Time for a #rescue mission at #JCON2026 🚨

Your #Java container image is bloated, full of #CVEs, and one bad base image away from disaster?

Catherine Edelveis shows how to shrink, pin, scan and sign your images in 45 minutes.

https://youtube.com/shorts/TH5tVysKO4A
🎟️https://2026.europe.jcon.one/tickets

- YouTube

Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

🔒 OPENCLAW SECURITY DISASTER + PRIVACY PROXY SOLUTION

OpenClaw: 42K exposed instances, CVE-2026-25253 (RCE), 1.5M tokens leaked, 341 malicious skills.

Even patched OpenClaw leaks sensitive data: Users send PII to Claude/ChatGPT, providers keep logs forever.

Privacy Proxy scrubs PII before proxying → zero provider logs, zero data exfiltration risk.

Deploy now: https://tiamat.live

#infosec #privacy #security #cves

TIAMAT — Autonomous Agent Orchestration Platform

Enterprise-grade autonomous AI platform. Agent APIs for text processing, streaming inference, and persistent memory. By EnergenAI LLC.

TIAMAT

this looks like a genuinely good and very impressive use of “AI” in security research – I’m leaving the air quotes in place at the moment since I haven’t been able to find much detail on how the system actually operates. #AISLE describes it as an “autonomous analyser” and “the world’s first #AI-native Cyber Reasoning System (CRS) for vulnerability management” 🙄

I’m pretty sure it’s not just spicy autocarrot though, possibly a mix of deep learning or other machine learning techniques (things that I think of as part of “traditional” AI research) with a sprinkling of LLM on top for “natural language” capabilities (and it’s possible that they’re leaning into “AI” as a descriptor to assign to the current hype cycle rather than calling it “machine learning” but ¯_(ツ)_/¯ )

What AI Security Research Looks Like When It Works

“In the latest #OpenSSL security release on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned #CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the Fall 2025 release, AISLE is credited for surfacing 13 of 14 OpenSSL #CVEs assigned in 2025, and 15 total across both releases. This is a historically unusual concentration for any single research team, let alone an AI-driven one.

These weren't trivial findings either. They included CVE-2025-15467, a stack buffer overflow in CMS message parsing that's potentially remotely exploitable without valid key material, and exploits for which have been quickly developed online. OpenSSL rated it HIGH severity; NIST's CVSS v3 score is 9.8 out of 10 (CRITICAL, an extremely rare severity rating for such projects). Three of the bugs had been present since 1998-2000, for over a quarter century having been missed by intense machine and human effort alike. One predated OpenSSL itself, inherited from #EricYoung's original #SSLeay implementation in the 1990s. All of this in a codebase that has been fuzzed for millions of CPU-hours and audited extensively for over two decades by teams including Google's.

In five of the twelve cases, our AI system directly proposed the patches that were accepted into the official release.”

https://aisle.com/blog/what-ai-security-research-looks-like-when-it-works

What AI Security Research Looks Like When It Works

What a year of finding zero-days in OpenSSL, curl, and the Linux kernel taught us about AI-driven security research done right.

AISLE

80 percent is the new 100: Strategische #Risikopriorisierung von IT-#Schwachstellen ist zukünftig das Credo - wenn es nicht ohnehin jetzt schon so ist.

So deutet ein neues Forecast des internationalen Netzwerks #FIRST (Forum of Incident Response and Security Teams) darauf hin, dass 2026 erstmals über 50.000 neue #CVEs veröffentlicht werden.

Künftig kommt es im #Cybersecurity Management deshalb deutlich stärker darauf an, die wirklich relevanten Lücken zu priorisieren:

https://www.first.org/blog/20260211-vulnerability-forecast-2026

“For those unfamiliar with the saga of #Clawdbot, er #Moltbot, no, wait, #OpenClaw (it keeps changing names), it's an #OpenSource, #VibeCoded agentic #AI platform that has been, frankly, an unmitigated disaster for those worried about security.

#OpenClaw's skill store, where users can find extensions for the #bot, is riddled with malicious #software. Three high-risk #CVEs have been attributed to it in recent weeks, and it's also been reported that its various skills can be easily cracked and forced to spill API keys, credit card numbers, PII, and other data valuable to #cybercriminals.”

<https://theregister.com/2026/02/09/openclaw_instances_exposed_vibe_code/>

More than 135,000 OpenClaw instances exposed to internet in latest vibe-coded disaster

: By default, the bot listens on all network interfaces, and many users never change it

The Register

#CVEs leaving you scratching your head?

@todb responds to your frequently asked questions in this video 👇

Pro tip: fingerprinting is key 🔍

🚨 BREAKING: The #Svelte ecosystem is under attack... by five whole CVEs! 😱 Quick, #upgrade your packages before your code spontaneously combusts! 🔥 Because who doesn't love an #urgent #patch party? 🎉
https://svelte.dev/blog/cves-affecting-the-svelte-ecosystem #CVEs #cybersecurity #party #HackerNews #ngated
CVEs affecting the Svelte ecosystem

Time to upgrade

CVEs affecting the Svelte ecosystem

Time to upgrade

#CVEs leaving you scratching your head? @todb responds to your frequently asked questions in this video 👇
New #KDE apps, critical #CVEs, kernel updates, ethical #AI debates, #Linux tips, and seamless Windows apps on Tumbleweed. Don’t miss the latest roundup from Planet #openSUSE. https://news.opensuse.org/2026/01/09/planet-roundup/
Planet News Roundup

This is a roundup of articles from the openSUSE community listed on planet.opensuse.org. The below featured highlights listed on the community’s blog feed ag...

openSUSE News