• Open

    The Oracle of Delphi Will Steal Your Credentials
    Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.
    The Nansh0u Campaign – Hackers Arsenal Grows Stronger
    In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).
    PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
    Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
    Threats Making WAVs - Incident Response to a Cryptomining Attack
    Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident response processes in data centers.
    Keep Your Tech Flame Alive: Trailblazer Rachel Bayley
    In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their authentic selves.

  • Open

    CASI Leaderboard Shifts: Developer Role Attack, and Three Concerning Incidents
    AI Security Insights – April 2026
  • Open

    Inside Cirro: Attack Paths, Cloud Graphs, and Extensible Schemas
    Cloud risk doesn’t live in a single permission, it lives in the relationships between them. Discover how Cirro maps hidden attack paths across Azure identities, resources, and data to reveal what attackers actually see.
  • Open

    The agentic SOC—Rethinking SecOps for the next decade
    In the SOC of the future, autonomous defense moves at machine speed, agents add context and coordination, and humans focus on judgment, risk, and outcomes. The post The agentic SOC—Rethinking SecOps for the next decade appeared first on Microsoft Security Blog.
    Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees
    Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized access to employee profiles and divert salary payments to attacker-controlled accounts. The post Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees appeared first on Microsoft Security Blog.
    Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk
    A severe Android intent‑redirection vulnerability in a widely deployed SDK exposed sensitive user data across millions of apps. Microsoft researchers detail how the flaw works, why it matters, and how developers can mitigate similar risks by updating affected SDKs. The post Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk appeared first on Microsoft Security Blog.
  • Open

    World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover
    At least 24 chimpanzees have been killed in a war that has split the Ngogo group of wild chimpanzees in two, turning former kin into enemies.
    Farmer Arrested for Speaking Too Long at Datacenter Town Hall Vows to Fight
    Darren Blanchard went a few seconds over his three minute time limit and found himself in handcuffs.
    FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database
    The case was the first time authorities charged people for alleged “Antifa” activities after President Trump designated the umbrella term a terrorist organization.
  • Open

    Protecting Cookies with Device Bound Session Credentials
    Posted by Ben Ackerman, Chrome team, Daniel Rubery, Chrome team and Guillaume Ehinger, Google Account Security team Following our April 2024 announcement, Device Bound Session Credentials (DBSC) is now entering public availability for Windows users on Chrome 146, and expanding to macOS in an upcoming Chrome release. This project represents a significant step forward in our ongoing efforts to combat session theft, which remains a prevalent threat in the modern security landscape. Session theft typically occurs when a user inadvertently downloads malware onto their device. Once active, the malware can silently extract existing session cookies from the browser or wait for the user to log in to new accounts, before exfiltrating these tokens to an attacker-controlled server. Infostealer ma…
  • Open

    Operation Atlantic: How Public-Private Collaboration Is Freezing Millions in Crypto Scam Proceeds
    Last week, Chainalysis joined a proactive joint operation co-hosted by the UK’s National Crime Agency (NCA), the US Secret Service,… The post Operation Atlantic: How Public-Private Collaboration Is Freezing Millions in Crypto Scam Proceeds appeared first on Chainalysis.  ( 12 min )
    The Drift Protocol Hack: How Privileged Access Led to a $285 Million Loss
    TL;DR On April 1, 2026, Solana’s Drift Protocol was drained of $285 million (over 50% of its TVL) in a… The post The Drift Protocol Hack: How Privileged Access Led to a $285 Million Loss appeared first on Chainalysis.  ( 15 min )
  • Open

    Scammers pose as Amazon support to steal your account
    A new wave of Amazon refund scams is spreading, hitting both email inboxes and text messages.  ( 22 min )
    NSFW app leak exposes 70,000 prompts linked to individual users
    MyLovely.AI leaked personal data, explicit prompts, and images of over 100,000 users, exposing many to sextortion and doxxing.  ( 21 min )
    30,000 private Facebook images allegedly downloaded by Meta employee
    The accused didn't just browse around; he built a custom script designed to circumvent Meta's internal detection systems.  ( 22 min )
    This fake Windows support website delivers password-stealing malware
    A convincing Microsoft lookalike tricks users into downloading malware that steals passwords, payments, and account access.  ( 26 min )
  • Open

    HUGE AI-powered Microsoft Account phishing campaign
    No content preview
  • Open

    InfoSec News Nuggets 04/09/2026
    Hackers exploiting Acrobat Reader zero-day flaw since December  Attackers have been using a previously unpatched Adobe Reader flaw in malicious PDFs since at least December, according to researcher Haifei Li. The reported activity can steal local data through Acrobat APIs and may enable follow-on remote code execution or sandbox escape, which makes this one worth […] The post InfoSec News Nuggets 04/09/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    So… You Thought Your VPN Was Keeping You Safe and Secure? Think Again (Hacker’s Edition)
    ✨ Link for the full article in the first comment Continue reading on InfoSec Write-ups »
    Building a SOC Ticketing System with JIRA (Complete Step-by-Step Guide)
    Learn how to build a SOC ticketing system in Jira Service Management from scratch and for free. Continue reading on InfoSec Write-ups »
    The Ministry of Silly Walks Presents: Walking the PEB
    No content preview
    My eCPPTv3 Exam Review
    No content preview
    JADX + MCP: I let the AI read the APK so I don’t have to
    No content preview
    OWASP API Security Top 10 (Part 1) — TryHackMe Walkthrough ️
    No content preview
    CI/CD Takeover & Supply Chain Risk! $$$$ Bounty
    No content preview
    Dig Dug TryHackMe Walkthrough
    No content preview
    Love Letter Locker — TryHackMe Writeup
    No content preview
    “Bug Bounty Bootcamp #30: Time-Based Blind SQL Injection — When Silence Speaks Through Delays”
    The application never shows an error, never says “true” or “false” — just “email added” every time. Yet you can still drain the database… Continue reading on InfoSec Write-ups »

