Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
Tens of thousands of people eagerly downloaded the leaked Claude Code source code this week, and some of those downloads came with a side of credential-stealing malware.…
A few days ago I wrote about how the Trivy ecosystem got turned into a credential stealer. One of my takeaways was “pin by SHA.” Every supply chain security guide says it, I’ve said it, every subreddit says it, and the GitHub Actions hardening docs say it.
The Trivy attack proved it wrong, and I think we need to talk about why.
Here is a draft for a Reddit post tailored for the r/homelab community.
Title: [Project] Turning a Raspberry Pi into a "Poor Man's" Enterprise IDS/NSM using Zeek and Suricata
Hey everyone,
I’ve been looking for ways to get better visibility into my network traffic without dropping $500+ on dedicated hardware or running a power-hungry 1U server 24/7. I came across this guide from HookProbe that breaks down how to deploy Zeek and Suricata on a Raspberry Pi (specifically optimized for the Pi 4/5), and I thought it would be right up this sub's alley.
Link: Deploying Zeek and Suricata on Raspberry Pi for Edge Security
Why this is cool for a Homelab:
The Setup: The guide walks through the /etc configurations for both tools. If you’re like me and love structured logs (DNS queries, SSL handshakes, HTTP headers) for your ELK stack or Grafana dashboards, Zeek is a goldmine.
Some questions for the community:
I’m planning to set this up this weekend to feed into my local SOC dashboard. If you're looking for a low-cost way to move past "just a basic firewall," this seems like a solid weekend project.
Curious to hear if anyone has tried a similar "Edge Security" approach!
Built a free red team arena for testing real attack paths against a live defense system for ShieldNet DLX7.
This is NOT a CTF or a static lab. It actually responds to what you do.
Current scenarios:
Everything runs in a sandbox. No production targets. Novel attacks generate detection rules that get reviewed and pushed into the system
If you want to test how your payloads actually hold up against modern defenses, this is useful.
Mongoose network library <= 7.20
CVE-2026-5244 - mg_tls_recv_cert pubkey heap-based overflow (exploitable)
CVE-2026-5245 - mDNS Record stack-based overflow (exploitable)
CVE-2026-5246 - authorization bypass via P-384 Public Key (trivially exploitable)
Fun ride.