Claude Code's remote control protocol lets developers orchestrate instances programmatically. @tyholms reverse engineered it and found an undocumented flag that redirects any instance to attacker-controlled infrastructure, silently bypassing all permission checks.
originhq.com/blog/reversing…
If you can't see the queries, you can't secure the data. DNS filtering helps you identify and score every AI tool on your network.
See 5 ways to build a better security foundation: cfl.re/3Qawx9d
The Initial Access Broker market is maturing. In H2 2025...
📈 Asking prices (and the size of targeted orgs) rose
👀 New marketplaces thrive; older forums stall or shut down
🏛️ Government the top-targeted sector
For key findings, recommendations & more: r-7.co/4bVvi4Z
CEOs are wasting millions on AI. Here's why. 💸
CEOs are pouring millions into AI, but simply swapping a human for an AI agent in the middle of a broken process won't change your business. True AI transformation requires an end-to-end workflow redesign. Don't just use AI to make the old way faster—use it to build a completely new experience.
Ready to build AI workflows that actually move the needle? @DeepLearningAI offers free short courses to help you master agentic workflows and the latest AI tools.
Start learning today: hubs.la/Q048nRwq0
Subscribe to The Batch newsletter for weekly AI insights: hubs.la/Q048nVvj0
The @VulnCheckAI team took a look at exploited CVEs in network edge technologies, with emphasis on EOL versions and device categorization. This is a neat graphic, esp. if you've manually categorized these things before!
Full network edge report here: wwv.vulncheck.com/2026-network-e…
Understand how AI systems break — so you can defend them.
Join us in Arlington at #AISummit (Apr 20–21) for 2 days of talks & workshops inc a session with Venkata Sai Kishore Modalavalasa & Helen Oakley on attacking & securing agentic AI workflows.
➡️ sans.org/u/1CNB
oh oh! Someone didn't follow @SANSOffensive SEC565 and left their C2 web interface exposed to the internet! can you get in?
sec565.rocks
read about how I recently used an LLM to bypass math captchas and decided to make it a SEC565 bonus lab. jfmaes.me/blog/your-capt…
Querida Red: lo prometido es deuda. Aquí tenéis el repositorio de la herramienta que comenté en #rootedcon2026.
Antes un breve descargo de responsabilidad:
1. La herramienta tiene distintos puntos débiles que permiten hacer inútil su uso efectivo en el mundo real: estoy comprometido con lo que hago, pero no quiero liberar nada dañino *todavía*.
2. Puede ser o no que funcione bien en escenarios de NAT traverlas: he probado distintos y otros no.
3. Hay cosas en la forma que se usa el cifrado que son cuestionables.
En conclusión, NO LA USÉIS PARA NADA QUE OS PUEDA GENERAR UN PELIGRO.
github.com/cryptografree/…#rootedcon2026#criptored#anon#CryptograFREE /cc @criptored@rootedcon@mindcrypt