Sign in to view Kevin’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
United Kingdom
Sign in to view Kevin’s full profile
Kevin can introduce you to 10+ people at GitHub
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
583 followers
422 connections
Sign in to view Kevin’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Kevin
Kevin can introduce you to 10+ people at GitHub
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Kevin
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Kevin’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Articles by Kevin
-
Finding a 16-year-old bug isn't as surprising as you think it is
Finding a 16-year-old bug isn't as surprising as you think it is
Anthropic's recent blog post about Project Glasswing has understandably been getting a lot of attention. AI tools are…
21
-
Finding and fixing a stack buffer overflow in librelp (CVE-2018-1000140) - a collaboration between Adiscon and SemmleJun 19, 2018
Finding and fixing a stack buffer overflow in librelp (CVE-2018-1000140) - a collaboration between Adiscon and Semmle
Blog post about CVE-2018-1000140, an RCE in librelp (rsyslog), by Kevin Backhouse, Rainer Gerhards, and Bas van Schaik.…
6
-
Remote code execution in Apple's packet-mangler (CVE-2017-13904, CVE-2018-4249)Jun 4, 2018
Remote code execution in Apple's packet-mangler (CVE-2017-13904, CVE-2018-4249)
Blog post about an RCE #vulnerability that I found in #macOS last summer (CVE-2017-13904, CVE-2018-4249). It's just…
5
-
Negative integer overflows in Apple's NFS Diskless Boot (CVE-2018-4136, CVE-2018-4160)May 1, 2018
Negative integer overflows in Apple's NFS Diskless Boot (CVE-2018-4136, CVE-2018-4160)
New blog post about how my colleague Jonas Jensen found two vulnerabilities in Apple's macOS kernel. https://lgtm.
6
-
Using QL to find kernel stack buffer overflows in Qualcomm MSM-4.4Jan 24, 2018
Using QL to find kernel stack buffer overflows in Qualcomm MSM-4.4
New blog post about how you can use QL to find stack buffer overflows. My query found a vulnerability in Qualcomm's…
11
Activity
583 followers
-
Kevin Backhouse reposted thisKevin Backhouse reposted thisvulnz.ch's second edition will take place on Monday, April 20th at HeadsQuarter The Historic in Zurich. Peter will present GitHub Security Lab's AI-powered vulnerability scanning framework and I will cover defending AI agents with open source tooling. If you're into appsec, pentesting, vulnerability research, or anything in between, come join us! https://luma.com/ul9wg5o8
-
Kevin Backhouse shared thisSecurity research is about looking for bugs in obscure parts of the code. We can do that even more efficiently now.Finding a 16-year-old bug isn't as surprising as you think it isFinding a 16-year-old bug isn't as surprising as you think it isKevin Backhouse
-
Kevin Backhouse reposted thisKevin Backhouse reposted this23 CVEs this year (in Signal, Outline, Sentry, NocoDB, ...) and counting! Don't wait for the next mythical model to help you secure your project, get started today with our frontier open-source harness: https://lnkd.in/dA65FeGFHow to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered frameworkHow to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
-
Kevin Backhouse reposted thisKevin Backhouse reposted thisA zero-permission Android app could read every photo, video, voice note, and document in your Signal chats. Downloaded Signal apk directly from Signal.org? You were vulnerable. https://lnkd.in/g9ZbPgn2GHSL-2026-102: Unauthorized exfiltration of decrypted attachments in Signal through Intent redirectionGHSL-2026-102: Unauthorized exfiltration of decrypted attachments in Signal through Intent redirection
-
Kevin Backhouse reposted thisKevin Backhouse reposted thisI just published something I've been wanting to share for a while! Earlier this year, our team published a deep dive into open source vulnerability trends across 2025. But the data through December only told part of the story. In Q1 2026, private vulnerability reports submitted to maintainers on GitHub increased over 4x. The number of unique reporters doubled. The number of targeted repositories doubled. No single reporter, project, or organization is driving it - this is a systemic shift. Here's what surprised me most: despite the volume surge, CVE requests to our CNA nearly quadrupled and our assignment rate actually improved - from ~90% to ~93%. The increase isn't just noise. Real vulnerabilities are being found, disclosed, and published faster than ever. But the pressure on maintainers is real. Acceptance rates have dipped. Backlogs are growing. And the people who maintain the software the world runs on are absorbing more of the burden every quarter. I wrote up the full analysis - the data, the nuance, and what we're doing about it - in the article below. If you're a maintainer, a security researcher, or someone who cares about the sustainability of open source: I'd love to hear what you're seeing on your side. #opensource #cybersecurity #vulnerabilitymanagementEveryone's blaming AI for bad vulnerability reports. The data tells a more nuanced story.Everyone's blaming AI for bad vulnerability reports. The data tells a more nuanced story.Madison Oliver Ficorilli
-
Kevin Backhouse reposted thisKevin Backhouse reposted thisHidden feature in Signal? Not for attackers! An attacker with no admin privileges can delete any message in a group! https://lnkd.in/gSnhs9Su https://lnkd.in/gB4qgCv2GHSL-2026-095: Unauthorized message deletion in Signal for iOSGHSL-2026-095: Unauthorized message deletion in Signal for iOS
-
Kevin Backhouse reposted thisKevin Backhouse reposted thisAttacks on open source aren't slowing down. Neither is GitHub. Our teams have rolled out trusted publishing, npm package scanning with human reviews, and guidance for Actions users (linked in comments). If you use GitHub Actions, take three steps today: 1. Turn on CodeQL (free for public repos) 2. Pin Actions to full commit SHAs 3. Review your workflows for script-injection risks
-
Kevin Backhouse shared thisHow to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework Link to blog post: https://lnkd.in/eCufH4ZN To run the tool: 1. Start a codespace on https://lnkd.in/eEjsmhN7 2. Wait a few minutes for the codespace to initialize 3. In the terminal, run ./scripts/audit/run_audit.sh myorg/myrepo A GitHub Copilot license is required. You may be eligible for free access if you're a student, teacher, or maintainer: https://lnkd.in/eryTv8yW
-
Kevin Backhouse reposted thisKevin Backhouse reposted thisSign in with ANY password: How we used AI to break into a popular chat application, and other high-impact vulnerabilities. Read "How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework" https://lnkd.in/de-fz3-NHow to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered frameworkHow to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
-
Kevin Backhouse liked thisKevin Backhouse liked thisvulnz.ch's second edition will take place on Monday, April 20th at HeadsQuarter The Historic in Zurich. Peter will present GitHub Security Lab's AI-powered vulnerability scanning framework and I will cover defending AI agents with open source tooling. If you're into appsec, pentesting, vulnerability research, or anything in between, come join us! https://luma.com/ul9wg5o8
-
Kevin Backhouse liked thisKevin Backhouse liked thisTo be clear: Mythos finding a 27 year old vulnerability in the BSD kernel doesn't mean it found a bug that went unnoticed for 27 years, or that it achieved something no human researcher could achieve in 27 years. BSD does not have a bug bounty program. There is no financial incentive to report bugs in BSD. However, kernel remote code execution (RCE) bugs are worth a lot of money if you sell them to an exploit broker. A BSD kernel RCE would probably fetch somewhere around $100k - $200k USD. While the bug looks mostly useless, you never truly know whether a bug is useless or not. Sometimes a seemingly useless bug can be chained with another vulnerability to achieve RCE. Therefore, almost anyone who found that bug would have been financially incentivized to keep quiet about it. Furthermore, BSD has about a 0.1% market share, so there's probably not a whole lot of people even bothering to audit the code in the first place. There's this old trope in open source that says "many eyes make all bugs shallow". It frequently gets used to imply that open source software is more secure simply because more people have access to the code, therefore can audit it. But it completely ignores the economics of vulnerability research. It takes years (even decades) of experience to become a good vulnerability researchers. Most people are not putting decades of experience into auditing code for free. Sure, lots of people can read the code, but the majority of the people who can actually find vulnerabilities in it are incentivized to just horde them. This has happened before too. There was a major Linux vulnerability called shellshock, which went unreported for 25 years. The vulnerability itself was pretty obvious and not the kind of thing that was likely to have gone unnoticed to even a spectacularly average vulnerability researcher. The simple fact of the matter is, the economic incentives for auditing open source code just isn't that. Anyone CAN audit the code, but that doesn't mean anyone is going to, especially when they're not getting paid to do so. There's a big difference between a bug going UNNOTICED and UNREPORTED. It's very unlikely Mythos achieved something no one else did or could. It just performed work that nobody else wanted to do, at the cost of $20,000 worth of tokens.
-
Kevin Backhouse liked thisKevin Backhouse liked this23 CVEs this year (in Signal, Outline, Sentry, NocoDB, ...) and counting! Don't wait for the next mythical model to help you secure your project, get started today with our frontier open-source harness: https://lnkd.in/dA65FeGFHow to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered frameworkHow to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
-
Kevin Backhouse liked thisKevin Backhouse liked thisA zero-permission Android app could read every photo, video, voice note, and document in your Signal chats. Downloaded Signal apk directly from Signal.org? You were vulnerable. https://lnkd.in/g9ZbPgn2GHSL-2026-102: Unauthorized exfiltration of decrypted attachments in Signal through Intent redirectionGHSL-2026-102: Unauthorized exfiltration of decrypted attachments in Signal through Intent redirection
Experience & Education
-
GitHub
***** ******** ******** ********
-
******
******** ******** ******** * *********** *******
-
******
******** ********
-
********** ** ******
***** ******** ******* undefined
-
-
********** ** *********
******* ******** *******
-
View Kevin’s full experience
See their title, tenure and more.
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Languages
-
Dutch
-
View Kevin’s full profile
-
See who you know in common
-
Get introduced
-
Contact Kevin directly
Other similar profiles
Explore more posts
-
Kim Laine
Microsoft • 2K followers
🎺 🎺 Have *you* developed applications with client-side secrets? It can be a real pain since secret management APIs are different on all platforms. We have released MPSS---a Multi-Platform Secure Signing library. It provides a unified secret management API that is backed by native HSM-powered secret management APIs on different platforms (Windows, macOS, iOS, Android). It also comes with an OpenSSL provider that allows you to use MPSS secrets through the familiar OpenSSL APIs that we all know and love. MPSS is available at https://lnkd.in/ghQ6DtTY. We welcome code contributions from the community and hope you find the library useful. Huge thanks to my amazing collaborator Radames Cruz for making this real.
54
-
Peng Wu
Stellar Capacity • 2K followers
Saw this write-up about a Claude security issue demonstrating prompt injection + file exfiltration risks for Cowork that"a worth reading: https://lnkd.in/dzvWpbuS My thoughts: 1.) Claude Code and Cowork are amazing tools. If we're serious about the future of agents, this requires giving these systems actual agency, e.g. the ability to act outside their sandbox. 2.) But that comes with enhanced risks. Prompt injection was mostly theoretical a year ago. With Cowork automating across your work environment, it's not theoretical anymore. And the attack demoed in the article can happen with zero user approval. 3.) What really surprised me: Anthropic knew about this specific file exfiltration vulnerability before releasing Cowork (it was disclosed months ago in Claude.ai chat). They acknowledged it but didn't fix it; they just added a warning for users to watch for "suspicious actions." That's a buyer-beware approach I didn't expect from them. The experiments I've done with Cowork have been really cool. But using these tools well needs a clear-eyed view of the risks. We all want autonomous agents, but we can't ignore the cracks in the foundation. For folks who are experimenting right now with Cowork, how are you balancing the excitement of the tool with the reality of these risks? #genAI #Anthropic #Claude #promptinjection #AIsafety #cybersecurity #buyerbeware
3
1 Comment -
FHE.org
2K followers
New resource added to FHE.org/resources: "Apple's Deployment of Homomorphic Encryption at Scale" by Rehan Rishi, Haris Mughees, Fabian Boemer, Karl Tarbe, Nicholas Genise, Akshay Wadia, and Ruiyu Zhu. https://lnkd.in/dfUTGGvX Know of an FHE resource that should be shared? Let us know below!
34
4 Comments -
Tim Simpkins
Application Security Engineer… • 1K followers
We often think of open source software as “freeware.” But behind every widely used library or framework is a maintainer juggling unpaid work, burnout, and community expectations. The reality? Maintaining open infrastructure takes real resources — and the current model isn’t sustainable. The Open Source Security Foundation (OpenSSF), alongside over 20 organizations, just released a joint statement calling for sustainable investment in open infrastructure. Their message is clear: we must move beyond passive reliance and actively support the people and projects that keep open source secure, stable, and thriving. 🔍 Key takeaways: • Open infrastructure is a shared responsibility. • Volunteer-driven maintenance is not a sustainable model. • Organizations must invest in long-term stewardship — financially and operationally. 📢 Whether you're a developer, a tech leader, or a policymaker, now’s the time to ask: How are we supporting the open source foundations we depend on every day? Explore the full joint statement from OpenSSF here: https://lnkd.in/g4KADrY9 #OpenSource #CyberSecurity #DigitalInfrastructure #Sustainability #OpenSSF #TechLeadership #SoftwareStewardshipOpen
7
2 Comments -
Justin Albrecht
Lookout • 1K followers
If you haven't read the reports on the iOS spyware Coruna, I recommend you check out the blogs by Google and iVerify. This could be considered a watershed moment for mobile security. Not only is it the first time that iOS 0-day exploit use has been observed being used by a criminal entity, but it also highlights the proliferation of likely US 0-days in uncontrolled markets, something reminiscent of WannaCry. If you've ever been on the receiving end of one of my mobile threat landscape briefings then I'm sorry, but jokes aside one of the ideas I posited over the last couple years is that the pressure on Israeli / European / US commercial surveillance vendors has driven these entities to align further with NATO to avoid sanctions and negative press. This vacuum creates an opportunity in the mobile 0-day market for entities in Russia and China to corner the market for less ethical government customers, creating a cyber weapons pipeline similar to kinetic arms dealing occuring between these countries that are more aligned geopolitically. Operation Zero is an example of this, a 0-day purchaser backed with funding and support by the Russian government which has been willing to pay up to 20 million USD for mobile exploit chains, and which only sells to non-NATO entities. You may have heard of them in relation to a recent news story regarding the conviction of an L3Harris employee selling multiple exploits to Operation Zero for up to 4 million USD. The exploits in Coruna were used in four campaigns in chronological order: some of the exploits were observed in Operation Triangulation targeting Kaspersky -> government customer of a CSV used them -> Russian APT used them against Ukraine -> Chinese criminal organization used them to target cryptocurrency. This, plus other indicators within the code, points to the stolen L3Harris exploits as the likely start of the spread if we're to speculate, at least IMO. I think this is just the beginning. People are downplaying the exploits due to the fact that they only affect older iOS devices running outdated OSs, but some key takeaways from this story are the framework and the exploit pipeline, regardless of the exploits used in these attacks. Criminal groups and non-NATO aligned APTs now have access to completely inscrupulous brokers that can get them mobile exploit chains, they have an adaptable framework to use new exploits to target iOS devices, and Android likely isn't far behind. All of this in an environment where your average mobile user doesn't have any sort of additional protection on their devices, to include employees for many major companies and governments. Imagine if SLSH (Scattered Lapsus$ Hunters) decides to use this tech, or ransomware groups. I don't think most orgs are prepared for this.
107
4 Comments -
Wade Baker, Ph.D.
Cyentia Institute • 13K followers
Veracode published the 2026 edition of its long-running State of Software Security report last week. As we have for nearly a decade now, Cyentia Institute provided independent analysis of the massive dataset that spans SAST, DAST, and SCA findings. I'll be sharing some highlights this week, so punch that follow and/or like button to tell The Algorithm that you want to monitor the posts. If you just can't wait for them to roll out, a link to the full report is in the comments.
38
3 Comments -
Dominique Brezinski
Apple • 2K followers
If you need to use software that has undecidable security/saftey properties, should you consider an external (dependency) implementation? I recently posted about specification-only libraries, which sparked a bunch of very healthy dialog. Constructive debate is incredibly important. One point that was very relevant was that certain safety/security properties are undecidable using formal methods. My response was, in that case, I rather use software generated with my tool chain than take an external dependency. Do you have any strong counterpoints?
9
6 Comments -
Josh Bressers
Anchore • 5K followers
I was thinking about what could be a second order effect from the #CRA for #opensource developers The CRA does have carve outs that spare individual open source contributors from many of the requirements, but I wonder if we will see those projects receiving requests from companies to provide evidence While the companies using the software are on the hook to track #security #vulnerabilities and evidence like #SBOM, there's nothing stopping those companies from asking an open source developer to help them out, just this once Now multiply this by several thousand and we have a problem I would value thoughts from Roman Zhukov and Daniel Thompson-Yvetot, am I missing something important?
