bugbounty_tech | Unsorted

Telegram-канал bugbounty_tech - Bug bounty Tips

2777

🛡️ Cybersecurity enthusiast | 💻 Helping secure the digital world | 🌐 Web App Tester | 🕵️‍♂️ OSINT Specialist Admin: @laazy_hack3r

Subscribe to a channel

Bug bounty Tips

#Analytics
#Threat_Research
An analytical review of the main cybersecurity events for the week (Jan.17-24, 2026)

1⃣  CVE-2026-24061: Telnetd RCE as Root
// This script exploits the CVE-2026-24061 vulnerability in Telnet servers using a malformed USER environment variable
2⃣  Top Agentic AI Security Threats in 2026
// The agentic AI era has arrived. The question is not whether your organization will face agentic threats in 2026. The question is whether you will be ready
3⃣  ISC BIND DoS vulnerability in Drone ID Records
// CVE-2025-13878
4⃣  Pwn2Own Automotive 2026
// Day One Two Three Results
5⃣ Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts
// The vulnerabilities allow for unauth bypass of SSO login authentication via crafted SAML messages when the FortiCloud SSO feature is enabled on affected Devices
6⃣ SmarterTools SmarterMail WT-2026-0001 Auth Bypass
// This issue was patched in ver.9511, released on Jan 15, 2026. If you have not already upgraded, do so immediately. This vulnerability is already being actively exploited!
7⃣  Wireshark 4.6.3 and 4.4.13 Released
// Release notes + download page
8⃣ Bandit v.1.9.3
// Tool to find common security issues in Python code

]-> Analytical review (Jan.10-17, 2026)

Читать полностью…

Bug bounty Tips

#AIOps
#MLSecOps
#Threat_Research
"Agent Skills in the Wild: An Empirical Study of Security Vulnerabilities at Scale", 2026.

// The rise of AI agent frameworks has introduced agent skills, modular packages containing instructions and executable code that dynamically extend agent capabilities. While this architecture enables powerful customization, skills execute with implicit trust and minimal vetting, creating a significant yet uncharacterized attack surface

Читать полностью…

Bug bounty Tips

#Analytics
#Threat_Research
An analytical review of the main cybersecurity events for the week (Jan.10-17, 2026)

1⃣  VideoLAN fixed vulns in its VLC software
// CVE-2025-51602
2⃣  Hijacking Bluetooth Accessories Using Google Fast Pair
// Many Bluetooth accessories do not implement Google Fast Pair correctly, enabling an attacker to forcefully pair with a vulnerable accessory
3⃣  CVE-2025-64155: Fortinet FortiSIEM Argument Injection to RCE
// PoC exploit for Fortinet FortiSIEM which abuses an argument injection to write a file to gain code execution as root
4⃣  Critical Privilege Escalation Vulnerability in Modular DS plugin affecting 40k+ Sites exploited in the wild
// CVE-2026-23800
5⃣  Sicarii Ransomware: Truth vs Myth
// Sicarii is a newly observed RaaS operation that surfaced in late 2025
6⃣  Security Detections MCP
// An MCP server that lets LLMs query a unified database of Sigma, Splunk ESCU, Elastic, and KQL security detection rules

]-> Analytical review (Jan.03-10, 2026)

Читать полностью…

Bug bounty Tips

Resources for securing AI systems

https://github.com/TalEliyahu/Awesome-AI-Security

Читать полностью…

Bug bounty Tips

Awesome AI Security

- Learning resources
- Frameworks and standards
- AI for offensive cyber
- AI for defensive cyber
- Safety and sandboxing for AI tools
- Detection & scanners

https://github.com/ottosulin/awesome-ai-security

Contributor Otto Sulin

#ai #cybersecuriyty

Читать полностью…

Bug bounty Tips

#AIOps
#exploit
#AppSec
BodySnatcher (CVE-2025-12420):
A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow

https://appomni.com/ao-labs/bodysnatcher-agentic-ai-security-vulnerability-in-servicenow
// The discovery of BodySnatcher represents the most severe AI-driven security vulnerability uncovered to date and a defining example of agentic AI security vulnerabilities in modern SaaS platforms

Читать полностью…

Bug bounty Tips

#AIOps
#AppSec
#Threat_Research
ZombieAgent: New ChatGPT Vulnerabilities
https://www.radware.com/blog/threat-intelligence/zombieagent
// several new vulnerabilities + method to achieve persostence + new propagation technique

