<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>vulnerability</title>
    <link rel="self" type="application/atom+xml" href="https://links.pgmac.net.au/guest/tags/16/feed"/>
    <updated>2026-05-06T22:17:16+10:00</updated>
    <id>https://links.pgmac.net.au/guest/tags/16/feed</id>
            <entry>
            <id>https://links.pgmac.net.au/links/1804</id>
            <title type="text"><![CDATA[Copy Fail — CVE-2026-31431]]></title>
            <link rel="alternate" href="https://copy.fail/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1804"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Copy Fail (CVE-2026-31431): a 732-byte Linux LPE — straight-line, no race, no per-distro offsets. Same Python script roots Ubuntu, Amazon Linux, RHEL, SUSE since 2017. Page-cache write bypasses on-disk file-integrity tools and crosses container boundaries. Found by Xint Code.]]>
            </summary>
            <updated>2026-05-03T10:44:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1789</id>
            <title type="text"><![CDATA[GitHub RCE Vulnerability: CVE-2026-3854 Breakdown]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1789"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-05-01T01:44:40+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1775</id>
            <title type="text"><![CDATA[The zero-days are numbered]]></title>
            <link rel="alternate" href="https://blog.mozilla.org/en/privacy-security/ai-security-zero-day-vulnerabilities/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1775"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser.]]>
            </summary>
            <updated>2026-04-22T08:11:03+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1759</id>
            <title type="text"><![CDATA[RedSun: System user access on Win 11/10 and Server with the April 2026 Update]]></title>
            <link rel="alternate" href="https://github.com/Nightmare-Eclipse/RedSun" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1759"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Red Sun vulnerability repository. Contribute to Nightmare-Eclipse/RedSun development by creating an account on GitHub.]]>
            </summary>
            <updated>2026-04-18T14:25:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1688</id>
            <title type="text"><![CDATA[axios@1.14.1 and axios@0.30.4 are compromised · Issue #10604 · axios/axios · GitHub]]></title>
            <link rel="alternate" href="https://github.com/axios/axios/issues/10604#issuecomment-4160410930" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1688"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[more details: https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan Most likely, a maintainer&amp;#039;s GitHub and npm accounts are compromised as these issues are getting deleted. I have also rep...]]>
            </summary>
            <updated>2026-03-31T22:58:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1665</id>
            <title type="text"><![CDATA[Trivy under attack again: Widespread GitHub Actions tag compromise secrets]]></title>
            <link rel="alternate" href="https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1665"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-25T00:51:37+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1632</id>
            <title type="text"><![CDATA[VulHunt: Open-source vulnerability detection framework - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2026/03/16/vulhunt-open-source-vulnerability-detection-framework/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1632"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Binarly has published VulHunt Community Edition, making the core scanning engine from Binarly&amp;#039;s commercial Transparency Platform available to independent]]>
            </summary>
            <updated>2026-03-17T19:12:52+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1580</id>
            <title type="text"><![CDATA[A GitHub Issue Title Compromised 4k Developer Machines]]></title>
            <link rel="alternate" href="https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1580"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A prompt injection in a GitHub issue triggered a chain reaction that ended with 4,000 developers getting OpenClaw installed without consent. The attack composes well-understood vulnerabilities into something new: one AI tool bootstrapping another.]]>
            </summary>
            <updated>2026-03-06T14:01:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1491</id>
            <title type="text"><![CDATA[Windows Notepad App Remote Code Execution Vulnerability]]></title>
            <link rel="alternate" href="https://www.cve.org/CVERecord?id=CVE-2026-20841" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1491"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-12T00:47:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1465</id>
            <title type="text"><![CDATA[Opus 4.6 uncovers 500 zero-day flaws in open-source code]]></title>
            <link rel="alternate" href="https://www.axios.com/2026/02/05/anthropic-claude-opus-46-software-hunting" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1465"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-06T14:07:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1394</id>
            <title type="text"><![CDATA[Supply Chain Vuln Compromised Core AWS GitHub Repos &amp;amp; Threatened the AWS Console]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1394"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-16T06:16:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1329</id>
            <title type="text"><![CDATA[Gpg.fail]]></title>
            <link rel="alternate" href="https://gpg.fail" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1329"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-28T13:51:29+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1259</id>
            <title type="text"><![CDATA[Years-old bugs in open source took out major clouds at risk • The Register]]></title>
            <link rel="alternate" href="https://www.theregister.com/2025/11/24/fluent_bit_cves/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1259"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[: Fluent Bit has 15B+ deployments … and 5 newly assigned CVEs]]>
            </summary>
            <updated>2025-11-25T07:23:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1246</id>
            <title type="text"><![CDATA[Researchers discover security vulnerability in WhatsApp]]></title>
            <link rel="alternate" href="https://www.univie.ac.at/en/news/detail/forscherinnen-entdecken-grosse-sicherheitsluecke-in-whatsapp" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1246"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Worldwide enumeration of accounts was possible due to a —now closed— privacy vulnerability]]>
            </summary>
            <updated>2025-11-20T13:13:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1196</id>
            <title type="text"><![CDATA[Inside the breach that broke the internet: The untold story of Log4Shell - The GitHub Blog]]></title>
            <link rel="alternate" href="https://github.blog/open-source/inside-the-breach-that-broke-the-internet-the-untold-story-of-log4shell/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1196"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Log4Shell proved that open source security isn&amp;#039;t guaranteed and isn’t just a code problem.]]>
            </summary>
            <updated>2025-11-06T08:41:31+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1135</id>
            <title type="text"><![CDATA[OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/openssh-vulnerability-proxycommand/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1135"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve remote code execution on a victim&amp;#039;s machine.]]>
            </summary>
            <updated>2025-10-07T20:51:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1119</id>
            <title type="text"><![CDATA[From MCP to shell: MCP auth flaws enable RCE in Claude Code, Gemini CLI and more]]></title>
            <link rel="alternate" href="https://verialabs.com/blog/from-mcp-to-shell/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1119"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[How MCP Authentication Flaws Enable RCE in Claude Code, Gemini CLI, and More]]>
            </summary>
            <updated>2025-10-06T18:14:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1103</id>
            <title type="text"><![CDATA[One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens - dirkjanm.io]]></title>
            <link rel="alternate" href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1103"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments). If you are an Entra ID admin reading this, yes that means complete access to your tenant. The vulnerability consisted of two components: undocumented impersonation tokens that Microsoft uses in their backend for service-to-service (S2S) communication, called “Actor tokens”, and a critical vulnerability in the (legacy) Azure AD Graph API that did not properly validate the originating tenant, allowing these tokens to be used for cross-tenant access.]]>
            </summary>
            <updated>2025-09-18T15:25:51+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1099</id>
            <title type="text"><![CDATA[We all dodged a bullet - Xe Iaso]]></title>
            <link rel="alternate" href="https://xeiaso.net/notes/2025/we-dodged-a-bullet/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1099"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[That NPM attack could have been so much worse.]]>
            </summary>
            <updated>2025-09-10T10:56:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1085</id>
            <title type="text"><![CDATA[Critical Docker Desktop flaw lets attackers hijack Windows hosts]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/critical-docker-desktop-flaw-lets-attackers-hijack-windows-hosts/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1085"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.]]>
            </summary>
            <updated>2025-08-26T05:57:12+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1059</id>
            <title type="text"><![CDATA[Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyata | The Control Plane for Agentic Identity]]></title>
            <link rel="alternate" href="https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1059"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your […]]]>
            </summary>
            <updated>2025-08-07T18:54:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/862</id>
            <title type="text"><![CDATA[CISA extends funding to ensure &amp;#039;no lapse in critical CVE services&amp;#039;]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/cisa-extends-funding-to-ensure-no-lapse-in-critical-cve-services/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/862"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[CISA says the U.S. government has extended MITRE&amp;#039;s funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.]]>
            </summary>
            <updated>2025-05-28T01:06:03+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/861</id>
            <title type="text"><![CDATA[CVE Foundation]]></title>
            <link rel="alternate" href="https://www.thecvefoundation.org/home" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/861"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Common Vulnerabilities and Exposures (CVE) Program has become the cornerstone of vulnerability management. Nearly all technology vendors and service providers identify vulnerabilities with CVEs when they publish security advisories. Most security products and services related to vulnerabilities]]>
            </summary>
            <updated>2025-05-28T01:05:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/860</id>
            <title type="text"><![CDATA[CVE program faces swift end after DHS fails to renew contract. Leaving security flaw tracking in limbo]]></title>
            <link rel="alternate" href="https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/860"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.]]>
            </summary>
            <updated>2025-05-28T01:05:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/851</id>
            <title type="text"><![CDATA[AI-hallucinated code dependencies become new supply chain risk]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/ai-hallucinated-code-dependencies-become-new-supply-chain-risk/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/851"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A new class of supply chain attacks named &amp;#039;slopsquatting&amp;#039; has emerged from the increased use of generative AI tools for coding and the model&amp;#039;s tendency to &amp;quot;hallucinate&amp;quot; non-existent package names.]]>
            </summary>
            <updated>2025-05-28T01:04:05+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/831</id>
            <title type="text"><![CDATA[Remote Code Execution Vulnerabilities in Ingress NGINX | Wiz Blog]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/831"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/818</id>
            <title type="text"><![CDATA[Harden-Runner detection: tj-actions/changed-files action is compromised - StepSecurity]]></title>
            <link rel="alternate" href="https://search.app/nz29ggeNi26oEF8q9" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/818"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:58:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/817</id>
            <title type="text"><![CDATA[Sign in as anyone: Bypassing SAML SSO authentication with parser differentials - The GitHub Blog]]></title>
            <link rel="alternate" href="https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/817"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.]]>
            </summary>
            <updated>2025-05-28T00:58:08+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/786</id>
            <title type="text"><![CDATA[https://archive.md/wy1Wt]]></title>
            <link rel="alternate" href="https://archive.md/wy1Wt" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/786"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:53:06+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/784</id>
            <title type="text"><![CDATA[Paul Butler – Smuggling arbitrary data through an emoji]]></title>
            <link rel="alternate" href="https://paulbutler.org/2025/smuggling-arbitrary-data-through-an-emoji/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/784"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:52:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/774</id>
            <title type="text"><![CDATA[DeepSeek Jailbreak Reveals Its Entire System Prompt]]></title>
            <link rel="alternate" href="https://www.darkreading.com/application-security/deepseek-jailbreak-system-prompt" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/774"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:51:06+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/730</id>
            <title type="text"><![CDATA[Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Secu]]></title>
            <link rel="alternate" href="https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/730"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introduction
Hello, I’m RyotaK (@ryotkak
), a security engineer at Flatt Security Inc.
A few days ago, I was upgrading my home lab network, and I decided to upgrade the OpenWrt
 on my router.1 After accessing the LuCI, which is the web interface of OpenWrt, I noticed that there is a section called Attended Sysupgrade, so I tried to upgrade the firmware using it.
After reading the description, I found that it states it builds new firmware using an online service.]]>
            </summary>
            <updated>2026-01-26T04:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/681</id>
            <title type="text"><![CDATA[Google Claims World First As AI Finds 0-Day Security Vulnerability]]></title>
            <link rel="alternate" href="https://www.forbes.com/sites/daveywinder/2024/11/04/google-claims-world-first-as-ai-finds-0-day-security-vulnerability/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/681"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Google’s Project Zero hackers and DeepMind boffins have collaborated to uncover a zero-day security vulnerability in real-world code for the first time using AI.]]>
            </summary>
            <updated>2026-01-21T02:00:44+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/674</id>
            <title type="text"><![CDATA[OpenSSF Adds Minder as a Sandbox Project to Simplify the Integration and Use of Open Source Security]]></title>
            <link rel="alternate" href="https://openssf.org/blog/2024/10/28/openssf-adds-minder-as-a-sandbox-project-to-simplify-the-integration-and-use-of-open-source-security-tools/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/674"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-21T04:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/593</id>
            <title type="text"><![CDATA[Critical doomsday Linux bug is CUPS-based vulnerability • The Register]]></title>
            <link rel="alternate" href="https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/593"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[No patches yet, can be mitigated, requires user interaction]]>
            </summary>
            <updated>2025-12-26T12:00:45+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/591</id>
            <title type="text"><![CDATA[Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/critical-unauthenticated-rce-flaw/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/591"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Critical Unauthenticated RCE Flaw, no Common CVE identifiers have been assigned yet, although experts suggest there should be at least three to six.]]>
            </summary>
            <updated>2026-01-01T04:00:30+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/566</id>
            <title type="text"><![CDATA[We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI]]></title>
            <link rel="alternate" href="https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/566"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries.


Summary

What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms - has now seemingly become a]]>
            </summary>
            <updated>2025-12-26T04:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/554</id>
            <title type="text"><![CDATA[EUCLEAK - NinjaLab]]></title>
            <link rel="alternate" href="https://ninjalab.io/eucleak/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/554"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Download the Writeup Illustration Romain Flamand – Flamingo Studio – flamandromain@gmail.com Abstract Secure elements are small microcontrollers whose main purpose is to generate/store secrets and then execute cryptographic operations. They undergo the highest level of security evaluations that exists (Common Criteria) and are often considered inviolable, even in the worst-case attack scenarios. Hence, complex secure […]]]>
            </summary>
            <updated>2025-12-24T04:00:37+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/549</id>
            <title type="text"><![CDATA[Bypassing airport security via SQL injection]]></title>
            <link rel="alternate" href="https://ian.sh/tsa" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/549"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[We discovered a serious vulnerability in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) programs used by the Transportation Security Administration.]]>
            </summary>
            <updated>2025-12-24T04:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/543</id>
            <title type="text"><![CDATA[Nuclei: Open-source vulnerability scanner - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/08/26/nuclei-open-source-vulnerability-scanner/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/543"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Nuclei is a fast and customizable open-source vulnerability scanner powered by YAML-based templates. With its flexible templating system, Nuclei can be]]>
            </summary>
            <updated>2025-12-24T04:00:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/538</id>
            <title type="text"><![CDATA[OpenSSH Backdoors]]></title>
            <link rel="alternate" href="https://blog.isosceles.com/openssh-backdoors/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/538"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Imagine this: an OpenSSH backdoor is discovered, maintainers rush to push out a fixed release package, security researchers trade technical details on mailing lists to analyze the backdoor code. Speculation abounds on the attribution and motives of the attacker, and the tech media pounces on the story. A near miss]]>
            </summary>
            <updated>2025-12-19T08:00:30+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/518</id>
            <title type="text"><![CDATA[Open Source Firewall pfsense Vulnerable to Remote Code Execution Attacks]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/open-source-firewall-pfsense-vulnerable/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/518"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A vulnerability in the popular open-source firewall software pfSense has been identified, allowing for remote code execution (RCE) attacks.]]>
            </summary>
            <updated>2025-12-19T04:00:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/517</id>
            <title type="text"><![CDATA[New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users]]></title>
            <link rel="alternate" href="https://thehackernews.com/2024/08/new-flaws-in-sonos-smart-speakers-allow.html?m=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/517"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-18T04:00:55+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/511</id>
            <title type="text"><![CDATA[Critical AWS Vulnerabilities Allow S3 Attack Bonanza]]></title>
            <link rel="alternate" href="https://www.darkreading.com/remote-workforce/critical-aws-vulnerabilities-allow-s3-attack-bonanza" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/511"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-13T08:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/510</id>
            <title type="text"><![CDATA[https://www.scmagazine.com/news/critical-vulnerabilities-in-6-aws-services-disclosed-at-black-hat-usa]]></title>
            <link rel="alternate" href="https://www.scmagazine.com/news/critical-vulnerabilities-in-6-aws-services-disclosed-at-black-hat-usa" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/510"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-18T04:00:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/478</id>
            <title type="text"><![CDATA[OXO vulnerability scanning orchestrator for the modern age]]></title>
            <link rel="alternate" href="https://oxo.ostorlab.co/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/478"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OXO is a vulnerability scanning orchestrator that automatically binds tools together allowing for rapid scale.]]>
            </summary>
            <updated>2025-12-06T12:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/431</id>
            <title type="text"><![CDATA[Spotify Introduces Kitsune Vulnerability Management Platform]]></title>
            <link rel="alternate" href="https://www.infoq.com/news/2022/11/spotify-kitsune-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/431"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Spotify recently introduced its security vulnerability management platform, Kitsune. Right from vulnerability detection to providing insights based on metrics, Kitsune manages the overall security vul]]>
            </summary>
            <updated>2025-11-27T04:00:35+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/430</id>
            <title type="text"><![CDATA[Spotify’s Vulnerability Management Platform - Spotify Engineering : Spotify]]></title>
            <link rel="alternate" href="https://engineering.atspotify.com/2022/11/spotifys-vulnerability-management-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/430"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[We started developing our vulnerability management platform (VMP) at Spotify in Q2, 2020, and now that we’ve implemented it and use the system in our day-to-day work, we wanted to take a moment to share our journey to help reduce security risks in an efficient and scalable manner.]]>
            </summary>
            <updated>2025-11-27T04:00:34+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/317</id>
            <title type="text"><![CDATA[How to build a CI/CD pipeline for container vulnerability scanning with Tri]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/317"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]]]>
            </summary>
            <updated>2026-01-19T06:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/7</id>
            <title type="text"><![CDATA[OpenVAS - OpenVAS - Open Vulnerability Assessment System]]></title>
            <link rel="alternate" href="http://www.openvas.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/7"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-31T08:00:10+10:00</updated>
        </entry>
    </feed>
