FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

haveibeenpwned.watch - Open-source, no-fluff charts showcasing haveibeenpwned.com's pwned account data

By: /u/iosifache — June 23rd 2025 at 15:59

After discovering that the haveibeenpwned.com data is accessible via the API and noticing the lack of a visualization tool, I dedicated a few evenings to building haveibeenpwned.watch. This single-page website processes and presents data on leaks from Have I Been Pwned, with daily updates.

The site provides details on the total number of recorded breaches, the number of unique services affected, and the total accounts compromised. Charts break down the data by year, showing the number of breaches, affected accounts, average accounts breached per year, accounts by data type, and accounts by industry. Additionally, tables highlight the most recent breaches, the most significant ones, and the services with the highest number of compromised accounts.

Though simple, the website can be a useful resource for use cases like strategic security planning, cybersecurity sales, risk assessment, or simply tracking trends in the security landscape.

The website is open source, with its repository hosted on GitHub.

submitted by /u/iosifache
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

What secures LLMs calling APIs via MCP? A stack of OAuth specs—here’s how they fit together

By: /u/Smooth-Loquat-4954 — June 23rd 2025 at 14:55

Model Context Protocol is quickly becoming the default way for LLMs to call out to tools and APIs—but from a security standpoint, it’s been a little hand-wavy. This post fixes that.

It shows how five OAuth specs—including dynamic client registration and protected resource metadata—combine to form a secure, auditable, standards-based auth flow for MCP.

submitted by /u/Smooth-Loquat-4954
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Just casually broke bunq’s sandbox with 0day-level spoofing, and nobody seems to care 🇳🇱

By: /u/ficu71 — June 22nd 2025 at 02:42

So I cooked up a fake transaction for shits and giggles. No valid IBAN. No real user. No device. No signature. No token. No nothing. Just pure distilled bullshit in a JSON payload.

Guess what? “Transaction accepted” “attack_success”: true “fraud_score”: 0.99999 System looked at it and said: “yeah, looks good to me.”

I even told the sandbox I was sending 10k EUR from FAKE_IBAN_901 to INVALID_IBAN_123 using a spoofed IMEI and some RSA nonsense I made up in Notepad. Bunq backend? Nodded politely and gave me a sandbox TXID.

It gets better — it accepts critical priority flags, fake biometric hashes, invalid currency codes, all wrapped in a nice little “success” bow.

This ain’t a bug, this is a fuckin’ confessional.

If bunq staff lurking here: hit me up. This ain’t a ransom, but y’all might wanna know just how open wide your API goes when someone whispers sweet nothings like tpp_id: "lol_fake_999".

We got logs. We got timestamps. We got receipts.

Your move, bunq.

submitted by /u/ficu71
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Series 2: Implementing the WPA in RAWPA - Part 2

By: /u/Dark-stash — June 21st 2025 at 23:17

RAWPA helps security researchers and penetration testers with hierarchical methodologies for testing.
This is not a "get bugs quick scheme". I fully encourage manual scouring through JS files and playing around in burp, RAWPA is just like a guided to rejuvenate your thinking.
Interested ? Join the testers now
https://forms.gle/guLyrwLWWjQW61BK9

Read more about RAWPA on my blog: https://kuwguap.github.io/

submitted by /u/Dark-stash
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Sleepless Strings - Template Injection in Insomnia

By: /u/_pimps — June 19th 2025 at 06:44

A Template Injection vulnerability in the latest version of Kong’s Insomnia API Client (v.11.2.0) leads to Remote Code Execution.

submitted by /u/_pimps
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Security Analysis: MCP Protocol Vulnerabilities in AI Toolchains

By: /u/ES_CY — June 17th 2025 at 09:16

[Disclosure: I work at CyberArk and was involved in this research]

We've completed a security evaluation of the Model Context Protocol and discovered several concerning attack patterns relevant to ML practitioners integrating external tools with LLMs.

Background: MCP standardizes how AI applications access external resources - essentially creating a plugin ecosystem for LLMs. While this enables powerful agentic behaviors, it introduces novel security considerations.

