02

A 18‑Year‑Old Nginx RCE Flaw Finally Exposed (CVE‑2026‑42945)

Black & White Path 5 min read Information Security
2
0
03

Analyzing an AI‑Developed C2 Remote‑Access Trojan Framework

Black & White Path 2 min read Information Security
3
0
04

When $gt Becomes a Master Key: Bypassing MongoDB API Logins via NoSQL Injection

Black & White Path 12 min read Information Security
1
0
05

Dark Web Claim of a 62 GB OpenAI Data Leak: What’s Inside?

Black & White Path 2 min read Information Security
1
0
06

One Bash Script, One Weekend: How AI Uncovered a 23‑Year‑Old Linux Kernel Flaw

dbaplus Community 19 min read Information Security
1
0
07

Why npm Keeps Getting Compromised: A Deep Dive into the Latest node‑ipc Supply‑Chain Attack

Black & White Path 12 min read Information Security
1
0
08

From Normal User to Root: Inside the ssh-keysign-pwn Linux Kernel LPE (CVE‑2026‑46333)

Black & White Path 16 min read Information Security
1
0
09

When Scammers Go Physical: A Ledger User Receives a Handwritten Phishing Letter

Black & White Path 4 min read Information Security
1
0
10

Foxconn Factories Hit by Ransomware: 8 TB of Sensitive Files Potentially Stolen

Black & White Path 5 min read Information Security
1
0
11

AI‑Powered Red Team Evasion Playbook: Webshell Stealth, WAF/RASP/EDR Bypass & Traffic Camouflage Tips

Black & White Path 7 min read Information Security
1
0
12

Beware Open Ports: A Complete Server Security Self‑Check Using nmap

MaGe Linux Operations 41 min read Information Security
1
0
13

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake

Linux Tech Enthusiast 10 min read Information Security
1
0
14

How ODINI Breaches Air‑Gapped Machines: Exfiltrating Keys Without Opening the Cage

Black & White Path 6 min read Information Security
1
0
15

WireTapper: One-Click Open-Source Tool to Reveal All Nearby Wireless Devices

Black & White Path 4 min read Information Security
1
0
16

Comprehensive Red Team Information‑Gathering Guide

Black & White Path 19 min read Information Security
1
0
17

How 84 npm Packages Were Poisoned via a Legitimate CI/CD Pipeline

Black & White Path 18 min read Information Security
2
0
18

AI‑Powered 0‑Day Discovery: How Attackers Autonomously Bypassed 2FA

Black & White Path 12 min read Information Security
1
0
19

How We Obtained Root on Samsung S26 (Exynos 2600) – First Exploit After Bootloader Lock Removal

Black & White Path 1 min read Information Security
1
0
20

How FastGPT’s NoSQL Injection (CVE‑2026‑40351) Enables Admin Login Bypass – A Deep Dive

Black & White Path 10 min read Information Security
1
0
21

From an External Weak Password to Full Internal Access: A School Network Penetration Walkthrough

Black & White Path 3 min read Information Security
1
0
22

Critical CVE-2026-7482 'Bleeding Llama' in Ollama: Why You Must Upgrade Now

Old Zhang's AI Learning 5 min read Information Security
1
0
23

When a Security Vendor Becomes the Target: Trellix Source Code Breach Exposes Risks

Black & White Path 8 min read Information Security
1
0
24

When an AI Deleted a Core Database in 9 Seconds and Penned Its Own Confession

ITPUB 10 min read Information Security
1
0
25

12 High‑Severity CVEs Simultaneously Disclosed Across All Next.js/React Versions

Black & White Path 12 min read Information Security
1
0
26

Xubuntu Download Page Hijacked with Crypto‑Stealing Malware

Linux Tech Enthusiast 3 min read Information Security
1
0
27

Is the era of browser malware returning? Inside Chrome V8 zero‑day CVE‑2026‑5865

Black & White Path 4 min read Information Security
2
0
28

WhisperPair Vulnerability Enables Remote Hijacking of Millions of Bluetooth Headphones

Black & White Path 9 min read Information Security
1
0
29

Secure Anything with Google Tink: Encrypt Everywhere in Just Three Lines

Spring Full-Stack Practical Cases 13 min read Information Security
2
0
30

Why Large‑Model AI Agents Need Strict Security Controls

Old Zhang's AI Learning 12 min read Information Security
2
0
31

Why MCP’s Protocol Layer Allows Prompt Injection and Hijacks Agent Context

DeepHub IMBA 10 min read Information Security
1
0
32

23‑Year‑Old Hacks Taiwan High‑Speed Rail with SDR: TETRA Flaw Exposes 19‑Year Gap

Black & White Path 9 min read Information Security
1
0
33

Remote Recovery of Bluetooth Chip AES‑128 Keys via RF Side‑Channel at Meter‑Scale Distance

Black & White Path 7 min read Information Security
1
0
34

HackingTool: One Terminal Access to 185+ Penetration Testing Tools (50K+ Stars)

Black & White Path 8 min read Information Security
1
0
35

Microsoft Edge Stores Passwords in Plain Memory – Users’ Trust Exposed

Black & White Path 6 min read Information Security
1
0
36

KreiosC2 v3: Using Social Media as a Botnet C2 Server

Black & White Path 4 min read Information Security
1
0
37

Investigating and Securing a Server After a Suspicious Login

Ops Community 27 min read Information Security
1
0
38

Critical Vulnerabilities Discovered in Apache OpenNLP, Including XXE Injection

Black & White Path 5 min read Information Security
1
0
39

8 Essential Windows Privilege‑Escalation Techniques Every Security Analyst Should Know

ITPUB 19 min read Information Security
1
0
40

Pentest‑AI: One‑Command, Fully Automated Penetration Testing in 4 Minutes

Black & White Path 10 min read Information Security
3
0
41

DeepSeek + Claude Code Reproduce CVE‑2026‑31431 Linux ‘Copy Fail’ Privilege Escalation

Black & White Path 16 min read Information Security
2
0
42

Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation

MaGe Linux Operations 28 min read Information Security
1
0
43

Phalanx: An Open‑Source Autonomous Pentesting Assistant for Kali Linux

Black & White Path 4 min read Information Security
1
0
44

Maigret: A 3000+ Site Username Reconnaissance Tool for OSINT

AI Explorer 6 min read Information Security
1
0
45

Mastering Linux Firewalls: Core Netfilter Concepts and Practical iptables/firewalld Configuration

Ops Community 28 min read Information Security
1
0
46

Rare‑Earth Bait: Technical Analysis of a Shellcode Loader

Black & White Path 13 min read Information Security
1
0
47

When a Screenshot Gets You Caught: How Invisible Watermarks Reveal Leakers

SpringMeng 10 min read Information Security
2
0
48

20 Essential Server Hardening Steps Before Launching a New Machine

MaGe Linux Operations 33 min read Information Security
3
0
49

Urgent May Day Alert: CVE‑2026‑31431 Linux Kernel LPE & Container Escape

Ops Development Stories 6 min read Information Security
1
0
50

Agent Skills Security: Full Lifecycle Governance Framework and Threat Landscape

SuanNi 17 min read Information Security
3
0