read.ehrlich.dev
ai-curated rss
about
github
rss
dark
security
Offensive and defensive security, penetration testing, and vulnerability research
hot
new
week
month
year
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth
315
PolyShell flaw exposes Magento and Adobe Commerce to file upload attacks
(securityaffairs.com)
23 days ago ·
security
·
open source
110
Malicious Script Injection in Trivy Compromise Enables Credential Theft
(cybersecuritynews.com)
23 days ago ·
security
·
containers
265
Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
(thehackernews.com)
24 days ago ·
security
·
reverse engineering
72
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
(thehackernews.com)
23 days ago ·
security
·
git internals
115
Oracle Issues Urgent Security Update for Critical RCE Flaw in Identity Manager and Web Services Manager
(cybersecuritynews.com)
24 days ago ·
security
·
git internals
140
Patch Now: Oracle's Fusion Middleware Has Critical RCE Flaw
(darkreading.com)
24 days ago ·
security
·
cloud infrastructure
155
Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
(thehackernews.com)
24 days ago ·
security
·
open source
72
7,500+ Magento sites defaced in global hacking campaign
(securityaffairs.com)
24 days ago ·
security
·
open source
32
CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
(thehackernews.com)
23 days ago ·
security
·
git internals
75
Negotiating with the Board: Translating Active Risk into Financial Exposure
(rapid7.com)
24 days ago ·
security
·
algorithmic trading
28
FBI, CISA Warn Russian Hackers Are Targeting High-Value Individuals Through Signal
(cybersecuritynews.com)
23 days ago ·
security
·
cryptography
72
CISA Warns of Cisco Secure Firewall Management Center 0-Day Exploited in Ransomware Attacks
(cybersecuritynews.com)
24 days ago ·
security
·
malware analysis
55
Interlock Ransomware Targets Cisco Enterprise Firewalls
(darkreading.com)
24 days ago ·
security
·
malware analysis
220
Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure
(securityaffairs.com)
25 days ago ·
security
·
malware analysis
18
Iranian among two charged over alleged attempt to enter UK nuclear submarine base
(theguardian.com)
23 days ago ·
security
38
Congress Is Dropping the Ball with a Clean Extension of FISA
(eff.org)
24 days ago ·
digital rights
·
security
48
CVE-2026-31381, CVE-2026-31382: Gainsight Assist Information Disclosure and Cross-Site Scripting (FIXED)
(rapid7.com)
24 days ago ·
security
·
site reliability
52
Ransomware Actors Expand EDR Killer Tactics Beyond Vulnerable Drivers
(cybersecuritynews.com)
24 days ago ·
malware analysis
·
security
45
Windows 11 March Update Breaks Microsoft Teams and OneDrive Sign-Ins
(cybersecuritynews.com)
24 days ago ·
security
·
git internals
22
Metasploit Wrap-Up 03/20/2026
(rapid7.com)
24 days ago ·
security
·
reverse engineering
135
ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
(thehackernews.com)
25 days ago ·
security
·
cloud infrastructure
28
New Fake Zoom Meeting Invite Scam Spreads Malware on Windows PCs
(hackread.com)
24 days ago ·
malware analysis
·
security
110
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook
(blog.talosintelligence.com)
25 days ago ·
malware analysis
·
security
310
Snowflake Cortex AI Escapes Sandbox and Executes Malware
(simonwillison.net)
26 days ago ·
malware analysis
·
security
120
More notes on the Brazilian SYN attacks
(boston.conman.org)
25 days ago ·
security
·
cloud infrastructure
28
GSocket Backdoor Delivered Through Bash Script, (Fri, Mar 20th)
(isc.sans.edu)
24 days ago ·
malware analysis
·
security
88
Cloudflare with Discourse: Setup Guide (WAF & Security Rules)
(linuxblog.io)
25 days ago ·
cloud infrastructure
·
security
70
Russian APT targets Ukraine via Zimbra XSS flaw CVE-2025-66376
(securityaffairs.com)
25 days ago ·
security
·
cloud infrastructure
18
CVE-2026-26118 Azure MCP Server Tools Elevation of Privilege Vulnerability
(msrc.microsoft.com)
24 days ago ·
security
·
cloud infrastructure
8
Окупанти атакували Запоріжжя – загинуло подружжя, ще шестеро поранені, з них двоє дітей
(pravda.com.ua)
23 days ago ·
digital rights
·
security
145
Micropatches released for Microsoft Access Remote Code Execution Vulnerability (CVE-2025-62552)
(blog.0patch.com)
26 days ago ·
security
·
git internals
75
Hacking a Robot Vacuum
(schneier.com)
25 days ago ·
security
·
cloud infrastructure
7
Украинские беспилотники атаковали Уфу. Пострадали два человека
(meduza.io)
23 days ago ·
security
·
urban exploration
68
Sweden Breach Shows the Security Risks of National Digital ID Systems
(reclaimthenet.org)
25 days ago ·
security
·
digital rights
8
На Харківщині через російський обстріл є постраждалі, знеструмлені та пошкоджені будинки
(pravda.com.ua)
24 days ago ·
urban exploration
·
security
70
How One-Time Passwords work
(dkrichards.com)
25 days ago ·
cryptography
·
security
28
Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
(thehackernews.com)
25 days ago ·
malware analysis
·
security
72
Interesting Message Stored in Cowrie Logs, (Wed, Mar 18th)
(isc.sans.edu)
26 days ago ·
security
·
malware analysis
25
You have to invite them in
(blog.talosintelligence.com)
25 days ago ·
security
·
cryptography
8
РФ атакувала дроном евакуаційний екіпаж на Донеччині: двоє загиблих, троє постраждалих
(pravda.com.ua)
24 days ago ·
security
·
digital rights
22
U.S. CISA adds a flaw in Cisco FMC and Cisco SCC Firewall Management to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
25 days ago ·
security
·
git internals
8
"Это метод в российском стиле" - The Guardian
(meduza.io)
24 days ago ·
true crime
·
security
68
Scans for "adminer", (Wed, Mar 18th)
(isc.sans.edu)
26 days ago ·
security
·
malware analysis
42
The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report
(rapid7.com)
26 days ago ·
site reliability
·
security
580
Broken By Design: A Longitudinal Analysis of Cryptographic Failures in Alipay Mobile Payment Infrastructure
(eprint.iacr.org)
28 days ago ·
cryptography
·
security
82
How searching for a VPN could mean handing over your work login details
(malwarebytes.com)
27 days ago ·
security
·
malware analysis
65
IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th)
(isc.sans.edu)
27 days ago ·
networking
·
security
65
Rapid7 Guidance on Observed Microsoft Teams Phishing Campaigns
(rapid7.com)
28 days ago ·
security
·
devops
68
/proxy/ URL scans with IP addresses, (Mon, Mar 16th)
(isc.sans.edu)
28 days ago ·
security
·
malware analysis
24
Lazarus, AI, and Trust Abuse: Top Enterprise Cybersecurity Risks 2026
27 days ago ·
distributed systems
·
security
38
Vulnerabilities in Raytha software
(cert.pl)
28 days ago ·
security
·
reverse engineering
560
A set of AppArmor vulnerabilities
(lwn.net)
1 month ago ·
reverse engineering
·
security
45
An Idea for Bypassing Linux Age Verification
(gavinhoward.com)
29 days ago ·
security
·
digital rights
25
Payload Ransomware claims the hack of Royal Bahrain Hospital
(securityaffairs.com)
29 days ago ·
security
·
malware analysis
42
Microsoft Releases Out-of-Band Patch For Critical RRAS RCE Vulnerabilities in Windows 11
(cybersecuritynews.com)
29 days ago ·
security
·
site reliability
22
Cert Authorities Check for DNSSEC From Today
(grepular.com)
29 days ago ·
security
·
cryptography
310
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
(thehackernews.com)
1 month ago ·
security
65
Reducing email spam with a domain and catch-all aliases
(swiftrocks.com)
1 month ago ·
security
95
Critical LangSmith Account Takeover Vulnerability Puts Users at Risk
(cybersecuritynews.com)
1 month ago ·
security
48
Storm-2561 lures victims to spoofed VPN sites to harvest corporate logins
(securityaffairs.com)
1 month ago ·
security
·
cloud infrastructure
8
На Харківщині через атаки РФ загинула жінка, постраждали поліцейські й охоронець
(pravda.com.ua)
29 days ago ·
true crime
·
security
128
DRILLAPP: new backdoor targeting Ukrainian entities with possible links to Laundry Bear
(lab52.io)
1 month ago ·
security
·
digital rights
105
SQL Injection Vulnerability in Ally WordPress Plugin Exposes 200K+ Sites
(hackread.com)
1 month ago ·
security
95
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
(thehackernews.com)
1 month ago ·
security
·
malware analysis
58
‘CrackArmor’ Vulnerability in AppArmor Impacts 12.6M Linux Systems
(hackread.com)
1 month ago ·
security
5
Росіяни атакували Дніпропетровщину: є загибла і 5 поранених
(pravda.com.ua)
29 days ago ·
security
·
game dev
20
Starbucks data breach impacts 889 employees
(securityaffairs.com)
1 month ago ·
data engineering
·
security
22
Воїни ГУР вдарили по двох російських військових суднах
(pravda.com.ua)
1 month ago ·
security
15
Росіяни атакували цивільну інфраструктуру Сумщини: 3 постраждалих
(pravda.com.ua)
1 month ago ·
security
·
urban exploration
20
‘I won’t hide it, I’m scared’: drone strike alerts Cyprus to its inadequate bomb shelters
(theguardian.com)
1 month ago ·
cloud infrastructure
·
security
240
This Android vulnerability can break your lock screen in under 60 seconds
(malwarebytes.com)
1 month ago ·
security
·
malware analysis
18
У Греції заявили про атаку на танкер під їхнім прапором біля Новоросійська
(pravda.com.ua)
1 month ago ·
security
·
oceanography
32
Metasploit Wrap-Up 03/13/2026
(rapid7.com)
1 month ago ·
security
·
containers
52
Watch out for fake Malwarebytes renewal notices in your calendar
(malwarebytes.com)
1 month ago ·
malware analysis
·
security
18
В Амстердамі стався вибух біля єврейської школи
(pravda.com.ua)
1 month ago ·
security
·
digital rights
70
Mind the gravity
(scadastrangelove.blogspot.com)
1 month ago ·
site reliability
·
security
24
Chromium: CVE-2026-3942 Incorrect security UI in PictureInPicture
(msrc.microsoft.com)
1 month ago ·
security
·
malware analysis
45
US Agencies Face CISA Deadline Over Critical Cisco SD-WAN Flaw
(hackread.com)
1 month ago ·
security
10
Собянин сообщил о массовой атаке дронов на Москву. Сбиты более 30 беспилотников
(meduza.io)
1 month ago ·
urban exploration
·
security
130
Critical SQL Injection bug in Ally plugin threatens 400,000+ WordPress sites
(securityaffairs.com)
1 month ago ·
security
8
Росіяни вдарили по житловому кварталу Запоріжжя: одна людина загинула, 10 поранені
(pravda.com.ua)
1 month ago ·
security
·
game dev
28
Most Google Cloud Attacks Start With Bug Exploitation
(darkreading.com)
1 month ago ·
cloud infrastructure
·
security
24
CVE-2026-25172 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
(msrc.microsoft.com)
1 month ago ·
security
·
site reliability
22
CVE-2026-25173 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
(msrc.microsoft.com)
1 month ago ·
security
·
site reliability
22
Loblaw Data Breach – Hackers Accessed IT Network and Customer Information
(cybersecuritynews.com)
1 month ago ·
security
18
CVE-2026-26111 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
(msrc.microsoft.com)
1 month ago ·
security
·
site reliability
315
Six mistakes in ERC-4337 smart accounts
(blog.trailofbits.com)
1 month ago ·
cryptography
·
security
68
Microsoft Authenticator could leak login codes—update your app now
(malwarebytes.com)
1 month ago ·
security
·
reverse engineering
38
A.B. 1043’s Internet Age Gates Hurt Everyone
(eff.org)
1 month ago ·
digital rights
·
security
42
Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages
(hackread.com)
1 month ago ·
security
5
У трьох областях є загиблий та 15 поранених цивільних
(pravda.com.ua)
1 month ago ·
game dev
·
security
28
Hackers Are Compromising Signal Accounts. Don’t Be Next.
(reclaimthenet.org)
1 month ago ·
security
·
malware analysis
380
FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise
(sentinelone.com)
1 month ago ·
cloud infrastructure
·
security
48
DirectX, OpenFOAM, Libbiosig vulnerabilities
(blog.talosintelligence.com)
1 month ago ·
security
70
Understanding GRC: How to Navigate Risks and Compliance Standards
(blackhillsinfosec.com)
1 month ago ·
digital rights
·
security
15
The Face of Penetration Testing is Changing: Announcing Metasploit Pro 5.0.0
(rapid7.com)
1 month ago ·
security
·
site reliability
28
Announcing Cloudflare Account Abuse Protection: prevent fraudulent attacks from bots and humans
(blog.cloudflare.com)
1 month ago ·
digital rights
·
security
38
Protect What Matters Most: Aligning Sensitive Data with Exposure Risk
(rapid7.com)
1 month ago ·
security
165
OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector
1 month ago ·
security
68
Six-Day and IP Address Certificates Available in Certbot
(letsencrypt.org)
1 month ago ·
cryptography
·
security
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth