<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — Weekly Changelog</title>
  <link>https://appsec.fyi/changelog.html</link>
  <description>New application security resources added to appsec.fyi in the last 7 days</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/changelog.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Sun, 26 Apr 2026 03:26:51 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>Over 10000 Zimbra Servers Vulnerable to XSS Attacks</title>
    <link>https://www.secnews.gr/en/704887/zimbra-servers-eualotoi-xss-epithesis/</link>
    <guid isPermaLink="true">https://www.secnews.gr/en/704887/zimbra-servers-eualotoi-xss-epithesis/</guid>
    <description>Over 10,000 Zimbra Servers Vulnerable to XSS Attacks https://ift.tt/UNZfrVk</description>
    <category>XSS</category>
    <category domain="difficulty">news</category>
    <pubDate>Fri, 24 Apr 2026 20:31:31 +0000</pubDate>
  </item>
  <item>
    <title>Over 10000 Zimbra servers vulnerable to ongoing XSS attacks</title>
    <link>https://www.bleepingcomputer.com/news/security/cisa-says-zimbra-flaw-now-exploited-over-10k-servers-vulnerable/</link>
    <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/cisa-says-zimbra-flaw-now-exploited-over-10k-servers-vulnerable/</guid>
    <description>Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks https://ift.tt/Ay2mKgb</description>
    <category>XSS</category>
    <category domain="difficulty">news</category>
    <pubDate>Fri, 24 Apr 2026 13:56:29 +0000</pubDate>
  </item>
  <item>
    <title>LMDeploy SSRF alert CVE-2026-33626 exploited within hours Attackers can access internal services &amp; cloud metadata. Update now &amp; restrict outbound requests.vulert.com/blog/lmdeploy-p #CyberSecurity #SSRF #AIsecurity #Vulert</title>
    <link>https://x.com/vulert_official/status/2047624407104036892</link>
    <guid isPermaLink="true">https://x.com/vulert_official/status/2047624407104036892</guid>
    <description>🚨 LMDeploy SSRF alert CVE-2026-33626 exploited within hours ⚠️ Attackers can access internal services &amp; cloud metadata. Update now &amp; restrict outbound requests.vulert.com/blog/lmdeploy-…p #CyberSecuri...</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Fri, 24 Apr 2026 11:13:23 +0000</pubDate>
  </item>
  <item>
    <title>LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure</title>
    <link>https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html</guid>
    <description>LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure https://ift.tt/8wBTJAc</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Fri, 24 Apr 2026 07:41:26 +0000</pubDate>
  </item>
  <item>
    <title>Checkmarx Supply Chain Attack Exploits Docker Images and CI/CD Pipelines</title>
    <link>https://www.esecurityplanet.com/threats/checkmarx-supply-chain-attack-exploits-docker-images-and-ci-cd-pipelines/</link>
    <guid isPermaLink="true">https://www.esecurityplanet.com/threats/checkmarx-supply-chain-attack-exploits-docker-images-and-ci-cd-pipelines/</guid>
    <description>Checkmarx Supply Chain Attack Exploits Docker Images and CI/CD Pipelines   https://ift.tt/fPkwYx0</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 22:20:31 +0000</pubDate>
  </item>
  <item>
    <title>Shai-Hulud: The Third Coming Bitwarden CLI Backdoored in Latest Supply Chain Campaign</title>
    <link>https://www.ox.security/blog/shai-hulud-bitwarden-cli-supply-chain-attack/</link>
    <guid isPermaLink="true">https://www.ox.security/blog/shai-hulud-bitwarden-cli-supply-chain-attack/</guid>
    <description>Shai-Hulud: The Third Coming — Bitwarden CLI Backdoored in Latest Supply Chain Campaign  https://ift.tt/OsEXhPW</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 17:55:43 +0000</pubDate>
  </item>
  <item>
    <title>Tenable finds Microsoft GitHub flaw risking supply chains</title>
    <link>https://backendnews.net/tenable-finds-microsoft-github-flaw-risking-supply-chains/</link>
    <guid isPermaLink="true">https://backendnews.net/tenable-finds-microsoft-github-flaw-risking-supply-chains/</guid>
    <description>Tenable finds Microsoft GitHub flaw risking supply chains  https://ift.tt/VXu8wM2</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 17:13:06 +0000</pubDate>
  </item>
  <item>
    <title>New Checkmarx supply-chain breach affects KICS analysis tool</title>
    <link>https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/</link>
    <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/</guid>
    <description>New Checkmarx supply-chain breach affects KICS analysis tool https://ift.tt/p2R0T8O</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 16:35:53 +0000</pubDate>
  </item>
  <item>
    <title>Six AI Vulnerabilities Three Attack Patterns One Dangerous Service Gap</title>
    <link>https://www.msspalert.com/perspective/six-ai-vulnerabilities-three-attack-patterns-one-dangerous-service-gap</link>
    <guid isPermaLink="true">https://www.msspalert.com/perspective/six-ai-vulnerabilities-three-attack-patterns-one-dangerous-service-gap</guid>
    <description>Six AI Vulnerabilities, Three Attack Patterns, One Dangerous Service Gap https://ift.tt/STbWHA5</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 16:01:30 +0000</pubDate>
  </item>
  <item>
    <title>AI-powered scanner vulnerabilities</title>
    <link>https://portswigger.net/web-security/llm-attacks/ai-powered-scanner-vulnerabilities</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/llm-attacks/ai-powered-scanner-vulnerabilities</guid>
    <description>AI-powered scanner vulnerabilities  https://ift.tt/re6cDjZ</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 15:30:30 +0000</pubDate>
  </item>
  <item>
    <title>Anthropic&#x27;s model context protocol includes a critical remote code execution vulnerability</title>
    <link>https://www.msn.com/en-us/news/technology/anthropic-s-model-context-protocol-includes-a-critical-remote-code-execution-vulnerability/ar-AA21tiyX</link>
    <guid isPermaLink="true">https://www.msn.com/en-us/news/technology/anthropic-s-model-context-protocol-includes-a-critical-remote-code-execution-vulnerability/ar-AA21tiyX</guid>
    <description>Anthropic&#x27;s model context protocol includes a critical remote code execution vulnerability https://ift.tt/Hfb3ygq</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 14:39:40 +0000</pubDate>
  </item>
  <item>
    <title>Checkmarx Docker Hub repository compromised with malicious images</title>
    <link>https://www.scworld.com/brief/checkmarx-docker-hub-repository-compromised-with-malicious-images</link>
    <guid isPermaLink="true">https://www.scworld.com/brief/checkmarx-docker-hub-repository-compromised-with-malicious-images</guid>
    <description>Checkmarx Docker Hub repository compromised with malicious images https://ift.tt/Cpy7bme</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 13:55:33 +0000</pubDate>
  </item>
  <item>
    <title>Attackers Exploit LMDeploy Flaw in the Wild Within 12 Hours of Advisory</title>
    <link>https://gbhackers.com/attackers-exploit-lmdeploy-flaw/</link>
    <guid isPermaLink="true">https://gbhackers.com/attackers-exploit-lmdeploy-flaw/</guid>
    <description>Attackers Exploit LMDeploy Flaw in the Wild Within 12 Hours of Advisory https://ift.tt/xWknlfA</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 12:31:38 +0000</pubDate>
  </item>
  <item>
    <title>Namastex npm packages compromised in CanisterWorm supply chain attack</title>
    <link>https://www.scworld.com/news/namastex-npm-packages-compromised-in-canisterworm-supply-chain-attack</link>
    <guid isPermaLink="true">https://www.scworld.com/news/namastex-npm-packages-compromised-in-canisterworm-supply-chain-attack</guid>
    <description>Namastex npm packages compromised in ‘CanisterWorm’ supply chain attack https://ift.tt/hbNKaTp</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 12:15:37 +0000</pubDate>
  </item>
  <item>
    <title>No Off Season: Three Supply Chain Campaigns Hit npm PyPI and Docker Hub in 48 Hours</title>
    <link>https://securityboulevard.com/2026/04/no-off-season-three-supply-chain-campaigns-hit-npm-pypi-and-docker-hub-in-48-hours/</link>
    <guid isPermaLink="true">https://securityboulevard.com/2026/04/no-off-season-three-supply-chain-campaigns-hit-npm-pypi-and-docker-hub-in-48-hours/</guid>
    <description>No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours https://ift.tt/fIX26Eo</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 12:15:36 +0000</pubDate>
  </item>
  <item>
    <title>AI Sparks Bug-Bounty Surge in Crypto but Low-Quality Reports Grow</title>
    <link>https://www.mexc.co/en-PH/news/1045276</link>
    <guid isPermaLink="true">https://www.mexc.co/en-PH/news/1045276</guid>
    <description>AI Sparks Bug-Bounty Surge in Crypto, but Low-Quality Reports Grow  https://ift.tt/ImqYgUJ</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 10:19:04 +0000</pubDate>
  </item>
  <item>
    <title>No Off Season: Three Supply Chain Campaigns Hit npm PyPI and Docker Hub in 48 Hours</title>
    <link>https://blog.gitguardian.com/three-supply-chain-campaigns-hit-npm-pypi-and-docker-hub-in-48-hours/</link>
    <guid isPermaLink="true">https://blog.gitguardian.com/three-supply-chain-campaigns-hit-npm-pypi-and-docker-hub-in-48-hours/</guid>
    <description>No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours https://ift.tt/JDfPrIS</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 10:00:50 +0000</pubDate>
  </item>
  <item>
    <title>New LMDeploy Vulnerability Exploited in the Wild Just 12 Hours After Public Advisory</title>
    <link>https://cyberpress.org/new-lmdeploy-vulnerability/</link>
    <guid isPermaLink="true">https://cyberpress.org/new-lmdeploy-vulnerability/</guid>
    <description>New LMDeploy Vulnerability Exploited in the Wild Just 12 Hours After Public Advisory https://ift.tt/txmoBfy</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 09:51:31 +0000</pubDate>
  </item>
  <item>
    <title>Xinference PyPI Package Compromised With Malicious Code to Steal Cloud Credentials</title>
    <link>https://cyberpress.org/xinference-pypi-package-compromised/</link>
    <guid isPermaLink="true">https://cyberpress.org/xinference-pypi-package-compromised/</guid>
    <description>Xinference PyPI Package Compromised With Malicious Code to Steal Cloud Credentials https://ift.tt/MALwDp9</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 09:10:46 +0000</pubDate>
  </item>
  <item>
    <title>Malicious Docker Images and VS Code Extensions Compromise Checkmarx Supply Chain</title>
    <link>https://www.cxodigitalpulse.com/malicious-docker-images-and-vs-code-extensions-compromise-checkmarx-supply-chain/</link>
    <guid isPermaLink="true">https://www.cxodigitalpulse.com/malicious-docker-images-and-vs-code-extensions-compromise-checkmarx-supply-chain/</guid>
    <description>Malicious Docker Images and VS Code Extensions Compromise Checkmarx Supply Chain https://ift.tt/xvOUGSi</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 09:10:44 +0000</pubDate>
  </item>
  <item>
    <title>Checkmarx KICS Docker Repo Hijacked in Malicious Code Injection Attack</title>
    <link>https://gbhackers.com/checkmarx-kics-docker-repo-hijacked/</link>
    <guid isPermaLink="true">https://gbhackers.com/checkmarx-kics-docker-repo-hijacked/</guid>
    <description>Checkmarx KICS Docker Repo Hijacked in Malicious Code Injection Attack https://ift.tt/ocmvb8S</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 09:10:40 +0000</pubDate>
  </item>
  <item>
    <title>Xinference PyPI Breach Exposes Developers to Cloud Credential Theft</title>
    <link>https://gbhackers.com/xinference-pypi-breach-exposes-developers/</link>
    <guid isPermaLink="true">https://gbhackers.com/xinference-pypi-breach-exposes-developers/</guid>
    <description>Xinference PyPI Breach Exposes Developers to Cloud Credential Theft https://ift.tt/Tqo2NKg</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 08:58:35 +0000</pubDate>
  </item>
  <item>
    <title>axios npm Compromise: The Ultimate Supply Chain Scaries</title>
    <link>https://www.huntress.com/blog/axios-npm-compromise</link>
    <guid isPermaLink="true">https://www.huntress.com/blog/axios-npm-compromise</guid>
    <description>axios npm Compromise: The Ultimate Supply Chain Scaries https://ift.tt/ZmiRfkp</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 08:55:36 +0000</pubDate>
  </item>
  <item>
    <title>Anthropic&#x27;s model context protocol includes a critical remote code execution vulnerability</title>
    <link>https://www.msn.com/en-us/news/technology/anthropic-s-model-context-protocol-includes-a-critical-remote-code-execution-vulnerability/ar-AA21tiyX?apiversion</link>
    <guid isPermaLink="true">https://www.msn.com/en-us/news/technology/anthropic-s-model-context-protocol-includes-a-critical-remote-code-execution-vulnerability/ar-AA21tiyX?apiversion</guid>
    <description>Anthropic&#x27;s model context protocol includes a critical remote code execution vulnerability https://ift.tt/uJoCxjU</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 08:34:05 +0000</pubDate>
  </item>
  <item>
    <title>Xinference allegedly hacked by TeamPCP Malicious Package In PyPi</title>
    <link>https://www.ox.security/blog/xinference-allegedly-hacked-by-teampcp-malicious-package-in-pypi/</link>
    <guid isPermaLink="true">https://www.ox.security/blog/xinference-allegedly-hacked-by-teampcp-malicious-package-in-pypi/</guid>
    <description>Xinference allegedly hacked by TeamPCP, Malicious Package In PyPi  https://ift.tt/vMwcIWt</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 07:38:42 +0000</pubDate>
  </item>
  <item>
    <title>LangChain framework hit by several worrying security issues here&#x27;s what we know</title>
    <link>https://www.msn.com/en-us/technology/cybersecurity/langchain-framework-hit-by-several-worrying-security-issues-here-s-what-we-know/ar-AA1ZyEnW?apiversion</link>
    <guid isPermaLink="true">https://www.msn.com/en-us/technology/cybersecurity/langchain-framework-hit-by-several-worrying-security-issues-here-s-what-we-know/ar-AA1ZyEnW?apiversion</guid>
    <description>LangChain framework hit by several worrying security issues — here&#x27;s what we know https://ift.tt/XaO0IvB</description>
    <category>SQLi</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 07:31:18 +0000</pubDate>
  </item>
  <item>
    <title>AI Supply-Chain Monitor Identifies Critical Axios Attack</title>
    <link>https://www.varindia.com/news/ai-supply-chain-monitor-identifies-critical-axios-attack</link>
    <guid isPermaLink="true">https://www.varindia.com/news/ai-supply-chain-monitor-identifies-critical-axios-attack</guid>
    <description>AI Supply-Chain Monitor Identifies Critical Axios Attack https://ift.tt/jMkYqAz</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 05:30:48 +0000</pubDate>
  </item>
  <item>
    <title>Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale</title>
    <link>https://www.manilatimes.net/2026/04/20/tmt-newswire/globenewswire/aikido-security-launches-endpoint-protection-for-developer-devices-as-software-supply-chain-attacks-hit-unprecedented-scale/2323823</link>
    <guid isPermaLink="true">https://www.manilatimes.net/2026/04/20/tmt-newswire/globenewswire/aikido-security-launches-endpoint-protection-for-developer-devices-as-software-supply-chain-attacks-hit-unprecedented-scale/2323823</guid>
    <description>Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale https://ift.tt/sLawUZo</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 04:45:41 +0000</pubDate>
  </item>
  <item>
    <title>wapiti-scanner/wapiti: Web vulnerability scanner written in Python3</title>
    <link>https://github.com/wapiti-scanner/wapiti?sfnsn=wiwspmo</link>
    <guid isPermaLink="true">https://github.com/wapiti-scanner/wapiti?sfnsn=wiwspmo</guid>
    <description>Web vulnerability scanner written in Python3</description>
    <category>Python</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Thu, 23 Apr 2026 04:34:59 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-33626 exposes an SSRF in LMDeploys vision-language image loader. Attackers accessed AWS IMDS scanned local services and confirmed egress within 12 hours. Update to v0.12.3 and enforce IMDSv2. #LMDeploy #SSRF #USA ift.tt/PVn3XMk</title>
    <link>https://x.com/TweetThreatNews/status/2047159805358301245</link>
    <guid isPermaLink="true">https://x.com/TweetThreatNews/status/2047159805358301245</guid>
    <description>CVE-2026-33626 exposes an SSRF in LMDeploy’s vision-language image loader. Attackers accessed AWS IMDS, scanned local services, and confirmed egress within 12 hours. Update to v0.12.3 and enforce IMDS...</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 04:28:37 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-33626: A critical SSRF in LMDeploy exploited in under 13 hours. Learn how attackers hijack AI nodes and how to secure your inference cloud now. #CVE202633626 #SSRF #AISecurity #LMDeploy #InfoSec #CyberAttack #CloudSecurity #LLM #PatchNow securityonline.info/cve-2026-33626 pic.x.com/09IZxf21rQ</title>
    <link>https://x.com/the_yellow_fall/status/2047142935527886977</link>
    <guid isPermaLink="true">https://x.com/the_yellow_fall/status/2047142935527886977</guid>
    <description>CVE-2026-33626: A critical SSRF in LMDeploy exploited in under 13 hours. Learn how attackers hijack AI nodes and how to secure your inference cloud now. #CVE202633626 #SSRF #AISecurity #LMDeploy #Info...</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 02:43:36 +0000</pubDate>
  </item>
  <item>
    <title>Microsoft issues out-of-band patch for critical security flaw in update to ASP.NET Core</title>
    <link>https://www.csoonline.com/article/4162178/microsoft-issues-out-of-band-patch-for-critical-security-flaw-in-update-to-asp-net-core.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4162178/microsoft-issues-out-of-band-patch-for-critical-security-flaw-in-update-to-asp-net-core.html</guid>
    <description>Microsoft issues out-of-band patch for critical security flaw in update to ASP.NET Core https://ift.tt/ACNkfaG</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Thu, 23 Apr 2026 01:11:28 +0000</pubDate>
  </item>
  <item>
    <title>Another npm supply chain worm is tearing through dev environments</title>
    <link>https://www.theregister.com/2026/04/22/another_npm_supply_chain_attack/</link>
    <guid isPermaLink="true">https://www.theregister.com/2026/04/22/another_npm_supply_chain_attack/</guid>
    <description>Another npm supply chain worm is tearing through dev environments https://ift.tt/mrPsh3p</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 23:30:26 +0000</pubDate>
  </item>
  <item>
    <title>Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens</title>
    <link>https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html</guid>
    <description>Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens https://ift.tt/ch1xmSL</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 22:10:36 +0000</pubDate>
  </item>
  <item>
    <title>Massive compromise hits LiteLLM and the whole AI developers community: how did it happen?</title>
    <link>https://cybernews.com/security/critical-litellm-supply-chain-attack-sends-shockwaves/</link>
    <guid isPermaLink="true">https://cybernews.com/security/critical-litellm-supply-chain-attack-sends-shockwaves/</guid>
    <description>Massive compromise hits LiteLLM and the whole AI developers community: how did it happen? https://ift.tt/kWQ0dJB</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 20:43:24 +0000</pubDate>
  </item>
  <item>
    <title>Supply Chain Attacks Are Getting WorseHow to Shrink Your Exposure</title>
    <link>https://securityboulevard.com/2026/04/supply-chain-attacks-are-getting-worse-how-to-shrink-your-exposure/</link>
    <guid isPermaLink="true">https://securityboulevard.com/2026/04/supply-chain-attacks-are-getting-worse-how-to-shrink-your-exposure/</guid>
    <description>Supply Chain Attacks Are Getting Worse—How to Shrink Your Exposure https://ift.tt/A90d4Bp</description>
    <category>Supply Chain</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 20:05:48 +0000</pubDate>
  </item>
  <item>
    <title>Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain</title>
    <link>https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html</guid>
    <description>Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain https://ift.tt/uA7BI5U</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 19:10:32 +0000</pubDate>
  </item>
  <item>
    <title>Hypersonic Supply Chain Attacks: One Solution That Didn&#x27;t Need to Know the Payload</title>
    <link>https://www.sentinelone.com/blog/hypersonic-supply-chain-attacks-one-solution-that-didnt-need-to-know-the-payload/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/blog/hypersonic-supply-chain-attacks-one-solution-that-didnt-need-to-know-the-payload/</guid>
    <description>Hypersonic Supply Chain Attacks: One Solution That Didn&#x27;t Need to Know the Payload https://ift.tt/bKtc9JB</description>
    <category>Supply Chain</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 19:10:31 +0000</pubDate>
  </item>
  <item>
    <title>Three AI coding agents leaked secrets through a single prompt injection. One vendor&#x27;s system card predicted it</title>
    <link>https://venturebeat.com/security/ai-agent-runtime-security-system-card-audit-comment-and-control-2026</link>
    <guid isPermaLink="true">https://venturebeat.com/security/ai-agent-runtime-security-system-card-audit-comment-and-control-2026</guid>
    <description>Three AI coding agents leaked secrets through a single prompt injection. One vendor&#x27;s system card predicted it https://ift.tt/smH86bY</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 18:40:07 +0000</pubDate>
  </item>
  <item>
    <title>Whos Really to Blame When a White Hat Goes Gray?</title>
    <link>https://www.corporatecomplianceinsights.com/who-really-blame-white-hat-gray/</link>
    <guid isPermaLink="true">https://www.corporatecomplianceinsights.com/who-really-blame-white-hat-gray/</guid>
    <description>Who’s Really to Blame When a White Hat Goes Gray? https://ift.tt/GRys4eB</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 17:19:39 +0000</pubDate>
  </item>
  <item>
    <title>Mozilla Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities</title>
    <link>https://gbhackers.com/mozilla-firefox-150-released/</link>
    <guid isPermaLink="true">https://gbhackers.com/mozilla-firefox-150-released/</guid>
