OWASP WrongSecrets
We released version 1.13.1 of #OWASP #WrongSecrets! Now with #springboot4 and challenges involving #telegram #AI, #MCP . You can test it at www.wrongsecrets.com . Like what you see? Please give our repo github.com/OWASP/wrongs... a π if you like it! #security #opensource
07.03.2026 07:06
π 3
π 4
π¬ 0
π 0
Happy Friday! π
Missed a session or want to relive the highlights from OWASP Global AppSec DC? All talk recordings are now live on YouTube!
π₯ Catch what you missed
π Share your favourites
π‘ Keep your AppSec learning going
π www.youtube.com/play...
#owasp #appsec #infosec #cybersecurity
06.03.2026 14:13
π 1
π 1
π¬ 0
π 0
https://github.com/One-Man-Company/Skills-ContextManager
04.03.2026 12:23
π 0
π 1
π¬ 0
π 0
https://github.com/chainloop-dev/chainloop/raw/main/docs/img/overview-1.png
Chainloop is an evidence store and policy engine for Software Supply Chain attestations, SBOMs, VEX, SARIF, and QA reports, with contract-based workflows, Rego policy evaluation, and third-party integrations such as Dependency-Track and Guac
β https://ku.bz/_wQslV4bc
03.03.2026 18:26
π 0
π 1
π¬ 0
π 0
Enable multi-factor authentication (MFA) on all your accounts. It's an extra layer of defense that makes it much harder for attackers to get in, even if they have your password. A simple step for stronger online security.
#Cybersecurity #MFA #SecurityTips
02.03.2026 20:27
π 1
π 1
π¬ 0
π 0
Regularly update your software and operating systems. Patches often fix security vulnerabilities that attackers could exploit. A simple step for big protection.
#CybersecurityTips #StaySafeOnline
01.03.2026 19:17
π 0
π 1
π¬ 0
π 0
Harrison Ford: Life Achievement Award Acceptance Speech | 32nd Annual Actor Awards
YouTube video by Netflix
When you have the chance, please take the time to watch Harrison Ford's remarkable, beautiful Life Achievement Award acceptance speech. #ActorAwards
www.youtube.com/watch?v=dV_2...
02.03.2026 04:02
π 6222
π 1447
π¬ 292
π 217
https://github.com/cisco-ai-defense/skill-scanner
02.03.2026 04:22
π 0
π 1
π¬ 0
π 0
AI dev tool alert.
Claude Code vulnerabilities (now patched) allowed:
RCE via project hooks
MCP consent bypass
API key exfiltration
Config files became execution vectors.
AI-assisted development expands the trust boundary.
Have you updated your tools?
#ClaudeCode #Anthropic #AIsecurity #DevSecOps
28.02.2026 16:50
π 1
π 1
π¬ 0
π 0
Protect your accounts with strong, unique passwords. A long passphrase is easy to remember and much harder to guess. Consider a password manager for convenience and security.
#CybersecurityTips #PasswordStrength #OnlineSafety
28.02.2026 19:15
π 1
π 1
π¬ 0
π 0
Regular software updates aren't just for new features. They often patch security vulnerabilities, making your devices safer from known threats. Make it a habit to update for better digital defense.
#CybersecurityTips #StaySafeOnline #DigitalDefense
28.02.2026 20:17
π 1
π 1
π¬ 0
π 0
sbom-tools β From SBOM to Insight
Semantic SBOM diff and analysis tool. Compare, validate, and assess the quality of SBOMs across CycloneDX and SPDX formats.
Binarly's Alex Matrosov has launched SBOM Tools, a platform to compare and analyze SBOM files to understand software supply chain risks
sbom.tools
01.03.2026 01:07
π 17
π 9
π¬ 1
π 0
https://github.com/lreuss07/secintel-ai
26.02.2026 10:43
π 0
π 1
π¬ 0
π 0
LLMs Generate PredictableΒ Passwords
LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven Β for example, L , 9, m, 2, $ and # appeared in all 50 passwords, but 5 and @ only appeared in one password each, and most of the letters in the alphabet never appeared at all.