  • Open

    Tearing down a car telematic unit (and finding an accident on Facebook)
    From hardware analysis to OSINT: how we retrieved information about a BYD car crash by analyzing the TCU embedded memory.
  • Open

    A framework for securely collecting forensic artifacts into S3 buckets
    When customers experience a security incident, they need to acquire forensic artifacts to identify root cause, extract indicators of compromise (IoCs), and validate remediation efforts. NIST 800-86, Guide to Integrating Forensic Techniques into Incident Response, defines digital forensics as a process comprised of four basic phases: collection, examination, analysis, and reporting. This blog post focuses […]
  • Open

    Weekly Threat Bulletin – April 8th, 2026
    These are the top threats you should know about this week.
  • Open

    robots take over the world or something i guess idk
    No content preview
    How Teenage Hackers Hijack the Internet (with Joe Tidy!)
    No content preview
  • Open

    Node.js Trust Falls: Dangerous Module Resolution on Windows
    In September of 2024, ZDI received a vulnerability submission from an anonymous researcher affecting npm CLI that revealed a fundamental design issue in Node.js. This blog details how it continues to expose applications to local privilege escalation (LPE) attacks on Windows systems, including the Discord desktop app (CVE-2026-0776 0-Day), which remains unpatched and vulnerable. The issue is straightforward: when Node.js resolves modules, the runtime searches for packages in C:\node_modules as part of its default behavior. Since low-privileged Windows users can create this directory and plant malicious modules there, any Node.js application with missing or optional dependencies becomes vulnerable to privilege escalation. This issue is not new. Concerned discussions about Node.js's module se…
  • Open

    Your extensions leak clues about you, so we made sure Browser Guard doesn’t
    Your browser extensions can be used to build a profile of you for advertisers and scammers. We're making sure our Browser Guard extension stays private.  ( 121 min )
    Russian hacking group targets home and small office routers to spy on users
    The FBI, NCSC, and Microsoft warn of an ongoing Russian campaign hijacking DNS settings on home and small office routers to spy on users.  ( 23 min )
    Timeshare owners warned to watch out for cartel-linked scams
    Authorities warn that Mexican drug cartels are targeting timeshare owners with advance-fee fraud. Here’s what to watch for.  ( 25 min )
  • Open

    Podcast: Wildlife Cops Are Searching AI Cameras for ICE
    How Florida conservation police are tapping into Flock for ICE; Wikipedia's AI ban; and how the app TeleGuard uploads users' private keys.
    A 'Self-Doxing' Rave Helps Trans People Stay Safe Online
    At a New York party, attendees spent Trans Day of Visibility dancing, DJing, and learning how to become less visible online.
    I Wish I Didn’t Care About 'Marathon' Player Numbers, But I Do
    Marathon is a great game for uncs. As signs of a crash change the video game industry, there might not be a lot of those left.
    Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updates
    Updates to VeraCrypt, a popular and long-running piece of encryption, are now thrown into doubt because of a seemingly unexplained Microsoft decision.
  • Open

    Submission to the UN Working Group on the Use of Mercenaries
    The Citizen Lab submitted recommendations to the UN Working Group on the Use of Mercenaries. The post Submission to the UN Working Group on the Use of Mercenaries appeared first on The Citizen Lab.
    A Cat-and-Mouse Game of Russian Internet Restrictions and Evasion
    Senior researcher Ksenia Ermoshina spoke to the New York Times about how Russians may start acquiescing to the limits imposed by state censorship. The post A Cat-and-Mouse Game of Russian Internet Restrictions and Evasion appeared first on The Citizen Lab.
  • Open

    The $100 Trillion Wealth Shift: Stablecoin Utility and the Future of Payments
    This blog is a preview of our forthcoming report, “The New Rails: How Digital Assets Are Reshaping the Foundations of… The post The $100 Trillion Wealth Shift: Stablecoin Utility and the Future of Payments appeared first on Chainalysis.  ( 13 min )
  • Open

    InfoSec News Nuggets 04/08/2026
    Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins An international operation disrupted FrostArmada, a campaign linked to Russia’s APT28 that compromised SOHO routers, changed DNS settings, and intercepted Microsoft login traffic to steal credentials and OAuth tokens. At its peak in December 2025, the campaign had infected about 18,000 devices across 120 […] The post InfoSec News Nuggets 04/08/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Protecting Publishing: The Real Cost of AI Bots
    No content preview
  • Open

    My Lovely AI - 106,271 breached accounts
    In April 2026, the NSFW AI girlfriend platform My Lovely AI suffered a data breach that exposed over 100k users. The data included user-created prompts and links to the resulting AI-generated images, along with a small number of Discord and X usernames.

  • Open

    FAST '26 - Rearchitecting Buffered I/O in the Era of High-Bandwidth SSDs
    No content preview
    FAST '26 - SkySync: Accelerating File Synchronization with Collaborative Delta Generation
    No content preview
    FAST '26 - AdaCheck: An Adaptive Checkpointing System for Efficient LLM Training with Redundancy...
    No content preview
    FAST '26 - MlsDisk: Trusted Block Storage for TEEs Based on Layered Secure Logging
    No content preview
    FAST '26 - SolidAttention: Low-Latency SSD-based Serving on Memory-Constrained PCs
    No content preview
    FAST '26 - ParaSync: Exploiting Fine-Grained Parallelism for Efficient File Synchronization
    No content preview
    FAST '26 - LESS is More for I/O-Efficient Repairs in Erasure-Coded Storage
    No content preview
    FAST '26 - "Range as a Key" is the Key! Fast and Compact Cloud Block Store Index with RASK
    No content preview
    FAST '26 - Unleashing Zoned UFS: Cross-Layer Optimizations for Next-Generation Mobile Storage
    No content preview
    FAST '26 - PolarStore: High-Performance Data Compression for Large-Scale Cloud-Native Databases
    No content preview
    FAST '26 - FailureMiner: A Joint Key Decision Mining Scheme for Practical SSD Failure Prediction...
    No content preview
    FAST '26 - DMTree: Towards Efficient Tree Indexing on Disaggregated Memory via Compute-side...
    No content preview
    FAST '26 - Bidaw: Enhancing Key-Value Caching for Interactive LLM Serving via Bidirectional...
    No content preview
    FAST '26 - UnICom: A Universally High-Performant I/O Completion Mechanism for Modern Computer...
    No content preview
    FAST '26 - Xerxes: Extensive Exploration of Scalable Hardware Systems with CXL-Based Simulation...
    No content preview
  • Open