    <description>Mozilla Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities https://ift.tt/6dEs8aC</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 16:54:43 +0000</pubDate>
  </item>
  <item>
    <title>Terrarium Sandbox: Critical Vulnerability Allows Root Code</title>
    <link>https://www.secnews.gr/en/704148/terrarium-sandbox-eypatheia-root-critique/</link>
    <guid isPermaLink="true">https://www.secnews.gr/en/704148/terrarium-sandbox-eypatheia-root-critique/</guid>
    <description>Terrarium Sandbox: Critical Vulnerability Allows Root Code https://ift.tt/xt7SA8a</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 16:48:35 +0000</pubDate>
  </item>
  <item>
    <title>Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities</title>
    <link>https://cyberpress.org/firefox-150-released-with-fixes/</link>
    <guid isPermaLink="true">https://cyberpress.org/firefox-150-released-with-fixes/</guid>
    <description>Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities https://ift.tt/oKqHTf5</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 16:24:31 +0000</pubDate>
  </item>
  <item>
    <title>Critical Spring Authorization Server Issue Exposes Systems to XSS and SSRF Attacks</title>
    <link>https://gbhackers.com/critical-spring-authorization-server-issue/</link>
    <guid isPermaLink="true">https://gbhackers.com/critical-spring-authorization-server-issue/</guid>
    <description>Critical Spring Authorization Server Issue Exposes Systems to XSS and SSRF Attacks https://ift.tt/y4laiIW</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 15:41:09 +0000</pubDate>
  </item>
  <item>
    <title>Nextcloud ends bug bounty program due to too many low-quality reports</title>
    <link>https://www.techzine.eu/news/security/140713/nextcloud-ends-bug-bounty-program-due-to-too-many-low-quality-reports/</link>
    <guid isPermaLink="true">https://www.techzine.eu/news/security/140713/nextcloud-ends-bug-bounty-program-due-to-too-many-low-quality-reports/</guid>
    <description>Nextcloud ends bug bounty program due to too many low-quality reports https://ift.tt/Qpl1nJ2</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 15:29:41 +0000</pubDate>
  </item>
  <item>
    <title>Critical Spring Authorization Server Flaw Enables XSS Privilege Escalation and SSRF</title>
    <link>https://cyberpress.org/spring-authorization-server-flaw/</link>
    <guid isPermaLink="true">https://cyberpress.org/spring-authorization-server-flaw/</guid>
    <description>Critical Spring Authorization Server Flaw Enables XSS, Privilege Escalation, and SSRF https://ift.tt/b2pauUc</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 14:41:29 +0000</pubDate>
  </item>
  <item>
    <title>Microsoft releases emergency patches for critical ASP.NET flaw</title>
    <link>https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-security-updates-for-critical-aspnet-flaw/</link>
    <guid isPermaLink="true">https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-security-updates-for-critical-aspnet-flaw/</guid>
    <description>Microsoft releases emergency patches for critical ASP.NET flaw https://ift.tt/C9a1UoS</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 14:11:17 +0000</pubDate>
  </item>
  <item>
    <title>Flaw in Microsoft-owned GitHub repository allowed RCE via issue submission</title>
    <link>https://www.scworld.com/news/flaw-in-microsoft-owned-github-repository-allowed-rce-via-issue-submission</link>
    <guid isPermaLink="true">https://www.scworld.com/news/flaw-in-microsoft-owned-github-repository-allowed-rce-via-issue-submission</guid>
    <description>Flaw in Microsoft-owned GitHub repository allowed RCE via issue submission https://ift.tt/gj6ZlMi</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 13:34:15 +0000</pubDate>
  </item>
  <item>
    <title>New npm supply-chain attack self-spreads to steal auth tokens</title>
    <link>https://www.bleepingcomputer.com/news/security/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens/</link>
    <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens/</guid>
    <description>New npm supply-chain attack self-spreads to steal auth tokens https://ift.tt/jx1785i</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 13:25:42 +0000</pubDate>
  </item>
  <item>
    <title>SSTI in Bug Bounty: Playing with Handlebars and Breaking Stuff</title>
    <link>https://medium.com/@ali.zamini/ssti-in-bug-bounty-program-the-time-i-played-with-handlebars-and-broke-stuff-7dc1f9834a3d</link>
    <guid isPermaLink="true">https://medium.com/@ali.zamini/ssti-in-bug-bounty-program-the-time-i-played-with-handlebars-and-broke-stuff-7dc1f9834a3d</guid>
    <description>SSTI in Bug Bounty: Playing with Handlebars and Breaking Stuff</description>
    <category>SSTI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:53:25 +0000</pubDate>
  </item>
  <item>
    <title>SSTI: Explanation, Discovery, Exploitation, and Prevention</title>
    <link>https://www.akto.io/blog/server-side-template-injection-explanation-discovery-exploitation-and-prevention</link>
    <guid isPermaLink="true">https://www.akto.io/blog/server-side-template-injection-explanation-discovery-exploitation-and-prevention</guid>
    <description>SSTI: Explanation, Discovery, Exploitation, and Prevention</description>
    <category>SSTI</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:53:24 +0000</pubDate>
  </item>
  <item>
    <title>SSTI: Breaking Out of Templates</title>
    <link>https://www.kayssel.com/newsletter/issue-32/</link>
    <guid isPermaLink="true">https://www.kayssel.com/newsletter/issue-32/</guid>
    <description>SSTI: Breaking Out of Templates</description>
    <category>SSTI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:53:23 +0000</pubDate>
  </item>
  <item>
    <title>Metasploit Module: Tactical RMM Jinja2 SSTI RCE (CVE-2025-69516)</title>
    <link>https://github.com/rapid7/metasploit-framework/pull/21017</link>
    <guid isPermaLink="true">https://github.com/rapid7/metasploit-framework/pull/21017</guid>
    <description>Metasploit Module: Tactical RMM Jinja2 SSTI RCE (CVE-2025-69516)</description>
    <category>SSTI</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:23 +0000</pubDate>
  </item>
  <item>
    <title>Grav CMS Twig SSTI Authenticated Sandbox Bypass RCE</title>
    <link>https://www.rapid7.com/db/modules/exploit/multi/http/grav_twig_ssti_sandbox_bypass_rce/</link>
    <guid isPermaLink="true">https://www.rapid7.com/db/modules/exploit/multi/http/grav_twig_ssti_sandbox_bypass_rce/</guid>
    <description>Grav CMS Twig SSTI Authenticated Sandbox Bypass RCE</description>
    <category>SSTI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:53:22 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-33154: Dynaconf RCE via Insecure Jinja Template Evaluation</title>
    <link>https://advisories.gitlab.com/pkg/pypi/dynaconf/CVE-2026-33154/</link>
    <guid isPermaLink="true">https://advisories.gitlab.com/pkg/pypi/dynaconf/CVE-2026-33154/</guid>
    <description>CVE-2026-33154: Dynaconf RCE via Insecure Jinja Template Evaluation</description>
    <category>SSTI</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:21 +0000</pubDate>
  </item>
  <item>
    <title>Grav CMS: Security Sandbox Bypass with SSTI</title>
    <link>https://github.com/getgrav/grav/security/advisories/GHSA-gjc5-8cfh-653x</link>
    <guid isPermaLink="true">https://github.com/getgrav/grav/security/advisories/GHSA-gjc5-8cfh-653x</guid>
    <description>Grav CMS: Security Sandbox Bypass with SSTI</description>
    <category>SSTI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:53:20 +0000</pubDate>
  </item>
  <item>
    <title>Grav CMS: RCE via SSTI through Twig Sandbox Bypass</title>
    <link>https://github.com/getgrav/grav/security/advisories/GHSA-662m-56v4-3r8f</link>
    <guid isPermaLink="true">https://github.com/getgrav/grav/security/advisories/GHSA-662m-56v4-3r8f</guid>
    <description>Grav CMS: RCE via SSTI through Twig Sandbox Bypass</description>
    <category>SSTI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:53:20 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-27641: Flask-Reuploaded Path Traversal Enabling SSTI RCE</title>
    <link>https://github.com/advisories/GHSA-65mp-fq8v-56jr</link>
    <guid isPermaLink="true">https://github.com/advisories/GHSA-65mp-fq8v-56jr</guid>
    <description>CVE-2026-27641: Flask-Reuploaded Path Traversal Enabling SSTI RCE</description>
    <category>SSTI</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:19 +0000</pubDate>
  </item>
  <item>
    <title>A Survey of the Overlooked Dangers of Template Engines (arXiv 2024)</title>
    <link>https://arxiv.org/html/2405.01118v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2405.01118v1</guid>
    <description>A Survey of the Overlooked Dangers of Template Engines (arXiv 2024)</description>
    <category>SSTI</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:53:18 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-32597: PyJWT Information Disclosure Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-32597/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-32597/</guid>
    <description>CVE-2026-32597: PyJWT Information Disclosure Vulnerability</description>
    <category>JWT</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:17 +0000</pubDate>
  </item>
  <item>
    <title>Authlib Critical JWT Forgery (CVE-2026-27962)</title>
    <link>https://www.thehackerwire.com/authlib-critical-jwt-forgery-cve-2026-27962/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/authlib-critical-jwt-forgery-cve-2026-27962/</guid>
    <description>Authlib Critical JWT Forgery (CVE-2026-27962)</description>
    <category>JWT</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:17 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-34950 fast-jwt: Incomplete Fix for CVE-2023-48223</title>
    <link>https://www.endorlabs.com/vulnerability/cve-2026-34950</link>
    <guid isPermaLink="true">https://www.endorlabs.com/vulnerability/cve-2026-34950</guid>
    <description>CVE-2026-34950 fast-jwt: Incomplete Fix for CVE-2023-48223</description>
    <category>JWT</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:15 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-22817: JWT Algorithm Confusion in Hono</title>
    <link>https://dev.to/cverports/cve-2026-22817-identity-theft-on-the-edge-exploiting-jwt-algorithm-confusion-in-hono-5an9</link>
    <guid isPermaLink="true">https://dev.to/cverports/cve-2026-22817-identity-theft-on-the-edge-exploiting-jwt-algorithm-confusion-in-hono-5an9</guid>
    <description>CVE-2026-22817: JWT Algorithm Confusion in Hono</description>
    <category>JWT</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:14 +0000</pubDate>
  </item>
  <item>
    <title>Proof of Concept for CVE-2026-29000 (pac4j-jwt)</title>
    <link>https://github.com/cipher1x1/CVE-2026-29000</link>
    <guid isPermaLink="true">https://github.com/cipher1x1/CVE-2026-29000</guid>
    <description>Proof of Concept for CVE-2026-29000 (pac4j-jwt)</description>
    <category>JWT</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:53:13 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-23993: JWT Authentication Bypass in HarbourJwt via Unknown alg</title>
    <link>https://pentesterlab.com/blog/cve-2026-23993-harbourjwt-unknown-alg-jwt-bypass</link>
    <guid isPermaLink="true">https://pentesterlab.com/blog/cve-2026-23993-harbourjwt-unknown-alg-jwt-bypass</guid>
    <description>CVE-2026-23993: JWT Authentication Bypass in HarbourJwt via Unknown alg</description>
    <category>JWT</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:12 +0000</pubDate>
  </item>
  <item>
    <title>draft-ietf-oauth-rfc8725bis: JSON Web Token Best Current Practices</title>
    <link>https://datatracker.ietf.org/doc/draft-ietf-oauth-rfc8725bis/</link>
    <guid isPermaLink="true">https://datatracker.ietf.org/doc/draft-ietf-oauth-rfc8725bis/</guid>
    <description>draft-ietf-oauth-rfc8725bis: JSON Web Token Best Current Practices</description>
    <category>JWT</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:53:12 +0000</pubDate>
  </item>
  <item>
    <title>OAuth2 Proxy Authentication Bypass via X-Forwarded-Uri (CVE-2026-40575)</title>
    <link>https://dailycve.com/oauth2-proxy-authentication-bypass-cve-2026-40575-critical/</link>
    <guid isPermaLink="true">https://dailycve.com/oauth2-proxy-authentication-bypass-cve-2026-40575-critical/</guid>
    <description>OAuth2 Proxy Authentication Bypass via X-Forwarded-Uri (CVE-2026-40575)</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:10 +0000</pubDate>
  </item>
  <item>
    <title>Keycloak SAML Disabled Client SSO Bypass (CVE-2026-3047)</title>
    <link>https://www.thehackerwire.com/keycloak-saml-disabled-client-sso-bypass/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/keycloak-saml-disabled-client-sso-bypass/</guid>
    <description>Keycloak SAML Disabled Client SSO Bypass (CVE-2026-3047)</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:09 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-2092: Keycloak Auth Bypass Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-2092/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-2092/</guid>
    <description>CVE-2026-2092: Keycloak Auth Bypass Vulnerability</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:08 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-1529: Bypassing Keycloak Org Security</title>
    <link>https://cvereports.com/reports/CVE-2026-1529</link>
    <guid isPermaLink="true">https://cvereports.com/reports/CVE-2026-1529</guid>
    <description>CVE-2026-1529: Bypassing Keycloak Org Security</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:08 +0000</pubDate>
  </item>
  <item>
    <title>OAUTHBEARER Bypass and Sensitive Logging Leaks Hit Apache Kafka</title>
    <link>https://securityonline.info/apache-kafka-jwt-authentication-bypass-logging-vulnerabilities-2026/</link>
    <guid isPermaLink="true">https://securityonline.info/apache-kafka-jwt-authentication-bypass-logging-vulnerabilities-2026/</guid>
    <description>OAUTHBEARER Bypass and Sensitive Logging Leaks Hit Apache Kafka</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:07 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-26788: Passkey Authentication Bypass in StrongKey FIDO Server</title>
    <link>https://www.securing.pl/en/cve-2025-26788-passkey-authentication-bypass-in-strongkey-fido-server/</link>
    <guid isPermaLink="true">https://www.securing.pl/en/cve-2025-26788-passkey-authentication-bypass-in-strongkey-fido-server/</guid>
    <description>CVE-2025-26788: Passkey Authentication Bypass in StrongKey FIDO Server</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:06 +0000</pubDate>
  </item>
  <item>
    <title>Analyzing the rise in device code phishing attacks in 2026</title>
    <link>https://pushsecurity.com/blog/device-code-phishing</link>
    <guid isPermaLink="true">https://pushsecurity.com/blog/device-code-phishing</guid>
    <description>Analyzing the rise in device code phishing attacks in 2026</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:05 +0000</pubDate>
  </item>
  <item>
    <title>SAML rough quarter: Five critical vulnerabilities in four months</title>
    <link>https://workos.com/blog/saml-vulnerabilities-2026</link>
    <guid isPermaLink="true">https://workos.com/blog/saml-vulnerabilities-2026</guid>
    <description>SAML rough quarter: Five critical vulnerabilities in four months</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:05 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2024-9956: Critical WebAuthentication Vulnerability in Chrome on Android</title>
    <link>https://www.offsec.com/blog/cve-2024-9956/</link>
    <guid isPermaLink="true">https://www.offsec.com/blog/cve-2024-9956/</guid>
    <description>CVE-2024-9956: Critical WebAuthentication Vulnerability in Chrome on Android</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:04 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-34457 Detail (OAuth2 Proxy) - NVD</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-34457</link>
    <guid isPermaLink="true">https://nvd.nist.gov/vuln/detail/CVE-2026-34457</guid>
    <description>CVE-2026-34457 Detail (OAuth2 Proxy) - NVD</description>
    <category>Authentication</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:03 +0000</pubDate>
  </item>
  <item>
    <title>picoCTF Super Serial Writeup: PHP Object Injection Explained Clearly</title>
    <link>https://medium.com/@laughterkings95/picoctf-super-serial-writeup-php-object-injection-explained-clearly-83201433389f</link>
    <guid isPermaLink="true">https://medium.com/@laughterkings95/picoctf-super-serial-writeup-php-object-injection-explained-clearly-83201433389f</guid>
    <description>picoCTF Super Serial Writeup: PHP Object Injection Explained Clearly</description>
    <category>Deserialization</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:53:02 +0000</pubDate>
  </item>
  <item>
    <title>Deep Dive into Fastjson Deserialization Vulnerabilities</title>
    <link>https://medium.com/@pa2sw0rd/deep-dive-into-fastjson-deserialization-vulnerabilities-from-principles-to-practical-defense-c3be134ec8a6</link>
    <guid isPermaLink="true">https://medium.com/@pa2sw0rd/deep-dive-into-fastjson-deserialization-vulnerabilities-from-principles-to-practical-defense-c3be134ec8a6</guid>
    <description>Deep Dive into Fastjson Deserialization Vulnerabilities</description>
    <category>Deserialization</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:53:02 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-24813 PoC: Apache Tomcat Java Deserialization</title>
    <link>https://github.com/yaleman/cve-2025-24813-poc</link>
    <guid isPermaLink="true">https://github.com/yaleman/cve-2025-24813-poc</guid>
    <description>CVE-2025-24813 PoC: Apache Tomcat Java Deserialization</description>
    <category>Deserialization</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:01 +0000</pubDate>
  </item>
  <item>
    <title>WSUS Deserialization Exploit in the Wild (CVE-2025-59287)</title>
    <link>https://research.eye.security/wsus-deserialization-exploit-in-the-wild-cve-2025-59287/</link>
    <guid isPermaLink="true">https://research.eye.security/wsus-deserialization-exploit-in-the-wild-cve-2025-59287/</guid>
    <description>WSUS Deserialization Exploit in the Wild (CVE-2025-59287)</description>
    <category>Deserialization</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:53:00 +0000</pubDate>
  </item>
  <item>
    <title>Precise and Effective Gadget Chain Mining through Deserialization-Guided Call Graph Construction (USENIX Security 2025)</title>
    <link>https://www.usenix.org/conference/usenixsecurity25/presentation/zhang-yiheng</link>
    <guid isPermaLink="true">https://www.usenix.org/conference/usenixsecurity25/presentation/zhang-yiheng</guid>
    <description>Precise and Effective Gadget Chain Mining through Deserialization-Guided Call Graph Construction (USENIX Security 2025)</description>
    <category>Deserialization</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:52:59 +0000</pubDate>
  </item>
  <item>
    <title>Gleipner: A Benchmark for Gadget Chain Detection in Java Deserialization Vulnerabilities</title>
    <link>https://dl.acm.org/doi/10.1145/3715711</link>
    <guid isPermaLink="true">https://dl.acm.org/doi/10.1145/3715711</guid>
    <description>Gleipner: A Benchmark for Gadget Chain Detection in Java Deserialization Vulnerabilities</description>
    <category>Deserialization</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:52:59 +0000</pubDate>
  </item>
  <item>
    <title>UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours</title>
    <link>https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html</guid>
    <description>UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours</description>
    <category>Secrets</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:58 +0000</pubDate>
  </item>
  <item>
    <title>The State of Non-Human Identity Security (CSA Survey Report)</title>
    <link>https://cloudsecurityalliance.org/artifacts/state-of-non-human-identity-security-survey-report</link>
    <guid isPermaLink="true">https://cloudsecurityalliance.org/artifacts/state-of-non-human-identity-security-survey-report</guid>
    <description>The State of Non-Human Identity Security (CSA Survey Report)</description>
    <category>Secrets</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:57 +0000</pubDate>
  </item>
  <item>
    <title>Secrets Management in 2026: Vault, AWS Secrets Manager, and Beyond</title>
    <link>https://www.javacodegeeks.com/2025/12/secrets-management-in-2026-vault-aws-secrets-manager-and-beyond-a-developers-guide.html</link>
    <guid isPermaLink="true">https://www.javacodegeeks.com/2025/12/secrets-management-in-2026-vault-aws-secrets-manager-and-beyond-a-developers-guide.html</guid>
    <description>Secrets Management in 2026: Vault, AWS Secrets Manager, and Beyond</description>
    <category>Secrets</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:56 +0000</pubDate>
  </item>
  <item>
    <title>GitHub Secret Scanning 2026: New Patterns, Push Protection</title>
    <link>https://www.buildmvpfast.com/blog/github-secret-scanning-pattern-updates-devops-2026</link>
    <guid isPermaLink="true">https://www.buildmvpfast.com/blog/github-secret-scanning-pattern-updates-devops-2026</guid>
    <description>GitHub Secret Scanning 2026: New Patterns, Push Protection</description>
    <category>Secrets</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:56 +0000</pubDate>
  </item>
  <item>
    <title>Top 10 Non-Human Identity Security Tools and Platforms for 2026</title>
    <link>https://blog.gitguardian.com/nhi-security-tools/</link>
    <guid isPermaLink="true">https://blog.gitguardian.com/nhi-security-tools/</guid>
    <description>Top 10 Non-Human Identity Security Tools and Platforms for 2026</description>
    <category>Secrets</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:55 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-5807: HashiCorp Vault DoS via Unauthenticated Root Token Generation</title>
    <link>https://advisories.gitlab.com/golang/github.com/hashicorp/vault/CVE-2026-5807/</link>
    <guid isPermaLink="true">https://advisories.gitlab.com/golang/github.com/hashicorp/vault/CVE-2026-5807/</guid>
    <description>CVE-2026-5807: HashiCorp Vault DoS via Unauthenticated Root Token Generation</description>
    <category>Secrets</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:54 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-3605: HashiCorp Vault KVv2 Metadata Policy Bypass (DoS)</title>
    <link>https://advisories.gitlab.com/golang/github.com/hashicorp/vault/CVE-2026-3605/</link>
    <guid isPermaLink="true">https://advisories.gitlab.com/golang/github.com/hashicorp/vault/CVE-2026-3605/</guid>
    <description>CVE-2026-3605: HashiCorp Vault KVv2 Metadata Policy Bypass (DoS)</description>
    <category>Secrets</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:54 +0000</pubDate>
  </item>
  <item>
    <title>AI Is Fueling Secrets Sprawl: GitGuardian Reports 81% Surge of AI-Service Leaks</title>
    <link>https://blog.gitguardian.com/the-state-of-secrets-sprawl-2026-pr/</link>
    <guid isPermaLink="true">https://blog.gitguardian.com/the-state-of-secrets-sprawl-2026-pr/</guid>
    <description>AI Is Fueling Secrets Sprawl: GitGuardian Reports 81% Surge of AI-Service Leaks</description>
    <category>Secrets</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:53 +0000</pubDate>
  </item>
  <item>
    <title>HCSEC-2026-08: Vault DoS via Unauthenticated Root Token Generation</title>
    <link>https://discuss.hashicorp.com/t/hcsec-2026-08-vault-vulnerable-to-denial-of-service-via-unauthenticated-root-token-generation-rekey-operations/77345</link>
    <guid isPermaLink="true">https://discuss.hashicorp.com/t/hcsec-2026-08-vault-vulnerable-to-denial-of-service-via-unauthenticated-root-token-generation-rekey-operations/77345</guid>
    <description>HCSEC-2026-08: Vault DoS via Unauthenticated Root Token Generation</description>
    <category>Secrets</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:52 +0000</pubDate>
  </item>
  <item>
    <title>HCSEC-2026-05: Vault KVv2 Metadata Policy Bypass DoS</title>
    <link>https://discuss.hashicorp.com/t/hcsec-2026-05-vault-kvv2-metadata-and-secret-deletion-policy-bypass-denial-of-service/77342</link>
    <guid isPermaLink="true">https://discuss.hashicorp.com/t/hcsec-2026-05-vault-kvv2-metadata-and-secret-deletion-policy-bypass-denial-of-service/77342</guid>
    <description>HCSEC-2026-05: Vault KVv2 Metadata Policy Bypass DoS</description>
    <category>Secrets</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:51 +0000</pubDate>
  </item>
  <item>
    <title>Axios npm Supply Chain Attack: 83M Downloads Hit</title>
    <link>https://strobes.co/blog/axios-npm-supply-chain-attack-compromised-rat-2026/</link>
    <guid isPermaLink="true">https://strobes.co/blog/axios-npm-supply-chain-attack-compromised-rat-2026/</guid>
    <description>Axios npm Supply Chain Attack: 83M Downloads Hit</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:51 +0000</pubDate>
  </item>
  <item>
    <title>Axios npm Hijack 2026: Everything You Need to Know</title>
    <link>https://socradar.io/blog/axios-npm-supply-chain-attack-2026-ciso-guide/</link>
    <guid isPermaLink="true">https://socradar.io/blog/axios-npm-supply-chain-attack-2026-ciso-guide/</guid>
    <description>Axios npm Hijack 2026: Everything You Need to Know</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:50 +0000</pubDate>
  </item>
  <item>
    <title>TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files</title>
    <link>https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html</guid>
    <description>TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:49 +0000</pubDate>
  </item>
  <item>
    <title>litellm: Credential Stealer Hidden in PyPI Wheel</title>
    <link>https://www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel</link>
    <guid isPermaLink="true">https://www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel</guid>
    <description>litellm: Credential Stealer Hidden in PyPI Wheel</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:49 +0000</pubDate>
  </item>
  <item>
    <title>What&#x27;s Coming to Our GitHub Actions 2026 Security Roadmap</title>
    <link>https://github.blog/news-insights/product-news/whats-coming-to-our-github-actions-2026-security-roadmap/</link>
    <guid isPermaLink="true">https://github.blog/news-insights/product-news/whats-coming-to-our-github-actions-2026-security-roadmap/</guid>
    <description>What&#x27;s Coming to Our GitHub Actions 2026 Security Roadmap</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:48 +0000</pubDate>
  </item>
  <item>
    <title>Shai-Hulud npm Supply Chain Attack: New Compromised Packages Detected</title>
    <link>https://jfrog.com/blog/shai-hulud-npm-supply-chain-attack-new-compromised-packages-detected/</link>
    <guid isPermaLink="true">https://jfrog.com/blog/shai-hulud-npm-supply-chain-attack-new-compromised-packages-detected/</guid>
    <description>Shai-Hulud npm Supply Chain Attack: New Compromised Packages Detected</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:47 +0000</pubDate>
  </item>
  <item>
    <title>LiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain Campaign</title>
    <link>https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/</link>
    <guid isPermaLink="true">https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/</guid>
    <description>LiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain Campaign</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:46 +0000</pubDate>
  </item>
  <item>
    <title>Keeping Your GitHub Actions Secure Part 1: Preventing Pwn Requests</title>
    <link>https://securitylab.github.com/resources/github-actions-preventing-pwn-requests/</link>
    <guid isPermaLink="true">https://securitylab.github.com/resources/github-actions-preventing-pwn-requests/</guid>
    <description>Keeping Your GitHub Actions Secure Part 1: Preventing Pwn Requests</description>
    <category>Supply Chain</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:45 +0000</pubDate>
  </item>
  <item>
    <title>GitHub Actions Security Pt 1: Attacks &amp; Defenses (Wiz)</title>
    <link>https://www.wiz.io/blog/github-actions-security-threat-model-and-defenses</link>
    <guid isPermaLink="true">https://www.wiz.io/blog/github-actions-security-threat-model-and-defenses</guid>
    <description>GitHub Actions Security Pt 1: Attacks &amp; Defenses (Wiz)</description>
    <category>Supply Chain</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:44 +0000</pubDate>
  </item>
  <item>
    <title>Root/Jailbreak Detection and SSL Pinning in KMM</title>
    <link>https://www.appknox.com/blog/kmm-security-root-jailbreak-detection-ssl-pinning</link>
    <guid isPermaLink="true">https://www.appknox.com/blog/kmm-security-root-jailbreak-detection-ssl-pinning</guid>
    <description>Root/Jailbreak Detection and SSL Pinning in KMM</description>
    <category>Mobile</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:43 +0000</pubDate>
  </item>
  <item>
    <title>Reversing Android Apps: Bypassing Detection Like a Pro</title>
    <link>https://www.kayssel.com/newsletter/issue-12/</link>
    <guid isPermaLink="true">https://www.kayssel.com/newsletter/issue-12/</guid>
    <description>Reversing Android Apps: Bypassing Detection Like a Pro</description>
    <category>Mobile</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:43 +0000</pubDate>
  </item>
  <item>
    <title>Reverse engineering and modifying Android apps with JADX and Frida</title>
    <link>https://httptoolkit.com/blog/android-reverse-engineering/</link>
    <guid isPermaLink="true">https://httptoolkit.com/blog/android-reverse-engineering/</guid>
    <description>Reverse engineering and modifying Android apps with JADX and Frida</description>
    <category>Mobile</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:42 +0000</pubDate>
  </item>
  <item>
    <title>Common Vulnerabilities and Exposures Examples in Mobile Apps</title>
    <link>https://www.corellium.com/blog/mobile-app-security-cves-ios-testing</link>
    <guid isPermaLink="true">https://www.corellium.com/blog/mobile-app-security-cves-ios-testing</guid>
    <description>Common Vulnerabilities and Exposures Examples in Mobile Apps</description>
    <category>Mobile</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:41 +0000</pubDate>
  </item>
  <item>
    <title>Bypassing iOS Frida Detection with LLDB and Frida</title>
    <link>https://tonygo.tech/blog/2025/8ksec-ios-ctf-writeup</link>
    <guid isPermaLink="true">https://tonygo.tech/blog/2025/8ksec-ios-ctf-writeup</guid>
    <description>Bypassing iOS Frida Detection with LLDB and Frida</description>
    <category>Mobile</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:40 +0000</pubDate>
  </item>
  <item>
    <title>frida-interception-and-unpinning: Scripts to MitM all HTTPS traffic</title>
    <link>https://github.com/httptoolkit/frida-interception-and-unpinning</link>
    <guid isPermaLink="true">https://github.com/httptoolkit/frida-interception-and-unpinning</guid>
    <description>frida-interception-and-unpinning: Scripts to MitM all HTTPS traffic</description>
    <category>Mobile</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:40 +0000</pubDate>
  </item>
  <item>
    <title>Android Reports and Resources</title>
    <link>https://github.com/B3nac/Android-Reports-and-Resources</link>
    <guid isPermaLink="true">https://github.com/B3nac/Android-Reports-and-Resources</guid>
    <description>Android Reports and Resources</description>
    <category>Mobile</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:39 +0000</pubDate>
  </item>
  <item>
    <title>iOS Security Testing - OWASP MASTG</title>
    <link>https://mas.owasp.org/MASTG/0x06b-iOS-Security-Testing/</link>
    <guid isPermaLink="true">https://mas.owasp.org/MASTG/0x06b-iOS-Security-Testing/</guid>
    <description>iOS Security Testing - OWASP MASTG</description>
    <category>Mobile</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:38 +0000</pubDate>
  </item>
  <item>
    <title>Android Security Bulletin - March 2026</title>
    <link>https://source.android.com/docs/security/bulletin/2026/2026-03-01</link>
    <guid isPermaLink="true">https://source.android.com/docs/security/bulletin/2026/2026-03-01</guid>
    <description>Android Security Bulletin - March 2026</description>
    <category>Mobile</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:37 +0000</pubDate>
  </item>
  <item>
    <title>Android Security Bulletin - April 2026</title>
    <link>https://source.android.com/docs/security/bulletin/2026/2026-04-01</link>
    <guid isPermaLink="true">https://source.android.com/docs/security/bulletin/2026/2026-04-01</guid>
    <description>Android Security Bulletin - April 2026</description>
    <category>Mobile</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:37 +0000</pubDate>
  </item>
  <item>
    <title>A Deep Dive on the Most Critical API Vulnerability: BOLA</title>
    <link>https://inonst.medium.com/a-deep-dive-on-the-most-critical-api-vulnerability-bola-1342224ec3f2</link>
    <guid isPermaLink="true">https://inonst.medium.com/a-deep-dive-on-the-most-critical-api-vulnerability-bola-1342224ec3f2</guid>
    <description>A Deep Dive on the Most Critical API Vulnerability: BOLA</description>
    <category>API Security</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:36 +0000</pubDate>
  </item>
  <item>
    <title>What Is Broken Object Property Level Authorization?</title>
    <link>https://www.paloaltonetworks.com/cyberpedia/broken-object-property-level-authorization</link>
    <guid isPermaLink="true">https://www.paloaltonetworks.com/cyberpedia/broken-object-property-level-authorization</guid>
    <description>What Is Broken Object Property Level Authorization?</description>
    <category>API Security</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:35 +0000</pubDate>
  </item>
  <item>
    <title>What Is Broken Object Level Authorization?</title>
    <link>https://www.paloaltonetworks.com/cyberpedia/broken-object-level-authentication-api1</link>
    <guid isPermaLink="true">https://www.paloaltonetworks.com/cyberpedia/broken-object-level-authentication-api1</guid>
    <description>What Is Broken Object Level Authorization?</description>
    <category>API Security</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:35 +0000</pubDate>
  </item>
  <item>
    <title>This Is How I Hacked an API Using Mass Assignment Vulnerability</title>
    <link>https://spyboy.blog/2026/01/14/this-is-how-i-hacked-an-api-using-mass-assignment-vulnerability/</link>
    <guid isPermaLink="true">https://spyboy.blog/2026/01/14/this-is-how-i-hacked-an-api-using-mass-assignment-vulnerability/</guid>
    <description>This Is How I Hacked an API Using Mass Assignment Vulnerability</description>
    <category>API Security</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:34 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-34839: CORS Vulnerability in Glances REST API</title>
    <link>https://www.getastra.com/blog/vulnerability/cve-2026-34839/</link>
    <guid isPermaLink="true">https://www.getastra.com/blog/vulnerability/cve-2026-34839/</guid>
    <description>CVE-2026-34839: CORS Vulnerability in Glances REST API</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:33 +0000</pubDate>
  </item>
  <item>
    <title>API ThreatStats Report 2026</title>
    <link>https://www.wallarm.com/reports/2026-wallarm-api-threatstats-report</link>
    <guid isPermaLink="true">https://www.wallarm.com/reports/2026-wallarm-api-threatstats-report</guid>
    <description>API ThreatStats Report 2026</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:32 +0000</pubDate>
  </item>
  <item>
    <title>VAmPI: Vulnerable REST API with OWASP Top 10 Vulnerabilities</title>
    <link>https://github.com/erev0s/VAmPI</link>
    <guid isPermaLink="true">https://github.com/erev0s/VAmPI</guid>
    <description>VAmPI: Vulnerable REST API with OWASP Top 10 Vulnerabilities</description>
    <category>API Security</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:32 +0000</pubDate>
  </item>
  <item>
    <title>API4:2023 Unrestricted Resource Consumption</title>
    <link>https://salt.security/blog/api4-2023-unrestricted-resource-consumption</link>
    <guid isPermaLink="true">https://salt.security/blog/api4-2023-unrestricted-resource-consumption</guid>
    <description>API4:2023 Unrestricted Resource Consumption</description>
    <category>API Security</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:31 +0000</pubDate>
  </item>
  <item>
    <title>1H 2026 State of AI and API Security Report (Salt)</title>
    <link>https://salt.security/blog/the-era-of-agentic-security-is-here-key-findings-from-the-1h-2026-state-of-ai-and-api-security-report</link>
    <guid isPermaLink="true">https://salt.security/blog/the-era-of-agentic-security-is-here-key-findings-from-the-1h-2026-state-of-ai-and-api-security-report</guid>
    <description>1H 2026 State of AI and API Security Report (Salt)</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:30 +0000</pubDate>
  </item>
  <item>
    <title>PortSwigger Lab: Exploiting a Mass Assignment Vulnerability</title>
    <link>https://portswigger.net/web-security/api-testing/lab-exploiting-mass-assignment-vulnerability</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/api-testing/lab-exploiting-mass-assignment-vulnerability</guid>
    <description>PortSwigger Lab: Exploiting a Mass Assignment Vulnerability</description>
    <category>API Security</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:30 +0000</pubDate>
  </item>
  <item>
    <title>Rights Management Approaches: ACL, RBAC, ABAC, ReBAC</title>
    <link>https://system-design.space/en/chapter/access-control-models-acl-rbac-abac-rebac/</link>
    <guid isPermaLink="true">https://system-design.space/en/chapter/access-control-models-acl-rbac-abac-rebac/</guid>
    <description>Rights Management Approaches: ACL, RBAC, ABAC, ReBAC</description>
    <category>AuthZ</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:29 +0000</pubDate>
  </item>
  <item>
    <title>OPA, Cedar, OpenFGA: Why Are Policy Languages Trending Right Now?</title>
    <link>https://dev.to/permit_io/opa-cedar-openfga-why-are-policy-languages-trending-right-now-g7e</link>
    <guid isPermaLink="true">https://dev.to/permit_io/opa-cedar-openfga-why-are-policy-languages-trending-right-now-g7e</guid>
    <description>OPA, Cedar, OpenFGA: Why Are Policy Languages Trending Right Now?</description>
    <category>AuthZ</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:28 +0000</pubDate>
  </item>
  <item>
    <title>OPA vs OpenFGA: A Technical Comparison of Policy Engines</title>
    <link>https://madappgang.com/blog/opa-vs-openfga-a-comprehensive-technical-compariso/</link>
    <guid isPermaLink="true">https://madappgang.com/blog/opa-vs-openfga-a-comprehensive-technical-compariso/</guid>
    <description>OPA vs OpenFGA: A Technical Comparison of Policy Engines</description>
    <category>AuthZ</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:27 +0000</pubDate>
  </item>
  <item>
    <title>Implementing Google Zanzibar: A Demonstration of Its Basics</title>
    <link>https://permify.co/post/exploring-google-zanzibar-a-demonstration-of-its-basics</link>
    <guid isPermaLink="true">https://permify.co/post/exploring-google-zanzibar-a-demonstration-of-its-basics</guid>
    <description>Implementing Google Zanzibar: A Demonstration of Its Basics</description>
    <category>AuthZ</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:27 +0000</pubDate>
  </item>
  <item>
    <title>How to Protect Your API with OpenFGA: ReBAC Concepts to Practical Usage</title>
    <link>https://getlarge.eu/blog/how-to-protect-your-api-with-openfga/</link>
    <guid isPermaLink="true">https://getlarge.eu/blog/how-to-protect-your-api-with-openfga/</guid>
    <description>How to Protect Your API with OpenFGA: ReBAC Concepts to Practical Usage</description>
    <category>AuthZ</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:26 +0000</pubDate>
  </item>
  <item>
    <title>How Google Drive Models Authorization: A Look into Zanzibar</title>
    <link>https://www.aserto.com/blog/google-zanzibar-drive-rebac-authorization-model</link>
    <guid isPermaLink="true">https://www.aserto.com/blog/google-zanzibar-drive-rebac-authorization-model</guid>
    <description>How Google Drive Models Authorization: A Look into Zanzibar</description>
    <category>AuthZ</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:25 +0000</pubDate>
  </item>
  <item>
    <title>Common Bug Bounty Vulnerabilities: A Technical Deep Dive for Hunters in 2026</title>
    <link>https://www.redfoxsec.com/blog/common-bug-bounty-vulnerabilities-a-technical-deep-dive-for-hunters-in-2026</link>
    <guid isPermaLink="true">https://www.redfoxsec.com/blog/common-bug-bounty-vulnerabilities-a-technical-deep-dive-for-hunters-in-2026</guid>
    <description>Common Bug Bounty Vulnerabilities: A Technical Deep Dive for Hunters in 2026</description>
    <category>AuthZ</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:24 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-32877 - Red Hat Security Advisory</title>
    <link>https://access.redhat.com/security/cve/cve-2026-32877</link>
    <guid isPermaLink="true">https://access.redhat.com/security/cve/cve-2026-32877</guid>
    <description>CVE-2026-32877 - Red Hat Security Advisory</description>
    <category>AuthZ</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:24 +0000</pubDate>
  </item>
  <item>
    <title>CVE 2026: When Identity Breaks and Legacy Code Bites Back</title>
    <link>https://www.penligent.ai/hackinglabs/cve-2026-the-vulnerability-landscape-when-identity-breaks-and-legacy-code-bites-back/</link>
    <guid isPermaLink="true">https://www.penligent.ai/hackinglabs/cve-2026-the-vulnerability-landscape-when-identity-breaks-and-legacy-code-bites-back/</guid>
    <description>CVE 2026: When Identity Breaks and Legacy Code Bites Back</description>
    <category>AuthZ</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:23 +0000</pubDate>
  </item>
  <item>
    <title>What is Google Zanzibar?</title>
    <link>https://workos.com/guide/google-zanzibar</link>
    <guid isPermaLink="true">https://workos.com/guide/google-zanzibar</guid>
    <description>What is Google Zanzibar?</description>
    <category>AuthZ</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:22 +0000</pubDate>
  </item>
  <item>
    <title>You&#x27;re Simulating the Wrong Attacker: Who Matters in AI Red Teaming</title>
    <link>https://adversa.ai/blog/agentic-ai-red-teaming-p3/</link>
    <guid isPermaLink="true">https://adversa.ai/blog/agentic-ai-red-teaming-p3/</guid>
    <description>You&#x27;re Simulating the Wrong Attacker: Who Matters in AI Red Teaming</description>
    <category>AI</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:21 +0000</pubDate>
  </item>
  <item>
    <title>DeepTeam: Open-Source Framework to Red Team LLMs and LLM Systems</title>
    <link>https://github.com/confident-ai/deepteam</link>
    <guid isPermaLink="true">https://github.com/confident-ai/deepteam</guid>
    <description>DeepTeam: Open-Source Framework to Red Team LLMs and LLM Systems</description>
    <category>AI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:20 +0000</pubDate>
  </item>
  <item>
    <title>Claude Jailbreaking in 2026: What Repello&#x27;s Red Teaming Data Shows</title>
    <link>https://repello.ai/blog/claude-jailbreak</link>
    <guid isPermaLink="true">https://repello.ai/blog/claude-jailbreak</guid>
    <description>Claude Jailbreaking in 2026: What Repello&#x27;s Red Teaming Data Shows</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:52:19 +0000</pubDate>
  </item>
  <item>
    <title>AI-Infra-Guard: Full-Stack AI Red Teaming Platform</title>
    <link>https://github.com/Tencent/AI-Infra-Guard</link>
    <guid isPermaLink="true">https://github.com/Tencent/AI-Infra-Guard</guid>
    <description>AI-Infra-Guard: Full-Stack AI Red Teaming Platform</description>
    <category>AI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:19 +0000</pubDate>
  </item>
  <item>
    <title>AI Red Teaming Playground Labs (Microsoft)</title>
    <link>https://github.com/microsoft/AI-Red-Teaming-Playground-Labs</link>
    <guid isPermaLink="true">https://github.com/microsoft/AI-Red-Teaming-Playground-Labs</guid>
    <description>AI Red Teaming Playground Labs (Microsoft)</description>
    <category>AI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:18 +0000</pubDate>
  </item>
  <item>
    <title>HackerOne: LLM01: Invisible Prompt Injection</title>
    <link>https://hackerone.com/reports/2372363</link>
    <guid isPermaLink="true">https://hackerone.com/reports/2372363</guid>
    <description>Program: HackerOne
Severity: medium
Weakness: LLM01: Prompt Injection

## Description

Hey team,
Hai is vulnerable to invisible prompt injection via Unicode tag characters. 

## Reproduction steps
1. ...</description>
    <category>AI</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:17 +0000</pubDate>
  </item>
  <item>
    <title>When AI Meets the Web: Prompt Injection Risks in Third-Party AI Chatbot Plugins</title>
    <link>https://arxiv.org/html/2511.05797v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2511.05797v1</guid>
    <description>When AI Meets the Web: Prompt Injection Risks in Third-Party AI Chatbot Plugins</description>
    <category>AI</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:16 +0000</pubDate>
  </item>
  <item>
    <title>Prompt Injection Attacks on Agentic Coding Assistants: A Systematic Analysis</title>
    <link>https://arxiv.org/html/2601.17548v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2601.17548v1</guid>
    <description>Prompt Injection Attacks on Agentic Coding Assistants: A Systematic Analysis</description>
    <category>AI</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:52:16 +0000</pubDate>
  </item>
  <item>
    <title>Prompt Injection 2.0: Hybrid AI Threats</title>
    <link>https://arxiv.org/html/2507.13169v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2507.13169v1</guid>
    <description>Prompt Injection 2.0: Hybrid AI Threats</description>
    <category>AI</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:52:15 +0000</pubDate>
  </item>
  <item>
    <title>Architecting Secure AI Agents: System-Level Defenses Against Indirect Prompt Injection</title>
    <link>https://arxiv.org/abs/2603.30016</link>
    <guid isPermaLink="true">https://arxiv.org/abs/2603.30016</guid>
    <description>Architecting Secure AI Agents: System-Level Defenses Against Indirect Prompt Injection</description>
    <category>AI</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:52:14 +0000</pubDate>
  </item>
  <item>
    <title>Jazzer: Coverage-guided, in-process fuzzing for the JVM</title>
    <link>https://github.com/CodeIntelligenceTesting/jazzer</link>
    <guid isPermaLink="true">https://github.com/CodeIntelligenceTesting/jazzer</guid>
    <description>Jazzer: Coverage-guided, in-process fuzzing for the JVM</description>
    <category>Fuzzing</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:14 +0000</pubDate>
  </item>
  <item>
    <title>Fuzzing 100+ open source projects with OSS-Fuzz - lessons learned</title>
    <link>https://adalogics.com/blog/fuzzing-100-open-source-projects-with-oss-fuzz</link>
    <guid isPermaLink="true">https://adalogics.com/blog/fuzzing-100-open-source-projects-with-oss-fuzz</guid>
    <description>Fuzzing 100+ open source projects with OSS-Fuzz - lessons learned</description>
    <category>Fuzzing</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:13 +0000</pubDate>
  </item>
  <item>
    <title>Large Language Model guided Protocol Fuzzing (NDSS)</title>
    <link>https://www.ndss-symposium.org/ndss-paper/large-language-model-guided-protocol-fuzzing/</link>
    <guid isPermaLink="true">https://www.ndss-symposium.org/ndss-paper/large-language-model-guided-protocol-fuzzing/</guid>
    <description>Large Language Model guided Protocol Fuzzing (NDSS)</description>
    <category>Fuzzing</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:52:12 +0000</pubDate>
  </item>
  <item>
    <title>Detect Go&#x27;s silent arithmetic bugs with go-panikint</title>
    <link>https://blog.trailofbits.com/2025/12/31/detect-gos-silent-arithmetic-bugs-with-go-panikint/</link>
    <guid isPermaLink="true">https://blog.trailofbits.com/2025/12/31/detect-gos-silent-arithmetic-bugs-with-go-panikint/</guid>
    <description>Detect Go&#x27;s silent arithmetic bugs with go-panikint</description>
    <category>Fuzzing</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:11 +0000</pubDate>
  </item>
  <item>
    <title>Denial of Fuzzing: Rust in the Windows kernel</title>
    <link>https://research.checkpoint.com/2025/denial-of-fuzzing-rust-in-the-windows-kernel/</link>
    <guid isPermaLink="true">https://research.checkpoint.com/2025/denial-of-fuzzing-rust-in-the-windows-kernel/</guid>
    <description>Denial of Fuzzing: Rust in the Windows kernel</description>
    <category>Fuzzing</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:11 +0000</pubDate>
  </item>
  <item>
    <title>Bringing Fuzz Testing to Kotlin with kotlinx.fuzz</title>
    <link>https://blog.jetbrains.com/research/2025/04/kotlinxfuzz-kotlin-fuzzing/</link>
    <guid isPermaLink="true">https://blog.jetbrains.com/research/2025/04/kotlinxfuzz-kotlin-fuzzing/</guid>
    <description>Bringing Fuzz Testing to Kotlin with kotlinx.fuzz</description>
    <category>Fuzzing</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:09 +0000</pubDate>
  </item>
  <item>
    <title>Advanced binary fuzzing using AFL++-QEMU and libprotobuf</title>
    <link>https://airbus-seclab.github.io/AFLplusplus-blogpost/</link>
    <guid isPermaLink="true">https://airbus-seclab.github.io/AFLplusplus-blogpost/</guid>
    <description>Advanced binary fuzzing using AFL++-QEMU and libprotobuf</description>
    <category>Fuzzing</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:52:08 +0000</pubDate>
  </item>
  <item>
    <title>deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses</title>
    <link>https://arxiv.org/html/2506.15648v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2506.15648v1</guid>
    <description>deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses</description>
    <category>Fuzzing</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:52:07 +0000</pubDate>
  </item>
  <item>
    <title>Fixing Security Vulnerabilities with AI in OSS-Fuzz</title>
    <link>https://arxiv.org/html/2411.03346v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2411.03346v1</guid>
    <description>Fixing Security Vulnerabilities with AI in OSS-Fuzz</description>
    <category>Fuzzing</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:07 +0000</pubDate>
  </item>
  <item>
    <title>A Survey of Network Protocol Fuzzing: Model, Techniques and Directions</title>
    <link>https://arxiv.org/html/2402.17394v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2402.17394v1</guid>
    <description>A Survey of Network Protocol Fuzzing: Model, Techniques and Directions</description>
    <category>Fuzzing</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:06 +0000</pubDate>
  </item>
  <item>
    <title>ars0n-framework-v2: Bug Bounty Hunting Framework</title>
    <link>https://github.com/R-s0n/ars0n-framework-v2</link>
    <guid isPermaLink="true">https://github.com/R-s0n/ars0n-framework-v2</guid>
    <description>ars0n-framework-v2: Bug Bounty Hunting Framework</description>
    <category>Recon</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:05 +0000</pubDate>
  </item>
  <item>
    <title>Uncover Hidden Assets with Bug Bounty Recon: Fuzzing and JS Analysis</title>
    <link>https://www.yeswehack.com/learn-bug-bounty/discover-map-hidden-endpoints-parameters</link>
    <guid isPermaLink="true">https://www.yeswehack.com/learn-bug-bounty/discover-map-hidden-endpoints-parameters</guid>
    <description>Uncover Hidden Assets with Bug Bounty Recon: Fuzzing and JS Analysis</description>
    <category>Recon</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:04 +0000</pubDate>
  </item>
  <item>
    <title>Subdomain Takeover: Proof Creation for Bug Bounties</title>
    <link>https://0xpatrik.com/takeover-proofs/</link>
    <guid isPermaLink="true">https://0xpatrik.com/takeover-proofs/</guid>
    <description>Subdomain Takeover: Proof Creation for Bug Bounties</description>
    <category>Recon</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:04 +0000</pubDate>
  </item>
  <item>
    <title>Shodan and Censys for beginners: How to find more vulnerabilities</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/complete-guide-to-finding-more-vulnerabilities-with-shodan-and-censys</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/complete-guide-to-finding-more-vulnerabilities-with-shodan-and-censys</guid>
    <description>Shodan and Censys for beginners: How to find more vulnerabilities</description>
    <category>Recon</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:03 +0000</pubDate>
  </item>
  <item>
    <title>Hunting down subdomain takeover vulnerabilities</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/hunting-down-subdomain-takeover-vulnerabilities</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/hunting-down-subdomain-takeover-vulnerabilities</guid>
    <description>Hunting down subdomain takeover vulnerabilities</description>
    <category>Recon</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:02 +0000</pubDate>
  </item>
  <item>
    <title>FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/hacker-tools-ffuf-fuzz-faster-u-fool-2</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/hacker-tools-ffuf-fuzz-faster-u-fool-2</guid>
    <description>FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters</description>
    <category>Recon</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:52:02 +0000</pubDate>
  </item>
  <item>
    <title>Open Source Intelligence Gathering: Techniques, Automation, and Visualization</title>
    <link>https://posts.specterops.io/gathering-open-source-intelligence-bee58de48e05</link>
    <guid isPermaLink="true">https://posts.specterops.io/gathering-open-source-intelligence-bee58de48e05</guid>
    <description>Open Source Intelligence Gathering: Techniques, Automation, and Visualization</description>
    <category>Recon</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:01 +0000</pubDate>
  </item>
  <item>
    <title>OWASP Test for Subdomain Takeover</title>
    <link>https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/10-Test_for_Subdomain_Takeover</link>
    <guid isPermaLink="true">https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/10-Test_for_Subdomain_Takeover</guid>
    <description>OWASP Test for Subdomain Takeover</description>
    <category>Recon</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:52:00 +0000</pubDate>
  </item>
  <item>
    <title>Maximizing Security Outcomes: The Role of ASM in Bug Bounty Programs</title>
    <link>https://www.assetnote.io/resources/blog/maximizing-security-outcomes-the-role-of-asm-in-bug-bounty-programs</link>
    <guid isPermaLink="true">https://www.assetnote.io/resources/blog/maximizing-security-outcomes-the-role-of-asm-in-bug-bounty-programs</guid>
    <description>Maximizing Security Outcomes: The Role of ASM in Bug Bounty Programs</description>
    <category>Recon</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:59 +0000</pubDate>
  </item>
  <item>
    <title>Building a Fast One-Shot Recon Script for Bug Bounty</title>
    <link>https://blog.projectdiscovery.io/building-one-shot-recon</link>
    <guid isPermaLink="true">https://blog.projectdiscovery.io/building-one-shot-recon</guid>
    <description>Building a Fast One-Shot Recon Script for Bug Bounty</description>
    <category>Recon</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:59 +0000</pubDate>
  </item>
  <item>
    <title>DEF CON 33 Talks - YouTube Playlist</title>
    <link>https://www.youtube.com/playlist?list=PL9fPq3eQfaaBB9HANwjaTlKFuVhRxkdz2</link>
    <guid isPermaLink="true">https://www.youtube.com/playlist?list=PL9fPq3eQfaaBB9HANwjaTlKFuVhRxkdz2</guid>
    <description>DEF CON 33 Talks - YouTube Playlist</description>
    <category>Talks</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:58 +0000</pubDate>
  </item>
  <item>
    <title>DEF CON 33 Call Index</title>
    <link>https://defcon.org/html/defcon-33/dc-33-cfi.html</link>
    <guid isPermaLink="true">https://defcon.org/html/defcon-33/dc-33-cfi.html</guid>
    <description>DEF CON 33 Call Index</description>
    <category>Talks</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:57 +0000</pubDate>
  </item>
  <item>
    <title>Black Hat USA 2025 Briefings Schedule</title>
    <link>https://blackhat.com/us-25/briefings/schedule/</link>
    <guid isPermaLink="true">https://blackhat.com/us-25/briefings/schedule/</guid>
    <description>Black Hat USA 2025 Briefings Schedule</description>
    <category>Talks</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:56 +0000</pubDate>
  </item>
  <item>
    <title>Black Hat USA 2025 - YouTube Playlist</title>
    <link>https://www.youtube.com/playlist?list=PLH15HpR5qRsXtV3t9TlkRZBmIfcIC6THE</link>
    <guid isPermaLink="true">https://www.youtube.com/playlist?list=PLH15HpR5qRsXtV3t9TlkRZBmIfcIC6THE</guid>
    <description>Black Hat USA 2025 - YouTube Playlist</description>
    <category>Talks</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:56 +0000</pubDate>
  </item>
  <item>
    <title>Black Hat Official YouTube Channel</title>
    <link>https://www.youtube.com/@BlackHatOfficialYT</link>
    <guid isPermaLink="true">https://www.youtube.com/@BlackHatOfficialYT</guid>
    <description>Black Hat Official YouTube Channel</description>
    <category>Talks</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:55 +0000</pubDate>
  </item>
  <item>
    <title>DEF CON 33 AppSec Village</title>
    <link>https://www.appsecvillage.com/events/dc-2025</link>
    <guid isPermaLink="true">https://www.appsecvillage.com/events/dc-2025</guid>
    <description>DEF CON 33 AppSec Village</description>
    <category>Talks</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:54 +0000</pubDate>
  </item>
  <item>
    <title>DEF CON 33 Aerospace Village Talk Schedule</title>
    <link>https://www.aerospacevillage.org/def-con-33/def-con-33-talk-schedule</link>
    <guid isPermaLink="true">https://www.aerospacevillage.org/def-con-33/def-con-33-talk-schedule</guid>
    <description>DEF CON 33 Aerospace Village Talk Schedule</description>
    <category>Talks</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:53 +0000</pubDate>
  </item>
  <item>
    <title>About NDC Security 2026</title>
    <link>https://ndcsecurity.com/about</link>
    <guid isPermaLink="true">https://ndcsecurity.com/about</guid>
    <description>About NDC Security 2026</description>
    <category>Talks</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:52 +0000</pubDate>
  </item>
  <item>
    <title>The Unofficial HackerOne Disclosure Timeline</title>
    <link>http://h1.nobbd.de/</link>
    <guid isPermaLink="true">http://h1.nobbd.de/</guid>
    <description>The Unofficial HackerOne Disclosure Timeline</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:50 +0000</pubDate>
  </item>
  <item>
    <title>Publicly Disclosed HackerOne Bug Bounty Findings</title>
    <link>https://www.bugbountyhunter.com/disclosed/</link>
    <guid isPermaLink="true">https://www.bugbountyhunter.com/disclosed/</guid>
    <description>Publicly Disclosed HackerOne Bug Bounty Findings</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:50 +0000</pubDate>
  </item>
  <item>
    <title>GraphQL - PortSwigger Lab Writeup</title>
    <link>https://py-us3r.github.io/burp-writeup-graphql/</link>
    <guid isPermaLink="true">https://py-us3r.github.io/burp-writeup-graphql/</guid>
    <description>GraphQL - PortSwigger Lab Writeup</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:49 +0000</pubDate>
  </item>
  <item>
    <title>BugBoard: Searchable Bug Bounty Writeups</title>
    <link>https://bugboard.rsecloud.com/bugbounty_writeups</link>
    <guid isPermaLink="true">https://bugboard.rsecloud.com/bugbounty_writeups</guid>
    <description>BugBoard: Searchable Bug Bounty Writeups</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:48 +0000</pubDate>
  </item>
  <item>
    <title>AI Vulnerability Deep Dive: Prompt Injection (Bugcrowd)</title>
    <link>https://www.bugcrowd.com/blog/ai-vulnerability-deep-dive-prompt-injection/</link>
    <guid isPermaLink="true">https://www.bugcrowd.com/blog/ai-vulnerability-deep-dive-prompt-injection/</guid>
    <description>AI Vulnerability Deep Dive: Prompt Injection (Bugcrowd)</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:47 +0000</pubDate>
  </item>
  <item>
    <title>A Guide to the Hidden Threat of Prompt Injection (Bugcrowd)</title>
    <link>https://www.bugcrowd.com/blog/a-guide-to-the-hidden-threat-of-prompt-injection/</link>
    <guid isPermaLink="true">https://www.bugcrowd.com/blog/a-guide-to-the-hidden-threat-of-prompt-injection/</guid>
    <description>A Guide to the Hidden Threat of Prompt Injection (Bugcrowd)</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:47 +0000</pubDate>
  </item>
  <item>
    <title>Writeups for Hack The Box Bug Bounty CTF 2025</title>
    <link>https://github.com/hackthebox/bug-bounty-ctf</link>
    <guid isPermaLink="true">https://github.com/hackthebox/bug-bounty-ctf</guid>
    <description>Writeups for Hack The Box Bug Bounty CTF 2025</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:46 +0000</pubDate>
  </item>
  <item>
    <title>Bug-Bounty-Methodology: JWT and Other Vulnerability Classes</title>
    <link>https://github.com/tuhin1729/Bug-Bounty-Methodology</link>
    <guid isPermaLink="true">https://github.com/tuhin1729/Bug-Bounty-Methodology</guid>
    <description>Bug-Bounty-Methodology: JWT and Other Vulnerability Classes</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:45 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Writeups: Available Programs and Writeups</title>
    <link>https://github.com/kh4sh3i/bug-bounty-writeups</link>
    <guid isPermaLink="true">https://github.com/kh4sh3i/bug-bounty-writeups</guid>
    <description>Bug Bounty Writeups: Available Programs and Writeups</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:44 +0000</pubDate>
  </item>
  <item>
    <title>Awesome Google VRP Writeups</title>
    <link>https://github.com/xdavidhu/awesome-google-vrp-writeups</link>
    <guid isPermaLink="true">https://github.com/xdavidhu/awesome-google-vrp-writeups</guid>
    <description>Awesome Google VRP Writeups</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:44 +0000</pubDate>
  </item>
  <item>
    <title>Critical SGLang Flaw (CVE-2026-5760) Enables RCE via Malicious AI Models</title>
    <link>https://www.cxodigitalpulse.com/critical-sglang-flaw-cve-2026-5760-enables-remote-code-execution-via-malicious-ai-models/</link>
    <guid isPermaLink="true">https://www.cxodigitalpulse.com/critical-sglang-flaw-cve-2026-5760-enables-remote-code-execution-via-malicious-ai-models/</guid>
    <description>Critical SGLang Flaw (CVE-2026-5760) Enables RCE via Malicious AI Models</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:43 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-68454: Craft CMS Twig SSTI RCE Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2025-68454/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2025-68454/</guid>
    <description>CVE-2025-68454: Craft CMS Twig SSTI RCE Vulnerability</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:42 +0000</pubDate>
  </item>
  <item>
    <title>15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)</title>
    <link>https://hackread.com/jenkins-servers-risk-rce-vulnerability-cve-2025-53652/</link>
    <guid isPermaLink="true">https://hackread.com/jenkins-servers-risk-rce-vulnerability-cve-2025-53652/</guid>
    <description>15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:42 +0000</pubDate>
  </item>
  <item>
    <title>React2Shell (CVE-2025-55182): RSC Flight Decoder Remote Code Execution</title>
    <link>https://www.seqrite.com/blog/react2shell-cve-2025-55182-rsc-flight-decoder-remote-code-execution/</link>
    <guid isPermaLink="true">https://www.seqrite.com/blog/react2shell-cve-2025-55182-rsc-flight-decoder-remote-code-execution/</guid>
    <description>React2Shell (CVE-2025-55182): RSC Flight Decoder Remote Code Execution</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:41 +0000</pubDate>
  </item>
  <item>
    <title>Ivanti EPMM: Another Pre-Auth RCE (CVE-2026-1281 and CVE-2026-1340)</title>
    <link>https://www.intruder.io/blog/ivanti-epmm-another-day-another-pre-auth-rce-cve-2026-1281-cve-2026-1340</link>
    <guid isPermaLink="true">https://www.intruder.io/blog/ivanti-epmm-another-day-another-pre-auth-rce-cve-2026-1281-cve-2026-1340</guid>
