Hackers are reportedly leveraging the new AI tool HexStrike-AI to quickly exploit recently disclosed n-day flaws in real attacks, raising concerns in the cybersecurity community. #Cybersecurity#HexStrikeAIift.tt/lALkYOQ
Want to get better at GeoGuessr?
@Mousewithbeers’ GeoHints breaks down the signs, poles, soil, and road features the pros use to pinpoint locations.
Free, no signup, just sharp tools:
🌍 geohints.com
Want to get better at GeoGuessr?
@Mousewithbeers’ GeoHints breaks down the signs, poles, soil, and road features the pros use to pinpoint locations.
Free, no signup, just sharp tools:
🌍 geohints.com https://t.co/yypF4VfUHJ
we got a persistent 0click on ChatGPT by sharing a doc
that allowed us to exfiltrate sensitive data and creds from your connectors (google drive, sharepoint, ..) + chat history
+ future conversations
it gets worse. we deploy a memory implant
#DEFCON#BHUSA@tamirishaysh
petapixel.com/2013/08/10/min…
"Instead, it became well-known as a spy cam.
Even after WWII ended and the camera was redesigned, production costs made Minox subminiature cameras a luxury item that continued to be used by intelligence agencies on both sides during the Cold War."
Interesting point:
"The real game-changer is AI-powered malware, which is malicious software that dynamically interacts with AI models to adapt its behavior in real-time. This kind of capability could mark a meteoric leap in adversaries’ tactics"
aquasec.com/blog/ai-genera…
Black Mass Volume III is available for free as a PDF and for sale as a physical copy on Amazon
Locations available: US, UK, DE, FR, ES, IT, NL, PL, SE, JP, CA, AU
Subsequent post contains link to US Amazon link. Use your countries Amazon domain to buy the book.
🚨 A decade-old bug (CVE‑2016‑2296) in Meteocontrol WEB’log controllers lets anyone—with just three clicks—access the config, grab admin creds, and remotely manipulate solar-plant controls!
⚡ Thousands of exposed devices—mostly in Germany, Greece & Italy—still live online. Patch…
New research reveals detailed analysis of DPRK VPN infrastructure used by North Korean operatives abroad.
According to technical analysis published by NK Internet Watch, "Hangro" appears to be a specialized VPN client that enables North Koreans overseas to establish secure…
The song was infectious; in a bad way.
Playing on one laptop could cause other machines in the same room to crash.
The fix was hilarious. The manufacturer modified the audio pipeline to remove the offending frequency.
You quite literally couldn't play the offending note!
4K Followers 1K FollowingRadio Hacker. Shortwave & cw lover. Iw0hk amateur radio call. Head of @raiplaysound & Host of #inteferenze on @Radio3tweet
Sota Manager for Italy
308 Followers 1 FollowingA cybersecurity company specializing in web application security, protecting against supply chain attacks and client-side vulnerabilities
3.9M Followers 2K FollowingOfficial FBI X account. Submit tips at https://t.co/tGqFRcJykB. Public info may be used for authorized purposes: https://t.co/x6bfDUEYeJ.
7K Followers 12 FollowingStay ahead with updates on high-profile vulnerabilities, expert tutorials, essential safety tips, and the latest Netlas developments.
20K Followers 552 FollowingTech Journalism with zero ads, & zero Big Tech influence. We cover the Big Tech stories that other publications are afraid to touch.
24K Followers 2K Followingowner of https://t.co/PVTlUZSWgE and temari.fr - Security/Malware researcher, ethical carder, ex-treasurer of @Hack_Gyver and Temari fan ♥ #DIY #Electronic
11K Followers 728 Following// unethical hacker
// cybersecurity leader: megacorp, usa
// ex big tech, else
// @redteamvillage_ & @sec_defcon daemon
// take sincerely at your own risk
41 Followers 34 Following👮 OsintomátiCOPS - ESPAÑA
🗓 10 NOV - Workshops Exc.
🗓 11/12 NOV - Evento
🚨 Exclusivamente para fuerzas de seguridad, inteligencia y defensa.
56K Followers 9K FollowingCutting through #AI for sharper investigations. Workshops worldwide. Trusted by Pulitzer winners, law makers and NGOs. My mission: find a story in public data.
4K Followers 711 FollowingBrincando com Linux/BSD desde 1997 e eu posso provar.
Endereço de monero (XMR) na @cakewallet: 85xLNKPVaX3A4PeC9n2hciKwjjZHRYh6sjgyi24C6gVcQPouvsUkbVMDUEvsBLvn
14K Followers 673 FollowingThis is the official Twitter account of Maltego - The world’s most used all-in-one intelligence platform for complex cyber investigations.
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
253K Followers 185 FollowingOfficial account of the Metasploit Project, part of the @rapid7 family.
Mastodon: @[email protected]
Slack: https://t.co/ZOLPDG2O2s
229K Followers 934 FollowingResearcher and a best-selling author. Keynote talks at RSA, Black Hat & DEF CON. TED Speaker. Chief Research Officer at Sensofusion.
7K Followers 236 FollowingProvide comprehensive visibility into internet-facing assets.
Looking for vulnerabilities and misconfigurations 24/7 since 2020.
https://t.co/MEjkffN1xg
21K Followers 0 FollowingOur mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity and emerging threats. Join our Alliance!
38K Followers 132 FollowingDetect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.