#SecurityResearch

Hack in Days of Future Pastallainyann@piaille.fr
2026-02-09

If Claude Can Find serious cybersecurity Bug, Who Collects the Bounty?

Bug bounty programs vs. $20/month reasoning — when the brutal question becomes: why pay five-figure bounties if a Claude Code subscription already finds entire classes of bugs? #BugBounty #VulnerabilityResearch #OffSec #AppSec #Infosec #AI #LLM #SecurityResearch #CyberSecurity red.anthropic.com/2026/zero-da

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2026-02-02

And it's out!

Zack Whittaker and I have released our report on the pilot survey we conducted to increase awareness about threats security researchers and journalists who report on cybersecurity and cybercrime experience.

We are grateful to all those who responded to the survey and shared a bit of their experiences. Based on what we found in a pilot survey with a non-random sample, I really think we need to do a bigger study that can also do a deeper dive into some questions.

You can read the report in html or download the .pdf version:

html: databreaches.net/2026/02/02/un

pdf: databreaches.net/wp-content/up

In conjunction with the release of the report, I've also added a new "Threats" category to DataBreaches.net.

You can also read some overview comments from Zack at
this.weekinsecurity.com/new-su

My post explaining how this all started is at databreaches.net/2026/02/02/th

#cybersecurity #securityresearch #legalthreats #threats #criminals #databreach #vulernabilities #malware #lawsuit #survey

@zackwhittaker @campuscodi @amvinfe @jgreig @dangoodin @GossiTheDog @lawrenceabrams @euroinfosec

2026-02-02

📢 CFP Update: #EuroSec2026 Deadline Extended

The submission deadline for EuroSec 2026 (co-located with #EuroSys2026, Edinburgh) has been postponed.

More time to submit your work on #InfoSec, #SystemsSecurity & #ComputerSecurity.

🗓 New deadline: February 10, 2026 (AoE)
🔗 eurosec26.hotcrp.com/

#CFP #SecurityResearch

Authentic8authentic8
2026-01-30

Secure adversary research gives SOC teams the context alerts alone can’t. It reduces blind spots, strengthens detection logic, and supports faster, intelligence-driven response without increasing operational risk.

Learn how hands-on, secure research strengthens SOC outcomes from triage through remediation.

bit.ly/4r9mL5b

How secure adversary research strengthens an intelligence-driven SOC
Marcus Schulerschuler
2026-01-29

Security researchers discovered 1,862 Moltbot AI assistant servers exposed without authentication on the internet. The viral GitHub project requires access to emails, messages, banking, and system commands to function. 22% of enterprise customers have employees running it without IT approval, creating shadow AI deployments with full privileges. Supply chain attack tests compromised 16 developers across 7 countries within 8 hours.

implicator.ai/moltbot-punched-

2026-01-29

Hacker communities are reshaping vulnerability discovery — collaboration, incentives, and scale are accelerating security research. The crowd is becoming a force multiplier. 🧠⚡️ #BugBounty #SecurityResearch

buff.ly/SckWoE6

knoppixknoppix95
2026-01-27

New research reveals Predator spyware’s advanced anti-analysis tech 🕵️‍♂️
Malware learns from failed attacks & hides traces via crash log suppression 🧬
Used by state-backed actors, Predator refines itself to evade detection ⚠️

🔗 securityweek.com/predator-spyw

2026-01-24

The GCVE vulnerability database, developed by Luxembourg’s CIRCL, is now publicly available and designed to remain CVE-compatible.

It aggregates advisories from 25+ centralized and decentralized sources, correlates naming conventions, and supports machine-based analysis for security teams and researchers.

The launch reflects ongoing conversations around redundancy, governance, and long-term stability in vulnerability disclosure frameworks.

How do you evaluate new vulnerability data sources before integrating them into your pipeline?

Source: inside-it.ch/europaeische-cve-

Follow @technadu for objective cybersecurity reporting.

#GCVE #VulnerabilityManagement #ThreatIntel #CVE #SecurityResearch #EUInfosec

European CVE alternative has been launched
2026-01-22

As AI adoption in SOCs accelerates, benchmarks are becoming de facto decision tools — yet many still evaluate models in controlled, exam-like settings.
Recent research highlights consistent issues:
• Security workflows reduced to MCQs
• Little measurement of detection or containment outcomes
• Heavy reliance on LLMs judging other LLMs

These findings reinforce the need for workflow-level, outcome-driven evaluation before operational deployment.