    <description>Ivanti EPMM: Another Pre-Auth RCE (CVE-2026-1281 and CVE-2026-1340)</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:40 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-57738: Apache Syncope Groovy Injection RCE</title>
    <link>https://blog.securelayer7.net/cve-2025-57738-apache-syncope-groovy-rce/</link>
    <guid isPermaLink="true">https://blog.securelayer7.net/cve-2025-57738-apache-syncope-groovy-rce/</guid>
    <description>CVE-2025-57738: Apache Syncope Groovy Injection RCE</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:39 +0000</pubDate>
  </item>
  <item>
    <title>Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain</title>
    <link>https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html</guid>
    <description>Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:39 +0000</pubDate>
  </item>
  <item>
    <title>Critical RCE Vulnerability in Anthropic MCP Inspector (CVE-2025-49596)</title>
    <link>https://www.oligo.security/blog/critical-rce-vulnerability-in-anthropic-mcp-inspector-cve-2025-49596</link>
    <guid isPermaLink="true">https://www.oligo.security/blog/critical-rce-vulnerability-in-anthropic-mcp-inspector-cve-2025-49596</guid>
    <description>Critical RCE Vulnerability in Anthropic MCP Inspector (CVE-2025-49596)</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:38 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-24893: XWiki SSTI Unauthenticated RCE Exploit</title>
    <link>https://github.com/rippsec/CVE-2025-24893-XWiki-SSTI-RCE</link>
    <guid isPermaLink="true">https://github.com/rippsec/CVE-2025-24893-XWiki-SSTI-RCE</guid>
    <description>CVE-2025-24893: XWiki SSTI Unauthenticated RCE Exploit</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:37 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-34197: ActiveMQ RCE via Jolokia API</title>
    <link>https://horizon3.ai/attack-research/disclosures/cve-2026-34197-activemq-rce-jolokia/</link>
    <guid isPermaLink="true">https://horizon3.ai/attack-research/disclosures/cve-2026-34197-activemq-rce-jolokia/</guid>
    <description>CVE-2026-34197: ActiveMQ RCE via Jolokia API</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:36 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-12821: WordPress NewsBlogger CSRF Allowing RCE</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2025-12821/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2025-12821/</guid>
    <description>CVE-2025-12821: WordPress NewsBlogger CSRF Allowing RCE</description>
    <category>CSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:36 +0000</pubDate>
  </item>
  <item>
    <title>Manipulating User Email: A CSRF PoC From TCM Academy</title>
    <link>https://medium.com/@trixiahorner/csrf-walkthrough-5876cdf437ea</link>
    <guid isPermaLink="true">https://medium.com/@trixiahorner/csrf-walkthrough-5876cdf437ea</guid>
    <description>Manipulating User Email: A CSRF PoC From TCM Academy</description>
    <category>CSRF</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:35 +0000</pubDate>
  </item>
  <item>
    <title>Bypassing CSRF Token Validation Techniques</title>
    <link>https://medium.com/@musayyabsharif/bypassing-csrf-token-validation-techniques-33d79004fc6b</link>
    <guid isPermaLink="true">https://medium.com/@musayyabsharif/bypassing-csrf-token-validation-techniques-33d79004fc6b</guid>
    <description>Bypassing CSRF Token Validation Techniques</description>
    <category>CSRF</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:34 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-40925: CSRF in WWBN AVideo Configuration Endpoint</title>
    <link>https://radar.offseq.com/threat/cve-2026-40925-cwe-352-cross-site-request-forgery--d3211bbb</link>
    <guid isPermaLink="true">https://radar.offseq.com/threat/cve-2026-40925-cwe-352-cross-site-request-forgery--d3211bbb</guid>
    <description>CVE-2026-40925: CSRF in WWBN AVideo Configuration Endpoint</description>
    <category>CSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:33 +0000</pubDate>
  </item>
  <item>
    <title>CSRF in 2025: Not Dead, Just Different</title>
    <link>https://ghostsecurity.com/blog/csrf-in-2025-not-dead-just-different</link>
    <guid isPermaLink="true">https://ghostsecurity.com/blog/csrf-in-2025-not-dead-just-different</guid>
    <description>CSRF in 2025: Not Dead, Just Different</description>
    <category>CSRF</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:32 +0000</pubDate>
  </item>
  <item>
    <title>Internet Bug Bounty: Argo CD CSRF leads to Kubernetes cluster compromise</title>
    <link>https://hackerone.com/reports/2326194</link>
    <guid isPermaLink="true">https://hackerone.com/reports/2326194</guid>
    <description>Program: Internet Bug Bounty
Severity: high
Weakness: Cross-Site Request Forgery (CSRF)

GHSA: https://github.com/argoproj/argo-cd/security/advisories/GHSA-92mw-q256-5vwg

It&#x27;s been publicly known for...</description>
    <category>CSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:31 +0000</pubDate>
  </item>
  <item>
    <title>SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection</title>
    <link>https://github.com/I-TRACING-ASO/SulphurAPI</link>
    <guid isPermaLink="true">https://github.com/I-TRACING-ASO/SulphurAPI</guid>
    <description>SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection</description>
    <category>Burp Suite</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:30 +0000</pubDate>
  </item>
  <item>
    <title>Awesome Burp Extensions 2025</title>
    <link>https://github.com/rm-rf-tools/awesome-burp-extensions-2025</link>
    <guid isPermaLink="true">https://github.com/rm-rf-tools/awesome-burp-extensions-2025</guid>
    <description>Awesome Burp Extensions 2025</description>
    <category>Burp Suite</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:29 +0000</pubDate>
  </item>
  <item>
    <title>Top 10 Web Hacking Techniques of 2025: Call for Nominations</title>
    <link>https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open</link>
    <guid isPermaLink="true">https://portswigger.net/research/top-10-web-hacking-techniques-of-2025-nominations-open</guid>
    <description>Top 10 Web Hacking Techniques of 2025: Call for Nominations</description>
    <category>Burp Suite</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:28 +0000</pubDate>
  </item>
  <item>
    <title>The Future of Security Testing: AI-Powered Extensibility in Burp</title>
    <link>https://portswigger.net/blog/the-future-of-security-testing-harness-ai-powered-extensibility-in-burp-nbsp</link>
    <guid isPermaLink="true">https://portswigger.net/blog/the-future-of-security-testing-harness-ai-powered-extensibility-in-burp-nbsp</guid>
    <description>The Future of Security Testing: AI-Powered Extensibility in Burp</description>
    <category>Burp Suite</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:51:27 +0000</pubDate>
  </item>
  <item>
    <title>Filtering the WebSockets history with scripts</title>
    <link>https://portswigger.net/burp/documentation/desktop/tools/proxy/websockets-history/scripts</link>
    <guid isPermaLink="true">https://portswigger.net/burp/documentation/desktop/tools/proxy/websockets-history/scripts</guid>
    <description>Filtering the WebSockets history with scripts</description>
    <category>Burp Suite</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:26 +0000</pubDate>
  </item>
  <item>
    <title>Filtering the HTTP history with scripts (Bambdas)</title>
    <link>https://portswigger.net/burp/documentation/desktop/tools/proxy/http-history/scripts</link>
    <guid isPermaLink="true">https://portswigger.net/burp/documentation/desktop/tools/proxy/http-history/scripts</guid>
    <description>Filtering the HTTP history with scripts (Bambdas)</description>
    <category>Burp Suite</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:25 +0000</pubDate>
  </item>
  <item>
    <title>Developing AI features in Burp extensions</title>
    <link>https://portswigger.net/burp/documentation/desktop/extend-burp/extensions/creating/creating-ai-extensions/developing-ai-features</link>
    <guid isPermaLink="true">https://portswigger.net/burp/documentation/desktop/extend-burp/extensions/creating/creating-ai-extensions/developing-ai-features</guid>
    <description>Developing AI features in Burp extensions</description>
    <category>Burp Suite</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:51:25 +0000</pubDate>
  </item>
  <item>
    <title>Burp AI - PortSwigger Documentation</title>
    <link>https://portswigger.net/burp/documentation/desktop/burp-ai</link>
    <guid isPermaLink="true">https://portswigger.net/burp/documentation/desktop/burp-ai</guid>
    <description>Burp AI - PortSwigger Documentation</description>
    <category>Burp Suite</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:24 +0000</pubDate>
  </item>
  <item>
    <title>Bambdas - PortSwigger Documentation</title>
    <link>https://portswigger.net/burp/documentation/desktop/extend-burp/bambdas</link>
    <guid isPermaLink="true">https://portswigger.net/burp/documentation/desktop/extend-burp/bambdas</guid>
    <description>Bambdas - PortSwigger Documentation</description>
    <category>Burp Suite</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:23 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-68664: Critical LangChain Flaw Enables Secret Extraction</title>
    <link>https://socradar.io/blog/cve-2025-68664-langchain-flaw-secret-extraction/</link>
    <guid isPermaLink="true">https://socradar.io/blog/cve-2025-68664-langchain-flaw-secret-extraction/</guid>
    <description>CVE-2025-68664: Critical LangChain Flaw Enables Secret Extraction</description>
    <category>Python</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:22 +0000</pubDate>
  </item>
  <item>
    <title>Bandit Python: Free SAST in 10 Seconds (2026 Review)</title>
    <link>https://appsecsanta.com/bandit</link>
    <guid isPermaLink="true">https://appsecsanta.com/bandit</guid>
    <description>Bandit Python: Free SAST in 10 Seconds (2026 Review)</description>
    <category>Python</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:20 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-22607: Fickling Python RCE Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-22607/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-22607/</guid>
    <description>CVE-2026-22607: Fickling Python RCE Vulnerability</description>
    <category>Python</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:19 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-21226: Azure Core Python Library RCE Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-21226/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-21226/</guid>
    <description>CVE-2026-21226: Azure Core Python Library RCE Vulnerability</description>
    <category>Python</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:18 +0000</pubDate>
  </item>
  <item>
    <title>SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files</title>
    <link>https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html</guid>
    <description>SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files</description>
    <category>Python</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:17 +0000</pubDate>
  </item>
  <item>
    <title>Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure</title>
    <link>https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html</guid>
    <description>Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure</description>
    <category>Python</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:17 +0000</pubDate>
  </item>
  <item>
    <title>Critical SQL Injection Vulnerability in Django (CVE-2025-64459)</title>
    <link>https://www.endorlabs.com/learn/critical-sql-injection-vulnerability-in-django-cve-2025-64459</link>
    <guid isPermaLink="true">https://www.endorlabs.com/learn/critical-sql-injection-vulnerability-in-django-cve-2025-64459</guid>
    <description>Critical SQL Injection Vulnerability in Django (CVE-2025-64459)</description>
    <category>Python</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:14 +0000</pubDate>
  </item>
  <item>
    <title>CERT-FR Warns of Python/CPython RCE Vulnerabilities (CVE-2026-4786, CVE-2026-6100)</title>
    <link>https://changeflow.com/govping/data-privacy-cybersecurity/python-rce-vulnerabilities-cpython-affected-14th-apr-2026-04-14</link>
    <guid isPermaLink="true">https://changeflow.com/govping/data-privacy-cybersecurity/python-rce-vulnerabilities-cpython-affected-14th-apr-2026-04-14</guid>
    <description>CERT-FR Warns of Python/CPython RCE Vulnerabilities (CVE-2026-4786, CVE-2026-6100)</description>
    <category>Python</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:13 +0000</pubDate>
  </item>
  <item>
    <title>Malicious PyPI Packages Deliver SilentSync RAT</title>
    <link>https://www.zscaler.com/blogs/security-research/malicious-pypi-packages-deliver-silentsync-rat</link>
    <guid isPermaLink="true">https://www.zscaler.com/blogs/security-research/malicious-pypi-packages-deliver-silentsync-rat</guid>
    <description>Malicious PyPI Packages Deliver SilentSync RAT</description>
    <category>Python</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:13 +0000</pubDate>
  </item>
  <item>
    <title>Bearer: SAST Tool to Discover, Filter, and Prioritize Security and Privacy Risks</title>
    <link>https://github.com/Bearer/bearer</link>
    <guid isPermaLink="true">https://github.com/Bearer/bearer</guid>
    <description>Bearer: SAST Tool to Discover, Filter, and Prioritize Security and Privacy Risks</description>
    <category>Python</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:12 +0000</pubDate>
  </item>
  <item>
    <title>Master Google Dorking: Advanced Techniques for OSINT and Ethical Hacking</title>
    <link>https://neospl0it.github.io/master-google-dorking-advanced-search-techniques</link>
    <guid isPermaLink="true">https://neospl0it.github.io/master-google-dorking-advanced-search-techniques</guid>
    <description>Master Google Dorking: Advanced Techniques for OSINT and Ethical Hacking</description>
    <category>OSINT</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:11 +0000</pubDate>
  </item>
  <item>
    <title>Lessons from Building an Online Toolkit to Aid Open-Source Investigations</title>
    <link>https://niemanreports.org/osint-open-source-investigations-bellingcat-volunteers/</link>
    <guid isPermaLink="true">https://niemanreports.org/osint-open-source-investigations-bellingcat-volunteers/</guid>
    <description>Lessons from Building an Online Toolkit to Aid Open-Source Investigations</description>
    <category>OSINT</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:11 +0000</pubDate>
  </item>
  <item>
    <title>IntelTechniques Books (Michael Bazzell)</title>
    <link>https://inteltechniques.com/book1.html</link>
    <guid isPermaLink="true">https://inteltechniques.com/book1.html</guid>
    <description>IntelTechniques Books (Michael Bazzell)</description>
    <category>OSINT</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:10 +0000</pubDate>
  </item>
  <item>
    <title>Epieos: The Ultimate OSINT Tool</title>
    <link>https://epieos.com</link>
    <guid isPermaLink="true">https://epieos.com</guid>
    <description>Epieos: The Ultimate OSINT Tool</description>
    <category>OSINT</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:09 +0000</pubDate>
  </item>
  <item>
    <title>Bellingcat&#x27;s Online Investigation Toolkit</title>
    <link>https://bellingcat.gitbook.io/toolkit</link>
    <guid isPermaLink="true">https://bellingcat.gitbook.io/toolkit</guid>
    <description>Bellingcat&#x27;s Online Investigation Toolkit</description>
    <category>OSINT</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:08 +0000</pubDate>
  </item>
  <item>
    <title>Automating Google Dorking: From Manual OSINT Technique to Continuous Monitoring</title>
    <link>https://www.digitalstakeout.com/blog/automating-google-dorking-osint</link>
    <guid isPermaLink="true">https://www.digitalstakeout.com/blog/automating-google-dorking-osint</guid>
    <description>Automating Google Dorking: From Manual OSINT Technique to Continuous Monitoring</description>
    <category>OSINT</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:08 +0000</pubDate>
  </item>
  <item>
    <title>mosint: An automated e-mail OSINT tool</title>
    <link>https://github.com/alpkeskin/mosint</link>
    <guid isPermaLink="true">https://github.com/alpkeskin/mosint</guid>
    <description>mosint: An automated e-mail OSINT tool</description>
    <category>OSINT</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:07 +0000</pubDate>
  </item>
  <item>
    <title>Telegram-OSINT: In-depth repository of Telegram OSINT resources</title>
    <link>https://github.com/The-Osint-Toolbox/Telegram-OSINT</link>
    <guid isPermaLink="true">https://github.com/The-Osint-Toolbox/Telegram-OSINT</guid>
    <description>Telegram-OSINT: In-depth repository of Telegram OSINT resources</description>
    <category>OSINT</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:06 +0000</pubDate>
  </item>
  <item>
    <title>Email-Username-OSINT Toolbox</title>
    <link>https://github.com/The-Osint-Toolbox/Email-Username-OSINT</link>
    <guid isPermaLink="true">https://github.com/The-Osint-Toolbox/Email-Username-OSINT</guid>
    <description>Email-Username-OSINT Toolbox</description>
    <category>OSINT</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:06 +0000</pubDate>
  </item>
  <item>
    <title>Awesome OSINT for Everything</title>
    <link>https://github.com/Astrosp/Awesome-OSINT-For-Everything</link>
    <guid isPermaLink="true">https://github.com/Astrosp/Awesome-OSINT-For-Everything</guid>
    <description>Awesome OSINT for Everything</description>
    <category>OSINT</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:05 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-1094: PostgreSQL SQL Injection Vulnerability</title>
    <link>https://www.armosec.io/blog/cve-2025-1094-postgresql-sql-injection-vulnerability/</link>
    <guid isPermaLink="true">https://www.armosec.io/blog/cve-2025-1094-postgresql-sql-injection-vulnerability/</guid>
    <description>CVE-2025-1094: PostgreSQL SQL Injection Vulnerability</description>
    <category>SQLi</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:51:04 +0000</pubDate>
  </item>
  <item>
    <title>SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)</title>
    <link>https://github.com/regaan/sqlmap-tamper-collection</link>
    <guid isPermaLink="true">https://github.com/regaan/sqlmap-tamper-collection</guid>
    <description>SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)</description>
    <category>SQLi</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:03 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection and Postgres: An Adventure to Eventual RCE</title>
    <link>https://pulsesecurity.co.nz/articles/postgres-sqli</link>
    <guid isPermaLink="true">https://pulsesecurity.co.nz/articles/postgres-sqli</guid>
    <description>SQL Injection and Postgres: An Adventure to Eventual RCE</description>
    <category>SQLi</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:02 +0000</pubDate>
  </item>
  <item>
    <title>Pentesting PostgreSQL with SQL Injections</title>
    <link>https://onsecurity.io/article/pentesting-postgresql-with-sql-injections/</link>
    <guid isPermaLink="true">https://onsecurity.io/article/pentesting-postgresql-with-sql-injections/</guid>
    <description>Pentesting PostgreSQL with SQL Injections</description>
    <category>SQLi</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:51:01 +0000</pubDate>
  </item>
  <item>
    <title>NoSQL Injection: Advanced Exploitation Guide</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-nosql-injection-nosqli-vulnerabilities</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-nosql-injection-nosqli-vulnerabilities</guid>
    <description>NoSQL Injection: Advanced Exploitation Guide</description>
    <category>SQLi</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:51:01 +0000</pubDate>