    Building AI defenses at scale: Before the threats emerge
    At AWS, we’ve spent decades developing processes and tools that enable us to defend millions of customers simultaneously, wherever they operate around the world. AI has been an extremely helpful addition to the automation our security and threat intelligence teams do every day, and we’re still early in this journey. Our AI-powered log analysis system […]
  • Open

    Maine Is Close to Passing a Moratorium on New Datacenters
    The proposed legislation would be the first of its kind passed in the country, but there are similar bills popping up everywhere this year.
    Data Center Tech Lobbyists Fearmonger in Attempt to Retroactively Roll Back Right to Repair Law
    Cisco, IBM, and major lobbying groups are trying to exempt "critical infrastructure" from an existing Colorado law.
  • Open

    SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
    Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in ways that turn them into part of the actor’s malicious infrastructure. The post SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks appeared first on Microsoft Security Blog.
  • Open

    Hackers make FAKE notifications
    No content preview
  • Open

    Scale Smarter: A Practical Guide to Building with Akamai Object Storage
    Akamai Object Storage provides high-performance, cost-effective Amazon S3–compatible object storage. Here's what it's used for and how to set it up.
    Scale Faster: A Practical Guide to Building with Akamai Block Storage
    No content preview
  • Open

    API Authentication Bypass in FortiClient EMS 7.4.5-7.4.6–CVE-2026-35616
    Bishop Fox researchers expanded on Fortinet's disclosure of CVE-2026-35616 by identifying the root cause via the released hotfix.
  • Open

    Traffic violation scams swap links for QR codes to steal your card details
    Phishers are using QR codes on official-looking notices to level up their traffic and toll scams.  ( 23 min )
    Support platform breach exposes Hims & Hers customer data
    Healthcare companies handle some of the most personal data imaginable, and that makes them a magnet for hackers.  ( 23 min )
  • Open

    InfoSec News Nuggets 04/07/2026
    Microsoft links Medusa ransomware affiliate to zero-day attacks Microsoft says the China-based group it tracks as Storm-1175 is moving unusually fast in Medusa ransomware intrusions, sometimes weaponizing newly disclosed bugs within a day and in some cases exploiting flaws before patches are released. The company said recent campaigns hit healthcare, education, professional services, and finance […] The post InfoSec News Nuggets 04/07/2026 appeared first on AboutDFIR - The Definitive Compendium Project.

  • Open

    Milking the last drop of Intego - Time for Windows to get its LPE
    Exploitation of an arbitrary directory deletion via symlink following in the antivirus Intego.
  • Open

    Multiple Hackers Warned Anti-Porn App Quittr About Security Issue for Months
    At least three different people notified the popular app that wants to help men stop watching porn that it was jeopardizing user data.
    Wisconsinites Can Keep Watching Porn After Governor Vetoes Age Verification Bill
    “I am vetoing this bill in its entirety because I object to this bill's intrusion into the personal privacy of Wisconsin residents,” Governor Tony Evers wrote.
    Wildlife Conservation Police Are Searching Thousands of Flock Cameras for ICE
    Ron DeSantis has empowered hundreds of Florida conservation police to work directly with ICE.
  • Open

    Inside an AI‑enabled device code phishing campaign
    A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation. This campaign goes beyond traditional phishing by generating live authentication codes on demand, enabling higher success rates and sustained post‑compromise access. The post Inside an AI‑enabled device code phishing campaign appeared first on Microsoft Security Blog.
    Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations
    The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize recently disclosed vulnerabilities to obtain initial access, exfiltrate data, and deploy Medusa ransomware. The post Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations appeared first on Microsoft Security Blog.
  • Open

    Submission to the National Security and Intelligence Committee of Parliamentarians
    In June 2023, the Citizen Lab submitted recommendations on combatting mercenary spyware risks to NSICOP. The post Submission to the National Security and Intelligence Committee of Parliamentarians appeared first on The Citizen Lab.
    John Scott-Railton Shares Tips and Tools to Protect Yourself Digitally
    Senior researcher John Scott-Railton speaks with GIJN about strategies journalists can employ to improve their digital hygiene and protect themselves from targeted attacks. The post John Scott-Railton Shares Tips and Tools to Protect Yourself Digitally appeared first on The Citizen Lab.
  • Open

    Delivered by Trust: What the Axios Supply Chain Attack Means for Security Leaders
    A trusted package turned into an attacker’s gateway overnight. The Axios supply chain breach shows how quickly risk can spread—and why security leaders must rethink trust in modern development.
  • Open

    InfoSec News Nuggets 04/06/2026
    CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers CISA has ordered federal agencies to patch CVE-2026-3502 in TrueConf by April 16 after confirming active exploitation. The bug affects the product’s updater validation mechanism and, according to reporting on Check Point’s research, can let an attacker controlling an on-prem TrueConf […] The post InfoSec News Nuggets 04/06/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    A week in security (March 30 – April 5)
    A list of topics we covered in the week of March 30 to April 5 of 2026  ( 20 min )

  • Open

    Killer robots are here. Now what? (Lock and Code S07E07)
    This week on the Lock and Code podcast, we speak with Peter Asaro about killer robots, how to stop them, and their obvious consequences.  ( 22 min )

  • Open

    📖 [The CloudSecList] Issue 332
    📖 [The CloudSecList] Issue 332 was originally published by Marco Lancini at CloudSecList on April 05, 2026.
  • Open

    Introducing the Landing Zone Accelerator on AWS Universal Configuration and LZA Compliance Workbook
    November 20, 2025: Original publication date of this post. This post has been updated to reference the most recent version of the LZA Compliance Workbook published to AWS Artifact in March 2026. We’re pleased to announce the availability of the latest sample security baseline from Landing Zone Accelerator on AWS (LZA)—the Universal Configuration. Developed from […]
  • Open

