<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>Sherlock Forensics Intelligence Feed</title>
  <link>https://www.sherlockforensics.com/blog/</link>
  <description>CVE analysis, digital forensics insights, and incident response intelligence from Vancouver's certified forensic examiners.</description>
  <language>en-ca</language>
  <lastBuildDate>Thu, 09 Apr 2026 00:02:03 -0500</lastBuildDate>
  <atom:link href="https://www.sherlockforensics.com/blog/feed.xml" rel="self" type="application/rss+xml"/>
  <item>
    <title>The 2026 AI Code Audit Checklist: What Every CTO Needs to Review | Sherlock</title>
    <link>https://www.sherlockforensics.com/blog/ai-code-audit-checklist-2026.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/ai-code-audit-checklist-2026.html</guid>
    <pubDate>Thu, 09 Apr 2026 00:00:58 -0500</pubDate>
    <description>The definitive 2026 checklist for auditing AI-generated code. Covers dependency verification, secrets scanning, auth review, API security, input validation and more.</description>
  </item>
  <item>
    <title>Your Vibe-Coded App Got Hacked. Now What? | Sherlock</title>
    <link>https://www.sherlockforensics.com/blog/vibe-coded-disaster-recovery.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/vibe-coded-disaster-recovery.html</guid>
    <pubDate>Thu, 09 Apr 2026 00:00:45 -0500</pubDate>
    <description>Incident response for vibe-coded applications. You built it in a weekend with Cursor. An attacker dismantled it in an afternoon. Here is the recovery playbook.</description>
  </item>
  <item>
    <title>Your AI Masterpiece Might Be a Security Timebomb | Sherlock</title>
    <link>https://www.sherlockforensics.com/blog/ai-masterpiece-or-timebomb.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/ai-masterpiece-or-timebomb.html</guid>
    <pubDate>Thu, 09 Apr 2026 00:00:33 -0500</pubDate>
    <description>AI-generated code that works is not AI-generated code that is secure. Auth bypasses, injectable queries and unprotected APIs hide behind functional applications.</description>
  </item>
  <item>
    <title>Audit Your AI Slop Before It Costs You Everything | Sherlock</title>
    <link>https://www.sherlockforensics.com/blog/audit-your-ai-slop.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/audit-your-ai-slop.html</guid>
    <pubDate>Thu, 09 Apr 2026 00:00:20 -0500</pubDate>
    <description>AI slop ships fast and breaks faster. Unreviewed AI-generated code carries injection flaws, hallucinated dependencies and hardcoded secrets. Audit it before attackers find it.</description>
  </item>
  <item>
    <title>docker-mcp-server Command Injection Scores 7.3 - CVE-2026-5741 Breakdown</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-5741.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-5741.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:53:20 -0500</pubDate>
    <description>suvarchal docker-mcp-server up to 0.1.0 OS command injection in container management functions via the HTTP interface. CVSS 7.3 HIGH.</description>
  </item>
  <item>
    <title>CVSS 7.3: PowerJob Code Injection Puts Workflow Nodes at Risk</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-5739.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-5739.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:53:20 -0500</pubDate>
    <description>PowerJob 5.1.0 through 5.1.2 code injection in the OpenAPI addWorkflowNode endpoint via the nodeParams argument allows remote code execution. CVSS 7.3 HIGH.</description>
  </item>
  <item>
    <title>CVE-2026-5736: PowerJob detailPlus Endpoint Exposes Server to Manipulation</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-5736.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-5736.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:53:20 -0500</pubDate>
    <description>PowerJob 5.1.0 through 5.1.2 contains a vulnerability in the InstanceController detailPlus endpoint allowing argument manipulation. CVSS 7.3 HIGH.</description>
  </item>
  <item>
    <title>CVE-2026-4788: IBM Tivoli Netcool Impact Hit with Sensitive Data Exposure in Logs</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-4788.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-4788.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:53:20 -0500</pubDate>
    <description>IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files readable by local users. CVSS 8.4 HIGH.</description>
  </item>
  <item>
    <title>Red Hat ACM Certificate Forgery Scores 8.2 - CVE-2026-4740 Breakdown</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-4740.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-4740.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:53:20 -0500</pubDate>
    <description>Open Cluster Management (Red Hat ACM) improper certificate renewal validation allows managed cluster admins to forge client certificates. CVSS 8.2 HIGH.</description>
  </item>
  <item>
    <title>CVSS 9.8: Cockpit SSH Command Injection Puts Linux Servers at Risk</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-4631.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-4631.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:53:20 -0500</pubDate>
    <description>Cockpit remote login passes unsanitized hostnames to SSH, allowing attackers to inject malicious commands via a single HTTP request. CVSS 9.8 CRITICAL.</description>
  </item>
  <item>
