Normal view
-
/r/netsec - Information Security News & Discussion
- We scanned 900 MCP configs on GitHub. 75% had security problems.
-
/r/netsec - Information Security News & Discussion
- We rewrote SoftHSMv2 (the default PKCS#11 software HSM) in Rust β 617+ tests, PQC support, memory-safe key handling
-
/r/netsec - Information Security News & Discussion
- With the rise of SaaS and cloud applications, the browser has become the new workplace. That's where net-security comes in.
-
/r/netsec - Information Security News & Discussion
- Alleged OVHcloud data of 1.6M customers and 5.9M websites posted on popular forum for sale. CEO Comments
Alleged OVHcloud data of 1.6M customers and 5.9M websites posted on popular forum for sale. CEO Comments
There are reports of OVHcloud-related data being posted on a forum for sale. No official confirmation so far from OVHCloud. Given OVHβs scale, potential impact could be significant depending on scope, especially in Europe
UPDATE: OVHcloud CEO, Octave Klaba has commented that the sample dataset was not found in their system.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Forensic Readiness Is Becoming a Strategic Security Discipline
Forensic Readiness Is Becoming a Strategic Security Discipline
The transition from a niche practice of DFIR to the discipline of risk management and incident preparedness
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- e open-sourced 209 security tests for multi-agent AI systems (MCP, A2A, L402/x402 protocols)
e open-sourced 209 security tests for multi-agent AI systems (MCP, A2A, L402/x402 protocols)
Most AI security testing focuses on the model: prompt injection, jailbreaking, and output filtering.
We've been working on something different: testing the agent *system*. The protocols, integrations, and decision paths that determine what agents do in production. The result is a framework with 209 tests covering 4 wire protocols:
**MCP (Model Context Protocol)** Tool invocation security: auth, injection, data leakage, tool abuse, scope creep
**A2A (Agent-to-Agent)** Inter-agent communication: message integrity, impersonation, privilege escalation
**L402 (Lightning)** Bitcoin-based agent payments: payment flow integrity, double-spend, authorization bypass
**x402 (USDC/Stablecoin)** Fiat-equivalent agent payments: transaction limits, approval flows, compliance
Every test maps to a specific OWASP ASI (Agentic Security Initiatives) Top 10 category. Cross-referenced with NIST AI 800-2 categories for compliance reporting.
```
pip install agent-security-harness
```
20+ enterprise platform adapters included (Salesforce, ServiceNow, Workday, etc.).
MIT license. Feedback welcome. Especially from anyone running multi-agent systems in production. What attack vectors are we missing?
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
SnappyClient is a malware found by Zscaler that uses a custom binary protocol (encrypted and compressed) to communicate with its C&C server, with little to work with when it comes to network detection.
At Netomize, we set out to write a detection rule targeting the encrypted message packet by leveraging the unique features of PacketSmith + Yara-X detection module, and the result is documented in this blog post.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Vulnerability Disclosure - SCHNEIDER ELECTRIC Modicon Controllers M241 / M251 / M262
Vulnerability Disclosure - SCHNEIDER ELECTRIC Modicon Controllers M241 / M251 / M262
Schneider Electric has addressed two vulnerabilities disclosed by Team82 in its Modicon Controllers M241 / M251, and M262 PLC line. The vulnerabilities can allow an attacker to cause a denial-of-service condition that affects the availability of the controller.
Read more on our Disclosure Dashboard: http://claroty.com/team82/disclosure-dashboard
Or download SE's advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-069-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-069-01.pdf
[link] [comments]
Why Your Brain is a Security Risk
Human thought is still evolving to handle the digital world. We act instinctively when we should act deliberately β and under pressure, we rarely consider all the options available to us. This article examines how we think under stress and outlines practical steps organizations can take to protect themselves
[link] [comments]