    Gambling Is Thousands of Years Older Than We Thought, Rewriting Human Evolution
    Native Americans were playing dice and other games of chance many millennia before any known cultures elsewhere.
  • Open

    AI Cyber Defense Ops Course Launch!
    No content preview
  • Open

    Crunchyroll - 1,195,684 breached accounts
    In March 2026, the anime streaming service Crunchyroll suffered a data breach alleged to have impacted 6.8M users. The exposed data is reported to have originated from the company's Zendesk support system where "name, login name, email address, IP address, general geographic location and the contents of the support tickets" were exposed. A subset of 1.2M email addresses from an alleged 2M record dataset being sold was later provided to HIBP.
    SongTrivia2 - 291,739 breached accounts
    In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum. The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt password hashes. The data also included names, usernames and avatars.

  • Open

    That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords
    We uncovered two job scams posing as legitimate offers from Coca-Cola and Ferrari that could pry into Google and Facebook accounts.  ( 26 min )
    Blocking children from social media is a badly executed good idea
    Governments are each inventing their own flavor of an age based ban for social media. Is the cure worse than the disease?  ( 23 min )
  • Open

    Behind the Blog: Systems As Designed
    This week, we discuss crypto, journalists using AI, and a cool photo of Earth.
  • Open

    How AWS KMS and AWS Encryption SDK overcome symmetric encryption bounds
    If you run high-scale applications that encrypt large volumes of data, you might be concerned about tracking encryption limits and rotating keys. This post explains how AWS Key Management Service (AWS KMS) and the AWS Encryption SDK handle Advanced Encryption Standard in Galois Counter Mode’s (AES-GCM) encryption limits or bounds automatically by using derived key […]
  • Open

    Extremely Easy Identity Management (with Authentik!)
    No content preview
    The Payload Podcast #005 - AI with Shane Caldwell
    No content preview
  • Open

    InfoSec News Nuggets 04/03/2026
    ShinyHunters claim theft of over 3 million Cisco records, threaten public leak The ShinyHunters group is claiming it exfiltrated more than 3 million records tied to Cisco, allegedly obtained through access to Salesforce and AWS environments, and is threatening to release the data if demands are not met. While the full scope and validity of […] The post InfoSec News Nuggets 04/03/2026 appeared first on AboutDFIR - The Definitive Compendium Project.

  • Open

    Four security principles for agentic AI systems
    Agentic AI represents a qualitative shift in how software operates. Traditional software executes deterministic instructions. Generative AI responds to human prompts with output that humans review and use at their discretion. Agentic AI differs from both. Agents connect to software tools and APIs and uses large language models (LLMs) as reasoning engines to plan and […]
  • Open

    Chainalysis Links NYC 2026: AI Amplification, TradFi Convergence, and the Power of Networked Intelligence
    Chainalysis Links 2026 brought together the brightest minds across cryptocurrency exchanges, global law enforcement, and traditional finance (TradFi) for an… The post Chainalysis Links NYC 2026: AI Amplification, TradFi Convergence, and the Power of Networked Intelligence appeared first on Chainalysis.  ( 12 min )
    Chainalysis、初のブロックチェーン・インテリジェンス・エージェントを発表
    ※この記事は自動翻訳されています。正確な内容につきましては原文をご参照ください。 悪意のあるアクターはすでに AI を駆使し、詐欺、窃盗、マネーロンダリングを加速させています。対抗する側には、それを上回るスピードが求められます。 本日、イベント Links にて、Chainalysis の新たなステージとなるブロックチェーン・インテリジェンス・エージェント、「Chainalysis Agent(エージェント)」を発表しました。単独の新製品でも、後付けのチャットボット機能でもありません。数十億件のスクリーニング済みトランザクション、1,000 万件以上の捜査、10 年以上にわたるブロックチェーン分析で培った知見、これらすべてを基盤として進化したプラットフォーム機能であり、お客様のチームの一員として機能します。 ブロックチェーン分析を組織全体へ Chainalysis は、政府、金融機関、暗号資産事業者が捜査、規制対応、資産保護のために信頼を寄せる、世界で最も包括的なブロックチェーンデータセットを構築してきました。当社のデータは法廷で唯一信頼性を認められ、証拠として採用されています。そして当社のツールは、暗号資産史上最も重要な捜査を支えてきました。 しかし、その分析能力を最大限に活かすには、高度な専門スキルが求められていました。Chainalysis エージェントは、プラットフォームの全機能、つまりデータ、製品、専門知識を組織内の誰もが活用できるようにします。熟練の捜査官やコンプライアンスアナリストから経営層まで、Chainalysis エージェントを通じて的確なインサイトを得られるようになり、チームの対応力を飛躍的に高めます。 エージェントの力を引き出すプラットフォーム 今、あらゆる企業が AI… The post Chainalysis、初のブロックチェーン・インテリジェンス・エージェントを発表 appeared first on Chainalysis.  ( 8 min )
  • Open

    PGBouncer: Connection Pooling for Managed PostgreSQL Databases
    Learn how enabling PGBouncer reduces connection overhead, frees up server resources for query execution and disk caching, and improves performance at scale.
    Compliance Won’t Save Healthcare: Reducing the Blast Radius Will
    No content preview
  • Open

    Google Workspace’s continuous approach to mitigating indirect prompt injections
    Posted by Adam Gavish, Google GenAI Security Team Indirect prompt injection (IPI) is an evolving threat vector targeting users of complex AI applications with multiple data sources, such as Workspace with Gemini. This technique enables the attacker to influence the behavior of an LLM by injecting malicious instructions into the data or tools used by the LLM as it completes the user’s query. This may even be possible without any input directly from the user. IPI is not the kind of technical problem you “solve” and move on. Sophisticated LLMs with increasing use of agentic automation combined with a wide range of content create an ultra-dynamic and evolving playground for adversarial attacks. That’s why Google takes a sophisticated and comprehensive approach to these attacks. We’re contin…
  • Open

    Threat actor abuse of AI accelerates from tool to cyberattack surface
    Generative AI is upgrading cyberattacks, from 450% higher phishing click‑through rates to industrialized MFA bypass. The post Threat actor abuse of AI accelerates from tool to cyberattack surface appeared first on Microsoft Security Blog.
    Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
    Cookie-gated PHP webshells use obfuscation, php-fpm execution, and cron-based persistence to evade detection in Linux hosting environments. This post examines how this tradecraft conceals execution behind specially crafted HTTP cookies. The post Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments appeared first on Microsoft Security Blog.
  • Open

    Journalist Sues FAA Over Drone No Fly Zone Designed to Prevent Filming ICE
    A Minnesota journalist is challenging a 3,000 foot restriction on flying near DHS assets on First Amendment grounds.
  • Open

    Apple expands “DarkSword” patches to iOS 18.7.7
    Apple has quietly expanded patches against the vulnerabilities in the DarkSword exploit kit to include iOS and iPadOS 18.7.7  ( 23 min )
    Malwarebytes Privacy VPN receives full third-party audit
    We commissioned a third-party audit for the infrastructure behind our VPNs. Here are the results.  ( 25 min )
  • Open

    InfoSec News Nuggets 04/02/2026
    Hasbro takes some systems offline after cybersecurity incident Hasbro disclosed that it detected unauthorized access on March 28 and responded by taking some systems offline, with the disruption affecting parts of its ability to ship products and process orders. The company said the investigation is still underway, so the bigger issue for defenders is that […] The post InfoSec News Nuggets 04/02/2026 appeared first on AboutDFIR - The Definitive Compendium Project.

  • Open

    SightHouse: Automated function identification
    In this blog post we present SightHouse, an open-source tool designed to assist reverse engineers by retrieving information and metadata from programs and identifying similar functions already known from other libraries, binaries or any other source codes that can be found online.
  • Open

    Wikipedia’s AI agent row likely just the beginning of the bot-ocalypse
    An AI agent was banned from editing Wikipedia pages... and that's when things got weird, with the agent publishing its complaints publicly.  ( 23 min )
    WhatsApp on Windows users targeted in new campaign, warns Microsoft
    Microsoft warns WhatsApp on Windows users about an ongoing campaign that tries to gain permanent access to your machine  ( 22 min )
    Why we’re still not doing April Fools’ Day
    Scams are so convincing that two in three people can't tell them from the real thing. It's why we're not adding to the noise for April Fools.  ( 24 min )
  • Open

    Mitigating the Axios npm supply chain compromise
    On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages for version updates to download from command and control (C2) that Microsoft Threat Intelligence has attributed to the North Korean state actor Sapphire Sleet. Although the malicious versions are no longer available for download, since Axios is one of the most widely used HTTP clients in the JavaScript ecosystem, this compromise exposed hundreds to potentially millions of users. The post Mitigating the Axios npm supply chain compromise appeared first on Microsoft Security Blog.
  • Open

    Weekly Threat Bulletin – April 1st, 2026
    These are the top threats you should know about this week.
  • Open

    The Perils of Privatized Cyberwarfare
    In an essay for Lawfare, Citizen Lab director Ron Deibert warns that the Trump administration may authorize private firms to undertake offensive cyber operations with major consequences. The post The Perils of Privatized Cyberwarfare appeared first on The Citizen Lab.
  • Open

    InfoSec News Nuggets 04/01/2026
    ChatGPT data leakage vulnerability discovered and patched Researchers at Check Point found a prompt-based data exfiltration issue in ChatGPT’s code execution runtime that abused DNS as a side channel, allowing sensitive content processed by third-party apps, including data pulled from uploaded PDFs, to be sent to attacker-controlled infrastructure without tripping expected network restrictions. OpenAI reportedly […] The post InfoSec News Nuggets 04/01/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    How Managed Databases Are Transforming Today’s IT Landscape
    No content preview
    Digital Transformation in Africa: Security, Scale, and Control
    No content preview
  • Open

    SUCCESS - 253,510 breached accounts
    In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach. The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders containing physical addresses and the payment method used. In SUCCESS' disclosure notice, they advised their system had also been abused to send offensive newsletters with quotes falsely attributed to contributors.

  • Open

    New compliance guide available: ISO/IEC 27001:2022 on AWS
    We’re excited to announce the release of our latest compliance guide, ISO/IEC 27001:2022 on AWS, which provides practical guidance for organizations designing and operating an Information Security Management System (ISMS) using AWS services. As organizations migrate critical workloads to the cloud, aligning with globally recognized standards such as ISO/IEC 27001:2022 becomes an important step toward […]
    AWS Security Agent on-demand penetration testing now generally available
    AWS Security Agent on-demand penetration testing is now generally available, enabling you to run comprehensive security tests across all your applications, not only your most critical ones. This milestone transforms penetration testing from a periodic bottleneck into an on-demand capability that scales with your development velocity across AWS, Azure, GCP, other cloud-providers, and on-premises. With […]
  • Open

    Asking AI for personal advice is a bad idea, Stanford study shows
    AI chatbots, including ChatGPT, Claude, and Gemini, were all too willing to validate and hype up their users, a new Stanford study showed.  ( 23 min )
    Axios supply chain attack chops away at npm trust
    Developers using the axios package from npm may have downloaded a malicous version that drops a Remote Access Trojan  ( 22 min )
  • Open

    The threat to critical infrastructure has changed. Has your readiness?
    Five facts critical infrastructure (CI) leaders need to act on in 2026, grounded in what Microsoft Threat Intelligence is observing across sectors right now. The post The threat to critical infrastructure has changed. Has your readiness? appeared first on Microsoft Security Blog.
  • Open

    VRP 2025 Year in Review
    Posted by Dirk Göhmann, Tony Mendez, and the Vulnerability Rewards Program Team 2025 marked a special year in the history of vulnerability rewards and bug bounty programs at Google: our 15th anniversary 🎉🎉🎉! Originally started in 2010, our vulnerability reward program (VRP) has seen constant additions and expansions over the past decade and a half, clearly indicating the value the programs under this umbrella contribute to the safety and security of Google and its users, but also highlighting their acceptance by the external research community, without which such programs cannot function. Coming back to 2025 specifically, our VRP once again confirmed the ongoing value of engaging with the external security research community to make Google and its products safer. This was more eviden…
  • Open

    Chainalysis Introduces the First Blockchain Intelligence Agents
    Bad actors are already using AI to accelerate fraud, theft, money laundering, and more. We need to move fast to… The post Chainalysis Introduces the First Blockchain Intelligence Agents appeared first on Chainalysis.  ( 10 min )
  • Open

    InfoSec News Nuggets 03/31/2026
    European Commission confirms cyberattack after hackers claim data breach The European Commission confirmed that attackers breached part of its cloud infrastructure tied to the Europa.eu platform and said it had already contained the incident and implemented mitigation steps. The Commission said its internal systems were not affected, but it’s still investigating what data was taken […] The post InfoSec News Nuggets 03/31/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Akamai Enterprise Application Access Achieves FedRAMP Moderate Authorization
    No content preview
  • Open

    HUGE npm axios supply chain attack
    No content preview
    🚨 NPM axios Supply Chain Attack 🚨
    No content preview
  • Open

    Cuties AI - 144,250 breached accounts
    In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that was subsequently published to a public hacking forum. The incident exposed 144k unique email addresses along with display names, avatars, prompts and descriptions used to generate AI adult images, as well as URLs to the generated content. The data also included the account that created the content and a stated "preference" of either female or trans.

  • Open

    QBDI vs TritonDSE against a VM: who will be the fastest?
    In this blog, we present how QBDI and TritonDSE can be used to attack a complex C++ binary implementing a VM.
  • Open

    From the Battlefield to the Blockchain: How Cryptocurrency Is Helping Finance the Drone Revolution
    TL;DR Low-cost, commercially available drones have become central to modern conflict, allowing state and non-state actors, such as pro-Russia militias… The post From the Battlefield to the Blockchain: How Cryptocurrency Is Helping Finance the Drone Revolution appeared first on Chainalysis.  ( 11 min )
    Chainalysis Supports Tempo with Automatic Token Coverage
    Chainalysis is excited to announce support for Tempo, an EVM-compatible Layer 1 blockchain purpose-built for stablecoin payments at scale. Tempo… The post Chainalysis Supports Tempo with Automatic Token Coverage appeared first on Chainalysis.  ( 9 min )
  • Open

    InfoSec News Nuggets 03/30/2026
    CISA Flags Critical PTC Vulnerability That Had German Police Mobilized A critical remote code execution flaw in PTC Windchill and FlexPLM, CVE-2026-4681, is drawing unusual urgency. PTC has published mitigations and indicators of compromise, and CISA warned that the bug could let an unauthenticated attacker gain full control over affected systems. What makes this stand […] The post InfoSec News Nuggets 03/30/2026 appeared first on AboutDFIR - The Definitive Compendium Project.

  • Open

    📖 [The CloudSecList] Issue 331
    📖 [The CloudSecList] Issue 331 was originally published by Marco Lancini at CloudSecList on March 29, 2026.

  • Open

    InfoSec News Nuggets 03/27/2026
    CISA Flags Critical PTC Vulnerability That Had German Police Mobilized A critical remote code execution flaw in PTC Windchill and FlexPLM, CVE-2026-4681, is drawing unusual urgency. PTC hasn’t released patches yet, but it has published mitigations and IOCs, and German police reportedly went door to door warning companies about the risk. This one matters because […] The post InfoSec News Nuggets 03/27/2026 appeared first on AboutDFIR - The Definitive Compendium Project.
  • Open

    Magento Polyshell — The Latest Magento Threat (APSB25-94)
    No content preview
    The Telnyx PyPI Compromise and the 2026 TeamPCP Supply Chain Attacks
    No content preview
    Extend Application Security Visibility from Code to Runtime
    No content preview
  • Open

    英国政府が Xinbi を制裁:中国語圏の暗号資産詐欺を支えるインフラの中核を指定
    ※この記事は自動翻訳されています。正確な内容につきましては原文をご参照ください。 要約 英国外務・英連邦・開発省(FCDO)が中国語圏の主要な不正担保マーケットプレイス Xinbi を制裁指定。個別の加害者のみを対象とする従来の手法から、大規模詐欺エコシステムを支える金融「担保プラットフォーム」そのものに切り込む戦略的転換 Chainalysis のデータによると、Xinbi は 2021 年から 2025 年にかけて 199 億ドル超の決済を仲介。「Black U」マネーロンダリング、無許可 OTC 取引、個人情報データベース販売、詐欺インフラの提供など、あらゆる不正取引を仲介 FCDO はグローバル人権制裁制度に基づき Xinbi… The post 英国政府が Xinbi を制裁:中国語圏の暗号資産詐欺を支えるインフラの中核を指定 appeared first on Chainalysis.  ( 9 min )
  • Open

    BreachForums Version 5 - 339,778 breached accounts
    In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed. The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.

  • Open

    Preparing for agentic AI: A financial services approach
    Deploying agentic AI in financial services requires additional security controls that address AI-specific risks. This post walks you through comprehensive observability and fine-grained access controls—two critical capabilities for maintaining explainability and accountability in AI systems. You will learn seven design principles and get implementation guidance for meeting regulatory requirements while deploying secure AI solutions. Financial […]
  • Open

    Chainalysis Extends Sui Support with Automatic Token Support
    Chainalysis is excited to announce extended support for Sui, an emerging high-performance blockchain that has rapidly grown its ecosystem since… The post Chainalysis Extends Sui Support with Automatic Token Support appeared first on Chainalysis.  ( 9 min )
  • Open

    strongSwan CVE-2026-25075: Integer Underflow in VPN Authentication
    Bishop Fox researchers took a deep dive into a new strongSwan vulnerability that allows unauthenticated attackers to take VPN services offline. We created an easy tool to test your strongSwan deployment & recommend upgrading to version 6.0.5 and later.
  • Open

    Scuf Gaming - 128,683 breached accounts
    In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach. The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
    Sound Radix - 292,993 breached accounts
    In March 2026, the audio production tools company Sound Radix disclosed a data breach that they subsequently self-submitted to HIBP. The incident impacted 293k unique email addresses and names. Sound Radix advised that it is possible that additional data including hashed passwords may have been exposed, and that no financial or credit card information was impacted.

  • Open

    In WAF we (should not) trust
    Deep dive into Web Application Firewall (WAF) bypasses, from misconfiguration exploitation to crafting obfuscated payloads. We show the impact of the parsing discrepancy between how a WAF reads a request and how a backend executes it. It is not a bug, it is a feature.
  • Open

    Weekly Threat Bulletin – March 25th, 2026
    These are the top threats you should know about this week.
  • Open

    Netanyahu Posts ‘Proof of Life’ Video: AI Sows Doubts About What’s Real
    Senior researcher Alberto Fittarelli spoke with the New York Times about the double threat of AI-produced disinformation. The post Netanyahu Posts ‘Proof of Life’ Video: AI Sows Doubts About What’s Real appeared first on The Citizen Lab.
  • Open

    Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
    Posted by Eric Lynch, Product Manager, Android and Dom Elliott, Group Product Manager, Google Play Modern digital security is at a turning point. We are on the threshold of using quantum computers to solve "impossible" problems in drug discovery, materials science, and energy—tasks that even the most powerful classical supercomputers cannot handle. However, the same unique ability to consider different options simultaneously also allows these machines to bypass our current digital locks. This puts the public-key cryptography we’ve relied on for decades at risk, potentially compromising everything from bank transfers to trade secrets. To secure our future, it is vital to adopt the new Post-Quantum Cryptography (PQC) standards National Institute of Standards and Technology (NIST) is urging…
  • Open

    Akamai Leads the Way: 2026 GigaOm Radar for Microsegmentation
    Akamai Guardicore Segmentation, a Leader and Fast Mover in the 2026 GigaOm Radar for Microsegmentation report, balances innovation with platform strength.
    Machine Learning Operations: Yesterday, Today, and Tomorrow
    No content preview

  • Open

    Microsegmentation and Zero Trust: Control the Blast Radius by Design
    No content preview

  • Open

    RuneScape Boards - 222,762 breached accounts
    In around 2011, the now defunct RuneScape Boards forum (also known as RSBoards) suffered a data breach that was later redistributed as part of a larger corpus of data. The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.
  • Open

    IAM policy types: How and when to use them
    June 3, 2022: Original publication date of this post. This post has been updated to add the additional IAM policy types: Resource control policies. You manage access in AWS by creating policies and attaching them to AWS Identity and Access Management (IAM) principals (roles, users, or groups of users) or AWS resources. AWS evaluates these […]
  • Open

    Farming at the Edge: Where Autonomous Robots and Edge Compute Meet
    No content preview
  • Open

    Canadians Will Face ‘Tsunami’ of Transnational Repression in Coming Years
    On March 23, Citizen Lab director Ron Deibert will appear before the House of Commons to testify on transnational repression.  The post Canadians Will Face ‘Tsunami’ of Transnational Repression in Coming Years appeared first on The Citizen Lab.

  • Open

    📖 [The CloudSecList] Issue 330
    📖 [The CloudSecList] Issue 330 was originally published by Marco Lancini at CloudSecList on March 22, 2026.

  • Open

    ChatGPT For The Dark Web
    No content preview
    State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview
    No content preview
  • Open

    CVE-2026-31979: The Symlink Trap — Root Privilege Escalation in Himmelblau
    No content preview

  • Open

    Intego X9: Never trust my updates
    This blog post dives into the most common classes of macOS Local Privilege Escalation vulnerabilities, from insecure XPC communications and time-of-check to time-of-use (TOCTOU) Race Conditions to a range of implementation and configuration oversights. We will explore how attackers can exploit these weaknesses to escalate privileges, and highlight real-world examples to illustrate recurring patterns. This post ends the series on Intego products on macOS by revealing vulnerabilities that can lead to Local Privilege Escalation, as well as a surprise bonus.
  • Open

    Akamai Helps Authorities Disrupt the World’s Largest IoT Botnets
    The U.S. DOJ recently disrupted several large and powerful DDoS botnets and shut down their related DDoS-for-hire services with Akamai’s help.
    The Top 10 Threats Related to Agent Skills
    Read about the top 10 critical threats related to Agent Skills that security teams should consider while building and evaluating agents.

  • Open

    Italian Prosecutors Confirm Journalist Was Hacked with Paragon Spyware
    Italian prosecutors have confirmed the hacking of journalist Francesco Cancellato, who was alerted of a suspected attack last year. The post Italian Prosecutors Confirm Journalist Was Hacked with Paragon Spyware appeared first on The Citizen Lab.
  • Open

    Weekly Threat Bulletin – March 18th, 2026
    These are the top threats you should know about this week.
  • Open

    Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls
    Amazon threat intelligence has identified an active Interlock ransomware campaign exploiting CVE-2026-20131, a critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device, which was disclosed by Cisco on March 4, 2026. After Cisco’s disclosure, Amazon threat […]
  • Open

    Bloodhound OpenGraph
    No content preview
    BIG DAY TODAY
    No content preview
    BIG DAY TODAY
    No content preview
  • Open

    Aura - 903,080 breached accounts
    In March 2026, the online safety service Aura disclosed a data breach that exposed 900k unique email addresses. The data was primarily associated with a marketing tool from a previously acquired company, with fewer than 20k active Aura customers affected. Exposed data included names, phone numbers, physical and IP addresses, and customer service notes. Aura advised that no Social Security numbers, passwords or financial information were compromised.

  • Open

    AWS completes the second GDV community audit with participant insurers in Germany
    We’re excited to announce that Amazon Web Services (AWS) has completed its second GDV (German Insurance Association) community audit with 36 members from the Germany insurance industry participating, corresponding to over 63% coverage of the German market in terms of insurance premiums. Community audits are an efficient method to provide additional assurance to a group […]
  • Open

    Submission to the OHCHR: Protecting Human Rights Defenders in the Digital Age
    The Citizen Lab has submitted an input on digital transnational repression to the OHCHR report on ‘Protecting Human Rights Defenders in the Digital Age’. The post Submission to the OHCHR: Protecting Human Rights Defenders in the Digital Age appeared first on The Citizen Lab.
  • Open

    Join Us at Wasm I/O 2026
    Akamai is sponsoring Wasm IO 2026 as part of our commitment to WebAssembly. Get all the details.
    The Agentic Security Crisis: Why You Need to Act Now
    No content preview
    Apps, APIs, and DDoS 2026: The Industrialization of Cyberattack Campaigns
    No content preview
  • Open

    can AI eat its own tail? 🤖
    No content preview
  • Open

    Accidental Engineer: Building My First Hardware Tool the Hard Way
    I set out to build a rugged badge-cloning tool for field use, with zero hardware background. This is the story of learning electrical engineering from scratch, navigating bad assumptions, and discovering that curiosity, persistence, and hands-on testing can take you further than you think.

  • Open

    Akamai and Google: Advancing Data-Driven Marketing with Google Tag Gateway for Advertisers
    No content preview
    Secure the AI Factory: Data Center Security for Accelerated Intelligence
    No content preview

  • Open

    Divine Skins - 105,814 breached accounts
    In March 2026, the League of Legends custom skins service Divine Skins suffered a data breach. The incident was disclosed via the service's Discord server, where Divine Skins stated that an unauthorised third party accessed part of its systems, deleted all skins from the database and exposed email addresses and usernames. The data also contained a history of purchases made by users.
    Baydöner - 1,266,822 breached accounts
    In March 2026, the Turkish restaurant chain Baydöner suffered a data breach which was subsequently published to a public hacking forum. The incident exposed over 1.2M unique email addresses along with names, phone numbers, cities of residence and plaintext passwords. A small number of records also included Turkish national ID number and date of birth. In their disclosure notice, Baydöner stated that payment and financial data was not affected.
  • Open

    📖 [The CloudSecList] Issue 329
    📖 [The CloudSecList] Issue 329 was originally published by Marco Lancini at CloudSecList on March 15, 2026.

  • Open

    Deploy AWS applications and access AWS accounts across multiple Regions with IAM Identity Center
    If your organization relies on AWS IAM Identity Center for workforce access, you can now extend that access across multiple AWS Regions with multi-Region replication. Previously, AWS access portal was only available in one Region, when you add an additional Region, users get an active access portal endpoint there. If the primary Region experiences a […]

  • Open

    Winning CTFs: A Proving Ground at HackMex & Ekoparty
    CTF competitions push offensive security skills to their limits. In 2025, the Bishop Fox Mexico team claimed first place at both HackMex Finals and EkoParty Red Team Space. Discover how the team navigated web exploitation, infrastructure compromise, and AWS attack paths to win.
  • Open

    AI in Vulnerability Discovery: A Call for Human Oversight and Caution
    No content preview
    Fortify Your Network Security from Emerging Geopolitical Cyberthreats
    No content preview

  • Open

    Looking at the SmarterMail API Vulnerability CVE-2026-24423
    Sensor Intel Series: February 2026 CVE Trends
  • Open

    OpenAI Blurs Its Mass Surveillance Red Line With New Pentagon Contract
    Senior researcher Wolfie Christl spoke with Forbes about OpenAI's deal with the Pentagon that permits the gathering of bulk data from users. The post OpenAI Blurs Its Mass Surveillance Red Line With New Pentagon Contract appeared first on The Citizen Lab.
  • Open

    RSAC 2026: Tag in a Partner for the AI Security Showdown
    Legacy security wasn't built for autonomous AI. See how Akamai partners are stepping into the ring to build trust and secure the agentic enterprise.
    Build Serverless Functions with Zero Cold Starts: WebAssembly and Spin
    No content preview
  • Open

    How to manage the lifecycle of Amazon Machine Images using AMI Lineage for AWS
    As organizations scale their cloud infrastructure, maintaining proper lifecycle management of Amazon Machine Images (AMIs) is a critical component of their security and risk management goals. AMIs provide the essential information required to launch Amazon Elastic Compute Cloud (Amazon EC2) instances, however; they present security and compliance challenges if not tracked and managed throughout their […]
  • Open

    Announcing Pwn2Own Berlin for 2026
    If you just want to read the contest rules, click here.   Willkommen zurück, meine Damen und Herren, zu unserem zweiten Wettbewerb in Berlin! That’s correct (if Google translate didn’t steer me wrong). After our inaugural competition last year, Pwn2Own returns to Berlin and OffensiveCon. Outside of our shipping troubles, we had an amazing time and can’t wait to get back. Last year, we added Artificial Intelligence as a category with great results. This year, we’re expanding this and splitting it into multiple different categories: AI Databases, Coding Agents, Local Inferences, and a separate category for NVIDIA products. In last year’s contest, NVIDIA targets had wins, losses, and collisions, so it will be interesting to see how they fare this year. The folks from AWS wanted to get into th…

  • Open

    A Nerd's Life: Weeks of Firmware Teardown to Prove We Were Right
    In a blog post published last December, we demonstrated how we managed to extract the firmware from a smartwatch by exploiting an out-of-bounds read vulnerability and spying on its screen interface. Follow us on our long and unexpected journey to figure out how this smartwatch can measure heart rate or blood pressure with no visible sensor, the problems we encountered while analyzing its firmware, and how we solved them to uncover The Truth about this device.
  • Open

    Weekly Threat Bulletin – March 11th, 2026
    These are the top threats you should know about this week.
2026-04-10T02:37:27.030Z osmosfeed 1.15.1