Technical Findings:

  • Tool Poisoning: Adversarial servers can define tools that appear benign but execute malicious payloads
  • Context Injection: Hidden instructions in MCP responses can manipulate model behavior
  • Privilege Escalation: Chained MCP servers can bypass intended access controls
  • Authentication Weaknesses: Many implementations rely on implicit trust rather than proper auth

ML-Specific Implications: For researchers using tools like Claude Desktop or Cursor with MCP servers, these vulnerabilities could lead to:

  • Unintended data exfiltration from research environments
  • Compromise of model training pipelines
  • Injection of adversarial content into datasets

Best Practices:

  • Sandbox MCP servers during evaluation
  • Implement explicit approval workflows for tool invocations
  • Use containerized environments for MCP integrations
  • Regular security audits of MCP toolchains

This highlights the importance of security-by-design as we build more sophisticated AI systems.

tps://www.cyberark.com/resources/threat-research-blog/is-your-ai-safe-threat-analysis-of-mcp-model-context-protocol

submitted by /u/ES_CY
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Hosting images inside dns records using TXT.

By: /u/Ok-Mushroom-8245 — June 15th 2025 at 20:27

I wrote a blog post discussing how I hid images inside DNS records, you can check out the web viewer at https://dnsimg.asherfalcon.com with some domains I already added images to like asherfalcon.com and containerback.com

submitted by /u/Ok-Mushroom-8245
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Input on using the ROT and network connection to hack voting and tabulating software and hardware.

By: /u/RobbyRock75 — June 15th 2025 at 04:44

I came across this article and in speaking with my friends in the netsec field I received lots of good input. Figured I’d push it here and see what the community thinks.

there are links in the article and I checked them to see if they coincided with the articles points.

i’,m not affiliated with this article but with the lawsuit in New York moving forward and the Dominion lawsuit in 2020 giving the hardware and software to the GOP. I had questions the community might be able to clarify

submitted by /u/RobbyRock75
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Millions of Vulnerabilities: One Checklist to Kill The Noise

By: /u/pathetiq — June 12th 2025 at 15:26

Hey all, started a blog series on Vulnerability Management. 4 articles posted already the last one is about when open you open the flood gate of a code or cloud scanner and you start drowning in findings!

This leads to thousands of findings for an SMB, millions for a big org. But vulns can’t all be worth fixing, right? This article walks through a first, simple way to shorten the list. Which is to triage every vuln and confirm if the bug is reachable in your reality.

Let me know if you have any comment to improve the blog or this article, would appreciate it!

submitted by /u/pathetiq
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

How to Setup Kali Linux on Docker + Create Custom Image & File Share

By: /u/kongwenbin — June 11th 2025 at 04:13

This is a walkthrough video for anyone who wants to run Kali Linux in a more lightweight, consistent way using Docker.

The video covers: * Installing Kali Linux via Docker * Avoiding the "it works on my machine" issue * Creating your own custom Docker image * Setting up file share between host and container

It's a solid way to practice hacking without spinning up a whole VM — and great for anyone doing tutorials that require a Kali Linux instance, or folks who are starting out their penetration testing or bug bounty journey.

submitted by /u/kongwenbin
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Research On Developing Secure AI Agents Using Google's A2A Protocol

By: /u/Artistic_Bee_2117 — June 10th 2025 at 18:51

I am a undergrad Computer Science student working with a team looking into building an security tool for developers building AI agent systems. I read this really interesting paper on how to build secure agents that implement Google's new A2A protocol which had some proposed vulnerabilities of codebases implementing A2A.

It mentioned some things like:

- Validating agent cards

- Ensuring that repeating tasks don't grant permissions at the wrong time

- Ensuring that message schemas adhere to A2A recommendations

- Checking for agents that are overly broad

- A whole lot more

I found it very interesting for anyone who is interested in A2A related security.

submitted by /u/Artistic_Bee_2117
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Code execution from web browser using URL schemes handled by KDE's KTelnetService and Konsole (CVE-2025-49091)

By: /u/11d_space — June 10th 2025 at 17:46

This issue affects systems where KTelnetService and a vulnerable version of Konsole are installed but at least one of the programs telnet, rlogin or ssh is not installed. The vulnerability is in KDE's terminal emulator Konsole. As stated in the advisory by KDE, Konsole versions < 25.04.2 are vulnerable.

On vulnerable systems remote code execution from a visited website is possible if the user allows loading of certain URL schemes (telnet://, rlogin:// or ssh://) in their web browser. Depending on the web browser and configuration this, e.g., means accepting a prompt in the browser.

submitted by /u/11d_space
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New ISPConfig Authenticated Remote Code Execution Vulnerability

By: /u/SSDisclosure — June 10th 2025 at 10:58

ISPConfig contains design flaws in the user creation and editing functionality, which allow a client user to escalate their privileges to superadmin. Additionally, the language modification feature enables arbitrary PHP code injection due to improper input validation.

submitted by /u/SSDisclosure
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Why Open Source ≠ Secure Code

By: /u/kobsoN — June 10th 2025 at 09:59

In 2023, During a security assessment of Masa CMS, an open-source content management system.

We discovered 11 vulnerabilities in Masa CMS, some allowing server takeover.

Why does it matter? Because it's easy to assume that "if it's open source, someone must have already reviewed it."

But the truth is:
No one looks until someone really looks.

Now, imagine if these vulnerabilities had been found by a malicious actor instead of a security researcher…

submitted by /u/kobsoN
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Preventing Prompt Injection Attacks at Scale

By: /u/mazen160 — June 9th 2025 at 16:52

Hi all,

I've written a blog post to showcase the different experiments I've had with prompt injection attacks, their detection, and prevention. Looking forward to hearing your feedback.

submitted by /u/mazen160
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Possible Malware in Official MicroDicom Installer (PDF + Hashes + Scan Results Included)

By: /u/Deeeee737 — June 6th 2025 at 20:44

Hi all, I discovered suspicious behavior and possible malware in a file related to the official MicroDicom Viewer installer. I’ve documented everything including hashes, scan results, and my analysis in this public GitHub repository:

https://github.com/darnas11/MicroDicom-Incident-Report

Feedback and insights are very welcome!

submitted by /u/Deeeee737
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

DroidGround: Elevate your Android CTF Challenges

By: /u/deleee — June 5th 2025 at 21:05

Hi all, I just released this new application that I think could be interesting. It is basically an application that enables hosting Android CTF challenges in a constrained and controlled environment, thus allowing to setup challenges that wouldn't be possible with just the standard apk.

For example you may create a challenge where the goal is to get RCE and read the flag.txt file placed on the device. Or again a challenge where you need to create an exploit app to abuse some misconfigured service or broadcast provider. The opportunities are endless.

As of now the following features are available:

  • Real-Time Device Screen (via scrcpy)
  • Reset Challenge State
  • Restart App / Start Activity / Start Service (toggable)
  • Send Broadcast Intent (toggable)
  • Shutdown / Reboot Device (toggable)
  • Download Bugreport (bugreportz) (toggable)
  • Frida Scripting (toggable)
    • Run from preloaded library (jailed mode)
    • Run arbitrary scripts (full mode)
  • File Browser (toggable)
  • Terminal Access (toggable)
  • APK Management (and start Exploit App) (toggable)
  • Logcat Viewer (toggable)

You can see the source code here: https://github.com/SECFORCE/droidground

There is also a simple example with a dummy application.

It also has a nice web UI!

Let me know what you think and please provide some constructive feedback on how to make it better.

submitted by /u/deleee
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Vulnerabilities in Anthropic’s MCP: Full-Schema Poisoning + Secret-Leaking Tool Attacks (PoC Inside)

By: /u/jat0369 — June 5th 2025 at 16:15

We’ve published new research exposing critical vulnerabilities in Anthropic’s Model Context Protocol (MCP). Our findings reveal Full-Schema Poisoning attacks that inject malicious logic into any schema field and Advanced Tool Poisoning techniques that trick LLMs into leaking secrets like SSH keys. These stealthy attacks only trigger in production. Full details and PoC are in the blog.

submitted by /u/jat0369
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

The state of cloud runtime security - 2025 edition

By: /u/Swimming_Version_605 — June 5th 2025 at 12:16

Discliamer- I'm managing the marketing for ARMO (no one is perfect), a cloud runtime security company (and the proud creator and maintainer of Kubescape). yes, this survey was commisioned by ARMO but there are really intresting stats inside.

some highlights

  • 4,080 alerts a month on avg but only 7 real incidents a year.
  • 89% of teams said they’re failing to detect active threats.
  • 63% are using 5+ cloud runtime security tools.
  • But only 13% can correlate alerts between them.
submitted by /u/Swimming_Version_605
[link] [comments]
❌