Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Stop triaging Go CVEs that don't affect you
Vinu K
Vinu K
Vinu K
Follow
May 5
Stop triaging Go CVEs that don't affect you
#
go
#
security
#
opensource
#
vulnerabilities
Comments
Add Comment
1 min read
Inside a 2017 Nightmare: Simulating WannaCry Ransomware in a Controlled Lab
Saumya Aggarwal
Saumya Aggarwal
Saumya Aggarwal
Follow
May 5
Inside a 2017 Nightmare: Simulating WannaCry Ransomware in a Controlled Lab
#
cybersecurity
#
vulnerabilities
#
ipsec
#
programming
1
 reaction
Comments
Add Comment
8 min read
OpenEMR 38-Vulnerability Chain: Patient Data Exfil & Tampering
Satyam Rastogi
Satyam Rastogi
Satyam Rastogi
Follow
Apr 29
OpenEMR 38-Vulnerability Chain: Patient Data Exfil & Tampering
#
security
#
vulnerabilities
#
cybersecurity
#
infosec
Comments
Add Comment
5 min read
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 23
From LOW to CRITICAL: How a 5-Step Vulnerability Chain Goes Undetected by Flat Scanners
#
security
#
appsec
#
vulnerabilities
#
devops
Comments
Add Comment
3 min read
How to Check Your MCP Server for CVE-2026-5603's Vulnerability Pattern (And Why shellQuote Isn't Enough)
Armor1
Armor1
Armor1
Follow
Apr 22
How to Check Your MCP Server for CVE-2026-5603's Vulnerability Pattern (And Why shellQuote Isn't Enough)
#
mcp
#
security
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
The AI Arms Race: Defending Your Enterprise Against Machine-Speed Vulnerabilities
Tech Croc
Tech Croc
Tech Croc
Follow
Apr 20
The AI Arms Race: Defending Your Enterprise Against Machine-Speed Vulnerabilities
#
ai
#
security
#
vulnerabilities
#
gpt3
5
 reactions
Comments
Add Comment
4 min read
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 21
Shift-Left Chain Enforcement: Blocking Vulnerability Chains at Commit Time
#
security
#
appsec
#
vulnerabilities
#
ai
Comments
Add Comment
5 min read
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack
Armor1
Armor1
Armor1
Follow
Apr 16
CVE-2026-35030 (CVSS 9.4): How LiteLLM's JWT Cache Fails and How to Rotate Credentials After the Supply Chain Attack
#
security
#
python
#
ai
#
vulnerabilities
Comments
Add Comment
3 min read
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
Excalibra
Excalibra
Excalibra
Follow
Apr 13
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
#
malware
#
vulnerabilities
#
redteam
#
cybersecurity
5
 reactions
Comments
Add Comment
6 min read
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
Calin V.
Calin V.
Calin V.
Follow
Apr 9
The Real Cost of 1 Hour of WordPress Downtime (It's More Than You Think)
#
security
#
wordpress
#
cybersecurity
#
vulnerabilities
Comments
Add Comment
6 min read
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Apr 8
LLMs Generate Vulnerable C/C++ Code: Self-Review Fails to Mitigate Security Flaws
#
llms
#
security
#
vulnerabilities
#
formalverification
Comments
Add Comment
10 min read
CVE-2026-21852: How enableAllProjectMcpServers Leaks Your Entire Source Code
Sattyam Jain
Sattyam Jain
Sattyam Jain
Follow
Apr 7
CVE-2026-21852: How enableAllProjectMcpServers Leaks Your Entire Source Code
#
ai
#
aiops
#
vulnerabilities
Comments
Add Comment
3 min read
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program
Eldor Zufarov
Eldor Zufarov
Eldor Zufarov
Follow
Apr 20
Deterministic Chain Analysis: The Missing Layer in a Mythos-Ready Security Program
#
security
#
appsec
#
vulnerabilities
#
ai
Comments
Add Comment
4 min read
Vulnerabities are being exploited faster than ever: opportunity in disguise
Mikail Kocak
Mikail Kocak
Mikail Kocak
Follow
Apr 7
Vulnerabities are being exploited faster than ever: opportunity in disguise
#
cybersecurity
#
infosec
#
vulnerabilities
Comments
Add Comment
2 min read
Ambiguous MCP Instructions Enable Unauthorized AI Actions: Enhanced Validation and Oversight Proposed
Olga Larionova
Olga Larionova
Olga Larionova
Follow
Apr 2
Ambiguous MCP Instructions Enable Unauthorized AI Actions: Enhanced Validation and Oversight Proposed
#
ai
#
security
#
ambiguity
#
vulnerabilities
Comments
Add Comment
10 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account