How "Strengthening Crypto" Broke Authentication: FreshRSS and bcrypt's 72-Byte Limit
As part of our CVE monitoring, we came across GHSA-pcq9-mq6m-mvmp (CVE-2025-68402), an authentication bypass in FreshRSS, a self-hosted RSS aggregator. It ...
A commit meant to "strengthen the crypto" in FreshRSS ended up removing the need for a correct password.
Why?
Longer SHA-256 nonce + bcrypt truncation at 72 bytes.
A nice example of why secure systems are about composition, not just stronger primitives.
pentesterlab.com/blog/freshrs...
10.03.2026 08:54
๐ 10
๐ 5
๐ฌ 0
๐ 1
Vibe Security Radar
Tracking the security cost of vibe coding
๐ ๐ฉ๐ถ๐ฏ๐ฒ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฅ๐ฎ๐ฑ๐ฎ๐ฟ
A cool little project to track the security issues created by vibe coding: vibe-radar-ten.vercel.app.
08.03.2026 21:01
๐ 1
๐ 0
๐ฌ 1
๐ 0
The MCP AuthN/Z Nightmare ยท Doyensec's Blog
The MCP AuthN/Z Nightmare
โจ ๐ง๐ต๐ฒ ๐ ๐๐ฃ ๐๐๐๐ต๐ก/๐ญ ๐ก๐ถ๐ด๐ต๐๐บ๐ฎ๐ฟ๐ฒ
A reminder of the mess AuthN/Z with MCP is: blog.doyensec.com/2026/03/05/m....
08.03.2026 21:01
๐ 0
๐ 1
๐ฌ 1
๐ 0
mitmproxy for fun and profit: Interception and Analysis of Application
mitmproxy for fun and profit: Interception and Analysis of Application
๐ฅ ๐บ๐ถ๐๐บ๐ฝ๐ฟ๐ผ๐
๐ ๐ณ๐ผ๐ฟ ๐ณ๐๐ป ๐ฎ๐ป๐ฑ ๐ฝ๐ฟ๐ผ๐ณ๐ถ๐: ๐๐ป๐๐ฒ๐ฟ๐ฐ๐ฒ๐ฝ๐๐ถ๐ผ๐ป ๐ฎ๐ป๐ฑ ๐๐ป๐ฎ๐น๐๐๐ถ๐ ๐ผ๐ณ ๐๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ง๐ฟ๐ฎ๐ณ๐ณ๐ถ๐ฐ
A write-up on how to use mitmproxy: www.synacktiv.com/en/publicati....
08.03.2026 21:01
๐ 0
๐ 0
๐ฌ 1
๐ 0
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ญ๐ฌ, ๐ฎ๐ฌ๐ฎ๐ฒ
A great mix of content this week!
๐ ๐๐ฟ๐ผ๐ป๐๐๐ฟ๐๐ฎ๐ถ๐ป: ๐ ๐ฃ๐ฒ๐ฟ๐๐ผ๐ป๐ฎ๐น ๐๐ ๐๐๐๐ถ๐๐๐ฎ๐ป๐ ๐๐๐ถ๐น๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐ณ๐ฟ๐ผ๐บ ๐๐ต๐ฒ ๐๐ฟ๐ผ๐๐ป๐ฑ ๐จ๐ฝ
Niels Provos (from OpenBSD's systrace) is sharing a new tool to sandbox your AI assistant: www.provos.org/p/ironcurtai....
08.03.2026 21:01
๐ 4
๐ 1
๐ฌ 1
๐ 0
vinext: Vibe-Hacking Cloudflare's Vibe-Coded Next.js Replacement
Cloudflare built a Next.js replacement in a week with AI for $1100. We pointed Hacktron at it to find what the tests missed.
โ๏ธ ๐๐ถ๐ป๐ฒ๐
๐: ๐ฉ๐ถ๐ฏ๐ฒ-๐๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด ๐๐น๐ผ๐๐ฑ๐ณ๐น๐ฎ๐ฟ๐ฒ'๐ ๐ฉ๐ถ๐ฏ๐ฒ-๐๐ผ๐ฑ๐ฒ๐ฑ ๐ก๐ฒ๐
๐.๐ท๐ ๐ฅ๐ฒ๐ฝ๐น๐ฎ๐ฐ๐ฒ๐บ๐ฒ๐ป๐
It's raining bugs in the cloud. A great example of agent capabilities on a never-seen-before target: www.hacktron.ai/blog/hacking....
01.03.2026 23:58
๐ 0
๐ 0
๐ฌ 0
๐ 0
100+ Kernel Bugs in 30 Days
High-Scale Driver Vulnerability Research with Agent Swarms
๐ช ๐ญ๐ฌ๐ฌ+ ๐๐ฒ๐ฟ๐ป๐ฒ๐น ๐๐๐ด๐ ๐ถ๐ป ๐ฏ๐ฌ ๐๐ฎ๐๐
Behind the (impressive) result, the methodology is probably the most important. Make sure you read between the lines: substack.com/home/post/p-....
01.03.2026 23:58
๐ 0
๐ 0
๐ฌ 1
๐ 0
Browser-Based Port Scanning in the Age of LNA
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ต, ๐ฎ๐ฌ๐ฎ๐ฒ
Mostly AI...
๐ป ๐๐ฟ๐ผ๐๐๐ฒ๐ฟ-๐๐ฎ๐๐ฒ๐ฑ ๐ฃ๐ผ๐ฟ๐ ๐ฆ๐ฐ๐ฎ๐ป๐ป๐ถ๐ป๐ด ๐ถ๐ป ๐๐ต๐ฒ ๐๐ด๐ฒ ๐ผ๐ณ ๐๐ก๐
Leveraging Local Network Access to create a port scanner! wiki.notveg.ninja/tools/lna-po....
01.03.2026 23:58
๐ 2
๐ 3
๐ฌ 1
๐ 0
CVE Archeologist's field guide
Methodology and Lessons from 10 Vulnerability Analyses
Written by Louis Nyffenegger
As I mentioned last week I ordered some books (which got delivered this week)
CVE ARCHEOLOGIST'S FIELD GUIDE by Louis Nyffenegger @pentesterlab.com
28.02.2026 00:15
๐ 1
๐ 1
๐ฌ 1
๐ 0
Using threat modeling and prompt injection to audit Comet
Trail of Bits used ML-centered threat modeling and adversarial testing to identify four prompt injection techniques that could exploit Perplexityโs Comet browser AI assistant to exfiltrate private Gma...
๐ค ๐จ๐๐ถ๐ป๐ด ๐๐ต๐ฟ๐ฒ๐ฎ๐ ๐บ๐ผ๐ฑ๐ฒ๐น๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐ฝ๐ฟ๐ผ๐บ๐ฝ๐ ๐ถ๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐ผ ๐ฎ๐๐ฑ๐ถ๐ ๐๐ผ๐บ๐ฒ๐
The team at Trail of Bits is sharing some key learnings from their audit of Comet (AI browser) blog.trailofbits.com/2026/02/20/u....
22.02.2026 22:16
๐ 2
๐ 0
๐ฌ 0
๐ 0
HeroDevs Blog | CVE-2026-0603: Second-Order SQL Injection in Hibernate UPDATE/DELETE (InlineIdsOrClauseBuilder)
CVE-2026-0603 is a high-severity second-order SQL injection vulnerability in Hibernate ORM caused by unsafe ID inlining during UPDATE and DELETE operations. Learn impact, root cause, and remediation.
โ๏ธ ๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฒ-๐ฌ๐ฒ๐ฌ๐ฏ: ๐ฆ๐ฒ๐ฐ๐ผ๐ป๐ฑ-๐ข๐ฟ๐ฑ๐ฒ๐ฟ ๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ถ๐ป ๐๐ถ๐ฏ๐ฒ๐ฟ๐ป๐ฎ๐๐ฒ ๐จ๐ฃ๐๐๐ง๐/๐๐๐๐๐ง๐ (๐๐ป๐น๐ถ๐ป๐ฒ๐๐ฑ๐๐ข๐ฟ๐๐น๐ฎ๐๐๐ฒ๐๐๐ถ๐น๐ฑ๐ฒ๐ฟ)
A bit of a stretch but an interesting insight into Hibernate: www.herodevs.com/blog-posts/c....
22.02.2026 22:16
๐ 0
๐ 0
๐ฌ 1
๐ 0
Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat โ Insinuator.net
๐ฑ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐ถ๐๐ฐ๐น๐ผ๐๐๐ฟ๐ฒ: ๐๐ช๐ง ๐๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐๐๐ฝ๐ฎ๐๐ ๐ถ๐ป ๐ข๐ฝ๐ฒ๐ป๐๐ ๐๐ผ๐ป๐ป๐ฒ๐ฐ๐ ๐๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ผ๐ฟ ๐ณ๐ผ๐ฟ ๐ง๐ผ๐บ๐ฐ๐ฎ๐
The exact same vulnerability I found in HarbourJWT but in a much cooler target, still not fixed... insinuator.net/2026/02/jwt-....
22.02.2026 22:16
๐ 0
๐ 0
๐ฌ 1
๐ 0
Almost Impossible: Java Deserialization Through Broken Crypto in OpenText Directory Services โบ Searchlight Cyber
Introduction We recently found ourselves looking into OpenText Directory Services (OTDS). We had seen it present on our customer's attack surface, and it seemed to be an interesting target. OTDS is a ...
โ๏ธ ๐๐น๐บ๐ผ๐๐ ๐๐บ๐ฝ๐ผ๐๐๐ถ๐ฏ๐น๐ฒ: ๐๐ฎ๐๐ฎ ๐๐ฒ๐๐ฒ๐ฟ๐ถ๐ฎ๐น๐ถ๐๐ฎ๐๐ถ๐ผ๐ป ๐ง๐ต๐ฟ๐ผ๐๐ด๐ต ๐๐ฟ๐ผ๐ธ๐ฒ๐ป ๐๐ฟ๐๐ฝ๐๐ผ ๐ถ๐ป ๐ข๐ฝ๐ฒ๐ป๐ง๐ฒ๐
๐ ๐๐ถ๐ฟ๐ฒ๐ฐ๐๐ผ๐ฟ๐ ๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ๐
What an adventure in Java Deserialisation... slcyber.io/research-cen....
22.02.2026 22:16
๐ 0
๐ 0
๐ฌ 1
๐ 0
CTFtime.org / justCTF [*] 2020 / Go-fs / Writeup
CTF writeups, Go-fs
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ด, ๐ฎ๐ฌ๐ฎ๐ฒ
Java x2, Go, JWT and a sprinkling of AI
๐ฆซ ๐๐ง๐๐๐ถ๐บ๐ฒ.๐ผ๐ฟ๐ด / ๐ท๐๐๐๐๐ง๐ [*] ๐ฎ๐ฌ๐ฎ๐ฌ / ๐๐ผ-๐ณ๐ / ๐ช๐ฟ๐ถ๐๐ฒ๐๐ฝ
A cool Golang quirk via an unintended CTF solution ctftime.org/writeup/25852.
22.02.2026 22:16
๐ 1
๐ 0
๐ฌ 1
๐ 0
New lab: CVE-2026-24895 โ FrankenPHP Path Confusion RCE (Unicode)
People think "lowercase it" is harmless. In Unicode itโs not.
Case folding can do weird mappings (Turkish i, Kelvin signโฆ), and sometimes worse: UTF-8 byte length changes.
Hands-on lab: pentesterlab.com/exercises/cv...
16.02.2026 01:13
๐ 3
๐ 0
๐ฌ 0
๐ 0
Trailing Danger: exploring HTTP Trailer parsing discrepancies
Trailing Danger: exploring HTTP Trailer parsing discrepancies
๐ ๐ง๐ฟ๐ฎ๐ถ๐น๐ถ๐ป๐ด ๐๐ฎ๐ป๐ด๐ฒ๐ฟ: ๐ฒ๐
๐ฝ๐น๐ผ๐ฟ๐ถ๐ป๐ด ๐๐ง๐ง๐ฃ ๐ง๐ฟ๐ฎ๐ถ๐น๐ฒ๐ฟ ๐ฝ๐ฎ๐ฟ๐๐ถ๐ป๐ด ๐ฑ๐ถ๐๐ฐ๐ฟ๐ฒ๐ฝ๐ฎ๐ป๐ฐ๐ถ๐ฒ๐
Probably one of the lesser-known features of HTTP... Trailers. This post provides details on the feature and explains how they can be leveraged to find security issues. www.sebsrt.xyz/blog/trailin....
16.02.2026 01:13
๐ 1
๐ 0
๐ฌ 0
๐ 0
RCE in Google's AI code editor Antigravity - $10000 Bounty
Hacktron AI Research Team discovered a critical RCE in Googleโs Antigravity IDE that lets attackers take over your system just by opening a malicious website.
๐ค ๐ฅ๐๐ ๐ถ๐ป ๐๐ผ๐ผ๐ด๐น๐ฒ'๐ ๐๐ ๐ฐ๐ผ๐ฑ๐ฒ ๐ฒ๐ฑ๐ถ๐๐ผ๐ฟ ๐๐ป๐๐ถ๐ด๐ฟ๐ฎ๐๐ถ๐๐ - $๐ญ๐ฌ๐ฌ๐ฌ๐ฌ ๐๐ผ๐๐ป๐๐
A detailed blog post on hacking Antigravity with a lot of interesting details on its inner workings. www.hacktron.ai/blog/hacking....
16.02.2026 01:13
๐ 1
๐ 0
๐ฌ 1
๐ 0
๐คบ ๐ช๐ต๐ฒ๐ป ๐ง๐๐ผ ๐ฃ๐ฎ๐ฟ๐๐ฒ๐ฟ๐ ๐๐ถ๐๐ฎ๐ด๐ฟ๐ฒ๐ฒ: ๐๐
๐ฝ๐น๐ผ๐ถ๐๐ถ๐ป๐ด ๐ค๐๐ฒ๐ฟ๐ ๐ฆ๐๐ฟ๐ถ๐ป๐ด ๐๐ถ๐ณ๐ณ๐ฒ๐ฟ๐ฒ๐ป๐๐ถ๐ฎ๐น๐ ๐ณ๐ผ๐ฟ ๐ซ๐ฆ๐ฆ
If you enjoy parser differential issues, you are going to love this exploit. Don't think "It's a CTF challenge" or "It's just an XSS", read between the lines to find the real gold. blog.voorivex.team/when-two-par....
16.02.2026 01:13
๐ 0
๐ 0
๐ฌ 1
๐ 0
Introducing Augustus: Open Source LLM Prompt Injection Tool
Explore LLM fingerprinting and its role in exposing vulnerable Ollama servers online to unauthorized access risks.
โ๏ธ ๐๐ป๐๐ฟ๐ผ๐ฑ๐๐ฐ๐ถ๐ป๐ด ๐๐๐ด๐๐๐๐๐: ๐ข๐ฝ๐ฒ๐ป ๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ ๐๐๐ ๐ฃ๐ฟ๐ผ๐บ๐ฝ๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ง๐ผ๐ผ๐น
Praetorian is back with another tool (one of their 12 Caesars): Augustus... Make sure you check it out! www.praetorian.com/blog/introdu....
16.02.2026 01:13
๐ 0
๐ 0
๐ฌ 1
๐ 0
Breaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Security | hetmehta.com
Deep technical analysis of CVE-2026-25049: How type confusion bypassed n8n's security patch and why TypeScript types aren't runtime security boundaries
โจ ๐๐ฟ๐ฒ๐ฎ๐ธ๐ถ๐ป๐ด ๐๐ผ๐๐ป ๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฒ-๐ฎ๐ฑ๐ฌ๐ฐ๐ต: ๐๐ผ๐ ๐ง๐๐ฝ๐ฒ๐ฆ๐ฐ๐ฟ๐ถ๐ฝ๐ ๐ง๐๐ฝ๐ฒ๐ ๐๐ฎ๐ถ๐น๐ฒ๐ฑ ๐ป๐ด๐ป'๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐
A great explanation of the recent vulnerabilities impacting n8n. If you are working in security on TypeScript projects, it's a must read. hetmehta.com/posts/n8n-ty....
16.02.2026 01:13
๐ 1
๐ 0
๐ฌ 1
๐ 0
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ณ, ๐ฎ๐ฌ๐ฎ๐ฒ
Parser Differential, TypeScript and AI
๐
16.02.2026 01:13
๐ 3
๐ 1
๐ฌ 1
๐ 0
What Really Killed Flash Player: A Six-Year Campaign of Deliberate Platform Work
This is what it actually took. From the person who architected and drove Chromeโs Flash deprecation from proposal to the final removal inโฆ
โก๏ธ ๐ช๐ต๐ฎ๐ ๐ฅ๐ฒ๐ฎ๐น๐น๐ ๐๐ถ๐น๐น๐ฒ๐ฑ ๐๐น๐ฎ๐๐ต ๐ฃ๐น๐ฎ๐๐ฒ๐ฟ: ๐ ๐ฆ๐ถ๐
-๐ฌ๐ฒ๐ฎ๐ฟ ๐๐ฎ๐บ๐ฝ๐ฎ๐ถ๐ด๐ป ๐ผ๐ณ ๐๐ฒ๐น๐ถ๐ฏ๐ฒ๐ฟ๐ฎ๐๐ฒ ๐ฃ๐น๐ฎ๐๐ณ๐ผ๐ฟ๐บ ๐ช๐ผ๐ฟ๐ธ
The story of the death of Adobe Flash, a must-read for AppSec practitioners. medium.com/@aglaforge/w....
