FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

NX Compromised to Check for Claude Code CLI and Explore Filesystem for Credentials

By: /u/j12y — August 27th 2025 at 14:19

An interesting approach to malware by checking for Claude Code CLI and Gemini CLI in compromised `nx` package to explore local filesystem and steal credentials, api keys, wallets, etc.

submitted by /u/j12y
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

IPv4/IPv6 Packet Fragmentation: Detection & Reassembly

By: /u/MFMokbel — August 26th 2025 at 12:48

Yesterday, we released PacketSmith v2.0, and today we are publishing an article detailing some of the implementation details of IPv4/IPv6 Packet Fragmentation: detection and reassembly.

submitted by /u/MFMokbel
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

ECScape - Blog Series (Black Hat & fwd:cloudsec)

By: /u/naorhaziz — August 20th 2025 at 11:21

Hey folks,
I recently presented ECScape at Black Hat USA and fwd:cloudsec.
Research into how ECS (EC2 launch type) handles IAM roles, and how those boundaries can be broken.

I wrote a two-part blog series that dives deep:

Would love to hear feedback, questions, or thoughts from the community - especially around how people think about IAM isolation in containerized environments.

submitted by /u/naorhaziz
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Build a new kind of browser security, care to try it? You have access to control a private key but cannot take it. Looking for things that break. No security knowledge needed to try it if you can copy paste and type you can try to break the new algorithm.

By: /u/Dangerous-Middle922 — August 25th 2025 at 18:08

I setup a challenge for a new kind of tool there's a private key in plain text in this browser instance. You can copy paste and use it. But you cannot see it or take it. It's basically a mirrored document editor that allows you to control it on any webpage without exposure.

There's a 20$ private bitcoin key directly usable by any user on it. Copy paste and delete it or move it around. If you break the new algorithm it's yours!

submitted by /u/Dangerous-Middle922
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New Algorithm Detects Active Hacking Groups Targeting Companies

By: /u/Disscom — August 23rd 2025 at 11:09

We built an algorithm that flags when hacker groups invest significant effort to breach a company.

  • No false positives
  • ~25% of detections later become breach announcements
  • For public companies, it’s nearly 100%

We’re sharing free real-time notifications at https://deepspecter.com/risk-signal

submitted by /u/Disscom
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

CaMeL Security Demonstration - Defending Against (most) Prompt Injections by Design

By: /u/ok_bye_now_ — August 21st 2025 at 22:05

An interactive application that visualizes and demonstrates Google’s CaMeL (Capabilities for Machine Learning) security approach for defending against prompt injections in LLM agents.

Link to original paper: https://arxiv.org/pdf/2503.18813

All credit to the original researchers

 title={Defeating Prompt Injections by Design}, author={Edoardo Debenedetti and Ilia Shumailov and Tianqi Fan and Jamie Hayes and Nicholas Carlini and Daniel Fabian and Christoph Kern and Chongyang Shi and Andreas Terzis and Florian Tramèr}, year={2025}, eprint={2503.18813}, archivePrefix={arXiv}, primaryClass={cs.CR}, url={https://arxiv.org/abs/2503.18813}, } 
submitted by /u/ok_bye_now_
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New AI prompt/data-leak scanner — try to break it (PrivGuard)

By: /u/Cold_Respond_7656 — August 21st 2025 at 00:26

We just dropped PrivGuard, an LLM prompt + data leakage scanner.

It’s built on a full production stack (Prisma + Supabase, quad-LLM orchestration, Vercel Pro infra). Not a toy scaffold — the engine’s real.

The rules: • You get 5 free prompts to try and bypass it. • If you want more, “reserve your place” and keep going. • Yes, we want you to find blind spots.

https://privguard.io

If you manage to punch holes in it, post your attack path here. If it holds up, tell me what you’d want in the next iteration (dashboards, reports, integrations).

Consider this an open challenge — let’s see what breaks.

submitted by /u/Cold_Respond_7656
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Live Q&A with an Author of the NIST Security Guidelines (SP 800-115)

By: /u/_cybersecurity_ — August 18th 2025 at 23:36

Join us for a LIVE Q&A discussion in the Cybersecurity Club on Discord featuring Karen Scarfone, co-author of the NIST Security Guidelines (SP 800-115).

The NIST SP 800-115 is a Technical Guide to Information Security Testing and Assessment from the National Institute of Standards and Technology.

This document is used by a variety of organizations, including federal agencies, private companies, educational institutions, and critical infrastructure operators, to strengthen their cybersecurity practices.

Why Join the Session?

  • Help Improve the NIST Guidelines (SP 800-115)
  • Learn How to Use the Guidelines in Real Life
  • Get Answers from a NIST Guidelines Author

Event Details:

When: Friday, September 12th, 2025, 3 PM EST
Where: Cybersecurity Club on Discord

About the Author: Karen Scarfone is a renowned cybersecurity expert, with significant contributions to NIST, having co-authored over 150 reports, including the NIST SP 800-115.

👉 Join Cybersecurity Club on Discord to Attend the Q&A.

submitted by /u/_cybersecurity_
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

“Vibe Hacking”: Abusing Developer Trust in Cursor and VS Code Remote Development

By: /u/thaidn_ — August 18th 2025 at 15:51

In a recent red team engagement, the client's attack surface was so well-defended that after months of effort, the only system we managed to compromise was a lone server, which was apparently isolated from the rest of the network. Or so we thought.

One developer had been using that server for remote development with Cursor. This setup is becoming increasingly popular: developers run AI agents remotely to protect their local machines.

But when we dug deeper into how Cursor works, we discovered something unsettling. By pivoting through the remote server, we could actually compromise the developer's local machine.

This wasn't a Cursor-specific flaw. The root cause lies in the Remote-SSH extension that Cursor inherits directly from VS Code. Which means the attack path we uncovered could extend across the entire VS Code remote development ecosystem, putting any developer who connects to an untrusted server at risk.

For the details, check out our blog post. Comments are welcome! If you enjoy this kind of work, we're hiring!

submitted by /u/thaidn_
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Kafka Encryption for Cardholder Data: Solving PCI Challenges with Kroxylicious

By: /u/mostafahussein — August 16th 2025 at 05:25

Encrypt Kafka messages at rest without changing app code — using Kroxylicious and OpenBao to meet PCI encryption requirements.

submitted by /u/mostafahussein
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Hacking Video Surveillance Platforms

By: /u/derp6996 — August 13th 2025 at 19:49

Kudos to Axis for patching their stuff. Looks like someone in MiTM could have leveraged their protocol to hit their server and camera feeds/client. This was a Black Hat talk too.

submitted by /u/derp6996
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Challenge for human and AI reverse engineers

By: /u/kaganisildak — August 12th 2025 at 21:05

Chapter #1
Reward : $100

This challenge is part of ongoing research at Malwation examining the potential of abusing foundation model via manipulation for malware development. We are currently preparing a comprehensive paper documenting the scope and implications of AI-assisted threat development.

The ZigotRansomware sample was developed entirely through foundation model interactions without any human code contribution. No existing malware code was mixed in or given as source code sample, no pre-built packer were integrated, and no commercial/open-source code obfuscation product were applied post-generation.

Research Objectives

This challenge demonstrates the complexity level achievable through pure AI code generation in adversarial contexts. The sample serves as a controlled test case to evaluate:

- Reverse engineering complexity of AI-generated malware
- Code structure and analysis patterns unique to AI-generated threats
- Defensive capability gaps against novel generation methodologies

submitted by /u/kaganisildak
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Windows OOBE Breakout Revived

By: /u/doitsukara — August 12th 2025 at 09:34

This is a short story that describes an alternative way of breaking out of the Windows Out-of-Box-Experience (OOBE) and gaining access to the command line of Windows with the privileges of the user defaultuser0 who is part of the local Administrators group.

submitted by /u/doitsukara
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

FREE SECURITY CAREER EVENT

By: /u/ruthless0x0x — August 12th 2025 at 05:32

🚀 Thinking about getting into cyber security but don’t know where to start?

We are hosting a free Event !!

This would be first we will break complete mindset in working in a team or cracking 6-7 figs salaries !!

🗓 Date: 20th August 📍 Online https://lu.ma/f6wn6ckp

submitted by /u/ruthless0x0x
[link] [comments]
❌