Follow for my hand-curated application security feed. Contains multiple newsletters, blogs, HackerNews feeds, and more.
💬 Run by @alp1n3.dev. Reach out with any suggestions for improvement!
That’s what I get for making a small change without testing 😂.
Should be back up a day or two.
That’s what I get for making a small change without testing 😂.
Should be back up a day or two.
🔗 https://zeropath.com/blog/breaking-authentication-unauthenticated-api-key-creation-in-better-auth-cve-2025-61928
🔗 https://zeropath.com/blog/breaking-authentication-unauthenticated-api-key-creation-in-better-auth-cve-2025-61928
🔗 https://blog.voorivex.team/cloudflare-image-proxy-as-a-cspt-gadget-a-cross-origin-cspt-exploit
🔗 https://blog.voorivex.team/cloudflare-image-proxy-as-a-cspt-gadget-a-cross-origin-cspt-exploit
🔗 https://www.securityweek.com/organizations-warned-of-exploited-adobe-aem-forms-vulnerability/
🔗 https://www.securityweek.com/organizations-warned-of-exploited-adobe-aem-forms-vulnerability/
🔗 https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html
🔗 https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html
🔗 https://aisle.com/
🔗 https://aisle.com/
🔗 https://www.theregister.com/2025/10/16/cve_cvss_scores_not_useful/
🔗 https://www.theregister.com/2025/10/16/cve_cvss_scores_not_useful/
🔗 https://labs.watchtowr.com/yikes-watchguard-fireware-os-ikev2-out-of-bounds-write-cve-2025-9242/
🔗 https://labs.watchtowr.com/yikes-watchguard-fireware-os-ikev2-out-of-bounds-write-cve-2025-9242/
🔗 https://www.netspi.com/blog/executive-blog/adversarial-machine-learning/how-app-integration-transactions-increase-the-attack-surface-of-llms/
🔗 https://www.netspi.com/blog/executive-blog/adversarial-machine-learning/how-app-integration-transactions-increase-the-attack-surface-of-llms/
🔗 https://blog.kulkan.com/client-side-path-traversal-exploiting-csrf-in-header-based-auth-scenarios-31c26a1baece
🔗 https://blog.kulkan.com/client-side-path-traversal-exploiting-csrf-in-header-based-auth-scenarios-31c26a1baece
🔗 https://www.securityweek.com/f5-blames-nation-state-hackers-for-theft-of-source-code-and-vulnerability-data/
🔗 https://www.securityweek.com/f5-blames-nation-state-hackers-for-theft-of-source-code-and-vulnerability-data/
🔗 https://github.com/dotnet/aspnetcore/security/advisories/GHSA-5rrx-jjjq-q2r5
🔗 https://github.com/dotnet/aspnetcore/security/advisories/GHSA-5rrx-jjjq-q2r5
🔗 https://nvd.nist.gov/vuln/detail/CVE-2025-55315
🔗 https://nvd.nist.gov/vuln/detail/CVE-2025-55315
🔗 https://www.alexedwards.net/blog/preventing-csrf-in-go
🔗 https://www.alexedwards.net/blog/preventing-csrf-in-go
🔗 https://www.bleepingcomputer.com/news/security/security-firms-dispute-credit-for-overlapping-cve-reports/
🔗 https://www.bleepingcomputer.com/news/security/security-firms-dispute-credit-for-overlapping-cve-reports/
🔗 https://dustri.org/b/silencing-a-kitchencook-teatime-kettle.html
🔗 https://dustri.org/b/silencing-a-kitchencook-teatime-kettle.html
🔗 https://twitter.com/fuzzinglabs/status/1977720899114606745
🔗 https://twitter.com/fuzzinglabs/status/1977720899114606745
🔗 https://www.macrumors.com/2025/10/10/apple-bug-bounty-program-overhauled/
🔗 https://www.macrumors.com/2025/10/10/apple-bug-bounty-program-overhauled/
🔗 https://pentesterlab.com/blog/research-worth-reading-week41-2025
🔗 https://pentesterlab.com/blog/research-worth-reading-week41-2025
🔗 https://embracethered.com/blog/posts/2025/github-copilot-remote-code-execution-via-prompt-injection/
🔗 https://embracethered.com/blog/posts/2025/github-copilot-remote-code-execution-via-prompt-injection/
🔗 https://news.ycombinator.com/item?id=45554830
🔗 https://news.ycombinator.com/item?id=45554830
🔗 https://www.legitsecurity.com/blog/camoleak-critical-github-copilot-vulnerability-leaks-private-source-code
🔗 https://www.legitsecurity.com/blog/camoleak-critical-github-copilot-vulnerability-leaks-private-source-code
🔗 https://www.legitsecurity.com/blog/camoleak-critical-github-copilot-vulnerability-leaks-private-source-code
🔗 https://www.legitsecurity.com/blog/camoleak-critical-github-copilot-vulnerability-leaks-private-source-code