Reading view
Broken by Default: I formally proved that LLM-generated C/C++ code is broken by default β 55.8% vulnerable, 97.8% invisible to existing tools
I spent the last few months running Z3 SMT formal verification against 3,500 code artifacts generated by GPT-4o, Claude, Gemini, Llama, and Mistral.
β Results:
β - 55.8% contain at least one proven vulnerability
β - 1,055 findings with concrete exploitation witnesses
β - GPT-4o worst at 62.4% β no model scores below 48%
β - 6 industry tools combined (CodeQL, Semgrep, Cppcheck...) miss 97.8%
β - Models catch their own bugs 78.7% in review β but generate them anyway
β Paper: https://arxiv.org/html/2604.05292v1
β GitHub: https://github.com/dom-omg/broken-by-default
[link] [comments]
Brandefense Q4 2025 Ransomware Trends Report β 2,373 incidents, 125 groups, CVE exploitation breakdown
Hi r/netsec community,
Q4 2025 data, monitoring dark web leak sites and criminal forums
throughout OctoberβDecember 2025.
Numbers:
- 2,373 confirmed victims
- 125 active ransomware groups
- 134 countries, 27 industries
Group highlights:
- Qilin peaked at 481 attacks in Q4, up from 113 in Q1
- Cl0p skipped encryption entirely in most campaigns β pure data theft + extortion via Oracle EBS and Cleo zero-days
- 46.3% of activity attributed to smaller/unnamed groups β RaaS commoditization is real
CVEs exploited this quarter (with group attribution):
RCE:
- CVE-2025-10035 (Fortra GoAnywhere MFT) β Medusa
- CVE-2025-55182 (React Server Components) β Weaxor
- CVE-2025-61882 (Oracle E-Business Suite) β Cl0p
- CVE-2024-21762 (Fortinet FortiOS SSL VPN) β Qilin
Privilege Escalation:
- CVE-2025-29824 (Windows CLFS driver β SYSTEM) β Play
Auth Bypass:
- CVE-2025-61884 (Oracle E-Business Suite) β Cl0p
- CVE-2025-31324 (SAP NetWeaver, CVSS 10.0) β BianLian, RansomExx
Notable: DragonForce announced a white-label "cartel" model through underground forums. Operations linked to Scattered Spider suggest staged attack chains β initial access and ransomware deployment split between separate actors.
Full report
brandefense.io/reports/ransomware-trends-report-q4-2025/
[link] [comments]
Training for Device Code Phishing
With the news of Hundreds of orgs being compromised daily, I saw a really cool red team tool that trains for this exact scenario. Have you guys used this new white hat tool? Thinking about ditching KB4 and even using this for our red teams for access.
[link] [comments]