Source: sentinelone.com/labs/llms-in-t

Thoughtful discussion encouraged. Follow @technadu for practitioner-focused AI and security analysis.

#SOC #ThreatHunting #AIinInfosec #LLMs #SecurityResearch #DetectionEngineering

LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams
2026-01-20

Recent research into sleeper browser extensions across Chrome, Edge, and Firefox highlights a persistent issue: delayed-activation threats.

By embedding code inside images and activating only after updates, these extensions avoided early detection while maintaining prolonged access to browser data.

The findings reinforce the importance of continuous monitoring, extension inventory management, and permission reviews - especially for widely used consumer tools.

Follow @technadu for objective, research-driven cybersecurity reporting.

Source: malwarebytes.com/blog/news/202

Thoughtful discussion welcome.

#InfoSec #ThreatIntelligence #BrowserSecurity #PrivacyEngineering #ExtensionRisk #CyberDefense #SecurityResearch #DigitalTrust

Firefox joins Chrome and Edge as sleeper extensions spy on users
2026-01-19

Recent joint law enforcement actions in Ukraine and Germany underscore the operational complexity behind ransomware groups like Black Basta.

Investigators report targeting individuals allegedly involved in credential recovery and access enablement - often an overlooked but critical layer of ransomware operations. Seized devices and cryptocurrency assets are still under analysis.

For defenders, the case reinforces the importance of credential protection, monitoring access paths, and understanding ransomware supply chains.

Source: cybernews.com/cybercrime/ukrai

Follow @technadu for continued, objective coverage of ransomware activity and cybercrime trends.

Discussion welcome.

#InfoSec #Ransomware #ThreatIntelligence #CyberCrime #DigitalForensics #SOC #IncidentResponse #SecurityResearch

Ukraine-Germany police raid homes linked to Black Basta ransomware group
2026-01-15

⏰ CFP Reminder: #EuroSec2026 — < 3 weeks left!

Less than three weeks remain to submit to the 19th European Workshop on Systems Security, co-located with #EuroSys2026 in Edinburgh 🇬🇧

If you’re working on new ideas, early results, or practical insights in #InfoSec, #SystemsSecurity, or #ComputerSecurity, we’d love to see your submission.

🗓 Deadline: Feb 3, 2026 (AoE)
🔗 eurosec26.hotcrp.com/

#CFP #SecurityResearch #Systems #Networking

SCENOR | The Science CrewScenorCrew
2026-01-12

WOMEN AND EXTREMISM DESERVE MORE PRECISE ANALYSIS.

Our latest FACT vs FICTION edition highlights why simplified assumptions can limit prevention and risk assessment.

Evidence based knowledge supports more effective responses.

Source: extremism.gwu.edu/sites/g/file

Follow SCENOR for regular FACT vs FICTION updates.

Cover slide with SCENOR logo and the title “Fact vs Fiction”. Subtitle reads “Debunking myths about extremism, terrorism and more”. Clean blue background with handwritten orange accent text.Slide labelled “Fiction”. Text states: “Women play only marginal roles in extremist movements.” White text box on blue background with a swipe indicator pointing to the next slide.Slide labelled “Fact”. Text explains that research shows women participate in extremist movements in diverse ways, including propaganda, online mobilisation, logistics, recruitment, financing, and sometimes violence. Source noted as GWU Program on Extremism.Slide labelled “Why it matters”. Text explains that assuming women are marginal can create blind spots in prevention, risk assessment, and disengagement, and that effective interventions must consider gendered roles, motivations, and pathways.
2026-01-11

Malwatcher: A self-hosted platform for verifying IOCs by centralizing online tools into one interface

Check ✅️ it out:
github.com/R4z1xx/malwatcher

#threatintel #infosec #malware_detection #securityresearch

2026-01-07

The pcTattletale founder’s guilty plea marks the first U.S. federal conviction of a stalkerware operator in over ten years.

This case reinforces:
• Legal accountability for spyware misuse
• Growing scrutiny of consumer surveillance tools
• The role of infosec and law enforcement collaboration

An important precedent for privacy enforcement in the spyware ecosystem.