LLMs Generate PredictableΒ Passwords
LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly unevenβ¦
26.02.2026 12:07
π 9
π 4
π¬ 3
π 0
Save the Date fΓΌr den BSI-Kongress am 15. und 16. April
Save the Date! π
Der 21. BSI-Kongress findet vom 15.β16. April 2026 statt β jeweils von 9:30 bis 16:30 Uhr (virtuell).
Das Motto: βCybernation Deutschland: gemeinsam, sicher, digitalβ
#BSI #ITSicherheit #Cybersecurity #CybernationDeutschland #DeutschlandDigitalSicherBSI
26.02.2026 15:00
π 4
π 2
π¬ 0
π 0
Our February meetup continues with Gary Archer speaking about Securing AI Agents.
Watch the live-stream πΊ here:
π
www.youtube.com/live/VwSCOJW...
26.02.2026 20:40
π 1
π 1
π¬ 2
π 0
Myth: "I only get viruses from sketchy sites." π«π» Truth: Malware can come from any source, even legitimate websites through ads or downloads. Always stay vigilant and keep your software updated! #CyberMyths #Malware
24.02.2026 18:06
π 0
π 1
π¬ 0
π 0
A strong password manager is your friend for unique, complex passwords across all accounts. Protect yourself one login at a time. #CybersecurityTips #PasswordManager #InfoSec
24.02.2026 21:27
π 1
π 1
π¬ 0
π 0
Protect your accounts with unique, strong passwords. A password manager can help you keep track without memorizing dozens. Small steps make a big difference in your online security.
#CybersecurityTips #PasswordSecurity #OnlineSafety
24.02.2026 22:25
π 1
π 1
π¬ 0
π 0
ππ Hackers know our weaknesses: they exploit fear and urgency to manipulate us into hasty decisions. It's not just about techβit's about understanding human psychology. Stay vigilant and think before you click! #CyberSecurity #HumanPsychology
24.02.2026 23:57
π 0
π 1
π¬ 0
π 0
https://github.com/aws-samples/sample-agentic-frameworks-on-aws
18.02.2026 16:11
π 0
π 1
π¬ 0
π 0
CVEDatabase.com - Search CVE Vulnerabilities & Get AI Remediation
Search CVE vulnerabilities instantly with CVSS scores, affected products, threat context, and AI-powered remediation guidance.
π Tired of hunting CVEs across 5 different sites?
Thatβs why cvedatabase.com exists:
-Clean CVE pages
-No fluff
-Fast lookups
-Built for defenders
Start here β cvedatabase.com
#CyberSecurity #VulnerabilityManagement
17.02.2026 17:41
π 0
π 1
π¬ 0
π 0
NIS2, DORA, and the EU Post-Quantum Roadmap
If you are a CISO under NIS2 or DORA, you are already expected to run a risk-management system that tracks material, evolving threats - and to implement βstateβofβtheβartβ controls appropriate...
CISOs under NIS2 or DORA: the EU's Post-Quantum roadmap makes quantum a material, evolving governance risk you must track. It's not "deploy X by Y"βit's about auditable crypto agility and timelines supervisors will use (2030β2035). Read: postquantum.com/quantum-poli... #PQC #CyberSecurity
13.02.2026 19:40
π 0
π 1
π¬ 1
π 0
The Boardroom Reality: How CISOs Are Talking About Cyber Risk in 2026 - Trusona
Cybersecurity discussions in the boardroom have fundamentally changed. In 2026, CISOs are reframing cyber risk in business terms as boards demand accountability, prevention, and defensible decisions.
CISOs no longer just present metrics. They defend decisions. Directors want answers about how attackers gain access, if the risk was already known, and why the organization was exposed.
Read More: www.trusona.com/blog/boardro...
#CyberRisk #CISO #BoardGovernance #CyberSecurity #IdentitySecurity
13.02.2026 20:57
π 0
π 1
π¬ 1
π 0