Forem

Ksenia Rudneva profile picture

Ksenia Rudneva

I hunt for vulnerabilities and explore how attacks really work. Expect deep dives into protocols, packet‑level mysteries, and surprising weak spots in everyday systems.

Joined Joined on 
NTLM-Relaying Attacks Persist Due to Lack of EPA Enforcement on Web Servers: Implementing EPA Mitigates Risk

NTLM-Relaying Attacks Persist Due to Lack of EPA Enforcement on Web Servers: Implementing EPA Mitigates Risk

Comments
12 min read
Navia Benefit Solutions' BOLA Vulnerability Exposed PII of 10,000+ Employees Due to Inadequate Access Controls

Navia Benefit Solutions' BOLA Vulnerability Exposed PII of 10,000+ Employees Due to Inadequate Access Controls

1
Comments
14 min read
Age-Verification Integration in Internet Infrastructure Raises Technical, Legal, and Privacy Concerns

Age-Verification Integration in Internet Infrastructure Raises Technical, Legal, and Privacy Concerns

Comments
14 min read
Agent Skill Marketplace Vulnerable to Supply Chain Attacks: Standardized Security Scanning Proposed

Agent Skill Marketplace Vulnerable to Supply Chain Attacks: Standardized Security Scanning Proposed

Comments
14 min read
ONNX `silent=True` Disables Security Checks, Exposing ML Models to Supply Chain Attacks: Solution Needed

ONNX `silent=True` Disables Security Checks, Exposing ML Models to Supply Chain Attacks: Solution Needed

Comments
11 min read
DarkSword iOS Exploit Analysis: Evaluating Lookout's LLM-Assisted Findings Against Other Research Teams

DarkSword iOS Exploit Analysis: Evaluating Lookout's LLM-Assisted Findings Against Other Research Teams

1
Comments
12 min read
Claude Code CLI Vulnerability: Malicious Configs Bypass Trust Dialog, Enabling Unauthorized Permission Elevation

Claude Code CLI Vulnerability: Malicious Configs Bypass Trust Dialog, Enabling Unauthorized Permission Elevation

Comments
10 min read
Simplifying Cybersecurity Frameworks: Practical Solutions for Startups to Implement ISO 27001 and NIST

Simplifying Cybersecurity Frameworks: Practical Solutions for Startups to Implement ISO 27001 and NIST

Comments
11 min read
AI/ML Infrastructure Vulnerabilities Expose Systems to Security Risks: Patching and Mitigation Strategies Proposed

AI/ML Infrastructure Vulnerabilities Expose Systems to Security Risks: Patching and Mitigation Strategies Proposed

2
Comments
13 min read
GlassWorm Malware Campaign Steals Crypto Seeds via Obfuscation, Chrome Exploit, and Social Engineering: Mitigation Strategies

GlassWorm Malware Campaign Steals Crypto Seeds via Obfuscation, Chrome Exploit, and Social Engineering: Mitigation Strategies

1
Comments
10 min read
Efficiently Locating and Analyzing PoC Code for CVEs with Contextual Information Integration

Efficiently Locating and Analyzing PoC Code for CVEs with Contextual Information Integration

Comments
8 min read
Windows Vulnerability CVE-2025-59284: Incomplete Patch Enables NetNTLM Hash Phishing During Archive Extraction

Windows Vulnerability CVE-2025-59284: Incomplete Patch Enables NetNTLM Hash Phishing During Archive Extraction

Comments
14 min read
Self-Hosted Email Threat Detection: Real-Time Monitoring, Multi-Stage Enrichment, and LLM Verdicts with Legal Compliance

Self-Hosted Email Threat Detection: Real-Time Monitoring, Multi-Stage Enrichment, and LLM Verdicts with Legal Compliance

1
Comments
15 min read
Enhancing Cybersecurity with Hypervisors: Current Practices, Future Advancements, and Nova Design Rationale

Enhancing Cybersecurity with Hypervisors: Current Practices, Future Advancements, and Nova Design Rationale

Comments
9 min read
Addressing Security Risks: Replacing Unscoped API Keys with Fine-Grained Access Control in AI Agent Frameworks

Addressing Security Risks: Replacing Unscoped API Keys with Fine-Grained Access Control in AI Agent Frameworks

Comments
11 min read
66% of MCP Servers Have Critical Security Vulnerabilities: Urgent Patching and Audits Needed

66% of MCP Servers Have Critical Security Vulnerabilities: Urgent Patching and Audits Needed

3
Comments
13 min read
Alipay App Vulnerabilities Enable Silent GPS Exfiltration; Vendor Denies Issue Despite High CVSS Scores

Alipay App Vulnerabilities Enable Silent GPS Exfiltration; Vendor Denies Issue Despite High CVSS Scores

1
Comments
10 min read
Microsoft's Software Ecosystem Faces 79 Vulnerabilities: Urgent Patching and Mitigation Strategies Required

Microsoft's Software Ecosystem Faces 79 Vulnerabilities: Urgent Patching and Mitigation Strategies Required

2
Comments
16 min read
Drywall Foreman in Ontario Demands $35/Hour Wage Review: Is the Pay Fair for the Responsibilities and Workload?

Drywall Foreman in Ontario Demands $35/Hour Wage Review: Is the Pay Fair for the Responsibilities and Workload?

Comments
13 min read
Pac4j-JWT Authentication Bypass Vulnerability Undetected for Six Years Despite Advanced Security Tools

Pac4j-JWT Authentication Bypass Vulnerability Undetected for Six Years Despite Advanced Security Tools

Comments
9 min read
Basic Operator Exploits Weak FortiGate Passwords in 55 Countries Using AI, Compromising 600+ Devices Without Zero-Days.

Basic Operator Exploits Weak FortiGate Passwords in 55 Countries Using AI, Compromising 600+ Devices Without Zero-Days.

Comments
12 min read
Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites

Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites

Comments
8 min read
Post-Quantum TLS Signatures Increase Handshake Size: Solutions to Mitigate Performance and Compatibility Issues

Post-Quantum TLS Signatures Increase Handshake Size: Solutions to Mitigate Performance and Compatibility Issues

Comments
13 min read
Navigating Legal and Compliance Challenges in Tech Content Aggregation: Balancing Data Privacy, IP Rights, and Liability Risks

Navigating Legal and Compliance Challenges in Tech Content Aggregation: Balancing Data Privacy, IP Rights, and Liability Risks

Comments
8 min read
loading...