Read more via TechNadu and follow for objective infosec coverage:
technadu.com/founder-of-pctatt

#Infosec #Privacy #Stalkerware #CyberLaw #DigitalSurveillance #SecurityResearch

Founder of pcTattletale Spyware App Pleads Guilty in Federal Stalkerware Case
2026-01-06

🚨 New research & tool release: OID-See - Giving Your OAuth Apps the Side-Eye

OAuth risk in Entra isn’t a table problem.
It’s a relationship problem.

After spending far too long staring at consent screens, Graph responses, and metadata that technically tells the truth while still being wildly misleading, I ended up building something I couldn’t find anywhere else:

OID-See - essentially BloodHound for OAuth in Entra.

It maps:
• OAuth apps & service principals
• Delegated scopes and app permissions
• Consent, assignments, and reachability
• Trust signals (and trust illusions)
• Persistence and impersonation paths

…into a graph-backed analysis model that lets you reason about what an app can actually become when chained, not just whether it looks risky in isolation.

Why this exists

I kept running into the same issues:
• “Verified publisher” isn’t always the signal we think it is
• Microsoft-shaped metadata can lull defenders into false trust
• offline_access ≠ impersonation, but does equal persistence
• Apps without assignment requirements are exposed by default
• Spreadsheets hide abuse paths - graphs expose them

So I stopped trying to answer “is this app bad?”
and started asking “what does this enable if it’s abused?”

What OID-See is (and isn’t)

✅ Graph-only by default (no token scraping, no SaaS, no data exfil)
✅ You run it yourself, get a JSON, analyse it locally
✅ Explainable scoring, externalised logic, no magic
❌ Not a CSPM replacement
❌ Not an EDR, SWG, or token replay tool

It’s about clarity, not control theatre.

📖 Blog (deep dive, philosophy, and war stories):
👉 cirriustech.co.uk/blog/oidsee/

🧰 Tool & source (v1.0.0):
👉 github.com/OID-See/OID-See/tre

If you’re an Entra admin, cloud security engineer, or anyone who’s ever said
“it’s just a harmless SSO integration” - this one’s for you.

And yes… the name is intentional.
You probably should be giving your OAuth apps the side-eye. 👀

#Entra #AzureAD #OAuth #OIDC #IdentitySecurity #SecurityResearch #AttackSurface #Graph #BloodHound #OIDSee

2026-01-03

Security researchers have revealed a phishing campaign that abused Google Cloud’s email automation to deliver legitimate-looking enterprise notifications from trusted domains.

The attack chain demonstrates how cloud trust, familiar formatting, and multi-stage redirection can work together to bypass both technical controls and user skepticism.

This raises broader questions about how defenders evaluate risk in automated cloud workflows.

What lessons should security teams take from this case?

Share your insights, and follow TechNadu for vendor-neutral cybersecurity analysis.
Source: thehackernews.com/2026/01/cybe

#InfoSec #PhishingCampaigns #CloudAbuse #EmailSecurity #ThreatDetection #SecurityResearch

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
2025-12-16

📢 CFP: #EuroSec2026

The 19th European Workshop on Systems Security is co-located with #EuroSys2026 in Edinburgh 🇬🇧
Join researchers & practitioners discussing the latest in #SystemsSecurity and #ComputerSecurity.

🗓 Deadline: Feb 3, 2026 (AoE)
🔗 eurosec26.hotcrp.com/

For details and submission guidelines, visit: eurosec-workshop.github.io/

#CFP #SecurityResearch #Systems #Networking

SCENOR | The Science CrewScenorCrew
2025-12-15

🛡️ FINAL CHANCE TO REGISTER for tomorrow’s training in Dublin for faith communities.

The event covers threat assessments, the Faith Guardian reporting tool, identification of vulnerabilities in Places of Worship and guidance on counter-narratives.

docs.google.com/forms/d/e/1FAI

2025-12-12

A new Chrome zero-day has been patched, but notable for its lack of a CVE and absence of public technical information. Identified only by a bug tracker ID, the flaw carries a high-severity rating and is already being exploited in the wild. Trends point toward a likely memory corruption vector.

The same update resolves two medium-risk issues tied to small bug-bounty awards.

How do you feel about delayed transparency during active exploitation windows?

Source:
securityweek.com/google-patche

Share your perspective and follow us for more threat intelligence and vulnerability insights.

#infosec #zeroday #chromesecurity #cybersecurity #vulnerabilitymanagement #patching #securityresearch #browsersecurity #threatintel #technadu

Google Patches Mysterious Chrome Zero-Day Exploited in the Wild

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst