Feed

Authentication

Authentication security news covering OAuth, JWT, passkeys, identity management, and login protocols trending in Hacker News and Reddit discussions.

Articles from the last 30 days

Notepad++ hijacked by state-sponsored actors
01Monday, February 2, 2026

Notepad++ hijacked by state-sponsored actors

A significant cybersecurity incident targeting Notepad++ has been disclosed, revealing a prolonged hijacking attempt by suspected Chinese state-sponsored hackers. Between June and December 2025, attackers compromised the application's shared hosting infrastructure to intercept and redirect update traffic. This allowed for the distribution of malicious update manifests to selective users by exploiting insufficient update verification controls in older versions of the software. Although the hosting provider implemented remediation steps by December 2, 2025, Notepad++ has since migrated to a more secure hosting environment. To prevent future incidents, the WinGup updater was enhanced in v8.8.9 to verify digital certificates and signatures. Furthermore, the upcoming v8.9.2 release will enforce XMLDSig verification for update manifests, ensuring the integrity of the update process through multiple layers of authentication and cryptographic validation.

I found a Vulnerability. They found a Lawyer
03Friday, February 20, 2026

I found a Vulnerability. They found a Lawyer

A platform engineer and diving instructor discovered a critical security vulnerability in a major diving insurer's member portal. The system used sequential user IDs and static default passwords, exposing sensitive personal data, including information on minors. Despite responsible disclosure to authorities, the insurer responded with legal threats and non-disclosure demands rather than expressing gratitude.

FBI couldn't get into WaPo reporter's iPhone because Lockdown Mode enabled
04Wednesday, February 4, 2026

FBI couldn't get into WaPo reporter's iPhone because Lockdown Mode enabled

A recent FBI court filing has highlighted the effectiveness of Apple's Lockdown Mode, a security feature that successfully prevented federal investigators from extracting data from a Washington Post reporter's iPhone. During an investigation into classified leaks, the FBI's Computer Analysis Response Team (CART) found that the iPhone 13 belonging to Hannah Natanson was inaccessible due to this hardened security state. While the FBI was able to access her Macbook Pro using Touch ID, the iPhone remained protected. Lockdown Mode is designed to mitigate sophisticated spyware by limiting message attachments, web functionality, and physical accessory connections. This case demonstrates that the feature is also a formidable barrier against physical forensic tools like Graykey and Cellebrite, which require an unlocked connection to exploit system vulnerabilities. The incident underscores the ongoing technical struggle between consumer electronics companies and law enforcement agencies seeking digital access.

Sources:Hacker News492 pts
A Supabase misconfiguration exposed every API key on Moltbook's 770K-agent platform. Two SQL statements would have prevented it
05Monday, February 2, 2026

A Supabase misconfiguration exposed every API key on Moltbook's 770K-agent platform. Two SQL statements would have prevented it

Moltbook, a viral social network for AI agents built on the OpenClaw framework, has quickly transitioned from a curious experiment to a significant security threat. With over 770,000 agents active, the platform recently suffered a massive database breach allowing unauthorized hijacked control over agent identities and shell access to host machines. Researchers have identified critical vulnerabilities including unauthenticated shell command execution, improper input sanitization, and over-privileged system access. Many instances are currently exposed via Shodan, leading to the exfiltration of sensitive API keys and session tokens. The incident highlights the dangers of prompt injection at scale and the inherent risks of autonomous agents running without robust sandboxing or encryption in personal and enterprise environments.

Sources:/r/programming414 pts
Hacking Moltbook
06Monday, February 2, 2026

Hacking Moltbook

Moltbook, a social platform intended exclusively for AI agents, recently faced a significant security breach that exposed its production database. Billed as the front page of the agent internet, the platform attracted attention from the tech community for its vibe-coded architecture. However, researchers discovered an exposed Supabase API key that granted unauthenticated access to the entire database due to missing Row Level Security (RLS). The leak included 1.5 million API tokens, 35,000 email addresses, and private messages containing third-party credentials like OpenAI keys. Analysis revealed that the platform's high agent count was largely inflated by a small number of human users. This incident highlights the critical security risks associated with rapid, AI-driven development where secure defaults and manual reviews are often overlooked in favor of deployment speed.

Man accidentally gains control of 7k robot vacuums
07Saturday, February 21, 2026

Man accidentally gains control of 7k robot vacuums

A software engineer discovered a major security flaw in DJI robot vacuums while creating a custom controller app. The vulnerability provided unauthorized access to live video, audio, and maps for nearly 7,000 devices globally. This incident highlights growing privacy risks associated with smart home surveillance and the potential for AI-assisted exploitation of hardware security bugs.

Sources:Hacker News354 pts
We installed a single turnstile to feel secure
08Sunday, February 22, 2026

We installed a single turnstile to feel secure

The author contrasts 'security theater', such as inefficient building turnstiles that cause massive delays, with real, invisible security like fixing Jira credential vulnerabilities. While physical measures are often prioritized for visibility, true security requires foundational engineering, such as proper authentication and token management, which often goes unnoticed and lacks management's enthusiastic support.

Sources:Hacker News326 pts
Please stop using passkeys for encrypting user data
09Friday, February 27, 2026

Please stop using passkeys for encrypting user data

The author expresses concern over using passkeys with the PRF extension for data encryption. While passkeys are excellent for authentication, coupling them with encryption increases the risk of permanent data loss if a credential is deleted. The post urges the industry to limit PRF usage to durable contexts like credential managers.

What Is OAuth?
11Friday, February 20, 2026

What Is OAuth?

The author explains the origins and core logic of OAuth, describing it as a standard way to delegate authorization through secrets without sharing passwords. It evolved from a need at Twitter to support multiple clients using OpenID, ultimately simplifying complex authentication challenges into a system of consent and delegated access tokens.

Sources:Hacker News182 pts
Show HN: Knock-Knock.net – Visualizing the bots knocking on my server's door
12Sunday, February 15, 2026

Show HN: Knock-Knock.net – Visualizing the bots knocking on my server's door

The website Knock-knock.net provides a real-time visualization of global bot traffic targeting unprotected servers. Often described as the background radiation of the Internet, these constant probes attempt to breach security using common usernames and passwords. The site tracks historic data, identifies offending ISPs, and analyzes password trends to reveal automated attack patterns.

Sources:Hacker News170 pts
Native FreeBSD Kerberos/LDAP with FreeIPA/IDM
13Wednesday, February 18, 2026

Native FreeBSD Kerberos/LDAP with FreeIPA/IDM

FreeBSD 15 simplifies FreeIPA integration by switching to MIT Kerberos. Adopting nslcd instead of complex sssd daemons reduces dependencies and management overhead. This guide details configuring Kerberos, LDAP, and PAM for native authentication, enabling centralized identity management and automatic home directory creation without the need for custom Ports compilation.

Sources:Hacker News112 pts
confusables.txt and NFKC disagree on 31 characters
14Saturday, February 21, 2026

confusables.txt and NFKC disagree on 31 characters

The Unicode Consortium's confusables.txt and NFKC normalization disagree on 31 characters, such as the Long S (ſ). While confusables.txt prioritizes visual similarity for security detection, NFKC focuses on semantic equivalence. Developers building login systems must understand these divergences to effectively prevent homoglyph attacks and manage character normalization without creating security loopholes.

Sources:Lobsters25 pts