April 29, 2026
April 29, 2026
you never think this will happen to you, but this happened to me today.
— whizwang (@whizwang) April 28, 2026
a DPRK actor posed as somebody i previously worked with at the arbitrum foundation to have a catchup call. they reached out via telegram, in a channel where we had an existing messaging history.
the DPRK… https://t.co/hjyJ8Pf1Iz pic.twitter.com/uJs98A6RPy
Throwback to early NYT reporting on Russian hackers
— Oleg Shakirov (@shakirov2036) April 28, 2026
In 2007, @mschwirtz asked Russian LJ users for their opinions. One user said he didn't think hackers were a big problem & he was cited by @cliffordlevy a week later
This was a sentiment shared by some, but not all in Russia pic.twitter.com/AfOpNbkFqv
Putting outdated coding books in the Little Free Library should be considered illegal dumping, and carry a sentence of 100 hours community service. pic.twitter.com/MBnzHLdflc
— Y Disassembler (@loomdoop) April 28, 2026
The cutout network addresses most of the structural vulnerabilities that exposed NSO Group. It provides legal insulation between developer and sale, complicates sanctions targeting through jurisdictional dispersion, and gives both vendor and client deniability.
— Gabriella (@gabrielladb_) April 28, 2026
Local importers… https://t.co/GwbIDUcubr
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.mdfile that primes Claude with expert-level methodology for a specific attack surface from SQLi to shellcode, EDR evasion to exploit development.… pic.twitter.com/QjsB8TILkH
— 7h3h4ckv157 (@7h3h4ckv157) April 25, 2026
GitHub - SnailSploit/Claude-Red: claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development. · GitHub
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a s...
SnailSploit/Claude-Red (1,064 stars) claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development.
source: 7h3h4ckv157 (@7h3h4ckv157)
It's wild to think about how massive 1M token context windows in LLMs really are
— David K 🎹 (@DavidKPiano) April 28, 2026
That's roughly equivalent to:
- The complete works of Shakespeare
- 11 hours of audio
- A 5-minute session fixing some TypeScript issue
A response to recent reporting in Germany, in service of clarity and accountability:
— Signal (@signalapp) April 27, 2026
First, it’s important to be precise when it comes to critical infrastructure like Signal. Signal was not “hacked” — in that our encryption, infrastructure, and the integrity of the app’s code…
How Amazon uses agentic AI for vulnerability detection at global scale https://t.co/fMtNQarSsW
— Vipin George (@vipinonline) April 28, 2026
How Amazon uses agentic AI for vulnerability detection at global scale - Amazon Science
Amazon’s RuleForge system uses agentic AI to generate production-ready detection rules 336% faster than traditional methods.
Oh, great to see MSRC listens! This indeed covers some harmful attack scenarios which the previous versions didn’t cover (such as the OLE and Protected View one). It’s a good move for Office researchers and all Office users.👏
— Haifei Li (@HaifeiLi) April 28, 2026
(with this spirit, I just shared my personal… https://t.co/iadtUEbWXH
🤵 Keynote #2 at #FUZZING'26 is online
— Marcel Böhme👨🔬 (@mboehme_) April 27, 2026
Where the Fuzz Are We Going?
by Sergej Dechand (@CI_Fuzz).https://t.co/K2RxY2awhJ
NDSS 2026 - FUZZING 2026, Keynote 2 by Sergej Dechand — NDSS Symposium
source: Marcel Böhme👨🔬 (@mboehme_)
https://blog.calif.io/p/mad-bugs-qemu-and-utm-escapeMAD Bugs: QEMU and UTM Escape
— thaidn (@XorNinja) April 28, 2026
Welcome gift for @justdionysus! Now onto another cool one for @i0n1c.
Blog: https://t.co/vILIkTZB1jhttps://t.co/YfJSt3W6sN
QEMU and UTM Escape — Calif Official
source: thaidn (@XorNinja)
[1/7]I've spent the last several years researching declassified CIA records for two books on Cold War intelligence operations. Along the way, I built a tool I wish had existed when I started.
— Albert Lulushi (@albertlulushi) April 28, 2026
It's called Intelligence Archive. https://t.co/MNRvvE0Z0K
Intelligence Archive - Cold War Intelligence Documents
Declassified CIA documents — Albania operations, OSS to Early CIA, U.S. intelligence & former Nazi personnel. 1939–2007.
This is one of the best takeways from #fast16 story. I cannot but agree more. This is so close to how I explain the journalists why fast16 hasn't been found until now. Kudos to Trey Darley. Checkout his full piece on Trusting Trust: https://t.co/Fto2GNDCeE pic.twitter.com/IGIR2FFY8R
— Vitaly Kamluk (@vkamluk) April 27, 2026
Field Note #10 ∷ On Trusting Trust, Revisited
On Ken Thompson's 1984 lecture, the fast16 sabotage framework, and the discipline of making trust commitments visible.
http://gbppr.net/l0pht/l0pht.html32 years ago today I registered the @L0phtHeavyInd class C. I got the email from ARIN, sent the class C address to our ISP, then got the first packets routed over our 56K modem to our 486 linux box. When those first packets come through the whole room exploded with chants of, "We… pic.twitter.com/juuazbg5Xr
— Chris Wysopal (@WeldPond) April 28, 2026
NEW: we caught 🇨🇳Chinese hackers... again.
— John Scott-Railton (@jsrailton) April 28, 2026
Twist: they're hacking journalists & activists, but we suspect they're private contractors.
State repression... with a profit margin.
Thread + how to protect yourself 1/
By us @citizenlab in collab w/@ICIJorg pic.twitter.com/fBQq5a8bxs
Add a comment: