FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WIRED

Ring Kills Flock Safety Deal After Super Bowl Ad Uproar

By: Maddy Varner, Andrew Couts — February 14th 2026 at 11:30
Plus: Meta plans to add face recognition to its smart glasses, Jared Kushner named as part of whistleblower’s mysterious national security complaint, and more.
☐ ☆ ✇ WIRED

Robot Dogs Are on Going on Patrol at the 2026 World Cup in Mexico

By: Jorge Garay — February 14th 2026 at 10:00
The Mexican city of Guadalupe, which will host portions of the 2026 World Cup, recently showed off four new robot dogs that will help provide security during matches at BBVA Stadium.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

I built a vulnerable AI banking CTF—5 flags covering prompt injection techniques (write-up in comments)

By: /u/Sad_Professor_518 — February 13th 2026 at 23:00

Full context: I built SecureBank AI Assistant, a deliberately vulnerable AI banking chatbot powered by Groq's Llama 3 70B.

5 exploitation techniques. 100% success rate against standard protections.

Flags cover:

  1. System prompt extraction

  2. Content filter bypass

  3. Function calling abuse

  4. Persistent backdoor injection

  5. RAG document poisoning

CTF challenge to practice: github.com/oussamaafnakkar/AccessDenied

Try it, break it, learn from it.

submitted by /u/Sad_Professor_518
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Capture the Flag (CTF) AWS/SANS

By: /u/Successful_Clock2878 — February 12th 2026 at 23:23

Over $1100 worth of prizes:

Prizes

Top performers will earn no-cost access to SANS training for further cyber skills development, including four prize categories:

Prize Category Prize
Overall top finishers 1-3 A license to SEC401, Security Essentials
Overall top finishers 4-6 A license to SEC480, AWS Secure Builder
Overall top finishers 7-9 A license to SEC495, Leveraging LLMs
Regional top 20 finishers (per country) 6-month access to SANS SkillQuests by NetWars

The event is open to all students from participating AWS Skills to Jobs Tech Alliance institutions across the US, Latin America, Europe and Asia-Pacific regions.

submitted by /u/Successful_Clock2878
[link] [comments]
☐ ☆ ✇ WIRED

Crypto-Funded Human Trafficking Is Exploding

By: Andy Greenberg — February 12th 2026 at 13:00
The use of cryptocurrency in sales of human beings for prostitution and scam compounds nearly doubled in 2025, according to a conservative estimate. Many of the deals are happening in plain sight.
☐ ☆ ✇ Security – Cisco Blog

Accelerate Security Operations with Cisco’s New Security-Tuned Model

By: Aman Priyanshu — February 12th 2026 at 13:00
Explore a new frontier in LLM quality and speed. Cisco’s Foundation-Sec model delivers high-performance AI summaries for Splunk Security Operations workflows.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

I kept finding security issues in AI-generated code, so I built a scanner for it

By: /u/AdnanBasil — February 12th 2026 at 11:58

Lately I've been using Al tools (Cursor / Anti gravity/ etc.) to prototype faster.

It's amazing for speed, but I noticed something

uncomfortable, a lot of the generated code had subtle security problems.

Examples I kept seeing:

Hardcoded secrets

  • Missing auth checks

Risky API routes

Potential IDOR patterns

So I built a small tool called CodeArmor Al that scans repos and PRs and classifies issues as:

Definite Vulnerabilities

Potential Risks (context required)

It also calculates a simple security score and PR risk delta. Not trying to replace real audits - more like a "sanity layer" for fast-moving / Al-heavy projects.

If anyone's curious or wants to roast it

Would genuinely love feedback from real devs

submitted by /u/AdnanBasil
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

No Legs, No Problem: Dumping BGA MCP NAND Flash

By: /u/fatpengoo — February 10th 2026 at 19:47

In an attempt to sharpen my hardware hacking skills, I took on the challenge of extracting firmware off a flip phone 📱.

But... I kind of underestimated my opponent:

- No trace of the firmware online

- No OTA updates

- Debug interface nowhere to be found

- The chip holding the firmware has no legs

Quite the challenge.
I ended up dead-bugging the chip and wiring it to the Xgecu T48 Flash programmer.
Enjoy!

submitted by /u/fatpengoo
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Quick IAM fundamentals knowledge check for security practitioners

By: /u/Big_Hour_2429 — February 12th 2026 at 07:59

Sharing an IAM-focused knowledge check covering identity lifecycle, access governance, authentication, and privilege management.

It’s intended as a short fundamentals self-check for security practitioners.

Disclosure: This is from ETCISO. Sharing purely as an educational resource.

submitted by /u/Big_Hour_2429
[link] [comments]
☐ ☆ ✇ WIRED

ICE Is Crashing the US Court System in Minnesota

By: Maddy Varner — February 11th 2026 at 21:23
Petitions demanding people get the chance to be released from ICE custody have overwhelmed courts throughout the US.
☐ ☆ ✇ WIRED

CBP Signs Clearview AI Deal to Use Face Recognition for ‘Tactical Targeting’

By: Dell Cameron — February 11th 2026 at 16:32
US Border Patrol intelligence units will gain access to a face recognition tool built on billions of images scraped from the internet.
☐ ☆ ✇ Security – Cisco Blog

Double Defense: Cisco Secure Firewall 10.0 Confronts Encrypted Traffic and Emerging Attack Challenges

By: Vignesh Sathiamoorthy — February 11th 2026 at 13:00
Discover how Cisco Secure Firewall 10.0 boosts visibility and protection against modern threats, from encrypted attacks to AI-driven exploits.
☐ ☆ ✇ Krebs on Security

Patch Tuesday, February 2026 Edition

By: BrianKrebs — February 10th 2026 at 21:49

Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six “zero-day” vulnerabilities that attackers are already exploiting in the wild.

Zero-day #1 this month is CVE-2026-21510, a security feature bypass vulnerability in Windows Shell wherein a single click on a malicious link can quietly bypass Windows protections and run attacker-controlled content without warning or consent dialogs. CVE-2026-21510 affects all currently supported versions of Windows.

The zero-day flaw CVE-2026-21513 is a security bypass bug targeting MSHTML, the proprietary engine of the default Web browser in Windows. CVE-2026-21514 is a related security feature bypass in Microsoft Word.

The zero-day CVE-2026-21533 allows local attackers to elevate their user privileges to “SYSTEM” level access in Windows Remote Desktop Services. CVE-2026-21519 is a zero-day elevation of privilege flaw in the Desktop Window Manager (DWM), a key component of Windows that organizes windows on a user’s screen. Microsoft fixed a different zero-day in DWM just last month.

The sixth zero-day is CVE-2026-21525, a potentially disruptive denial-of-service vulnerability in the Windows Remote Access Connection Manager, the service responsible for maintaining VPN connections to corporate networks.

Chris Goettl at Ivanti reminds us Microsoft has issued several out-of-band security updates since January’s Patch Tuesday. On January 17, Microsoft pushed a fix that resolved a credential prompt failure when attempting remote desktop or remote application connections. On January 26, Microsoft patched a zero-day security feature bypass vulnerability (CVE-2026-21509) in Microsoft Office.

Kev Breen at Immersive notes that this month’s Patch Tuesday includes several fixes for remote code execution vulnerabilities affecting GitHub Copilot and multiple integrated development environments (IDEs), including VS Code, Visual Studio, and JetBrains products. The relevant CVEs are CVE-2026-21516, CVE-2026-21523, and CVE-2026-21256.

Breen said the AI vulnerabilities Microsoft patched this month stem from a command injection flaw that can be triggered through prompt injection, or tricking the AI agent into doing something it shouldn’t — like executing malicious code or commands.

“Developers are high-value targets for threat actors, as they often have access to sensitive data such as API keys and secrets that function as keys to critical infrastructure, including privileged AWS or Azure API keys,” Breen said. “When organizations enable developers and automation pipelines to use LLMs and agentic AI, a malicious prompt can have significant impact. This does not mean organizations should stop using AI. It does mean developers should understand the risks, teams should clearly identify which systems and workflows have access to AI agents, and least-privilege principles should be applied to limit the blast radius if developer secrets are compromised.”

The SANS Internet Storm Center has a clickable breakdown of each individual fix this month from Microsoft, indexed by severity and CVSS score. Enterprise Windows admins involved in testing patches before rolling them out should keep an eye on askwoody.com, which often has the skinny on wonky updates. Please don’t neglect to back up your data if it has been a while since you’ve done that, and feel free to sound off in the comments if you experience problems installing any of these fixes.

☐ ☆ ✇ Security – Cisco Blog

Security Observability Improvements in Cisco Secure Firewall 10.0

By: Ron Scott-Adams — February 10th 2026 at 13:00
Improvements in Secure Firewall 10.0 provide better observability and detection for threats and security monitoring overall.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Http11Probe - Probe for Http 1.1 compliance

By: /u/MDA2AV — February 10th 2026 at 10:54

A C# CLI tool to probe a webserver for Http 1.1 compliance.

Platform Website

Project URL

I frequently see performance(throughput) benchmarks for webservers but never about strictness or compliance, since I work on building webserver frameworks and needed a tool like this, I made this a weekend project. Will keep adding on more tests and any contribution on those, new frameworks and test revision are very welcome.

To make it a little more interesting, I made it sort of a platform with leaderboards for comparison between webservers. Given the not too clear nature of many RFCs, I wouldn't take these results too seriously but can be an interesting comparison between different implementations' behavior.

submitted by /u/MDA2AV
[link] [comments]
☐ ☆ ✇ Security – Cisco Blog

Redefining Security for the Agentic Era

By: Peter Bailey — February 10th 2026 at 08:30
The agentic era is here. As AI agents act autonomously at machine speed, learn why security must evolve with intent-aware controls to make autonomous systems safe, accountable, and reliable.
☐ ☆ ✇ Security – Cisco Blog

SASE for the AI Era: Driving Secure, Distributed, and Optimized AI

By: Raj Chopra — February 10th 2026 at 08:20
Learn how Cisco SASE enables secure, predictable, and scalable AI operations by unifying performance and protection for distributed, agentic AI workflows.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Tool I built to strip sensitive data from logs before sharing

By: /u/Best-Mouse-6035 — February 9th 2026 at 23:36

In my day job I often need to send logs to vendors, tickets or support chats, but they contain emails, IPs and tokens.

I built a small API that redacts sensitive data before sharing.

No storage, no retention, just input → sanitized output.

Currently using it myself, curious if this solves a real pain for others.

Link: https://buy.stripe.com/5kQ14hb1qbCLbaY8ee3AY00

submitted by /u/Best-Mouse-6035
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

We scanned 8,000+ MCP servers, this is what we learned.

By: /u/Upstairs_Safe2922 — February 9th 2026 at 23:14

Over the past few months we’ve been running the MCP Trust Registry, an open scanning project looking at security posture across publicly available MCP server builds.

We’ve analyzed 8,000+ servers so far using 22 rules mapped to the OWASP MCP Top 10.

Some findings:

  • ~36.7% exposed unbounded URI handling → SSRF risk (same class of issue we disclosed in Microsoft’s Markitdown MCP server that allowed retrieval of instance metadata credentials)
  • ~43% had command execution paths that could potentially be abused
  • ~9.2% included critical-severity findings

We just added private repo scanning for teams running internal MCP servers. Same analysis, same evidence depth. Most enterprise MCP adoption is internal, so this was the #1 request.

Interested to know what security review processes others have for MCP servers, if any. The gap we keep seeing isn’t intent, it’s that MCP is new enough that standard security gates haven’t caught up.

Happy to share methodology details or specific vuln patterns if useful.

submitted by /u/Upstairs_Safe2922
[link] [comments]
☐ ☆ ✇ Security – Cisco Blog

Integrating With Cisco XDR at Black Hat Europe

By: Jessica (Bair) Oppenheimer — February 9th 2026 at 13:00
Investigating indicators of compromise (IOCs) requires a unified view of security data. See how we integrated Cisco XDR with third-party tools and open-source models at Black Hat Europe.
☐ ☆ ✇ Security – Cisco Blog

Black Hat Europe: Enhancing Security Operations With Cisco XDR and Foundation-sec-8b-Instruct LLM

By: Piotr Jarzynka — February 9th 2026 at 13:00
Manual triage often slows down incident response. Learn how we integrated an 8-billion parameter security LLM into Cisco XDR to summarize alerts and trace attack paths in real time.
☐ ☆ ✇ Security – Cisco Blog

Black Hat Europe 2025: A Decade of Cisco Security Cloud Innovation

By: Jessica (Bair) Oppenheimer — February 9th 2026 at 13:00
Building a secure network for thousands of cybersecurity experts in just three days requires intense collaboration. Discover the hardware, software, and engineering behind the Black Hat Europe NOC.
☐ ☆ ✇ Security – Cisco Blog

Black Hat Europe 2025: Firepower IDS Flags Unwanted P2P on Rented Gear

By: Rene Straube — February 9th 2026 at 13:00
Rented hardware often carries digital baggage from previous users. Discover how our NOC team used JA3 fingerprints and Cisco XDR to track down unauthorized P2P syncing in London.
☐ ☆ ✇ Security – Cisco Blog

Securing DNS With Secure Access at Black Hat Europe

By: Rob DeCooman — February 9th 2026 at 13:00
For a decade, Cisco has secured Black Hat events with DNS security. Learn how the evolution to Cisco Secure Access provided visibility into 66 million queries and 6,000 unique apps in London.
☐ ☆ ✇ WIRED

AI Is Here to Replace Nuclear Treaties. Scared Yet?

By: Matthew Gault — February 9th 2026 at 11:30
The last major nuclear arms treaty between the US and Russia just expired. Some experts believe a combination of satellite surveillance, AI, and human reviewers can take its place. Others, not so much.
☐ ☆ ✇ WIRED

Iran’s Digital Surveillance Machine Is Almost Complete

By: Lily Hay Newman, Matt Burgess — February 9th 2026 at 11:00
After more than 15 years of draconian measures, culminating in an ongoing internet shutdown, the Iranian regime seems to be staggering toward its digital surveillance endgame.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Open Security Architecture - 15 new security patterns with NIST 800-53 mappings (free, CC BY-SA 4.0)

By: /u/cyberruss — February 9th 2026 at 09:38

We've been quietly rebuilding Open Security Architecture (opensecurityarchitecture.org) -- a project that's been dormant for about a decade. This week we published 15 new security patterns covering areas that didn't exist when the original patterns were written:

- Zero Trust Architecture (51 mapped controls)

- API Security (OWASP API Top 10 mapped to NIST 800-53)

- Secure AI Integration (prompt injection, delegation chain exploitation, shadow AI)

- Secure DevOps Pipeline (supply chain, pipeline poisoning, SLSA provenance)

- Passkey Authentication (WebAuthn/FIDO2)

- Cyber Resilience (DORA, BoE/PRA operational resilience)

- Offensive Security Testing (CBEST/TIBER-EU)

- Privileged User Management (JIT/ZSP)

- Vulnerability Management

- Incident Response

- Security Monitoring and Response

- Modern Authentication (OIDC/JWT/OAuth)

- Secure SDLC

- Secure Remote Working

- Secure Network Zone Module

Each pattern maps specific NIST 800-53 Rev 5 controls to documented threat scenarios, with interactive SVG diagrams where every control badge links to the full control description. 39 patterns total now, with 191 controls and 5,500+ compliance mappings across ISO 27001/27002, COBIT, CIS v8, NIST CSF 2.0, SOC 2, and PCI DSS v4.

There's also a free self-assessment tool -- pick a pattern, score yourself against each control area, get gap analysis and radar charts with benchmark comparison against cross-industry averages.

