55182 (React Server Components) β Weaxor
- CVE-2025-61882 (Oracle E-Business Suite) β Cl0p
- CVE-2024-21762 (Fortinet FortiOS SSL VPN) β Qilin
Privilege Escalation:
- CVE-2025-29824 (Windows CLFS driver β SYSTEM) β Play
Auth Bypass:
- CVE-2025-61884 (Oracle E-Business Suite) β Cl0p
- CVE-2025-31324 (SAP NetWeaver, CVSS 10.0) β BianLian, RansomExx
Notable: DragonForce announced a white-label "cartel" model through underground forums. Operations linked to Scattered Spider suggest staged attack chains β initial access and ransomware deployment split between separate actors.
Full report
brandefense.io/reports/ransomware-trends-report-q4-2025/
[link] [comments]
Training for Device Code Phishing
With the news of Hundreds of orgs being compromised daily, I saw a really cool red team tool that trains for this exact scenario. Have you guys used this new white hat tool? Thinking about ditching KB4 and even using this for our red teams for access.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS
Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS
-
/r/netsec - Information Security News & Discussion
- We found a path traversal in an MCP server with 7,700 stars that lets AI agents read your SSH keys. Fix merged.
-
/r/netsec - Information Security News & Discussion
- From UART to Root: Vendor Shell Escape on a Uniview IP Camera
From UART to Root: Vendor Shell Escape on a Uniview IP Camera
CVE-2026-34197: ActiveMQ RCE via Jolokia API
Assessing Claude Mythos Previewβs capabilities
-
/r/netsec - Information Security News & Discussion
- The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape
The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape
AI coding tools are being shipped fast. In too many cases, basic security is not keeping up.
In our latest research, we found the same sandbox trust-boundary failure pattern across tools from Anthropic, Google, and OpenAI. Anthropic fixed and engaged quickly (CVE-2026-25725). Google did not ship a fix by disclosure. OpenAI closed the report as informational and did not address the core architectural issue.
That gap in response says a lot about vendor security posture.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Anthropic Opus 4.6 is less good at finding vulns than you might think
Anthropic Opus 4.6 is less good at finding vulns than you might think
We benchmarked Opus 4.6's ability to find simple C vulns and found that the model flags about 1 in 4 flaws -- with a very high false positive rate and lots of inconsistency from run to run. Techniques like judge agents and requiring the model to justify its results improve the results to some extent, but they're still not great.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- JavaScript runtime instrumentation via Chrome DevTools Protocol
JavaScript runtime instrumentation via Chrome DevTools Protocol
Iβve been experimenting with Chrome DevTools Protocol primitives to build tools for reversing and debugging JavaScript at runtime.
The idea is to interact with execution by hooking functions without monkeypatching or modifying application code.
Conceptually, this is closer to a Frida-style instrumentation model (onEnter/onLeave handlers), but applied to the browser via CDP.
Early experiments include:
- attaching hooks to functions at runtime
- inspecting and modifying arguments and local variables
- overriding return values (unfortunately limited to sync functions due to CDP constraints)
- following return values to their consumer (best-effort / heuristic)
- conditional stepping (stepIn / stepOut / stepOver)
All implemented via CDP (debugger breakpoints + runtime evaluation), so this also works inside closures and non-exported code.
Iβd really appreciate feedback β especially from people doing reverse engineering, bug bounty, or complex frontend debugging.
[link] [comments]
Microsoft Speech - Lateral Movement
-
/r/netsec - Information Security News & Discussion
- Detecting CI/CD Supply Chain Attacks with Canary Credentials