Robuta

Sponsor of the Day: Jerkmate
https://www.websiteplanet.com/blog/trump-app-vulnerability-report/ Trump 2020 Campaign Exposed to Attack via App Sep 4, 2023 - Led by renowned cybersecurity analysts Noam Rotem and Ran Locar, our security research team recently discovered a security vulnerability in US trump 2020campaign exposedattack viaapp https://www.crowdstrike.com/en-us/blog/detecting-kerberos-relay-attack-via-dns-cname-abuse/ Detecting CVE-2026-20929: Kerberos Relay Attack via DNS CNAME Abuse Mar 31, 2026 - Learn how to detect CVE-2026-20929, a Kerberos relay vulnerability using DNS CNAME abuse, with CrowdStrike Falcon to identify AD CS certificate-based attacks. cve 2026attack viadetectingkerberosrelay https://www.vuxml.org/freebsd/41af0277-47bf-11ee-8e38-002590c1f29c.html VuXML: FreeBSD -- Network authentication attack via pam_krb5 vuxml freebsdnetwork authenticationattack viapamkrb5 https://etedge-insights.com/trending/operant-ai-discovers-shadow-escape-the-first-zero-click-agentic-attack-via-mcp/?amp=1 Operant AI discovers “shadow escape”: The first zero-click agentic attack via MCP - ET Edge Insights Oct 23, 2025 - A critical security flaw in MCP (Model Context Protocol) enables invisible data theft across all major AI and Agentic platforms New attack class exploits... et edge insightsoperant aifirst zeroattack viadiscovers https://www.vuxml.org/freebsd/ec89dc70-2515-11e2-8eda-000a5e1e33c6.html VuXML: webmin -- potential XSS attack via real name field attack viareal namevuxmlwebminpotential https://www.vuxml.org/freebsd/44ee8160-c453-11dd-a721-0030843d3802.html VuXML: mgetty+sendfax -- symlink attack via insecure temporary files attack viainsecure temporaryvuxmlsymlinkfiles https://7asecurity.com/blog/2023/06/xmpp-mitm-attack/ XMPP MitM attack via PLAIN mechanism Apr 14, 2026 - In this episode, we'll be exploring the XMPP MitM attack via PLAIN mechanism. Perfect for Penetration Testers, Mobile Developers. mitm attackxmppviaplainmechanism https://bugzilla.redhat.com/show_bug.cgi?id=2378852 2378852 – (CVE-2025-7365) CVE-2025-7365 keycloak: Phishing attack via email verification step in... cve 2025phishing attackvia email7365keycloak https://threatpost.com/sophisticated-android-spyware-google-play/155202/ Sophisticated Android Spyware Attack Spreads via Google Play | Threatpost May 1, 2020 - The PhantomLance espionage campaign is targeting specific victims, mainly in Southeast Asia — and could be the work of the OceanLotus APT. android spywarevia googlesophisticatedattackspreads https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account Axios 1.14.1 and 0.30.4 injected malicious plain-crypto-js@4.2.1 after npm compromise on March 31, 2026, deploying cross-platform RAT malware. axios supply chaincross platform ratvia compromisedattackpushes https://eprint.iacr.org/2021/1064 Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED Two main classes of optical TEMPEST attacks against the confidentiality of information processed/delivered by devices have been demonstrated in the past two... glowworm attacksound recoveryopticaltempestvia https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-medusa Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis | USENIX microarchitectural datavia automatedmedusaleakageattack https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/unconventional-attack-surfaces-identity-replication-via-employee-digital-twins Unconventional Attack Surfaces: Identity Replication via Employee Digital Twins | Trend Micro (US) In this second installment of a series exploring emerging AI-driven attack surfaces, TrendAI™ Research focuses on employee digital twins: AI replicas of... trend micro usattack surfacesdigital twinsunconventionalidentity https://adversa.ai/blog/gpt-4-hacking-and-jailbreaking-via-rabbithole-attack-plus-prompt-injection-content-moderation-bypass-weaponizing-ai/ GPT-4 Jailbreak and Hacking via RabbitHole attack, Prompt injection, Content moderation bypass and... Jul 21, 2025 - GPT-4 Jailbreak is what all the users were waiting for since the GPT-4 release. Hack GPT-4 Bypass GPT4. DAN Jailbreak for GPT-4 gpt 4prompt injectioncontent moderationjailbreakhacking