Hackers are reportedly leveraging the new AI tool HexStrike-AI to quickly exploit recently disclosed n-day flaws in real attacks, raising concerns in the cybersecurity community. #Cybersecurity#HexStrikeAIift.tt/lALkYOQ
Want to get better at GeoGuessr?
@Mousewithbeers’ GeoHints breaks down the signs, poles, soil, and road features the pros use to pinpoint locations.
Free, no signup, just sharp tools:
🌍 geohints.com
Want to get better at GeoGuessr?
@Mousewithbeers’ GeoHints breaks down the signs, poles, soil, and road features the pros use to pinpoint locations.
Free, no signup, just sharp tools:
🌍 geohints.com https://t.co/yypF4VfUHJ
we got a persistent 0click on ChatGPT by sharing a doc
that allowed us to exfiltrate sensitive data and creds from your connectors (google drive, sharepoint, ..) + chat history
+ future conversations
it gets worse. we deploy a memory implant
#DEFCON#BHUSA@tamirishaysh
petapixel.com/2013/08/10/min…
"Instead, it became well-known as a spy cam.
Even after WWII ended and the camera was redesigned, production costs made Minox subminiature cameras a luxury item that continued to be used by intelligence agencies on both sides during the Cold War."
Interesting point:
"The real game-changer is AI-powered malware, which is malicious software that dynamically interacts with AI models to adapt its behavior in real-time. This kind of capability could mark a meteoric leap in adversaries’ tactics"
aquasec.com/blog/ai-genera…
Black Mass Volume III is available for free as a PDF and for sale as a physical copy on Amazon
Locations available: US, UK, DE, FR, ES, IT, NL, PL, SE, JP, CA, AU
Subsequent post contains link to US Amazon link. Use your countries Amazon domain to buy the book.
🚨 A decade-old bug (CVE‑2016‑2296) in Meteocontrol WEB’log controllers lets anyone—with just three clicks—access the config, grab admin creds, and remotely manipulate solar-plant controls!
⚡ Thousands of exposed devices—mostly in Germany, Greece & Italy—still live online. Patch…
New research reveals detailed analysis of DPRK VPN infrastructure used by North Korean operatives abroad.
According to technical analysis published by NK Internet Watch, "Hangro" appears to be a specialized VPN client that enables North Koreans overseas to establish secure…
The song was infectious; in a bad way.
Playing on one laptop could cause other machines in the same room to crash.
The fix was hilarious. The manufacturer modified the audio pipeline to remove the offending frequency.
You quite literally couldn't play the offending note!
11K Followers 716 Following// principal cybersecurity anarchist
// unethical hacker
// ex aws, wn, else
// @redteamvillage_ & @sec_defcon daemon
// take sincerely at your own risk
37 Followers 34 Following👮 OsintomátiCOPS - EDIÇÃO BRASIL
🗓️ 18 AGO - WORKSHOPS
🗓️ 19 - 20 AGO - EVENTO
🚨 Exclusivamente para forças de segurança, inteligência e defesa.
229K Followers 229 Following#1 Cyber Performance Center, providing a human-first platform to create and maintain high-performing cybersecurity individuals and organizations.
56K Followers 9K FollowingCutting through #AI for sharper investigations. Workshops worldwide. Trusted by Pulitzer winners, law makers and NGOs. My mission: find a story in public data.
4K Followers 588 FollowingBrincando com Linux/BSD desde 1997 e eu posso provar.
Endereço de monero (XMR) na @cakewallet: 85xLNKPVaX3A4PeC9n2hciKwjjZHRYh6sjgyi24C6gVcQPouvsUkbVMDUEvsBLvn
14K Followers 672 FollowingThis is the official Twitter account of Maltego - The world’s most used all-in-one intelligence platform for complex cyber investigations.
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
253K Followers 185 FollowingOfficial account of the Metasploit Project, part of the @rapid7 family.
Mastodon: @[email protected]
Slack: https://t.co/ZOLPDG2O2s
229K Followers 930 FollowingResearcher and a best-selling author. Keynote talks at RSA, Black Hat & DEF CON. TED Speaker. Chief Research Officer at WithSecure.
7K Followers 235 FollowingProvide comprehensive visibility into internet-facing assets.
Looking for vulnerabilities and misconfigurations 24/7 since 2020.
https://t.co/MEjkffN1xg
21K Followers 0 FollowingOur mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity and emerging threats. Join our Alliance!
37K Followers 125 FollowingDetect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.
36K Followers 184 FollowingNuclei uses a vast templating library to scan applications, cloud infrastructure, and networks to find and remediate vulnerabilities.
4K Followers 76 FollowingMalware Analysis
Creator of Debloat, certReport, and https://t.co/w4rAuuB7O0
Want to chat? Join the Debloat discord: https://t.co/ZcWIqa6ZA9
No recent Favorites. New Favorites will appear here.