08.02.2026 22:25
๐ 0
๐ 0
๐ฌ 0
๐ 0
Discovering Negative-Days with LLM Workflows
Itโs no longer just about reverse-engineering n-days. You can detect vulnerabilities in open-source repositories before a CVE is published - or even if theyโre never published. Hereโs how I built an L...
๐ฆ ๐๐ถ๐๐ฐ๐ผ๐๐ฒ๐ฟ๐ถ๐ป๐ด ๐ก๐ฒ๐ด๐ฎ๐๐ถ๐๐ฒ-๐๐ฎ๐๐ ๐๐ถ๐๐ต ๐๐๐ ๐ช๐ผ๐ฟ๐ธ๐ณ๐น๐ผ๐๐
That's something I toyed with in 2012 (Monitoring repositories for Fun and Profit - Ruxcon 2012), I used basic rules at the time. Obviously, having LLMs is a game changer for this kind of workload: spaceraccoon.dev/discovering-....
08.02.2026 22:25
๐ 1
๐ 0
๐ฌ 1
๐ 0
Boost LLM Security: automated Red Teaming at Scale with Promptfoo
Find access-control flaws in LLM apps using Promptfoo plugins and strategies.
๐จ ๐๐ป ๐ถ๐ป๐๐ฟ๐ผ๐ฑ๐๐ฐ๐๐ถ๐ผ๐ป ๐๐ผ ๐ฎ๐๐๐ผ๐บ๐ฎ๐๐ฒ๐ฑ ๐๐๐ ๐ฟ๐ฒ๐ฑ ๐๐ฒ๐ฎ๐บ๐ถ๐ป๐ด
Promptfoo is a neat tool to add to your red teaming arsenal: blog.nviso.eu/2026/02/05/a....
08.02.2026 22:25
๐ 1
๐ 0
๐ฌ 1
๐ 0
โฆ๏ธ ๐๐ผ -๐ฅ๐ฒ๐ฑ๐ง๐ฒ๐ฎ๐บ: ๐ข๐ฟ๐ฐ๐ต๐ฒ๐๐๐ฟ๐ฎ๐๐ฒ๐ฑ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐ฐ๐ผ๐๐ฒ๐ฟ๐ ๐ฎ๐ป๐ฑ ๐๐
๐ฝ๐น๐ผ๐ถ๐๐ฎ๐๐ถ๐ผ๐ป ๐๐ถ๐๐ต ๐๐๐ ๐๐ด๐ฒ๐ป๐๐
If you are working on a "LLM based hacker", you are going to want to read this: arxiv.org/pdf/2602.02164.
08.02.2026 22:25
๐ 1
๐ 0
๐ฌ 1
๐ 0
๐ค ๐๐๐ฎ๐น๐๐ฎ๐๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐บ๐ถ๐๐ถ๐ด๐ฎ๐๐ถ๐ป๐ด ๐๐ต๐ฒ ๐ด๐ฟ๐ผ๐๐ถ๐ป๐ด ๐ฟ๐ถ๐๐ธ ๐ผ๐ณ ๐๐๐ -๐ฑ๐ถ๐๐ฐ๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ ๐ฌ-๐ฑ๐ฎ๐๐
This section resumes it: "Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models": red.anthropic.com/2026/zero-da....
08.02.2026 22:25
๐ 1
๐ 0
๐ฌ 1
๐ 0
๐คฟ ๐ฆ๐ต๐ฎ๐ธ๐ถ๐ป๐ด ๐๐ต๐ฒ ๐ ๐๐ฃ ๐ง๐ฟ๐ฒ๐ฒ: ๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฒ๐ฒ๐ฝ ๐๐ถ๐๐ฒ
You may think "just another MCP bug" but this post is actually worth reading: blog.voorivex.team/shaking-the-....
08.02.2026 22:25
๐ 1
๐ 0
๐ฌ 1
๐ 0