9
23 Comments -
Antoine Vastel, PhD
Castle • 4K followers
I came across a surprising GitHub earlier today 🤖 https://lnkd.in/eZkgXbr5 A frustrated site owner reported that his site was being scraped aggressively with Scrapy, a popular open-source scraping framework. His proposed fixes? – Enforce robots.txt at the framework level – Limit concurrency by default – Require users to insert an email in the user agent If that sounds like trying to stop a freight train with a “Please slow down” sign, that’s because it is 😅 . The maintainers gave the expected response: Scrapy is just a tool. They’re not responsible for how it’s used. If you're seeing abusive traffic, you need to defend your site, not ask bot developers to be nicer 😇 Still, this thread is a great example of how many teams encounter the bot problem for the first time: by surprise, and completely unprepared. They assume bots will follow the rules. That "good behavior" will be enough. That robots.txt is a real deterrent. It’s not. The reality? If your site has anything of value—inventory, PII, login endpoints, limited edition drops, pricing APIs—sooner or later, fraudsters and bot operators will come after it. Scrapers might be the first wave. Next comes credential stuffing, fake account creation, card testing, or abuse of free trials. And they won’t politely identify themselves. They’ll spoof user agents. rotate IPs. Use headless browsers, anti-detect tools, residential proxies. Basic rate limits and blocklists won’t cut it. Hope is not a strategy. Neither is trusting that user agents are honest. If you’re not actively investing in bot detection, you’re not protected. You’re just lucky, for now 🤞
48
2 Comments -
Engr Mohammad Sayduzzaman
National Institute of Textile… • 929 followers
It was started with the static honeypots and very basic ELK (Elasticsearch, Logstash, Kibana) base monitoring during 2018 to 2021 with the aim of adaptive and intelligent deception. At 2024 Blockchain integrated and AI driven honeypot make the break throw with its efficient rreal time detection, tamper proof logging along with simple and dynamic deployment. https://lnkd.in/g-aqPmwR
25
-
. Brad Geesaman
Ghost Security • 2K followers
At Ghost Security 👻 when we are looking at solving a problem for our customers, I really enjoy it when we can apply LLMs in an augmentation capacity that aims squarely at reducing toil. That is, where the LLMs strengths heavily overlap with tasks that AppSec teams deem high value but weren’t able to be done before because at scale they are too voluminous so they do without. Very interesting things start to happen when AppSec teams stop fighting their tools to get results they can trust across their app fleet and that affords them the time to focus more strategically to pay down risk.
18
4 Comments -
Bar Kaduri ❇️
Capsule Security • 3K followers
If you think Prompt Injection is just a "chat" problem, you’re wrong. The Orca Security research team (<3) just proved you can take over a GitHub repository without ever typing a single word to the AI. I'm so excited to see this research project, which Roi Nisimi led before I left, finally see the light of day. No "ignore previous instructions." No "jailbreaking." No social engineering. The attack is just a "comment" in a GitHub Issue. When a developer opened their IDE to help, the AI read that comment, saw it as a set of commands, and silently handed the attackers the repo's GITHUB_TOKEN. This is the "Compound Risk" of Agentic AI. When you give an AI "hands" (tools, terminal access, tokens) and a "brain" that can't tell the difference between a user's instruction and a piece of data it just read, you've built a Sleeper Agent. If your AI agent can read your Jira tickets, your Slack, or your PRs, an attacker doesn't need to hack you. They just need to "salt" the information the AI is about to process. In reality: We are giving AI "God Mode" permissions while it's still operating on "Open Book" logic. That's an architectural disaster waiting to happen. Stop filtering the chat. Start hardening the architecture.
72
10 Comments -
Nikhil Swamy
Microsoft • 1K followers
PulseParse & EverCBOR Uses F* and Pulse to formalize several new standards for secure data formats and attestations, including CBOR, CDDL, and COSE, producing verified libraries and compilers. If you're building security-critical components in embedded systems, secure boot loaders, device attestation components, software bill of materials, etc.: Use our formally verified, high-performance code! The result includes * a detailed formalization of multiple RFCs, with mechanically checked proofs of correctness and security. * a library in verified C and in verified safe Rust for validating, parsing, and serializing CBOR objects * a verified compiler for CDDL specifications, yielding either verified C or verified safe Rust code, for parsing and serializing CBOR objects according to a CDDL schema * a verified implementation of COSE_Sign1, again in C or Rust, using verified cryptography from HACL* * and a verified implementation of DICE Protection Environment, using the CBOR profile Hat tip to Tahina Ramananandro, who drove this work! #fstarlang #pulse #rust #cbor #cddl #cose #everparse #sbom #dice #dpe https://lnkd.in/gkDzxjZt CBOR: https://cbor.io/ CDDL: https://lnkd.in/g8ydYzYa COSE:
55
2 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content