  </item>
  <item>
    <title>Exploits Explained: NoSQL Injection Returns Private Information</title>
    <link>https://www.synack.com/exploits-explained/exploits-explained-nosql-injection-returns-private-information/</link>
    <guid isPermaLink="true">https://www.synack.com/exploits-explained/exploits-explained-nosql-injection-returns-private-information/</guid>
    <description>Exploits Explained: NoSQL Injection Returns Private Information</description>
    <category>SQLi</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:51:00 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer</title>
    <link>https://github.com/Winz18/CVE-2025-52694-POC</link>
    <guid isPermaLink="true">https://github.com/Winz18/CVE-2025-52694-POC</guid>
    <description>CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer</description>
    <category>SQLi</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:59 +0000</pubDate>
  </item>
  <item>
    <title>MCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server</title>
    <link>https://securitylabs.datadoghq.com/articles/mcp-vulnerability-case-study-SQL-injection-in-the-postgresql-mcp-server/</link>
    <guid isPermaLink="true">https://securitylabs.datadoghq.com/articles/mcp-vulnerability-case-study-SQL-injection-in-the-postgresql-mcp-server/</guid>
    <description>MCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server</description>
    <category>SQLi</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:58 +0000</pubDate>
  </item>
  <item>
    <title>BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections</title>
    <link>https://dl.acm.org/doi/10.1145/3788286</link>
    <guid isPermaLink="true">https://dl.acm.org/doi/10.1145/3788286</guid>
    <description>BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections</description>
    <category>SQLi</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:50:58 +0000</pubDate>
  </item>
  <item>
    <title>LibreChat SSRF Bypass via IPv6 Mapped Address Confusion</title>
    <link>https://www.thehackerwire.com/librechat-ssrf-bypass-via-ipv6-mapped-address-confusion/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/librechat-ssrf-bypass-via-ipv6-mapped-address-confusion/</guid>
    <description>LibreChat SSRF Bypass via IPv6 Mapped Address Confusion</description>
    <category>SSRF</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:57 +0000</pubDate>
  </item>
  <item>
    <title>SSRF Vulnerability: Bypassing Protection with DNS Rebinding Attack</title>
    <link>https://aydinnyunus.github.io/2026/03/14/ssrf-dns-rebinding-vulnerability/</link>
    <guid isPermaLink="true">https://aydinnyunus.github.io/2026/03/14/ssrf-dns-rebinding-vulnerability/</guid>
    <description>SSRF Vulnerability: Bypassing Protection with DNS Rebinding Attack</description>
    <category>SSRF</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:56 +0000</pubDate>
  </item>
  <item>
    <title>is-localhost-ip 2.0.0 SSRF via Restrictions Bypass (CVE-2025-9960)</title>
    <link>https://fluidattacks.com/advisories/registrada</link>
    <guid isPermaLink="true">https://fluidattacks.com/advisories/registrada</guid>
    <description>is-localhost-ip 2.0.0 SSRF via Restrictions Bypass (CVE-2025-9960)</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:55 +0000</pubDate>
  </item>
  <item>
    <title>See-SURF: Tool to Find Potential Vulnerable SSRF Parameters</title>
    <link>https://github.com/In3tinct/See-SURF</link>
    <guid isPermaLink="true">https://github.com/In3tinct/See-SURF</guid>
    <description>See-SURF: Tool to Find Potential Vulnerable SSRF Parameters</description>
    <category>SSRF</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:50:55 +0000</pubDate>
  </item>
  <item>
    <title>Hacking Next.js Targets: Advanced SSRF Exploitation Guide</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/ssrf-vulnerabilities-in-nextjs-targets</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/ssrf-vulnerabilities-in-nextjs-targets</guid>
    <description>Hacking Next.js Targets: Advanced SSRF Exploitation Guide</description>
    <category>SSRF</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:50:54 +0000</pubDate>
  </item>
  <item>
    <title>Catflix CTF: Exploiting SSRFs in Next.js Middleware</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/catflix-ctf-ssrf-nextjs-middleware</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/catflix-ctf-ssrf-nextjs-middleware</guid>
    <description>Catflix CTF: Exploiting SSRFs in Next.js Middleware</description>
    <category>SSRF</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:53 +0000</pubDate>
  </item>
  <item>
    <title>SSRF Guard Bypass via Full-Form IPv4-Mapped IPv6 Literal</title>
    <link>https://github.com/openclaw/openclaw/security/advisories/GHSA-jrvc-8ff5-2f9f</link>
    <guid isPermaLink="true">https://github.com/openclaw/openclaw/security/advisories/GHSA-jrvc-8ff5-2f9f</guid>
    <description>SSRF Guard Bypass via Full-Form IPv4-Mapped IPv6 Literal</description>
    <category>SSRF</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:53 +0000</pubDate>
  </item>
  <item>
    <title>Next.js Improper Middleware Redirect Handling Leads to SSRF (CVE-2025-57822)</title>
    <link>https://github.com/advisories/GHSA-4342-x723-ch2f</link>
    <guid isPermaLink="true">https://github.com/advisories/GHSA-4342-x723-ch2f</guid>
    <description>Next.js Improper Middleware Redirect Handling Leads to SSRF (CVE-2025-57822)</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:52 +0000</pubDate>
  </item>
  <item>
    <title>Craft CMS Cloud Metadata SSRF Protection Bypass via IPv6 Resolution</title>
    <link>https://github.com/craftcms/cms/security/advisories/GHSA-v2gc-rm6g-wrw9</link>
    <guid isPermaLink="true">https://github.com/craftcms/cms/security/advisories/GHSA-v2gc-rm6g-wrw9</guid>
    <description>Craft CMS Cloud Metadata SSRF Protection Bypass via IPv6 Resolution</description>
    <category>SSRF</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:51 +0000</pubDate>
  </item>
  <item>
    <title>Axios Unrestricted Cloud Metadata Exfiltration via Header Injection Chain (CVE-2026-40175)</title>
    <link>https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx</link>
    <guid isPermaLink="true">https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx</guid>
    <description>Axios Unrestricted Cloud Metadata Exfiltration via Header Injection Chain (CVE-2026-40175)</description>
    <category>SSRF</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:50 +0000</pubDate>
  </item>
  <item>
    <title>GeoServer 2025 XXE Vulnerability (CVE-2025-58360) Explained</title>
    <link>https://motasemhamdan.medium.com/geoservers-2025-xxe-vulnerability-explained-e82caff3a661</link>
    <guid isPermaLink="true">https://motasemhamdan.medium.com/geoservers-2025-xxe-vulnerability-explained-e82caff3a661</guid>
    <description>GeoServer 2025 XXE Vulnerability (CVE-2025-58360) Explained</description>
    <category>XXE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:50 +0000</pubDate>
  </item>
  <item>
    <title>Critical Apache Tika Vulnerability Leads to XXE Injection</title>
    <link>https://www.securityweek.com/critical-apache-tika-vulnerability-leads-to-xxe-injection/</link>
    <guid isPermaLink="true">https://www.securityweek.com/critical-apache-tika-vulnerability-leads-to-xxe-injection/</guid>
    <description>Critical Apache Tika Vulnerability Leads to XXE Injection</description>
    <category>XXE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:49 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-30220: GeoServer WFS Service XML External Entity</title>
    <link>https://www.miggo.io/vulnerability-database/cve/CVE-2025-30220</link>
    <guid isPermaLink="true">https://www.miggo.io/vulnerability-database/cve/CVE-2025-30220</guid>
    <description>CVE-2025-30220: GeoServer WFS Service XML External Entity</description>
    <category>XXE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:48 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-27136: LocalS3 CreateBucketConfiguration XXE Injection</title>
    <link>https://www.offsec.com/blog/cve-2025-27136/</link>
    <guid isPermaLink="true">https://www.offsec.com/blog/cve-2025-27136/</guid>
    <description>CVE-2025-27136: LocalS3 CreateBucketConfiguration XXE Injection</description>
    <category>XXE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:47 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2024-30043: Exploiting XXE on SharePoint via Confused URL Parsing (PoC)</title>
    <link>https://github.com/W01fh4cker/CVE-2024-30043-XXE</link>
    <guid isPermaLink="true">https://github.com/W01fh4cker/CVE-2024-30043-XXE</guid>
    <description>CVE-2024-30043: Exploiting XXE on SharePoint via Confused URL Parsing (PoC)</description>
    <category>XXE</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:47 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-66516: Detecting and Defending Against Apache Tika XXE</title>
    <link>https://www.akamai.com/blog/security-research/cve-2025-66516-detecting-defending-apache-tika-xxe-attack</link>
    <guid isPermaLink="true">https://www.akamai.com/blog/security-research/cve-2025-66516-detecting-defending-apache-tika-xxe-attack</guid>
    <description>CVE-2025-66516: Detecting and Defending Against Apache Tika XXE</description>
    <category>XXE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:46 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-59845: CSRF Vulnerability in Apollo Studio Embeddable Explorer and Sandbox</title>
    <link>https://www.ameeba.com/blog/cve-2025-59845-csrf-vulnerability-in-apollo-studio-embeddable-explorer-embeddable-sandbox/</link>
    <guid isPermaLink="true">https://www.ameeba.com/blog/cve-2025-59845-csrf-vulnerability-in-apollo-studio-embeddable-explorer-embeddable-sandbox/</guid>
    <description>CVE-2025-59845: CSRF Vulnerability in Apollo Studio Embeddable Explorer and Sandbox</description>
    <category>GraphQL</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:45 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-31496: GraphQL Query Vulnerability in Apollo Compiler Leading to DoS</title>
    <link>https://www.ameeba.com/blog/cve-2025-31496-graphql-query-vulnerability-in-apollo-compiler-leading-to-possible-denial-of-service/</link>
    <guid isPermaLink="true">https://www.ameeba.com/blog/cve-2025-31496-graphql-query-vulnerability-in-apollo-compiler-leading-to-possible-denial-of-service/</guid>
    <description>CVE-2025-31496: GraphQL Query Vulnerability in Apollo Compiler Leading to DoS</description>
    <category>GraphQL</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:45 +0000</pubDate>
  </item>
  <item>
    <title>The 16-Hour Window: Catching a GraphQL Authorization Flaw</title>
    <link>https://amannsharmaa.medium.com/the-16-hour-window-catching-a-graphql-authorization-flaw-575f6e5c1217</link>
    <guid isPermaLink="true">https://amannsharmaa.medium.com/the-16-hour-window-catching-a-graphql-authorization-flaw-575f6e5c1217</guid>
    <description>The 16-Hour Window: Catching a GraphQL Authorization Flaw</description>
    <category>GraphQL</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:44 +0000</pubDate>
  </item>
  <item>
    <title>GraphQLer: Context-Aware GraphQL API Fuzzing Tool</title>
    <link>https://github.com/omar2535/GraphQLer</link>
    <guid isPermaLink="true">https://github.com/omar2535/GraphQLer</guid>
    <description>GraphQLer: Context-Aware GraphQL API Fuzzing Tool</description>
    <category>GraphQL</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:43 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting GraphQL Query Depth</title>
    <link>https://checkmarx.com/blog/exploiting-graphql-query-depth/</link>
    <guid isPermaLink="true">https://checkmarx.com/blog/exploiting-graphql-query-depth/</guid>
    <description>Exploiting GraphQL Query Depth</description>
    <category>GraphQL</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:42 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting Broken Authentication Control in GraphQL</title>
    <link>https://www.praetorian.com/blog/exploiting-broken-authentication-control-graphql/</link>
    <guid isPermaLink="true">https://www.praetorian.com/blog/exploiting-broken-authentication-control-graphql/</guid>
    <description>Exploiting Broken Authentication Control in GraphQL</description>
    <category>GraphQL</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:42 +0000</pubDate>
  </item>
  <item>
    <title>Didn&#x27;t Notice Your Rate Limiting: GraphQL Batching Attack</title>
    <link>https://checkmarx.com/blog/didnt-notice-your-rate-limiting-graphql-batching-attack/</link>
    <guid isPermaLink="true">https://checkmarx.com/blog/didnt-notice-your-rate-limiting-graphql-batching-attack/</guid>
    <description>Didn&#x27;t Notice Your Rate Limiting: GraphQL Batching Attack</description>
    <category>GraphQL</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:41 +0000</pubDate>
  </item>
  <item>
    <title>Avoid GraphQL Denial-of-Service Attacks through Batching and Aliasing</title>
    <link>https://escape.tech/blog/graphql-batch-attacks-cause-dos/</link>
    <guid isPermaLink="true">https://escape.tech/blog/graphql-batch-attacks-cause-dos/</guid>
    <description>Avoid GraphQL Denial-of-Service Attacks through Batching and Aliasing</description>
    <category>GraphQL</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:40 +0000</pubDate>
  </item>
  <item>
    <title>API Threat Research: GraphQL Authorization Flaws in a FinTech Platform</title>
    <link>https://salt.security/blog/api-threat-research-graphql-authorization-flaws-in-financial-technology-platform</link>
    <guid isPermaLink="true">https://salt.security/blog/api-threat-research-graphql-authorization-flaws-in-financial-technology-platform</guid>
    <description>API Threat Research: GraphQL Authorization Flaws in a FinTech Platform</description>
    <category>GraphQL</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:39 +0000</pubDate>
  </item>
  <item>
    <title>Apollo Router Query Planner Excessive Resource Consumption via Named Fragment Expansion (CVE-2025-32034)</title>
    <link>https://github.com/advisories/GHSA-75m2-jhh5-j5g2</link>
    <guid isPermaLink="true">https://github.com/advisories/GHSA-75m2-jhh5-j5g2</guid>
    <description>Apollo Router Query Planner Excessive Resource Consumption via Named Fragment Expansion (CVE-2025-32034)</description>
    <category>GraphQL</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:39 +0000</pubDate>
  </item>
  <item>
    <title>Mass-Assignment to Stored XSS and CSP Bypass in a Chatbot Platform</title>
    <link>https://medium.com/@melodicbook/how-mass-assignment-led-to-stored-xss-and-a-csp-bypass-in-a-major-chatbot-platform-3c6569d7c9e9</link>
    <guid isPermaLink="true">https://medium.com/@melodicbook/how-mass-assignment-led-to-stored-xss-and-a-csp-bypass-in-a-major-chatbot-platform-3c6569d7c9e9</guid>
    <description>Mass-Assignment to Stored XSS and CSP Bypass in a Chatbot Platform</description>
    <category>XSS</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:50:38 +0000</pubDate>
  </item>
  <item>
    <title>Full Disclosure: DOM-Based XSS And Failures In Bug Bounty Hunting</title>
    <link>https://kuldeep.io/posts/fulldisclosure-dom-based-xss/</link>
    <guid isPermaLink="true">https://kuldeep.io/posts/fulldisclosure-dom-based-xss/</guid>
    <description>Full Disclosure: DOM-Based XSS And Failures In Bug Bounty Hunting</description>
    <category>XSS</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:50:37 +0000</pubDate>
  </item>
  <item>
    <title>Cross-Site Scripting (XSS) Is Surging: 4 New CVEs This Week</title>
    <link>https://www.sherlockforensics.com/blog/cross-site-scripting-xss-is-surging-4-new-cves-this-week.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/cross-site-scripting-xss-is-surging-4-new-cves-this-week.html</guid>
    <description>Cross-Site Scripting (XSS) Is Surging: 4 New CVEs This Week</description>
    <category>XSS</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:37 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-26244: Stored XSS in DeimosC2 Leading to Privilege Escalation</title>
    <link>https://jarm222.github.io/posts/CVE-2025-26244-Writeup/</link>
    <guid isPermaLink="true">https://jarm222.github.io/posts/CVE-2025-26244-Writeup/</guid>
    <description>CVE-2025-26244: Stored XSS in DeimosC2 Leading to Privilege Escalation</description>
    <category>XSS</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:36 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-25461: SeedDMS Stored XSS</title>
    <link>https://github.com/RoNiXxCybSeC0101/CVE-2025-25461</link>
    <guid isPermaLink="true">https://github.com/RoNiXxCybSeC0101/CVE-2025-25461</guid>
    <description>CVE-2025-25461: SeedDMS Stored XSS</description>
    <category>XSS</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:35 +0000</pubDate>
  </item>
  <item>
    <title>Finding DOM Polyglot XSS in PayPal the Easy Way</title>
    <link>https://portswigger.net/research/finding-dom-polyglot-xss-in-paypal-the-easy-way</link>
    <guid isPermaLink="true">https://portswigger.net/research/finding-dom-polyglot-xss-in-paypal-the-easy-way</guid>
    <description>Finding DOM Polyglot XSS in PayPal the Easy Way</description>
    <category>XSS</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:34 +0000</pubDate>
  </item>
  <item>
    <title>Cisco IOS XE Web Authentication Reflected XSS Advisory</title>
    <link>https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-xss-VWyDgjOU</link>
    <guid isPermaLink="true">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-xss-VWyDgjOU</guid>
    <description>Cisco IOS XE Web Authentication Reflected XSS Advisory</description>
    <category>XSS</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:34 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-66412: Angular Stored XSS via SVG Animation and MathML Attributes</title>
    <link>https://github.com/advisories/GHSA-v4hv-rgfq-gp49</link>
    <guid isPermaLink="true">https://github.com/advisories/GHSA-v4hv-rgfq-gp49</guid>
    <description>CVE-2025-66412: Angular Stored XSS via SVG Animation and MathML Attributes</description>
    <category>XSS</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:33 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-0133: PAN-OS Reflected XSS in GlobalProtect Gateway</title>
    <link>https://security.paloaltonetworks.com/CVE-2025-0133</link>
    <guid isPermaLink="true">https://security.paloaltonetworks.com/CVE-2025-0133</guid>
    <description>CVE-2025-0133: PAN-OS Reflected XSS in GlobalProtect Gateway</description>
    <category>XSS</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:32 +0000</pubDate>
  </item>
  <item>
    <title>Synthesizing XSS Polyglots with Monte Carlo Tree Search (arXiv 2025)</title>
    <link>https://arxiv.org/pdf/2502.08467</link>
    <guid isPermaLink="true">https://arxiv.org/pdf/2502.08467</guid>
    <description>Synthesizing XSS Polyglots with Monte Carlo Tree Search (arXiv 2025)</description>
    <category>XSS</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:50:32 +0000</pubDate>
  </item>
  <item>
    <title>New Types of Hacking: IDOR Attacks Evolved</title>
    <link>https://theosintedge.medium.com/new-types-of-hacking-idor-attacks-evolved-ce556e25572e</link>
    <guid isPermaLink="true">https://theosintedge.medium.com/new-types-of-hacking-idor-attacks-evolved-ce556e25572e</guid>
    <description>New Types of Hacking: IDOR Attacks Evolved</description>
    <category>IDOR</category>
    <category domain="difficulty">advanced</category>
    <pubDate>Wed, 22 Apr 2026 12:50:31 +0000</pubDate>
  </item>
  <item>
    <title>Hunting for IDOR and BAC in B2B Apps with Burp Authorize</title>
    <link>https://thexssrat.medium.com/hunting-for-idor-and-bac-vulnerabilities-in-b2b-applications-with-burp-suites-authorize-extension-597877b53d94</link>
    <guid isPermaLink="true">https://thexssrat.medium.com/hunting-for-idor-and-bac-vulnerabilities-in-b2b-applications-with-burp-suites-authorize-extension-597877b53d94</guid>
    <description>Hunting for IDOR and BAC in B2B Apps with Burp Authorize</description>
    <category>IDOR</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:30 +0000</pubDate>
  </item>
  <item>
    <title>IDOR in the Wild: What CVE-2025-13526 Teaches Security Engineers</title>
    <link>https://www.penligent.ai/hackinglabs/idor-in-the-wild-what-cve-2025-13526-really-teaches-security-engineers/</link>
    <guid isPermaLink="true">https://www.penligent.ai/hackinglabs/idor-in-the-wild-what-cve-2025-13526-really-teaches-security-engineers/</guid>
    <description>IDOR in the Wild: What CVE-2025-13526 Teaches Security Engineers</description>
    <category>IDOR</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:29 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-14371: TaxoPress IDOR / Object-Level Authorization Bypass</title>
    <link>https://research.cleantalk.org/cve-2025-14371/</link>
    <guid isPermaLink="true">https://research.cleantalk.org/cve-2025-14371/</guid>
    <description>CVE-2025-14371: TaxoPress IDOR / Object-Level Authorization Bypass</description>
    <category>IDOR</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:29 +0000</pubDate>
  </item>
  <item>
    <title>IDOR-Scanner: Burp Suite Extension for Automated IDOR Detection</title>
    <link>https://github.com/6h4ack/IDOR-Scanner</link>
    <guid isPermaLink="true">https://github.com/6h4ack/IDOR-Scanner</guid>
    <description>IDOR-Scanner: Burp Suite Extension for Automated IDOR Detection</description>
    <category>IDOR</category>
    <category domain="difficulty">intermediate</category>
    <pubDate>Wed, 22 Apr 2026 12:50:28 +0000</pubDate>
  </item>
  <item>
    <title>GraphQL IDOR Vulnerabilities: What They Are and How to Fix</title>
    <link>https://escape.tech/blog/idor-in-graphql/</link>
    <guid isPermaLink="true">https://escape.tech/blog/idor-in-graphql/</guid>
    <description>GraphQL IDOR Vulnerabilities: What They Are and How to Fix</description>
    <category>IDOR</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:50:27 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-64431: IDOR in ZITADEL Organization API Allows Cross-Tenant Tampering</title>
    <link>https://advisories.gitlab.com/golang/github.com/zitadel/zitadel/CVE-2025-64431/</link>
    <guid isPermaLink="true">https://advisories.gitlab.com/golang/github.com/zitadel/zitadel/CVE-2025-64431/</guid>
    <description>CVE-2025-64431: IDOR in ZITADEL Organization API Allows Cross-Tenant Tampering</description>
    <category>IDOR</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:26 +0000</pubDate>
  </item>
  <item>
    <title>OpenCTI GraphQL IDOR Allows Workspace Content Deletion</title>
    <link>https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-pr6m-q4g7-342c</link>
    <guid isPermaLink="true">https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-pr6m-q4g7-342c</guid>
    <description>OpenCTI GraphQL IDOR Allows Workspace Content Deletion</description>
    <category>IDOR</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:26 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-2271: IDOR Vulnerability Detail</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-2271</link>
    <guid isPermaLink="true">https://nvd.nist.gov/vuln/detail/CVE-2025-2271</guid>
    <description>CVE-2025-2271: IDOR Vulnerability Detail</description>
    <category>IDOR</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:25 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-1270: IDOR in h6web by Anapi Group</title>
    <link>https://github.com/advisories/GHSA-3j4c-6c9j-p6jj</link>
    <guid isPermaLink="true">https://github.com/advisories/GHSA-3j4c-6c9j-p6jj</guid>
    <description>CVE-2025-1270: IDOR in h6web by Anapi Group</description>
    <category>IDOR</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:50:24 +0000</pubDate>
  </item>
  <item>
    <title>Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data</title>
    <link>https://www.securityweek.com/are-sboms-failing-supply-chain-attacks-rise-as-security-teams-struggle-with-sbom-data/</link>
    <guid isPermaLink="true">https://www.securityweek.com/are-sboms-failing-supply-chain-attacks-rise-as-security-teams-struggle-with-sbom-data/</guid>
    <description>Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data https://ift.tt/GMVqgjU</description>
    <category>Supply Chain</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 12:25:49 +0000</pubDate>
  </item>
  <item>
    <title>Axios supply chain attack deploys multi-OS malware</title>
    <link>https://www.mishcon.com/news/axios-supply-chain-attack-deploys-multi-os-malware</link>
    <guid isPermaLink="true">https://www.mishcon.com/news/axios-supply-chain-attack-deploys-multi-os-malware</guid>
    <description>Axios supply chain attack deploys multi-OS malware https://ift.tt/qVLszCa</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 12:25:48 +0000</pubDate>
  </item>
  <item>
    <title>AI Sparks Bug-Bounty Surge in Crypto but Low-Quality Reports Grow</title>
    <link>https://www.mexc.com/news/1045276</link>
    <guid isPermaLink="true">https://www.mexc.com/news/1045276</guid>
    <description>AI Sparks Bug-Bounty Surge in Crypto, but Low-Quality Reports Grow  https://ift.tt/huVd7WD</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 11:29:38 +0000</pubDate>
  </item>
  <item>
    <title>Anthropic&#x27;s Model Context Protocol includes a critical remote code execution vulnerability newly discovered exploit puts 200000 AI servers at risk</title>
    <link>https://www.tomshardware.com/tech-industry/artificial-intelligence/anthropics-model-context-protocol-has-critical-security-flaw-exposed</link>
    <guid isPermaLink="true">https://www.tomshardware.com/tech-industry/artificial-intelligence/anthropics-model-context-protocol-has-critical-security-flaw-exposed</guid>
    <description>Anthropic&#x27;s Model Context Protocol includes a critical remote code execution vulnerability — newly discovered exploit puts 200,000 AI servers at risk https://ift.tt/KLVv9gP</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 11:29:37 +0000</pubDate>
  </item>
  <item>
    <title>Google Antigravity in Crosshairs of Security Researchers Cybercriminals</title>
    <link>https://www.securityweek.com/google-antigravity-in-crosshairs-of-security-researchers-cybercriminals/</link>
    <guid isPermaLink="true">https://www.securityweek.com/google-antigravity-in-crosshairs-of-security-researchers-cybercriminals/</guid>
    <description>Google Antigravity in Crosshairs of Security Researchers, Cybercriminals https://ift.tt/ZgkxGsP</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 10:39:19 +0000</pubDate>
  </item>
  <item>
    <title>Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution Container Escape</title>
    <link>https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html</guid>
    <description>Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape https://ift.tt/1Oulkrs</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 10:28:28 +0000</pubDate>
  </item>
  <item>
    <title>Anthropic AI Finds 271 Vulnerabilities in Firefox</title>
    <link>https://letsdatascience.com/news/anthropic-ai-finds-271-vulnerabilities-in-firefox-78685110</link>
    <guid isPermaLink="true">https://letsdatascience.com/news/anthropic-ai-finds-271-vulnerabilities-in-firefox-78685110</guid>
    <description>Anthropic AI Finds 271 Vulnerabilities in Firefox https://ift.tt/61geSjc</description>
    <category>Fuzzing</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 10:10:22 +0000</pubDate>
  </item>
  <item>
    <title>Fake SVG puts 750000 websites at risk: hackers can seize the web server</title>
    <link>https://cybernews.com/security/dnn-vulnerability-enables-rce-exploits-on-web-servers/</link>
    <guid isPermaLink="true">https://cybernews.com/security/dnn-vulnerability-enables-rce-exploits-on-web-servers/</guid>
    <description>Fake SVG puts 750,000 websites at risk: hackers can seize the web server https://ift.tt/BwtOzhU</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 07:59:14 +0000</pubDate>
  </item>
  <item>
    <title>AI-Driven Endpoints Highlight Expanding Software Supply Chain Risk</title>
    <link>https://www.tipranks.com/news/private-companies/ai-driven-endpoints-highlight-expanding-software-supply-chain-risk</link>
    <guid isPermaLink="true">https://www.tipranks.com/news/private-companies/ai-driven-endpoints-highlight-expanding-software-supply-chain-risk</guid>
    <description>AI-Driven Endpoints Highlight Expanding Software Supply Chain Risk https://ift.tt/Op8eSmM</description>
    <category>Supply Chain</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Wed, 22 Apr 2026 06:55:47 +0000</pubDate>
  </item>
  <item>
    <title>Aikido Unveils Endpoint Security as Supply Chain Attacks Hit Developers</title>
    <link>https://briefglance.com/articles/aikido-unveils-endpoint-security-as-supply-chain-attacks-hit-developers</link>
    <guid isPermaLink="true">https://briefglance.com/articles/aikido-unveils-endpoint-security-as-supply-chain-attacks-hit-developers</guid>
    <description>Aikido Unveils Endpoint Security as Supply Chain Attacks Hit Developers https://ift.tt/aDBmAct</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 05:01:32 +0000</pubDate>
  </item>
  <item>
    <title>Adobe Acrobat Reader: Prototype pollution vulnerability enables remote code execution</title>
    <link>https://www.mishcon.com/news/adobe-acrobat-reader-prototype-pollution-vulnerability-enables-remote-code-execution</link>
    <guid isPermaLink="true">https://www.mishcon.com/news/adobe-acrobat-reader-prototype-pollution-vulnerability-enables-remote-code-execution</guid>
    <description>Adobe Acrobat Reader: Prototype pollution vulnerability enables remote code execution https://ift.tt/6Vm9ieE</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Wed, 22 Apr 2026 00:54:23 +0000</pubDate>
  </item>
  <item>
    <title>Critical Microsoft GitHub Flaw Highlights Dangers to CI/CD Pipelines: Tenable</title>
    <link>https://devops.com/critical-microsoft-github-flaw-highlights-dangers-to-ci-cd-pipelines-tenable/</link>
    <guid isPermaLink="true">https://devops.com/critical-microsoft-github-flaw-highlights-dangers-to-ci-cd-pipelines-tenable/</guid>
    <description>Critical Microsoft GitHub Flaw Highlights Dangers to CI/CD Pipelines: Tenable  https://ift.tt/nvuCc9x</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 22:40:30 +0000</pubDate>
  </item>
  <item>
    <title>CISA urges security teams to view environments following axios compromise</title>
    <link>https://www.cybersecuritydive.com/news/cisa--security-teams-environments-axios-compromise/818081/</link>
    <guid isPermaLink="true">https://www.cybersecuritydive.com/news/cisa--security-teams-environments-axios-compromise/818081/</guid>
    <description>CISA urges security teams to view environments following axios compromise https://ift.tt/JYRaA0z</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 19:15:37 +0000</pubDate>
  </item>
  <item>
    <title>22 BRIDGE:BREAK Flaws Expose 20000 Lantronix and Silex Serial-to-IP Converters</title>
    <link>https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html</guid>
    <description>22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters https://ift.tt/DKsAtmp</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 16:09:33 +0000</pubDate>
  </item>
  <item>
    <title>CISA Warns Axios npm Package Was Compromised in Major Supply Chain Attack</title>
    <link>https://cybersecuritynews.com/cisa-warns-axios-npm-supply-chain/</link>
    <guid isPermaLink="true">https://cybersecuritynews.com/cisa-warns-axios-npm-supply-chain/</guid>
    <description>CISA Warns Axios npm Package Was Compromised in Major Supply Chain Attack https://ift.tt/bSQfTkG</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 15:45:19 +0000</pubDate>
  </item>
  <item>
    <title>The &#x27;by design&#x27; security flaw of Model Context Protocol (MCP)</title>
    <link>https://bdtechtalks.substack.com/p/the-by-design-security-flaw-of-model</link>
    <guid isPermaLink="true">https://bdtechtalks.substack.com/p/the-by-design-security-flaw-of-model</guid>
    <description>The &#x27;by design&#x27; security flaw of Model Context Protocol (MCP) https://ift.tt/kotl0Is</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 15:34:39 +0000</pubDate>
  </item>
  <item>
    <title>Aikido Security launches Endpoint to secure AI development and mitigate supply chain attacks</title>
    <link>https://www.scworld.com/brief/aikido-security-launches-endpoint-to-secure-ai-development-and-mitigate-supply-chain-attacks</link>
    <guid isPermaLink="true">https://www.scworld.com/brief/aikido-security-launches-endpoint-to-secure-ai-development-and-mitigate-supply-chain-attacks</guid>
    <description>Aikido Security launches Endpoint to secure AI development and mitigate supply chain attacks https://ift.tt/pWgtqSF</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 15:20:50 +0000</pubDate>
  </item>
  <item>
    <title>Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool</title>
    <link>https://www.darkreading.com/vulnerabilities-threats/google-fixes-critical-rce-flaw-ai-based-antigravity-tool</link>
    <guid isPermaLink="true">https://www.darkreading.com/vulnerabilities-threats/google-fixes-critical-rce-flaw-ai-based-antigravity-tool</guid>
    <description>Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool https://ift.tt/1QOIZsB</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 15:09:32 +0000</pubDate>
  </item>
  <item>
    <title>Lovable left thousands of projects exposed for 48 days and the vibe coding security crisis is only getting worse</title>
    <link>https://thenextweb.com/news/lovable-vibe-coding-security-crisis-exposed</link>
    <guid isPermaLink="true">https://thenextweb.com/news/lovable-vibe-coding-security-crisis-exposed</guid>
    <description>Lovable left thousands of projects exposed for 48 days, and the vibe coding security crisis is only getting worse https://ift.tt/LVCAuWM</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 14:46:48 +0000</pubDate>
  </item>
  <item>
    <title>Introducing Endpoint Protection: Security for Developer Devices</title>
    <link>https://www.aikido.dev/blog/endpoint-security-for-developer-devices</link>
    <guid isPermaLink="true">https://www.aikido.dev/blog/endpoint-security-for-developer-devices</guid>
    <description>Introducing Endpoint Protection: Security for Developer Devices https://ift.tt/2w1NTUs</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 14:25:37 +0000</pubDate>
  </item>
  <item>
    <title>Lovable AI App Builder Reportedly Exposes Thousands of Project Data via API Flaw</title>
    <link>https://cyberpress.org/lovable-ai-app-builder-reportedly-exposes-thousands-of-project-data-via-api-flaw/</link>
    <guid isPermaLink="true">https://cyberpress.org/lovable-ai-app-builder-reportedly-exposes-thousands-of-project-data-via-api-flaw/</guid>
    <description>Lovable AI App Builder Reportedly Exposes Thousands of Project Data via API Flaw https://ift.tt/rUbhJN8</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 13:56:24 +0000</pubDate>
  </item>
  <item>
    <title>Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale</title>
    <link>https://www.globenewswire.com/news-release/2026/04/20/3276846/0/en/aikido-security-launches-endpoint-protection-for-developer-devices-as-software-supply-chain-attacks-hit-unprecedented-scale.html</link>
    <guid isPermaLink="true">https://www.globenewswire.com/news-release/2026/04/20/3276846/0/en/aikido-security-launches-endpoint-protection-for-developer-devices-as-software-supply-chain-attacks-hit-unprecedented-scale.html</guid>
    <description>Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale https://ift.tt/UoCFdbH</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 13:35:41 +0000</pubDate>
  </item>
  <item>
    <title>Apache Syncope RCE Vulnerability Detailed After Public Exploit Code Release</title>
    <link>https://gbhackers.com/apache-syncope-rce-vulnerability/</link>
    <guid isPermaLink="true">https://gbhackers.com/apache-syncope-rce-vulnerability/</guid>
    <description>Apache Syncope RCE Vulnerability Detailed After Public Exploit Code Release https://ift.tt/hT4dgwi</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 13:24:36 +0000</pubDate>
  </item>
  <item>
    <title>Prompt injection turned Googles Antigravity file search into RCE</title>
    <link>https://www.csoonline.com/article/4161382/prompt-injection-turned-googles-antigravity-file-search-into-rce.html</link>
    <guid isPermaLink="true">https://www.csoonline.com/article/4161382/prompt-injection-turned-googles-antigravity-file-search-into-rce.html</guid>
    <description>Prompt injection turned Google’s Antigravity file search into RCE https://ift.tt/kx2siuv</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 13:24:34 +0000</pubDate>
  </item>
  <item>
    <title>Actively exploited Apache ActiveMQ flaw impacts 6400 servers</title>
    <link>https://www.bleepingcomputer.com/news/security/actively-exploited-apache-activemq-flaw-impacts-6-400-servers/</link>
    <guid isPermaLink="true">https://www.bleepingcomputer.com/news/security/actively-exploited-apache-activemq-flaw-impacts-6-400-servers/</guid>
    <description>Actively exploited Apache ActiveMQ flaw impacts 6,400 servers https://ift.tt/TMZ4gHl</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 11:44:27 +0000</pubDate>
  </item>
  <item>
    <title>Claude Code Gemini CLI and GitHub Copilot Vulnerable to Prompt Injection via GitHub Comments</title>
    <link>https://cybersecuritynews.com/prompt-injection-via-github-comments/</link>
    <guid isPermaLink="true">https://cybersecuritynews.com/prompt-injection-via-github-comments/</guid>
    <description>Claude Code, Gemini CLI, and GitHub Copilot Vulnerable to Prompt Injection via GitHub Comments https://ift.tt/FS25xif</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 10:31:11 +0000</pubDate>
  </item>
  <item>
    <title>Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution</title>
    <link>https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html</guid>
    <description>Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution https://ift.tt/WhCTNuU</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 10:29:24 +0000</pubDate>
  </item>
  <item>
    <title>Vibe coding upstart Lovable denies data leak cites &#x27;intentional behavior&#x27; then throws HackerOne under the bus</title>
    <link>https://www.theregister.com/2026/04/20/lovable_denies_data_leak/</link>
    <guid isPermaLink="true">https://www.theregister.com/2026/04/20/lovable_denies_data_leak/</guid>
    <description>Vibe coding upstart Lovable denies data leak, cites &#x27;intentional behavior,&#x27; then throws HackerOne under the bus https://ift.tt/oy8L9Ec</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 10:11:33 +0000</pubDate>
  </item>
  <item>
    <title>Tenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub Repository</title>
    <link>https://smestreet.in/technology/tenable-research-uncovers-remote-code-execution-vulnerability-in-microsoft-github-repository-11749892</link>
    <guid isPermaLink="true">https://smestreet.in/technology/tenable-research-uncovers-remote-code-execution-vulnerability-in-microsoft-github-repository-11749892</guid>
    <description>Tenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub Repository, https://ift.tt/V1EDXyM</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 10:04:20 +0000</pubDate>
  </item>
  <item>
    <title>Hackers Could Weaponize GGUF Models to Achieve RCE on SGLang Inference Servers</title>
    <link>https://cyberpress.org/hackers-could-weaponize-gguf-models-to-achieve-rce-on-sglang-inference-servers/</link>
    <guid isPermaLink="true">https://cyberpress.org/hackers-could-weaponize-gguf-models-to-achieve-rce-on-sglang-inference-servers/</guid>
    <description>Hackers Could Weaponize GGUF Models to Achieve RCE on SGLang Inference Servers https://ift.tt/UTpIVmw</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 08:54:09 +0000</pubDate>
  </item>
  <item>
    <title>CISA Warns Axios npm Package Was Compromised in Major Supply Chain Attack</title>
    <link>https://cyberpress.org/cisa-warns-axios-npm-package-was-compromised-in-major-supply-chain-attack/</link>
    <guid isPermaLink="true">https://cyberpress.org/cisa-warns-axios-npm-package-was-compromised-in-major-supply-chain-attack/</guid>
    <description>CISA Warns Axios npm Package Was Compromised in Major Supply Chain Attack https://ift.tt/eymP7Vs</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 08:35:14 +0000</pubDate>
  </item>
  <item>
    <title>Tenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub Repository Exposing CI/CD Pipeline to Unauthorized Code Execution</title>
    <link>https://www.itvoice.in/tenable-research-uncovers-remote-code-execution-vulnerability-in-microsoft-github-repository-exposing-ci-cd-pipeline-to-unauthorized-code-execution</link>
    <guid isPermaLink="true">https://www.itvoice.in/tenable-research-uncovers-remote-code-execution-vulnerability-in-microsoft-github-repository-exposing-ci-cd-pipeline-to-unauthorized-code-execution</guid>
    <description>Tenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub Repository, Exposing CI/CD Pipeline to Unauthorized Code Execution https://ift.tt/sOHxvXg</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 08:29:41 +0000</pubDate>
  </item>
  <item>
    <title>Critical Anthropics MCP Vulnerability Enables Remote Code Execution Attacks</title>
    <link>https://cybersecuritynews.com/anthropics-mcp-vulnerability/</link>
    <guid isPermaLink="true">https://cybersecuritynews.com/anthropics-mcp-vulnerability/</guid>
    <description>Critical Anthropic’s MCP Vulnerability Enables Remote Code Execution Attacks https://ift.tt/NgPh5a6</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 07:19:29 +0000</pubDate>
  </item>
  <item>
    <title>Lovables API flaw exposed private project data from the $6.6 billion AI app builder used by Nvidia and Microsoft teams</title>
    <link>https://startupfortune.com/lovables-api-flaw-exposed-private-project-data-from-the-66-billion-ai-app-builder-used-by-nvidia-and-microsoft-teams/</link>
    <guid isPermaLink="true">https://startupfortune.com/lovables-api-flaw-exposed-private-project-data-from-the-66-billion-ai-app-builder-used-by-nvidia-and-microsoft-teams/</guid>
    <description>Lovable’s API flaw exposed private project data from the $6.6 billion AI app builder used by Nvidia and Microsoft teams https://ift.tt/E5xzyKD</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 06:56:42 +0000</pubDate>
  </item>
  <item>
    <title>Malicious GGUF Models Could Trigger Remote Code Execution on SGLang Servers</title>
    <link>https://gbhackers.com/malicious-gguf-models-could-trigger-rce/</link>
    <guid isPermaLink="true">https://gbhackers.com/malicious-gguf-models-could-trigger-rce/</guid>
    <description>Malicious GGUF Models Could Trigger Remote Code Execution on SGLang Servers https://ift.tt/tE3rbwk</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 06:29:47 +0000</pubDate>
  </item>
  <item>
    <title>CISA Warns Compromised Axios npm Package Fueled Major Supply Chain Attack</title>
    <link>https://gbhackers.com/cisa-warns-compromised-axios-npm-package/</link>
    <guid isPermaLink="true">https://gbhackers.com/cisa-warns-compromised-axios-npm-package/</guid>
    <description>CISA Warns Compromised Axios npm Package Fueled Major Supply Chain Attack https://ift.tt/3Sh8QXg</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 06:15:40 +0000</pubDate>
  </item>
  <item>
    <title>Lovable AI App Builder Hit by Reported API Flaw Exposing Thousands of Projects</title>
    <link>https://gbhackers.com/lovable-ai-app-builder-hit-by-reported-api-flaw/</link>
    <guid isPermaLink="true">https://gbhackers.com/lovable-ai-app-builder-hit-by-reported-api-flaw/</guid>
    <description>Lovable AI App Builder Hit by Reported API Flaw Exposing Thousands of Projects https://ift.tt/asxTLXh</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 06:11:05 +0000</pubDate>
  </item>
  <item>
    <title>SGLang Enables Remote Code Execution via Malicious GGUF Models</title>
    <link>https://letsdatascience.com/news/sglang-enables-remote-code-execution-via-malicious-gguf-mode-963bf60d</link>
    <guid isPermaLink="true">https://letsdatascience.com/news/sglang-enables-remote-code-execution-via-malicious-gguf-mode-963bf60d</guid>
    <description>SGLang Enables Remote Code Execution via Malicious GGUF Models https://ift.tt/IRetcHV</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 05:38:42 +0000</pubDate>
  </item>
  <item>
    <title>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables</title>
    <link>https://www.trendmicro.com/pt_br/research/26/d/vercel-breach-oauth-supply-chain.html</link>
    <guid isPermaLink="true">https://www.trendmicro.com/pt_br/research/26/d/vercel-breach-oauth-supply-chain.html</guid>
    <description>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/jIBeCuh</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 03:15:46 +0000</pubDate>
  </item>
  <item>
    <title>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables</title>
    <link>https://www.trendmicro.com/ru_ru/research/26/d/vercel-breach-oauth-supply-chain.html</link>
    <guid isPermaLink="true">https://www.trendmicro.com/ru_ru/research/26/d/vercel-breach-oauth-supply-chain.html</guid>
    <description>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/K8Z5lwR</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 02:50:35 +0000</pubDate>
  </item>
  <item>
    <title>Lovable Left Thousands of Projects Exposed for 48 Days And Still Hasn&#x27;t Fixed It</title>
    <link>https://www.cyberkendra.com/2026/04/lovable-left-thousands-of-projects.html</link>
    <guid isPermaLink="true">https://www.cyberkendra.com/2026/04/lovable-left-thousands-of-projects.html</guid>
    <description>Lovable Left Thousands of Projects Exposed for 48 Days — And Still Hasn&#x27;t Fixed It https://ift.tt/jFxufgQ</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 02:01:38 +0000</pubDate>
  </item>
  <item>
    <title>API Security Risks Rise as AI Adoption Accelerates</title>
    <link>https://www.esecurityplanet.com/threats/api-security-risks-rise-as-ai-adoption-accelerates/</link>
    <guid isPermaLink="true">https://www.esecurityplanet.com/threats/api-security-risks-rise-as-ai-adoption-accelerates/</guid>
    <description>API Security Risks Rise as AI Adoption Accelerates  https://ift.tt/oL4A7vV</description>
    <category>API Security</category>
    <category domain="difficulty">beginner</category>
    <pubDate>Tue, 21 Apr 2026 02:01:37 +0000</pubDate>
  </item>
  <item>
    <title>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables</title>
    <link>https://www.trendmicro.com/de_de/research/26/d/vercel-breach-oauth-supply-chain.html</link>
    <guid isPermaLink="true">https://www.trendmicro.com/de_de/research/26/d/vercel-breach-oauth-supply-chain.html</guid>
    <description>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/D9r2QqY</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 01:00:27 +0000</pubDate>
  </item>
  <item>
    <title>Astrix Security Highlights Rising Risk in OAuth-Driven Supply Chain Attacks</title>
    <link>https://www.tipranks.com/news/private-companies/astrix-security-highlights-rising-risk-in-oauth-driven-supply-chain-attacks-2</link>
    <guid isPermaLink="true">https://www.tipranks.com/news/private-companies/astrix-security-highlights-rising-risk-in-oauth-driven-supply-chain-attacks-2</guid>
    <description>Astrix Security Highlights Rising Risk in OAuth-Driven Supply Chain Attacks https://ift.tt/pdx7G9Z</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Tue, 21 Apr 2026 00:35:45 +0000</pubDate>
  </item>
  <item>
    <title>Critical RCE vulnerability in protobuf.js; Exploit code published</title>
    <link>https://www.scworld.com/brief/critical-rce-vulnerability-in-protobuf-js-exploit-code-published</link>
    <guid isPermaLink="true">https://www.scworld.com/brief/critical-rce-vulnerability-in-protobuf-js-exploit-code-published</guid>
    <description>Critical RCE vulnerability in protobuf.js; Exploit code published https://ift.tt/LxzVmlR</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 23:39:19 +0000</pubDate>
  </item>
  <item>
    <title>Lovable AI App Builder Reportedly Exposes Customer Data From Projects via Unpatched API Flaw</title>
    <link>https://cybersecuritynews.com/lovable-ai-app-builder-customer-data/</link>
    <guid isPermaLink="true">https://cybersecuritynews.com/lovable-ai-app-builder-customer-data/</guid>
    <description>Lovable AI App Builder Reportedly Exposes Customer Data From Projects via Unpatched API Flaw https://ift.tt/U5uy4dg</description>
    <category>API Security</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 22:41:34 +0000</pubDate>
  </item>
  <item>
    <title>Google Chrome Multiple Vulnerabilities</title>
    <link>https://www.hkcert.org/security-bulletin/google-chrome-multiple-vulnerabilities_20260416</link>
    <guid isPermaLink="true">https://www.hkcert.org/security-bulletin/google-chrome-multiple-vulnerabilities_20260416</guid>
    <description>Google Chrome Multiple Vulnerabilities https://ift.tt/u1NDCGr</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 22:29:33 +0000</pubDate>
  </item>
  <item>
    <title>Vuln in Googles Antigravity AI agent manager could escape sandbox give attackers remote code execution</title>
    <link>https://cyberscoop.com/google-antigravity-pillar-security-agent-sandbox-escape-remote-code-execution/</link>
    <guid isPermaLink="true">https://cyberscoop.com/google-antigravity-pillar-security-agent-sandbox-escape-remote-code-execution/</guid>
    <description>Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution https://ift.tt/MnhvV7G</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 21:44:17 +0000</pubDate>
  </item>
  <item>
    <title>iTerm2 Flaw Abuses SSH Integration Escape Sequences to Turn Text Into Code Execution</title>
    <link>https://cyberpress.org/iterm2-flaw-abuses-ssh-integration-escape-sequences-to-turn-text-into-code-execution/</link>
    <guid isPermaLink="true">https://cyberpress.org/iterm2-flaw-abuses-ssh-integration-escape-sequences-to-turn-text-into-code-execution/</guid>
    <description>iTerm2 Flaw Abuses SSH Integration Escape Sequences to Turn Text Into Code Execution https://ift.tt/l13PHeM</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 20:09:03 +0000</pubDate>
  </item>
  <item>
    <title>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables</title>
    <link>https://www.trendmicro.com/en_us/research/26/d/vercel-breach-oauth-supply-chain.html</link>
    <guid isPermaLink="true">https://www.trendmicro.com/en_us/research/26/d/vercel-breach-oauth-supply-chain.html</guid>
    <description>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/60RoEYV</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 19:50:44 +0000</pubDate>
  </item>
  <item>
    <title>Vercel incident falls short of a supply chain attack</title>
    <link>https://www.scworld.com/news/vercel-incident-falls-short-of-a-supply-chain-attack-for-now</link>
    <guid isPermaLink="true">https://www.scworld.com/news/vercel-incident-falls-short-of-a-supply-chain-attack-for-now</guid>
    <description>Vercel incident falls short of a supply chain attack  https://ift.tt/mfiYhux</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 18:40:23 +0000</pubDate>
  </item>
  <item>
    <title>Vulnerability exploitation surges often precede disclosure offering possible early warnings</title>
    <link>https://www.cybersecuritydive.com/news/vulnerability-disclosure-surges-warnings-greynoise/817952/</link>
    <guid isPermaLink="true">https://www.cybersecuritydive.com/news/vulnerability-disclosure-surges-warnings-greynoise/817952/</guid>
    <description>Vulnerability exploitation surges often precede disclosure, offering possible early warnings https://ift.tt/UAnQyhJ</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 15:49:22 +0000</pubDate>
  </item>
  <item>
    <title>Supply Chain Attack Hits Vercel: User Data is Being Sold on BreachForums For $2M</title>
    <link>https://www.ox.security/blog/vercel-context-ai-supply-chain-attack-breachforums/</link>
    <guid isPermaLink="true">https://www.ox.security/blog/vercel-context-ai-supply-chain-attack-breachforums/</guid>
    <description>Supply Chain Attack Hits Vercel: User Data is Being Sold on BreachForums For $2M  https://ift.tt/4aw2YkZ</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 15:40:30 +0000</pubDate>
  </item>
  <item>
    <title>Anthropic MCP Hit by Critical Vulnerability Enabling Remote Code Execution</title>
    <link>https://gbhackers.com/anthropic-mcp-hit-by-critical-vulnerability/</link>
    <guid isPermaLink="true">https://gbhackers.com/anthropic-mcp-hit-by-critical-vulnerability/</guid>
    <description>Anthropic MCP Hit by Critical Vulnerability Enabling Remote Code Execution https://ift.tt/4HM1zP0</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 15:24:36 +0000</pubDate>
  </item>
  <item>
    <title>Critical Anthropic MCP Vulnerability Enables Remote Code Execution Attacks</title>
    <link>https://cyberpress.org/critical-anthropic-mcp-vulnerability/</link>
    <guid isPermaLink="true">https://cyberpress.org/critical-anthropic-mcp-vulnerability/</guid>
    <description>Critical Anthropic MCP Vulnerability Enables Remote Code Execution Attacks https://ift.tt/sjNEzGL</description>
    <category>AI</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 14:39:48 +0000</pubDate>
  </item>
  <item>
    <title>Why the Axios attack proves AI is mandatory for supply chain security</title>
    <link>https://cyberscoop.com/ai-powered-security-operations-axios-supply-chain-attack/</link>
    <guid isPermaLink="true">https://cyberscoop.com/ai-powered-security-operations-axios-supply-chain-attack/</guid>
    <description>Why the Axios attack proves AI is mandatory for supply chain security https://ift.tt/AnX6trC</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 13:50:36 +0000</pubDate>
  </item>
  <item>
    <title>Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale</title>
    <link>https://finance.yahoo.com/sectors/technology/articles/aikido-security-launches-endpoint-protection-110000337.html</link>
    <guid isPermaLink="true">https://finance.yahoo.com/sectors/technology/articles/aikido-security-launches-endpoint-protection-110000337.html</guid>
    <description>Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale https://ift.tt/rNiAjU3</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 13:25:49 +0000</pubDate>
  </item>
  <item>
    <title>Aikido Endpoint offers developers additional protection against supply chain attacks</title>
    <link>https://www.techzine.eu/news/security/140610/aikido-endpoint-offers-developers-additional-protection-against-supply-chain-attacks/</link>
    <guid isPermaLink="true">https://www.techzine.eu/news/security/140610/aikido-endpoint-offers-developers-additional-protection-against-supply-chain-attacks/</guid>
    <description>Aikido Endpoint offers developers additional protection against supply chain attacks https://ift.tt/8yt0jbA</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 12:25:17 +0000</pubDate>
  </item>
  <item>
    <title>Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale</title>
    <link>https://uk.finance.yahoo.com/news/aikido-security-launches-endpoint-protection-110000316.html</link>
    <guid isPermaLink="true">https://uk.finance.yahoo.com/news/aikido-security-launches-endpoint-protection-110000316.html</guid>
    <description>Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale https://ift.tt/sVFAYcE</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 11:35:39 +0000</pubDate>
  </item>
  <item>
    <title>New security agent helps fight software supply chain attacks</title>
    <link>https://betanews.com/article/new-security-agent-helps-fight-software-supply-chain-attacks/</link>
    <guid isPermaLink="true">https://betanews.com/article/new-security-agent-helps-fight-software-supply-chain-attacks/</guid>
    <description>New security agent helps fight software supply chain attacks  https://ift.tt/tRoy3LB</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 11:10:29 +0000</pubDate>
  </item>
  <item>
    <title>Aikido launches Endpoint to secure AI-native developer workflows</title>
    <link>https://tech.eu/2026/04/20/aikido-launches-endpoint-to-secure-ai-native-developer-workflows/</link>
    <guid isPermaLink="true">https://tech.eu/2026/04/20/aikido-launches-endpoint-to-secure-ai-native-developer-workflows/</guid>
    <description>Aikido launches Endpoint to secure AI-native developer workflows https://ift.tt/ULhxSu6</description>
    <category>Supply Chain</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 11:10:28 +0000</pubDate>
  </item>
  <item>
    <title>52M-Download protobuf.js Library Hit by RCE in Schema Handling</title>
    <link>https://hackread.com/52m-download-protobuf-js-library-rce-schema-handle/</link>
    <guid isPermaLink="true">https://hackread.com/52m-download-protobuf-js-library-rce-schema-handle/</guid>
    <description>52M-Download protobuf.js Library Hit by RCE in Schema Handling https://ift.tt/i1QdNDX</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 10:54:42 +0000</pubDate>
  </item>
  <item>
    <title>Critical Vulnerability In Flowise Allows Remote Command Execution Via MCP Adapters</title>
    <link>https://cybersecuritynews.com/flowise-vulnerability/</link>
    <guid isPermaLink="true">https://cybersecuritynews.com/flowise-vulnerability/</guid>
    <description>Critical Vulnerability In Flowise Allows Remote Command Execution Via MCP Adapters https://ift.tt/NBwdZU2</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 09:41:18 +0000</pubDate>
  </item>
  <item>
    <title>Meta and PortSwigger drive offensive security further to find what others miss</title>
    <link>https://www.helpnetsecurity.com/2026/04/20/meta-bug-bounty-portswigger-partnership/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2026/04/20/meta-bug-bounty-portswigger-partnership/</guid>
    <description>Meta and PortSwigger drive offensive security further to find what others miss  https://ift.tt/gc5osvx</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 08:49:31 +0000</pubDate>
  </item>
  <item>
    <title>Cisco ISE Vulnerabilities Enable Remote Code Execution</title>
    <link>https://thecyberexpress.com/cisco-ise-vulnerabilities-enable-rce/</link>
    <guid isPermaLink="true">https://thecyberexpress.com/cisco-ise-vulnerabilities-enable-rce/</guid>
    <description>Cisco ISE Vulnerabilities Enable Remote Code Execution https://ift.tt/I3pcsMW</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 06:29:45 +0000</pubDate>
  </item>
  <item>
    <title>Dark web forum hosts $10000 article contest on vulnerability exploitation</title>
    <link>https://www.scworld.com/brief/dark-web-forum-hosts-10000-article-contest-on-vulnerability-exploitation</link>
    <guid isPermaLink="true">https://www.scworld.com/brief/dark-web-forum-hosts-10000-article-contest-on-vulnerability-exploitation</guid>
    <description>Dark web forum hosts $10,000 article contest on vulnerability exploitation https://ift.tt/Mc8sEPr</description>
    <category>Bug Bounty</category>
    <category domain="difficulty">news</category>
    <pubDate>Mon, 20 Apr 2026 03:44:09 +0000</pubDate>
  </item>
  <item>
    <title>CISA tells feds to patch 13-year-old Apache ActiveMQ bug under active attack</title>
    <link>https://www.theregister.com/2026/04/17/cisa_tells_feds_to_patch/</link>
    <guid isPermaLink="true">https://www.theregister.com/2026/04/17/cisa_tells_feds_to_patch/</guid>
    <description>CISA tells feds to patch 13-year-old Apache ActiveMQ bug under active attack https://ift.tt/m82B1ER</description>
    <category>RCE</category>
    <category domain="difficulty">news</category>
    <pubDate>Sun, 19 Apr 2026 14:04:39 +0000</pubDate>
  </item>
</channel>
</rss>