
Integer Overflow in dr_flac (CVE-2025–14369)
A short write up on fuzzing and audio decoding. Continue reading on Medium »

A short write up on fuzzing and audio decoding. Continue reading on Medium »
Cross-site scripting (XSS) isn’t just some theoretical threat from a textbook. It’s a code vulnerability where attackers inject malicious… Continue re...

A Deep Technical Analysis of Emerging Vulnerabilities in Agentic AI Infrastructure By Jayavelu Balaji | February 2026 Executive Summary The Model Cont...

When talking about password managers, the discussion often focuses on encryption algorithms, key length, or “zero-knowledge.” Much less often, a more...
How a single misconfigured redirect cost Salesloft 700+ customers their data — the lessons not from the books Continue reading on MERN Mastery »

How AI Code Review Tools Are Catching Bugs That Humans Miss A team of engineers at Stripe discovered a critical race condition in their payment proces...

TL;DR: We built a system that uses LiDAR depth analysis, moiré pattern detection, rolling shutter flicker analysis, and IMU-based human presence verif...
Around November 2025 I stumbled into a tarpit for rude web scrapers: https://maurycyz.com/projects/trap_bots/ Since then I indulged in writing my own,...

The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS Vulnerability ID: CVE-2026-26273 CVSS Score: 9.8 Published: 2026-02-13 CVE-2026-26273 i...
An exploration of the interesting question.

The company said hackers downloaded “a limited number of files” after breaking into an employee’s account. The hacking group ShinyHunters took respons...

The Japanese sex toy maker said a hacker broke into an employee's inbox and stole customer names, email addresses, and correspondence, including order...

By Latent Breach | February 2026 The OWASP Top 10 for LLM Applications got a major overhaul in late 2024. Version 2025 (v2.0) dropped two categories,...
Industrial control systems (ICS), the unsung backbone of global infrastructure, are no longer just operational assets; they are strategic targets. Whe...

CVE-2026-26187: escaping the Lake with a Path Traversal Two-Step Vulnerability ID: CVE-2026-26187 CVSS Score: 8.1 Published: 2026-02-13 A critical pat...

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat I...

Death by Parentheses: The sqlparse Recursive DoS Vulnerability ID: GHSA-27JP-WM6Q-GP25 CVSS Score: 6.5 Published: 2026-02-13 A high-impact Denial of S...

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the de...

How are you, hacker? 🪐 What’s happening in tech today, February 13, 2026? The HackerNoon Newsletter brings the HackerNoon homepage straight to your i...

HackerNoon Projects of the Week are projects that have proven their necessity and usefulness. This week's projects are from the Proof of Usefulness Ha...
Showing 1 - 20 of 149 articles