Everything is CC BY-SA 4.0, structured data in JSON on GitHub. No paywalls.

https://www.opensecurityarchitecture.org

Happy to answer questions about the control mappings or pattern design.

Russ

submitted by /u/cyberruss
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

OverTheWire Bandit: a complete walkthrough with in-depth explanations

By: /u/shelltief — February 8th 2026 at 14:50

Hey,

A couple of years ago I wrote solutions for the OverTheWire Bandit wargame. Recently, while reorganizing my documentation, I revisited that material and decided to properly clean it up and restructure it into a single, coherent walkthrough. This isn’t a formal course, it’s a complete Bandit walkthrough with in-depth explanations, written to extract as much understanding as possible from each level, not just to get the flag.

For every level, I included:

  • hints and spoiler warnings, so you can try before reading the solution
  • intermediate reasoning when it makes sense
  • links to official documentation and primary sources

The intent was to make this usable by someone starting from zero, but also detailed enough that you can finish Bandit feeling like you’ve actually milked it for all the knowledge it has to offer. Commands, patterns, and underlying UNIX concepts.

This is probably most useful if you:

  • are new to CTFs or system/security basics
  • want to understand what you’re doing instead of copying commands
  • plan to move on to harder OverTheWire games later

And to be fair, I think that even people that are more used to working with UNIX might actually learn a thing or two from these

submitted by /u/shelltief
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Defense Evasion: The Service Run Failed Successfully

By: /u/Cold-Dinosaur — February 8th 2026 at 14:21

You can exploit the Service Failure Recovery feature of Windows Service to execute a payload without ever touching the ImagePath. The biggest issue when exploiting Service Failure Recovery to execute a payload is figuring out how to trigger a "crash".

submitted by /u/Cold-Dinosaur
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Cloud Deception Management Platform (Open-source Cloud Canaries)

By: /u/John_Earle — February 7th 2026 at 19:20

Hi folks, I wanted to share a project of mine and get some feedback from the community.

Coalmine is a canary management platform I've built to let security admins deploy canary tokens (and objects) easily in there cloud environments.

Currently its early alpha and supports S3, GCS, AWS IAM, and GCP Service accounts.

The tool provides a webui, CLI and API, allowing you to integrate it with your custom tooling (when its production ready)

Example use for API: have your CICD pipelines request an canary token to embed in code, so you can Identify when the source has been exposed and attacks are testing credentials

Coalmine - Github

submitted by /u/John_Earle
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New OSS secret scanner: Kingfisher (Rust) validates exposed creds + maps permissions

By: /u/micksmix — February 7th 2026 at 18:18

Disclosure: I’m the author/maintainer of Kingfisher.

Kingfisher is an Apache-2.0 OSS secret scanner built in Rust that combines Hyperscan (SIMD regex) with tree-sitter parsing to improve context/accuracy, and it can validate detected creds in real time against provider APIs so you can prioritize active leaks. It’s designed to run entirely on-prem so secrets don’t get shipped to a third-party service.

Core Features

  • Hundreds of built-in rules (AI APIs, cloud providers, databases, DevOps tools)
  • Live validation against third-party APIs confirms credentials are active
  • Direct revocation of leaked creds: kingfisher revoke --rule github "ghp_..."
  • Can scan for secrets locally, github, gitlab, azure repos, bitbucket, gitea, hugging face, s3, gcs, docker, jira, confluence, slack
  • Built-in local-only HTML findings viewer kingfisher scan /tmp --view-report
  • Blast Radius mapping to show what a credential could actually access: kingfisher scan /tmp --access-map --view-report

Scan Targets

  • Git repos (full history), GitHub/GitLab/Azure Repos/Bitbucket/Gitea/Hugging Face orgs
  • AWS S3, GCS, Docker images, Jira, Confluence, Slack

Try It

  • brew install kingfisher or uv tool install kingfisher-bin
  • github.com/mongodb/kingfisher

Apache 2 Open-Source

submitted by /u/micksmix
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

trappsec: open source framework for API deception

By: /u/nikhil-salgaonkar — February 7th 2026 at 14:59

I've just released trappsec v0.1 - an experimental open-source framework that helps developers detect attackers who probe API business logic. By embedding realistic decoy routes and honey fields that are difficult to distinguish from real API constructs, attackers are nudged to authenticate — converting reconnaissance into actionable security telemetry.

submitted by /u/nikhil-salgaonkar
[link] [comments]
☐ ☆ ✇ WIRED

Moltbook, the Social Network for AI Agents, Exposed Real Humans’ Data

By: Andy Greenberg, Lily Hay Newman — February 7th 2026 at 11:30
Plus: Apple’s Lockdown mode keeps the FBI out of a reporter’s phone, Elon Musk’s Starlink cuts off Russian forces, and more.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

crypto-scanner: Open-source CLI tool to find quantum-vulnerable cryptography in your codebase

By: /u/MindlessConclusion42 — February 7th 2026 at 01:41

Hey r/netsec,

I built an open-source tool called crypto-scanner that scans codebases for cryptographic usage and flags algorithms vulnerable to quantum computing attacks.

What it does:

  • Scans source code (Python, JS/TS, Java, Go, Rust, C/C++, and more)
  • Parses X.509 certificates and config files (YAML, JSON, ENV, INI)
  • 4-tier risk classification: Critical (quantum-vulnerable), High (deprecated), Medium (monitor), Low (adequate)
  • Outputs JSON for CI/CD automation or styled HTML reports
  • Works as a pre-commit hook or GitHub Action

Why I built it:

NIST finalized post-quantum cryptography standards in 2024, and organizations need to start inventorying their cryptographic assets before migrating. Most teams have no idea what algorithms are actually running in their codebases. This tool gives you that visibility.

Install:

pip install crypto-scanner crypto-scanner scan /path/to/project --html --output report.html 

GitHub: https://github.com/mbennett-labs/crypto-scanner PyPI: https://pypi.org/project/crypto-scanner/

MIT licensed. Python 3.10+. Feedback and contributions welcome.

Would love to hear what you find when you run it on your projects.

submitted by /u/MindlessConclusion42
[link] [comments]
☐ ☆ ✇ WIRED

ICE Agent’s ‘Dragging’ Case May Help Expose Evidence in Renee Good Shooting

By: Dell Cameron — February 6th 2026 at 22:14
The government has withheld details of the investigation of Renee Good’s killing—but an unrelated case involving the ICE agent who shot her could force new revelations.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Tool: AST-based security scanner for AI-generated code (MCP server)

By: /u/NoButterfly9145 — February 6th 2026 at 16:25

Released an open-source security scanner designed for AI coding agent workflows.

Problem: AI assistants generate code with OWASP Top 10 vulnerabilities at alarming rates. They also "hallucinate" package names that could be registered by attackers.

Solution: MCP server that integrates with AI coding tools (Claude, Cursor, etc.) for real-time scanning.

Technical details:

- tree-sitter AST parsing for accurate detection (not just regex)

- Taint analysis for tracking user input to dangerous sinks

- 275+ rules covering: SQLi, XSS, command injection, SSRF, XXE, insecure deserialization, hardcoded secrets, weak crypto

- Package verification via bloom filters (4.3M packages, 7 ecosystems)

- Prompt injection detection for AI agent security

- CWE/OWASP metadata for compliance

Languages: Python, JavaScript/TypeScript, Java, Go, Ruby, PHP, C/C++, Rust, C#, Terraform, Kubernetes

No cloud dependencies - runs entirely local.

npx agent-security-scanner-mcp init

Feedback welcome, especially on rule coverage gaps.

submitted by /u/NoButterfly9145
[link] [comments]
☐ ☆ ✇ Security – Cisco Blog

Lessons Learned from Securing the World’s Largest Cyber Events

By: Jessica (Bair) Oppenheimer — February 6th 2026 at 13:00
Announcing the launch of the Cisco Event SOCs website and the release of our comprehensive Reference Architecture & Operations Guide.
❌