2777
🛡️ Cybersecurity enthusiast | 💻 Helping secure the digital world | 🌐 Web App Tester | 🕵️♂️ OSINT Specialist Admin: @laazy_hack3r
Most beginners don’t fail at bug bounty because it’s “too hard.”
They fail because they jump between tools, watch random tutorials, and call that learning.
No structure = no results.
You don’t need more tools. You need a path.
Something that shows: what to learn → what to practice → how to actually find bugs.
That’s where these come in:
* https://resources.codelivly.com/product/bug-bounty-beginner-editions/
* https://resources.codelivly.com/product/the-ultimate-bug-bounty-starter-pack/
They’re not theory dumps. It’s the stuff you actually use—recon, XSS, SQLi, reporting—step by step.
If you’re tired of “learning” but not earning, this might fix that.
Check it out if it clicks.
#NetSec
#Threat_Research
"Policy-Guided Threat Hunting: An LLM enabled Framework with Splunk SOC Triage", Mar. 2026.
// By integrating Agentic AI with Splunk SIEM, we developed a unique threat hunting framework. The framework systematically and seamlessly integrates different threat hunting modules together, ranging from traffic ingestion to anomaly assessment using a reconstruction-based autoencoder, deep reinforcement learning with two layers for initial triage, and a LLM for contextual analysis
#tools
#AIOps
"SkillTester: Benchmarking Utility and Security of Agent Skills", Mar. 2026.
// Benchmark system for testing skills with a repeatable agent workflow
#Malware_analysis
1⃣ Bogus Avast website fakes virus scan, installs Venom Stealer instead
https://www.malwarebytes.com/blog/threat-intel/2026/03/bogus-avast-website-fakes-virus-scan-installs-venom-stealer-instead
2⃣ Supply Chain Attack on Axios
https://socket.dev/blog/axios-npm-package-compromised
3⃣ SHA Pinning Is Not Enough..
https://rosesecurity.dev/2026/03/24/sha-pinning-is-not-enough.html
#Analytics
#Threat_Research
An analytical review of the main cybersecurity events for the week (Mar.21-28, 2026)
1⃣ Telegram 0-click RCE
// CVSS: 9.8
2⃣ litellm PyPI package (v1.82.7 + v1.82.8) compromised
// full timeline and status
3⃣ Claude security configurations
// Enhanced security configurations for Claude on MacOS
4⃣ Business TikTok accounts targeted with AITM phishing kits
5⃣ Exploiting AQL Injection Vulnerabilities in ArangoDB
// This post serves as a comprehensive reference for pentesters seeking detailed insight into AQL injections and how they can be exploited
6⃣ Infiniti Stealer
// New macOS infostealer using ClickFix and Python/Nuitka
7⃣ Trivy Compromised: Everything You Need to Know about the Latest Supply Chain Attack
// On Mar.19,2026, threat actors injected credential-stealing malware into Aqua Security’s Trivy scanner and related GitHub Actions
8⃣ strongSwan CVE-2026-25075:
Integer Underflow in VPN Authentication
// Critical integer underflow vulnerability in strongSwan 4.5.0-6.0.4 allows attackers to cause DoS via malformed EAP-TTLS messages
]-> P.S. The past week has demonstrated that attackers' focus has finally shifted to developer tools (AI libraries, CI/CD) ...
]-> Analytical review (Mar.14-21, 2026)
#AppSec
#WebApp_Security
"A Large-Scale Study of Telegram Bots", Mar. 2027.
]-> Dataset
// This research provides the first large-scale characterization of Telegram bots by analyzing over 32K bots and 492M messages. The authors developed an automated interaction system to classify bots, uncovering both beneficial applications and sophisticated malicious infrastructures
#NetSec
#cryptography
"Analyzing the WebRTC Ecosystem and Breaking Authentication in DTLS-SRTP", 2026.
]-> Repo
// In this work developing an automated MitM testing framework (DTLS-MitM-Scanner) to test the DTLS channel of a DTLS-SRTP connection
#Whitepaper
"Implementing Micro-Segmentation in a Legacy Enterprise Lab Network: A Zero Trust Approach to Reducing Lateral Movement, Improving Containment, and Controlling Operational Overhead", Jan. 2026.
// This study evaluates micro-segmentation as a practical Zero Trust control in a Windows Active Directory lab that models common legacy dependencies (directory services, file services, a web tier, and a database tier)
#tools
#AIOps
#MLSecOps
"Auditing MCP Servers for Over-Privileged Tool Capabilities", Mar. 2026.
// MCP Tools Detection provides a comprehensive, multi-layered defense mechanism combining static code analysis (AST-based) with dynamic runtime monitoring (eBPF-based) to identify malicious or vulnerable MCP servers before they can compromise an agentic workflow
#Whitepaper
#Blue_Team_Techniques
"Enhancing Linux Threat Detection: A Sysmon - Based Approach to Identifying Sandworm TTPs", Mar. 2026.
// Linux systems have become foundational across modern IT enterprises. Threat actors are increasingly targeting Linux systems, including well - known APTs such as Sandworm. This research evaluates the effectiveness of Sysmon for Linux in detecting Sandworm TTPs compared to the more established Linux auditd
See also:
]-> The Sysmon Community Guide, v.2.0, Dec.2025
#tools
#DFIR
#Research
#Whitepaper
"Assessing the Impact of Memory Acquisition on Key Windows Artifacts", Feb. 2026.
// This research evaluates the impact of memory capture tools on data at rest, aiming to understand the degree of change that occurs to artifacts, measure differences based on tool selection, and inform best practices for live responders
#Infosec_Standards
NIST SP 800-81 Rev.3:
"Secure Domain Name System (DNS) Deployment Guide", March 2026.
#Analytics
#Threat_Research
An analytical review of the main cybersecurity events for the week (Mar.14-21, 2026)
1⃣ More IP KVM Vulnerabilities
// 9 vulnerabilities across 4 vendors turn low-cost IP-KVMs into attack platforms
2⃣ Perseus Android Malware
// Perseus highlights the continued evolution of Android malware, demonstrating how modern threats build upon established families like Cerberus/Phoenix while introducing targeted improvements
3⃣ The Proliferation of DarkSword
// Google's TI uncovered DarkSword, a sophisticated iOS exploit chain using six 0-days since 2025, targeting users in multiple countries with JavaScript-based payloads
4⃣ A 32-Year-Old Bug Walks Into A Telnet Server
// GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE
5⃣ Vulnerabilities in snapd and Rust Coreutils Allowing Root Privileges
// CVE-2026-3888
6⃣ Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
// A flaw in Profile Builder Pro <3.14.5 enables unauth PHP Object Injection via AJAX, allowing RCE through crafted serialized objects
7⃣ SQLI in Spring AI’s MariaDB Vector Store
// CVE-2026-22730
8⃣ Exposure of TLS Private Key for Myclaw 360 in Qihoo 360 "Security Claw" AI Platform
]-> Analytical review (Mar.7-14, 2026)
#Tech_book
#Cyber_Education
#Malware_analysis
"MD MZ Book 2nd Edition", 2024.
]-> Repo
// The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware
#AIOps
#NetSec
#Cloud_Security
#Offensive_security
Pwning AI Code Interpreters in AWS Bedrock AgentCore
https://www.beyondtrust.com/blog/entry/pwning-aws-agentcore-code-interpreter
// AWS Bedrock AgentCore Code Interpreter’s ‘Sandbox’ mode allows DNS queries, enabling interactive shells and bypass of network isolation through DNS-based command-and-control
#tools
#AIOps
"Evaluating Privilege Usage of Agents on Real-World Tools", Mar. 2026.
// GrantBox - security evaluation framework designed to systematically assess how autonomous agents handle privilege usage when interacting with real-world tools and services
#Whitepaper
#Threat_Research
#WebApp_Security
"OWASP Automated Threats Handbook:
Web Applications", Version 1.3, Mar. 2026.
// OWASP Automated Threat Handbook remains the definitive resource for security professionals seeking actionable information to defend against the abuse of valid web application functionality. Despite the ever-shifting threat landscape, the handbook’s core framework of twenty-one unique, unordered OWASP Automated Threats has proven remarkably resilient. This latest update, ver.1.3, ensures the project stays ahead of the curve as automated attacks continue to evolve
#cryptography
"Cryptanalysis of a Lightweight RFID Authentication Protocol Based on a Variable Matrix Encryption Algorithm", Mar. 2026.
// Taken together, our results indicate that the protocol is structurally insecure and admits a realistic route to full compromise in the lightweight parameter regime advocated for deployment
#Research
#Hardware_Security
"Attacking AI Accelerators by Leveraging Arithmetic Properties of Addition", Mar. 2026.
