An interesting approach to malware by checking for Claude Code CLI and Gemini CLI in compromised `nx` package to explore local filesystem and steal credentials, api keys, wallets, etc.
Yesterday, we released PacketSmith v2.0, and today we are publishing an article detailing some of the implementation details of IPv4/IPv6 Packet Fragmentation: detection and reassembly.
Hey folks,
I recently presented ECScape at Black Hat USA and fwd:cloudsec.
Research into how ECS (EC2 launch type) handles IAM roles, and how those boundaries can be broken.
I wrote a two-part blog series that dives deep:
Would love to hear feedback, questions, or thoughts from the community - especially around how people think about IAM isolation in containerized environments.
I setup a challenge for a new kind of tool there's a private key in plain text in this browser instance. You can copy paste and use it. But you cannot see it or take it. It's basically a mirrored document editor that allows you to control it on any webpage without exposure.
There's a 20$ private bitcoin key directly usable by any user on it. Copy paste and delete it or move it around. If you break the new algorithm it's yours!
We built an algorithm that flags when hacker groups invest significant effort to breach a company.
We’re sharing free real-time notifications at https://deepspecter.com/risk-signal
An interactive application that visualizes and demonstrates Google’s CaMeL (Capabilities for Machine Learning) security approach for defending against prompt injections in LLM agents.
Link to original paper: https://arxiv.org/pdf/2503.18813
All credit to the original researchers
title={Defeating Prompt Injections by Design}, author={Edoardo Debenedetti and Ilia Shumailov and Tianqi Fan and Jamie Hayes and Nicholas Carlini and Daniel Fabian and Christoph Kern and Chongyang Shi and Andreas Terzis and Florian Tramèr}, year={2025}, eprint={2503.18813}, archivePrefix={arXiv}, primaryClass={cs.CR}, url={https://arxiv.org/abs/2503.18813}, }
We just dropped PrivGuard, an LLM prompt + data leakage scanner.
It’s built on a full production stack (Prisma + Supabase, quad-LLM orchestration, Vercel Pro infra). Not a toy scaffold — the engine’s real.
The rules: • You get 5 free prompts to try and bypass it. • If you want more, “reserve your place” and keep going. • Yes, we want you to find blind spots.
If you manage to punch holes in it, post your attack path here. If it holds up, tell me what you’d want in the next iteration (dashboards, reports, integrations).
Consider this an open challenge — let’s see what breaks.
Join us for a LIVE Q&A discussion in the Cybersecurity Club on Discord featuring Karen Scarfone, co-author of the NIST Security Guidelines (SP 800-115).
The NIST SP 800-115 is a Technical Guide to Information Security Testing and Assessment from the National Institute of Standards and Technology.
This document is used by a variety of organizations, including federal agencies, private companies, educational institutions, and critical infrastructure operators, to strengthen their cybersecurity practices.
Why Join the Session?
Event Details:
When: Friday, September 12th, 2025, 3 PM EST
Where: Cybersecurity Club on Discord
About the Author: Karen Scarfone is a renowned cybersecurity expert, with significant contributions to NIST, having co-authored over 150 reports, including the NIST SP 800-115.
👉 Join Cybersecurity Club on Discord to Attend the Q&A.
In a recent red team engagement, the client's attack surface was so well-defended that after months of effort, the only system we managed to compromise was a lone server, which was apparently isolated from the rest of the network. Or so we thought.
One developer had been using that server for remote development with Cursor. This setup is becoming increasingly popular: developers run AI agents remotely to protect their local machines.
But when we dug deeper into how Cursor works, we discovered something unsettling. By pivoting through the remote server, we could actually compromise the developer's local machine.
This wasn't a Cursor-specific flaw. The root cause lies in the Remote-SSH extension that Cursor inherits directly from VS Code. Which means the attack path we uncovered could extend across the entire VS Code remote development ecosystem, putting any developer who connects to an untrusted server at risk.
For the details, check out our blog post. Comments are welcome! If you enjoy this kind of work, we're hiring!
Questions and criticism welcome. Hit me hard, it won't hurt.
Encrypt Kafka messages at rest without changing app code — using Kroxylicious and OpenBao to meet PCI encryption requirements.
Kudos to Axis for patching their stuff. Looks like someone in MiTM could have leveraged their protocol to hit their server and camera feeds/client. This was a Black Hat talk too.
Chapter #1
Reward : $100
This challenge is part of ongoing research at Malwation examining the potential of abusing foundation model via manipulation for malware development. We are currently preparing a comprehensive paper documenting the scope and implications of AI-assisted threat development.
The ZigotRansomware sample was developed entirely through foundation model interactions without any human code contribution. No existing malware code was mixed in or given as source code sample, no pre-built packer were integrated, and no commercial/open-source code obfuscation product were applied post-generation.
Research Objectives
This challenge demonstrates the complexity level achievable through pure AI code generation in adversarial contexts. The sample serves as a controlled test case to evaluate:
- Reverse engineering complexity of AI-generated malware
- Code structure and analysis patterns unique to AI-generated threats
- Defensive capability gaps against novel generation methodologies
This is a short story that describes an alternative way of breaking out of the Windows Out-of-Box-Experience (OOBE) and gaining access to the command line of Windows with the privileges of the user defaultuser0
who is part of the local Administrators group.
🚀 Thinking about getting into cyber security but don’t know where to start?
We are hosting a free Event !!
This would be first we will break complete mindset in working in a team or cracking 6-7 figs salaries !!
🗓 Date: 20th August 📍 Online https://lu.ma/f6wn6ckp