    <title>CVE-2026-3357: IBM Langflow Insecure FAISS Deserialization Enables Code Execution</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-3357.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-3357.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:53:20 -0500</pubDate>
    <description>IBM Langflow Desktop 1.6.0 through 1.8.2 allows authenticated users to execute arbitrary code via insecure deserialization in the FAISS component. CVSS 8.8 HIGH.</description>
  </item>
  <item>
    <title>CVE-2026-3296: Everest Forms WordPress Plugin Hit with Critical PHP Object Injection</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-3296.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-3296.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:53:20 -0500</pubDate>
    <description>Everest Forms plugin for WordPress up to 3.4.3 contains a critical PHP Object Injection via unsafe deserialization of form entry metadata. CVSS 9.8.</description>
  </item>
  <item>
    <title>Windmill SQL Injection Scores 9.9 - CVE-2026-23696 Breakdown</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-23696.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-23696.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:52:50 -0500</pubDate>
    <description>Windmill CE and EE SQL injection in folder ownership management lets authenticated attackers extract JWT secrets and execute arbitrary SQL. CVSS 9.9 CRITICAL.</description>
  </item>
  <item>
    <title>CVSS 8.8: Windmill Authorization Bypass Puts Operator Restrictions at Risk</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-22683.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-22683.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:52:43 -0500</pubDate>
    <description>Windmill 1.56.0 through 1.614.0 missing authorization allows Operators to create and modify entities via the backend API. CVSS 8.8 HIGH.</description>
  </item>
  <item>
    <title>CVE-2026-22682: OpenHarness File Tool Flaw Exposes Local Files to Agents</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-22682.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-22682.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:52:35 -0500</pubDate>
    <description>OpenHarness improper access control in file tools allows attackers to read arbitrary local files outside intended repository boundaries. CVSS 7.1 HIGH.</description>
  </item>
  <item>
    <title>CVE-2026-22679: Weaver E-cology Hit with Critical Unauthenticated RCE</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-22679.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-22679.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:52:28 -0500</pubDate>
    <description>Weaver E-cology 10.0 contains a critical unauthenticated remote code execution flaw in the dubboApi debug endpoint. CVSS 9.8.</description>
  </item>
  <item>
    <title>IBM Verify Access Privilege Escalation Scores 9.3 - CVE-2026-1346 Breakdown</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-1346.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-1346.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:52:21 -0500</pubDate>
    <description>IBM Verify Identity Access privilege escalation allows local users to gain elevated access. CVSS 9.3 CRITICAL. Affects containers and standalone deployments.</description>
  </item>
  <item>
    <title>CVSS 7.2: IBM Verify Access SSRF Puts Internal Auth Endpoints at Risk</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-1343.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-1343.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:52:13 -0500</pubDate>
    <description>IBM Verify Identity Access contains a server-side request forgery vulnerability exposing internal authentication endpoints to unauthorized access. CVSS 7.2 HIGH.</description>
  </item>
  <item>
    <title>CVE-2026-1342: IBM Verify Identity Access Lets Local Users Execute Malicious Scripts</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-1342.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2026-1342.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:52:06 -0500</pubDate>
    <description>IBM Verify Identity Access and Security Verify Access containers allow locally authenticated users to execute malicious scripts. CVSS 8.5 HIGH.</description>
  </item>
  <item>
    <title>CVE-2021-4473: Tianxin Management System Hit with Critical Command Injection</title>
    <link>https://www.sherlockforensics.com/blog/2026-04-08-cve-2021-4473.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/2026-04-08-cve-2021-4473.html</guid>
    <pubDate>Wed, 08 Apr 2026 23:52:01 -0500</pubDate>
    <description>Tianxin Internet Behavior Management System contains a critical command injection flaw (CVSS 9.8) in the Reporter component allowing unauthenticated remote code execution.</description>
  </item>
  <item>
    <title>Weekly Security Roundup 2026-04-08 | Sherlock</title>
    <link>https://www.sherlockforensics.com/blog/weekly-roundup-2026-04-08.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/weekly-roundup-2026-04-08.html</guid>
    <pubDate>Wed, 08 Apr 2026 22:08:45 -0500</pubDate>
    <description>Weekly cybersecurity roundup: 16 critical vulnerabilities from April 01 to April 08, 2026. CVE analysis from Sherlock Forensics Vancouver.</description>
  </item>
  <item>
    <title>How Attackers Are Using AI Right Now | Sherlock SF</title>
    <link>https://www.sherlockforensics.com/blog/ai-attacks-real-examples-2026.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/ai-attacks-real-examples-2026.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>Real examples of AI-powered attacks in 2026. AI phishing campaigns, deepfake CEO fraud, automated vulnerability discovery and AI credential stuffing explained.</description>
  </item>
  <item>
    <title>5 Vulnerabilities AI Code Assistants Introduce | Sherlock</title>
    <link>https://www.sherlockforensics.com/blog/ai-code-vulnerabilities-2026.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/ai-code-vulnerabilities-2026.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>Five real vulnerability patterns AI code assistants introduce: hallucinated packages, weak randomness, SQL injection, hardcoded secrets and insecure deserialization.</description>
  </item>
  <item>
    <title>Deepfake Forensics for Legal Proceedings | Sherlock SF</title>
    <link>https://www.sherlockforensics.com/blog/ai-deepfake-forensics-legal-proceedings.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/ai-deepfake-forensics-legal-proceedings.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>Forensic methodology for detecting AI-generated deepfakes in courtroom evidence. Detection techniques and chain-of-custody protocols for admissibility.</description>
  </item>
  <item>
    <title>Why AI Startups Need a Pen Test Before Demo Day | SF</title>
    <link>https://www.sherlockforensics.com/blog/ai-startup-pen-test-before-demo-day.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/ai-startup-pen-test-before-demo-day.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>AI startup penetration testing and pre-funding security audits. What investors expect, what a pentest covers and why skipping it is shipping a liability.</description>
  </item>
  <item>
    <title>Why AI Products Need a Security Audit Before Launch</title>
    <link>https://www.sherlockforensics.com/blog/audit-your-ai-before-launch.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/audit-your-ai-before-launch.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>EU AI Act, NIST AI RMF and investor due diligence are making pre-launch AI security audits mandatory. What an AI audit covers vs a traditional pentest.</description>
  </item>
  <item>
    <title>Best Penetration Testing Tools in 2026 | Sherlock</title>
    <link>https://www.sherlockforensics.com/blog/best-pentesting-tools-2026.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/best-pentesting-tools-2026.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>The 7 best penetration testing tools in 2026: Burp Suite, Metasploit, Nmap, OWASP ZAP, Nuclei, Cobalt Strike and BloodHound. What each does and its limits.</description>
  </item>
  <item>
    <title>Can AI Be Hacked? Yes and Here Is How | Sherlock SF</title>
    <link>https://www.sherlockforensics.com/blog/can-ai-be-hacked.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/can-ai-be-hacked.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>AI systems can be hacked through adversarial attacks, prompt injection, model extraction, data poisoning and jailbreaking. How each attack works.</description>
  </item>
  <item>
    <title>Claude Mythos AI Security Threat Analysis | Sherlock SF</title>
    <link>https://www.sherlockforensics.com/blog/claude-mythos-ai-security-threat.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/claude-mythos-ai-security-threat.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>Claude Mythos found thousands of zero-days for under $50 and over 99% remain unpatched. What this means for your security posture and next steps.</description>
  </item>
  <item>
    <title>Encrypted Memory Forensics Post-Quantum | Sherlock SF</title>
    <link>https://www.sherlockforensics.com/blog/encrypted-memory-forensics-post-quantum-era.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/encrypted-memory-forensics-post-quantum-era.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>How post-quantum encryption reshapes volatile memory forensics. Updated acquisition methods and tooling for forensic examiners in 2026.</description>
  </item>
  <item>
    <title>PIPEDA Compliance Guide for 2026 | Sherlock</title>
    <link>https://www.sherlockforensics.com/blog/pipeda-compliance-guide-2026.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/pipeda-compliance-guide-2026.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>PIPEDA compliance guide for 2026. Breach notification requirements, penalties, 10 fair information principles and how a security audit proves due diligence.</description>
  </item>
  <item>
    <title>Shadow AI Is an Employee Security Risk | Sherlock SF</title>
    <link>https://www.sherlockforensics.com/blog/shadow-ai-employee-risk.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/shadow-ai-employee-risk.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>Your employees are pasting company data into ChatGPT and Claude without approval. Shadow AI creates data leaks, IP loss and compliance violations.</description>
  </item>
  <item>
    <title>You Vibe Coded It. Now Secure It.</title>
    <link>https://www.sherlockforensics.com/blog/vibe-coding-security-risks.html</link>
    <guid isPermaLink="true">https://www.sherlockforensics.com/blog/vibe-coding-security-risks.html</guid>
    <pubDate>Wed, 08 Apr 2026 21:42:03 -0500</pubDate>
    <description>Vibe coding lets non-developers ship production apps in days. Here is why scanning alone will not secure them and what to do before you get hacked.</description>
  </item>
</channel>
</rss>