// A new hardware aging attack that exploits commutative properties of addition to disrupt the multiply-and-add operation that forms the backbone of almost all AI models. Experimental results demonstrates that the proposed attack degrades inference accuracy by up to 64% in 4 years, posing a significant threat to AI accelerators. The attack can also be extended to arithmetic units of general-purpose processors
#AIOps
#DevOps
#MLSecOps
AI Security Solutions Landscape
for LLM and Gen AI Apps, Q2 2026.
See also:
]-> AI Security Solutions Landscape for Agentic AI Q2 2026
]-> OWASP GenAI Data Security Risks & Mitigations 2026
#tools
#MLSecOps
"Claudini: Autoresearch Discovers State-of-the-Art Adversarial Attack Algorithms for LLMs", Mar. 2026.
]-> Code repository
// This paper demonstrates that LLM agents can automate AI safety research by autonomously discovering novel white-box adversarial attacks. The resulting algorithms significantly outperform over 30 existing methods, achieving up to 100% success rates in jailbreaking and prompt injection evaluations across various models. These findings highlight the potential for LLM agents to accelerate security red-teaming through iterative optimization and quantitative feedback
#AIOps
#Research
"Malicious Or Not: Adding Repository Context to Agent Skill Classification", Mar. 2026.
]-> Repo
// The largest empirical security analysis of the AI agent skill ecosystem
#info
#Events
#MLSecOps
[un]prompted 2026:
The AI Security Practitioner Conference,
March 3-4, The Hibernia, San Francisco.
https://github.com/ethanolivertroy/unpromptedcon-2026-slides
// 49 slide decks from talks across both days and both stages, covering AI agents, offensive AI, LLM security, governance, and the agentic future
#Whitepaper
#Offensive_security
"Leveraging Generative AI for Password Cracking Efficiency Under Resource Constraints", Jan. 2026.
// The purpose of this research is to investigate whether GenAI can alleviate the hardware and financial burdens of password cracking/recovery while maintaining or even improving cracking success rates...
#tools
#Threat_Research
"ProHunter: A Comprehensive APT Hunting System Based on Whole-System Provenance", Mar. 2026.
// ProHunter - efficient and accurate provenance-based APT hunting system with a platform-independent design
#AppSec
1⃣ Intego X9: Never trust my updates
https://blog.quarkslab.com/intego_lpe_macos_3.html
// Multiple vulnerabilities in Intego's macOS products enable privilege escalation through XPC flaws, race conditions, and insecure updates
2⃣ LLVM Adventures: Fuzzing Apache Modules
https://pwner.gg/blog/2026-03-20-apatchy
// Apatchy - LLVM-based fuzzing framework for Apache HTTPD with advanced coverage analysis, and a modular build system
3⃣ A Copy-Paste Bug That Broke PSpice AES-256 Encryption
https://jtsylve.blog/post/2026/03/18/PSpice-Encryption-Weakness
// Bug in PSpice's AES-256 mode reduces its effective keyspace from 2^256 to 2^32, enabling rapid brute-force attacks that compromise encrypted models
#reversing
#Tech_book
#Cyber_Education
"Windows Debugging, Disassembling, Reversing:
Practical Foundations. Training Course",
Third Edition, 2025.
// Another bestseller from a subject-matter leader...
#AIOps
#Infosec_Standards
Agent Control Protocol:
Technical Specification and Reference Implementation, v.1.13, Mar. 2026.
]-> Specification and implementation
// Cryptographically verifiable authorization architecture for autonomous AI agents
#Malware_analysis
1⃣ AI Wrote This Malware:
Dissecting the Insides of a Vibe-Coded Malware Campaign
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/ai-written-malware-vibe-coded-campaign
2⃣ Fake Telegram Malware Campaign: Analysis of a Multi-Stage Loader Delivered via Typosquatted Websites
https://labs.k7computing.com/index.php/fake-telegram-malware-campaign-analysis-of-a-multi-stage-loader-delivered-via-typosquatted-websites
3⃣ Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack
https://www.trendmicro.com/en_us/research/26/c/dissecting-a-warlock-attack.html
#tools
#NetSec
#WebApp_Security
"Reducing Excessive Trust in the Web PKI Ecosystem", 2026.
// examines the possibility of developing an add-on for mitmproxy project to add drift detection for root CA certificates, incorporate policy-based controls over which CAs are allowed, and leverage an ensemble of existing technologies to reduce the level of trust placed in the public Web PKI. The result is a PoC tool, CertGuard, that provides a higher-security browsing experience and enables security - conscious users to make more informed risk decisions when browsing the web