leekthehack

14 Followers
22 Following
128 Posts

The UK government has sanctioned Chinese-based company Xinbi, described as one of the largest illicit online cryptocurrency marketplaces as well a associated entities and individuals accused of links with scam compounds in Southeast Asia.

https://www.infosecurity-magazine.com/news/uk-sanction-chinese-crypto/

๐๐„๐– - Vibe coding tools are flooding software with new vulnerabilities, @georgiatech researchers have warned.

I spoke to Hanqing Zhao, founder of the Vibe Security Radar, about the future of AI coding tool-induced vulnerabilities.

https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/

๐๐„๐– - @openai has launched a new Safety Bug Bounty program to encourage disclosures of issues in its products that pose โ€œmeaningful abuse and safety risks, even if they donโ€™t meet the criteria for a security vulnerability.โ€ @Bugcrowd

https://www.infosecurity-magazine.com/news/openai-bug-bounty-ai-abuse-safety/

The US Federal Communications Commission bans foreign-made internet routers over national security concerns.

The ban means that all such routers made in foreign countries โ€“ not just a few select Chinese vendors โ€“ are now placed on the FCCโ€™s covered list.

https://www.infosecurity-magazine.com/news/us-fcc-bans-foreign-made-routers/

At @rsaconference, the head of the @ncsc urged the cybersecurity industry to develop vibe coding safeguards.

https://www.infosecurity-magazine.com/news/rsac-uk-ncsc-urges-vibe-coding/

VulnWatch Monday: CVE-2026-22172 ๐Ÿ”“

๐Ÿฆž Yekai Chen (aka LUOYEcode) has detected a critical vulnerability affecting OpenClaw versions prior to 2026.3.12.

๐Ÿ”ง Fix in OpenClaw 2026.3.12.

๐Ÿ”Ž GitHub advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-rqpp-rjj8-7wv8
๐Ÿž VulnCheck advisory: https://www.vulncheck.com/advisories/openclaw-scope-elevation-in-websocket-shared-auth-connections
๐Ÿ’พ View JSON: https://cveawg.mitre.org/api/cve/CVE-2026-22172

VulnWatch Monday: CVE-2026-3611 ๐Ÿ”“

Gjoko Krstic, from Zero Science Lab reported a maximum-severity vulnerability in Honeywell's IQ4x building management controller.

The flaw was publicly disclosed by ICS Cert and is tracked as CVE-2026-3611.

๐Ÿ”Ž With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface.

โš™๏ธ Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.

๐Ÿ”ง According to CISA, Honeywell is aware of the issue, but has not released a fix. For more information, users are urged to contact Honeywell directly.

โš ๏ธ CISA advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-03
๐Ÿ’พ View CSAF: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-069-03.json

๐‚๐ซ๐ข๐ญ๐ข๐œ๐š๐ฅ ๐™๐ž๐ซ๐จ-๐‚๐ฅ๐ข๐œ๐ค ๐…๐ฅ๐š๐ฐ ๐ข๐ง ๐ง๐Ÿ–๐ง ๐€๐ฅ๐ฅ๐จ๐ฐ๐ฌ ๐…๐ฎ๐ฅ๐ฅ ๐’๐ž๐ซ๐ฏ๐ž๐ซ ๐‚๐จ๐ฆ๐ฉ๐ซ๐จ๐ฆ๐ข๐ฌ๐ž

Researchers from Pillar Security have found two new critical vulnerabilities in self-hosted and cloud n8n deployments.

n8n is a popular open-source workflow automation platform powering hundreds of thousands of enterprise AI systems worldwide.

One of the flaws, tracked as CVE-2026-27493, can lead to full takeover of a server without the target clicking on anything and without the attacker needing to be authenticated.

๐Ÿ”งFix? n8n cloud users should have already benefitted from automated fixes.

People self-hosting n8n instances are urged to update to versions 2.10.1, 2.9.3 or 1.123.22 of n8n, depending on their release channel.

Pillar Security also recommended users to rotate all stored credentials if a vulnerable workflow is found in their n8n environment.

https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/

๐–๐ก๐š๐ญ ๐‚๐ˆ๐’๐Ž๐ฌ ๐’๐ก๐จ๐ฎ๐ฅ๐ ๐Š๐ง๐จ๐ฐ (๐€๐ง๐ ๐ƒ๐จ) ๐€๐›๐จ๐ฎ๐ญ ๐Ž๐ฉ๐ž๐ง๐‚๐ฅ๐š๐ฐ

OpenClaw has exploded onto the scene and govts are already slamming on the brakes. I spoke to experts to explore what CISOs should do to contain its vulnerabilities.

https://www.infosecurity-magazine.com/news-features/what-cisos-should-know-and-do/

What CISOs Should Know (And Do) About OpenClaw

Infosecurity spoke to several experts to explore what CISOs should do to contain the viral AI agent toolโ€™s security vulnerabilities

Infosecurity Magazine
Exclusive Interview with OpenClawโ€™s Security Advisor

Infosecurity Magazine Podcast ยท Episode

Spotify