·

What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 1/26/26

Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week.

Featured Analysis

Featured article analysis: Researcher reveals evidence of private Instagram profiles leaking photos

A significant privacy vulnerability was discovered by security researcher Jatin Banga, which reportedly allowed unauthenticated users to access private Instagram content. The flaw resided in how Instagram’s backend handled server-side authorization; specifically, when certain private profiles were accessed via specific mobile user-agents, the HTML source code returned JSON objects containing direct CDN links to private photos and captions. Banga’s testing suggested that approximately 28% of the accounts he analyzed were susceptible to this leak, effectively bypassing the platform’s primary “private account” security wall.

The story also highlights a contentious dispute between the researcher and Meta regarding the disclosure and remediation process. Banga reported the issue in October 2025, but Meta initially dismissed the findings as a CDN caching issue rather than a server-side authorization failure. Although Meta eventually closed the report as “not applicable” and “not reproducible,” Banga observed that the exploit stopped working shortly after his report was submitted. This led to accusations of a “silent fix,” where the company allegedly patched the vulnerability to avoid paying a bug bounty or admitting to a critical security lapse, while publicly maintaining that no actionable bug existed.

Ultimately, the analysis serves as a cautionary tale about the complexities of coordinated disclosure and the transparency of tech giants. By going public after the standard 90-day disclosure window, Banga forfeited potential financial rewards to prioritize public awareness, arguing that Meta’s reluctance to acknowledge the root cause leaves users in the dark about how long their data may have been exposed. The situation underscores a persistent tension in the cybersecurity industry: the balance between a company’s desire to protect its reputation and a researcher’s mission to ensure that systemic vulnerabilities are fully understood and verified.

Projects

Articles

, , , , , , , , , , , , , , , , , , , , , , , , , ,