🔶 A framework for securely collecting forensic artifacts into S3 buckets
Blog presenting an AWS architecture for securely collecting forensic artifacts into S3, using IAM least-privilege session policies, STS time-limited credentials scoped per case prefix, KMS encryption, S3 versioning, and an automated Step Functions/Lambda/SSM workflow deployable via AWS CDK.
https://aws.amazon.com/ru/blogs/security/a-framework-for-securely-collecting-forensic-artifacts-into-s3-buckets
#aws
Blog presenting an AWS architecture for securely collecting forensic artifacts into S3, using IAM least-privilege session policies, STS time-limited credentials scoped per case prefix, KMS encryption, S3 versioning, and an automated Step Functions/Lambda/SSM workflow deployable via AWS CDK.
https://aws.amazon.com/ru/blogs/security/a-framework-for-securely-collecting-forensic-artifacts-into-s3-buckets
#aws
🔥2❤1👍1
AI, as demonstrated by Anthropic's Mythos, has significantly increased the likelihood of attackers discovering new vulnerabilities, creating new exploits, and using them in complex automated attacks at scale. While AI also increases the speed of patch development and reduces defects in new software, defenders still face a heavier relative burden due to the inherent limitations of patching. Attackers gain asymmetric benefits.
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
Researchers reverse-engineered Claude Code's ("claude.exe") undocumented "--sdk-url" flag, fully mapped its CCRv1 WebSocket remote control protocol (NDJSON over WebSockets), and implemented a Python C2 server. The flag accepts arbitrary URLs with no authentication, enabling post-compromise beaconing.
https://www.originhq.com/blog/reversing-remote-control
#ClaudeCode
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
Part one of a two-part series on GitHub Actions security, covering the core threat model, common misconfigurations, and real-world attack examples.
https://www.wiz.io/blog/github-actions-security-threat-model-and-defenses
#github
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2❤1🔥1
A lightweight intro to passkeys from Google.
https://bughunters.google.com/blog/passkeys-are-your-new-best-friend
#iam
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4❤2👍2
Amazon's RuleForge is a multi-agent AI system that auto-generates CVE detection rules from exploit PoC code. It uses parallel generation (via Amazon Bedrock/Fargate), a separate judge model (reducing false positives by 67%), and multistage validation, achieving 336% faster rule production than manual workflows while keeping humans in the final approval loop.
https://www.amazon.science/blog/how-amazon-uses-agentic-ai-for-vulnerability-detection-at-global-scale
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2❤1🔥1
Cloudflare built a CI-native, plugin-based AI code review system using OpenCode, orchestrating up to 7 specialised agents (security, performance, code quality, etc.) per merge request. It processed 131K reviews across 48K MRs, averaging $0.98/review at 3m39s median latency, with an 85.7% prompt cache hit rate.
https://blog.cloudflare.com/ai-code-review
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
A walkthrough of my Claude Code setup across a multi-project monorepo: global settings, safety guardrails, a context/plan/code workflow, subagents and plugins, and the StarCraft-themed customisations that make the terminal feel like mine.
https://blog.marcolancini.it/2026/blog-my-claude-code-setup
#ClaudeCode
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍2🔥2
Fast and accurate AI powered file content types detection.
https://github.com/google/magika
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1
Wiz Research discovered CVE-2026-3854 (CVSS 8.7): an unsanitized semicolon injection in GitHub's X-Stat internal header allows any authenticated user to override security fields via git push -o, achieving RCE on GitHub com and full GHES server compromise.
https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854
#github
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3❤1🔥1
OpenShell is the safe, private runtime for autonomous AI agents.
https://github.com/NVIDIA/OpenShell
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍2🔥2
Postman is sharing the evolution of their Security Review Process (SRP). What didn't work, what they changed, and how they built SRP v2, a risk-based, automation-first security model embedded directly into their SDLC.
https://blog.postman.com/how-we-scaled-security-reviews-without-slowing-down-engineering
#SRP
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
How Block built benchmrk, a harness for measuring SAST scanner efficacy against ground truth you control.
https://engineering.block.xyz/blog/proof-not-promises-evaluating-code-scanner-efficacy
#SAST
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
NVD's April 2026 scope reduction (enriching only KEVs and critical federal software) collides with AI-accelerated vulnerability discovery (e.g., Claude Mythos), creating a dangerous gap in OSS CVE coverage.
https://pulse.latio.tech/p/building-an-ai-ready-vulnerability
#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1