Читать полностью…

Bug bounty Tips

#AppSec
#Threat_Research
1⃣ GnuPG Vulnerabilities
2⃣ zlib v1.3.1.2 Global BOF in TGZfname() of zlib untgz Utility
// The untgz utility that is part of zlib suffers from a straightforward buffer overflow in the filename parameter
3⃣ SmarterMail Pre-Auth RCE 
// pre-auth RCE (CVE-2025-52691) in SmarterMail allowed unauthenticated file uploads via /api/upload, enabling RCE through path traversal, highlighting risks of silent patches and the need for proactive security

Читать полностью…

Bug bounty Tips

#MLSecOps
AI Model Confusion:
An LLM/AI Model Supply Chain Attack

https://checkmarx.com/zero-post/hugs-from-strangers-ai-model-confusion-supply-chain-attack
// Checkmarx Zero research reveals the AI Model Confusion attack pattern against registries like Hugging Face, building on Dependency Confusion in OSS library registry

Читать полностью…

Bug bounty Tips

⚙️ Learn Python, Docker, Git, DevOps & more, all in one interactive platform

A new all-in-one learning resource has popped up with fully interactive courses covering Python, Docker, Git, DevOps, and many other tech topics, perfect for beginners and upskillers.

🔸 Step-by-step explanations for every concept, function, and method.
🔸 Interactive lessons with lots of hands-on practice and real examples.
🔸 Covers everything from basic syntax to advanced workflows.

For anyone looking to build strong technical skills from scratch, this is a clean, beginner-friendly place to start.

Читать полностью…

Bug bounty Tips

#tools
#Offensive_security
1⃣ MSFinger - Microsoft Network Service Fingerprinting Tool
2⃣ PowerShell Script to Reset The KrbTgt Account Password/Keys For Both RWDCs And RODCs
3⃣ ZeroPulse - Modern Command & Control (C2) Platform with Cloudflare Tunnel Integration

Читать полностью…

Bug bounty Tips

#Tech_book
#Cyber_Education
"Attacking Active Directory with Linux - Lab Manual", 2025.

Читать полностью…

Bug bounty Tips

☁️🚀 AWS DevOps Guide – Build, Deploy & Scale with Confidence

Want to master DevOps on AWS?
This guide helps you understand how modern teams build, automate, deploy, and monitor applications using AWS DevOps best practices.

📌 What You’ll Learn:
• Core AWS services for DevOps
• CI/CD pipelines & automation
• Infrastructure as Code (IaC)
• Monitoring, logging & scaling
• Security & DevOps best practices
🎯 Perfect for DevOps engineers, cloud learners, and cybersecurity professionals.

📥 Grab resources here:
👉 https://resources.codelivly.com/

Level up your cloud & DevOps skills the right way ☁️🔧🚀

Читать полностью…

Bug bounty Tips

🐧 Important Linux Commands You Need to Know
Linux is powerful — but with great power comes great responsibility.
Some commands can break systems, wipe data, or create serious security risks if used carelessly, especially in production environments.
📘 Read this essential article:
👉 Dangerous Linux Commands You Should Never Use in Production
🔗 https://hacklivly.com/blog/13-dangerous-linux-commands-you-should-never-use-in-production
If you’re serious about mastering Linux for cybersecurity, ethical hacking, or system administration, go deeper with structured learning 👇

📚 Linux Playbook for Hackers (eBooks):

🎄CHRISTMAS SALE IS LIVE - upto 90% off


• Beginner Edition → https://resources.codelivly.com/product/linux-playbook-for-hackers/

• Advanced Edition → https://resources.codelivly.com/product/linux-playbook-for-hackers-advanced-edition/

🎯 Perfect for students, pentesters, SOC analysts, and Linux admins.
⚠️ Always practice responsibly and test commands in lab environments.

Читать полностью…

Bug bounty Tips

☁️ AWS Interview Questions for Top Multinational Companies

Preparing for interviews at Amazon, Google, Microsoft, Accenture, Deloitte, Infosys, TCS, Wipro, or other MNCs?
This guide is designed to help you crack AWS cloud interviews with confidence.

📌 What This Covers:
• Core AWS services (EC2, S3, IAM, VPC, RDS, Lambda)
• Security & IAM interview questions
• Networking & VPC scenarios
• High availability & scalability concepts
• Cost optimization & best practices
• Real-world, scenario-based questions asked by MNCs

Explore more at:
https://resources.codelivly.com/product/the-complete-cybersecurity-playbook/

🎯 Ideal for cloud engineers, DevOps learners, and cybersecurity professionals moving into cloud security.

Читать полностью…

Bug bounty Tips

#MLSecOps
#Offensive_security
"Reasoning Hijacking: Subverting LLM Classification via Decision-Criteria Injection", 2026.
]-> Criteria Attack Dataset

// Current LLM safety research predominantly focuses on mitigating Goal Hijacking, preventing attackers from redirecting a model's high-level objective. In this paper, we argue that this perspective is incomplete and highlight a critical vulnerability in Reasoning Alignment. We propose a new adversarial paradigm: Reasoning Hijacking and instantiate it with Criteria Attack, which subverts model judgments by injecting spurious decision criteria without altering the high-level task goal

Читать полностью…

Bug bounty Tips

#Analytics
#Threat_Research
"Red Report 2025:
The Top 10 Most Prevalent MITRE ATT&CK Techniques. SneakThief and The Perfect Heist".

// This year's findings highlight a new era of adversarial sophistication in infostealer attacks, epitomized by malware like "SneakThief," which executed in a kill chain what has come to be known as "The Perfect Heist." Although the SneakThief malware is a fictitious name in this scenario, its attack patterns reflect real-world incidents. This advanced threat leverages stealth, persistence, and automation to infiltrate networks, bypass defenses, and exfiltrate critical data

Читать полностью…

Bug bounty Tips

#tools
#OSINT
1⃣ SwaggerSpy - Automated OSINT on SwaggerHub
2⃣ RedTiger-Tools - Open-Source Security Multi-Tool
3⃣ ASN - ASN Lookup Tool and Traceroute Server
4⃣ SatIntel - OSINT tool for Satellites. Extract satellite telemetry, receive orbital predictions, and parse TLEs

Читать полностью…

Bug bounty Tips

leash - take your AI agents for a walk - github.com/strongdm/leash

Authorize and monitor your AI agents with policy enforcement, sandboxed execution, and real-time observability—ensuring they operate safely within your defined boundaries.

Leash wraps AI coding agents in containers and monitors their activity. You define policies in Cedar; Leash enforces them instantly.

Читать полностью…

Bug bounty Tips

#exploit
#AppSec
1⃣ Reprompt: The Single-Click Microsoft Copilot Attack that Silently Steals Your Personal Data
// The attack exploits the q URL parameter, double-request techniques, and chain-request methods to inject malicious prompts, perform repeated actions, and establish ongoing data exfiltration chains
2⃣ Lack of isolation in agentic browsers resurfaces old vulnerabilities
// Agentic browsers' lack of proper isolation enables vulnerabilities like XSS and CSRF, leading to data leaks, prompt injections, and session hijacking, necessitating system-level security measures and extended origin policies
3⃣ Clang Hardening Cheat Sheet
// The article reviews a decade of Clang hardening techniques, highlighting new compiler flags and hardware-assisted protections against modern exploits like ROP, JOP, and speculative attacks

Читать полностью…

Bug bounty Tips

#AIOps
#Research
#Threat_Research
"VulnLLM-R: Specialized Reasoning LLM for Vulnerability Detection", Dec. 2025.
]-> Code & Data
]-> Demo
]-> Model

// We propose VulnLLM-R, the~\emph{first specialized reasoning LLM} for vulnerability detection. Our key insight is that LLMs can reason about program states and analyze the potential vulnerabilities, rather than simple pattern matching

Читать полностью…

Bug bounty Tips

#DFIR
#Tech_book
"Cyber Security Kill Chain - Tactics and Strategies: Breaking down the cyberattack process and responding to threats", 1st Edition, 2025.

// The book is a timely response to the increasing complexity of cyber threats. With the rapid growth of technologies such as AI, the Internet of Things, and quantum computing, the battlefield of cyber warfare is evolving faster than ever..

Читать полностью…

Bug bounty Tips

#DevOps
#Tech_book
#Threat_Modelling
"Threat Modeling Best Practices:
Proven frameworks and practical techniques to secure modern systems", Oct. 2025.

// This book takes you through the spectrum of threat modeling processes and practices. From foundational methodologies such as STRIDE to cutting-edge implementations that keep pace with the speed of system development, we begin by establishing a solid understanding of threat modeling principles, methodologies, and best practices that form the foundation of threat identification

Читать полностью…

Bug bounty Tips

#AIOps
#MLSecOps
"OpenRT: An Open-Source Red Teaming Framework for Multimodal LLMs", Jan 2026.
]-> https://github.com/AI45Lab/OpenRT

// Existing red-teaming benchmarks are often fragmented, limited to single-turn text interactions, and lack the scalability required for systematic evaluation. To address this, we introduce OpenRT, a unified, modular, and high-throughput red-teaming framework designed for comprehensive MLLM safety evaluation

Читать полностью…

Bug bounty Tips

#exploit
Complete comprehensive archive of all 1558 exploits added to Packet Storm in 2025.

Читать полностью…

Bug bounty Tips

#MLSecOps
#Whitepaper
"Implementing Secure AI Framework Controls in Google Cloud", Dec. 2025.

// Google’s Secure AI Framework is a framework for securing AI systems throughout their lifecycles. SAIF is designed for practitioners – the security professionals, developers, and data scientists on the front lines – to ensure AI models and applications are secure by design

Читать полностью…

Bug bounty Tips

Acunetix Premium Plus OnPremise with API Discovery v25.8.250820089 Full Activated

https://www.up-4ever.net/oromifz4sng2

Читать полностью…

Bug bounty Tips

🌐 Network Security – Protecting the Backbone of Digital Communication

Network security is the foundation of cybersecurity.
It focuses on protecting data, devices, and services from unauthorized access, attacks, and disruptions.

📌 What You’ll Learn:
• What network security really means
• Common network threats & attack types
• Firewalls, IDS/IPS, VPNs & segmentation
• Secure protocols and traffic monitoring
• Best practices for defending enterprise networks

Grab it here:
https://resources.codelivly.com/product/computer-networking-all-in-one-for-dummies/

🎯 Essential knowledge for cybersecurity students, SOC analysts, network engineers, and ethical hackers.

Читать полностью…

Bug bounty Tips

🐞 The Complete Bug Bounty Hunting Guide

Want to get started with bug bounty hunting or level up your vulnerability hunting skills?
This guide walks you through the entire bug bounty workflow — from finding targets to responsibly reporting vulnerabilities.

📌 What You’ll Learn:
• Bug bounty basics & mindset
• Reconnaissance and asset discovery
• Common web vulnerabilities (OWASP)
• Manual testing vs automation
• Writing high-quality vulnerability reports
• Legal & ethical guidelines
• Tips to increase valid findings and payouts

Explore more at :
https://resources.codelivly.com/product/bug-bounty-beginner-editions/

https://resources.codelivly.com/product/bug-bounty-payloads-bible/

🎯 Perfect for ethical hackers, students, and security researchers aiming to earn while learning.

⚠️ Practice only on authorized programs and platforms.

Читать полностью…

Bug bounty Tips

🔐 *How to Secure Your APIs – A Practical Guide*

APIs are the backbone of modern apps — but without security, they become open doors to attacks. Here's how to lock them down effectively:

---

✅ *1. Use Authentication & Authorization*
- Implement *OAuth2*, *JWT*, or *API keys*
- Enforce *role-based access control (RBAC)*

---

🔐 *2. Validate Inputs Strictly*
- Sanitize user inputs
- Use strong data validation (e.g., Joi, Yup)
- Prevent SQL & NoSQL injection

---

📦 *3. Rate Limiting & Throttling*
- Control request frequency to avoid abuse
- Use tools like *NGINX*, *API Gateway*, or *Cloudflare*

---

📜 *4. Use HTTPS Everywhere*
- Encrypt all data in transit
- Never expose APIs over HTTP

---

🕵️‍♂️ *5. Monitor & Log*
- Track unusual behavior
- Use centralized logging (e.g., ELK, Datadog)

---

🧱 *6. CORS & Firewall Rules*
- Restrict allowed origins
- Protect using *WAFs* and IP whitelisting

---

Secure APIs = Safe apps + Protected data + Trusted users
Build smart. Build safe.

Читать полностью…
Subscribe to a channel