Notepad++ infrastructure hack likely tied to China-nexus APT Lotus Blossom

Rapid7 researchers say the Notepad++ hosting breach is likely linked to the China-nexus Lotus Blossom APT group. Recently, the Notepad++ maintainer revealed that nation-state hackers compromised the hosting provider’s infrastructure, redirecting update traffic to malicious servers. The attack did not exploit flaws in Notepad++ code but intercepted updates before they reached users. “According to the […]

MoltBot Skills exploited to distribute 400+ malware packages in days

Over 400 malicious OpenClaw packages were uploaded in days, using MoltBot skills to spread password-stealing malware. Researchers uncovered a large malware campaign abusing AI skills for Claude Code and Moltbot users. Between late January and early February 2026, more than 400 malicious skills were published on ClawHub and GitHub, posing as crypto trading tools. OpenClaw […]

Panera Bread breach affected 5.1 Million accounts, HIBP Confirms

Have I Been Pwned says Panera Bread ’s breach affected 5.1 million accounts, far fewer than the 14 million customers first reported. Have I Been Pwned followed claims by the ShinyHunters gang, which said it stole data from over 14 million Panera Bread accounts. After Panera refused to pay, the group leaked a 760MB archive […]

Hackers exploit unsecured MongoDB instances to wipe data and demand ransom

Over 1,400 exposed MongoDB servers have been hijacked and wiped by hackers, who left ransom notes after exploiting weak or missing access controls. Cybersecurity firm Flare reports that unsecured MongoDB databases remain easy targets, with 1,416 of 3,100 exposed servers compromised. Hackers wiped data and left ransom notes, usually demanding $500 in Bitcoin, often using […]

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 82

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter KONNI Adopts AI to Generate PowerShell Backdoors   Who Operates the Badbox 2.0 Botnet? Weaponized in China, Deployed in India: The SyncFuture Espionage Targeted Campaign Android Trojan Campaign Uses Hugging Face Hosting for RAT Payload […]

Nation-state hack exploited hosting infrastructure to hijack Notepad++ updates

Notepad++ maintainer says nation-state attackers hijacked the app’s update system by redirecting traffic at the hosting provider level. The Notepad++ maintainer revealed that nation-state hackers compromised the hosting provider’s infrastructure, redirecting update traffic to malicious servers. The attack did not exploit flaws in Notepad++ code but intercepted updates before they reached users. “According to the […]

Security Affairs newsletter Round 561 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. DOJ releases details alleged talented hacker working for Jeffrey Epstein Cyberattacks Disrupt Communications at Wind, Solar, […]

Bug bounty security tool, browser extension

I’ve built a tool for myself that ended up finding my last 4 Hackerone bugs, and I’m trying to figure out if it’s useful to anyone else.

First, It’s not an automated scanner, and it doesn’t use or implement AI anywhere. Purely a program I built to find things I don’t think I would have normally found myself.

What it is:

  • A browser extension
  • You log in (or not), browse the app normally
  • Click “record”, perform your usual workflow, testing, etc., click “stop”
  • It captures the exact API calls you made

Then the tool tries to break logic assumptions that emerged from your own flow.

Example:

  • You apply a coupon
  • Cart total changes
  • Checkout succeeds

The tool then asks things like:

  1. Can the coupon be reused?
  2. Can another user apply it?
  3. Can it be applied to a different product?
  4. Can checkout / refund be abused to get money back?

It does this by replaying and mutating the same requests you already made, and it only reports an issue if it can prove its theories to be correct.

Its also basically zero-friction, since it runs in your own browser, works based on your flow, and won’t flood you with false positives.

Two questions:

  1. Would you use something like this?
  2. Would you pay for it?

submitted by /u/dvnci1452
[link] [comments]

DOJ releases details alleged talented hacker working for Jeffrey Epstein

An FBI informant said in 2017 that Jeffrey Epstein had a “personal hacker,” according to a Justice Department document released Friday. An FBI informant said in 2017 that Jeffrey Epstein had a “personal hacker,” according to one of the documents released by the Department of Justice (DoJ) as part of the Epstein Files. The accuracy […]