April 30, 2025
April 30, 2025
watched a talk on Necrobotics, which started by posing an insane question: would you let a dead spider, controlled by AI robotics, perform surgery on your eyeball? and then told us that this wasnβt actually a theoretical question at all. pic.twitter.com/2lktDAZYRo
β Chairman Birb Bernanke (@Bonecondor) April 28, 2025
Since people suddenly care about rotational inertia on the grid, here's our paper on the topic from 6 years ago. pic.twitter.com/2176qiQ0im
β Michael E. Webber (@MichaelEWebber) April 29, 2025
Exploiting CVE-2024-0582 via the Dirty Pagetable Method@kuzeyardabulut posted an article about exploiting CVE-2024-0582 in io_uring using the Dirty Pagetable technique: https://t.co/QTcePhPBsN
β Linux Kernel Security (@linkersec) April 28, 2025
This bug was reported by @tehjh: https://t.co/FuxAT4wfOX pic.twitter.com/sarqjOqyc3
Thanks Forbes, I was confused what password spraying...sorry, "sparaying" attacks looked like. π« pic.twitter.com/5glRHZfarF
β Tib3rius (@0xTib3rius) April 28, 2025
Microsoft Telnet Server MS-TNAP Guest Access Restriction Bypass Exploit https://t.co/BuqLbfm5bu
β hackerfantastic.x (@hackerfantastic) April 29, 2025
Monty Python and the Holy Grail turns 50 https://t.co/2XlTvimdxp
β Ars Technica (@arstechnica) April 29, 2025
LMFAO - Which one of you degenerates did this? π pic.twitter.com/UULhopJwPA
β β£οΈ Mr. The Plague β£οΈ (@DotNetRussell) April 29, 2025
OpenAI: We are delighted to inform you we've silently shipped an update transforming ChatGPT into the Schizophrenia Accelerator from the hit novel "Do Not Build the Schizophrenia Accelerator" https://t.co/hc4VkUFkTE
β 0.005 Seconds (3/694) (@seconds_0) April 28, 2025
π€ Last week, Anthropic released a report on malicious uses of Claude.
β Thomas Roccia π€ (@fr0gger_) April 29, 2025
The report is very interesting, but I think it is missing critical actionable insights to make it useful for threat analysts.
I broke down my POV in a blog, quick thread ππ§΅https://t.co/V2Xf00QlsA
@thegrugq Guten Tag, the unroll you asked for: https://t.co/Ebop6kG7gb Share this if you think it's interesting. π€
β Thread Reader App (@threadreaderapp) April 30, 2025
.png)
AirBorne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk | Oligo Security | Oligo Security
Oligo Security reveals AirBorne, a new set of vulnerabilities in Appleβs AirPlay protocol and SDK. Learn how zero-click RCEs, ACL bypasses, and wormable exploits could endanger Apple and IoT devices worldwide β and how to protect yourself.
Crazy idea: letβs give one country to the Habsburgs and one to the Bourbons and check on them 500 years later pic.twitter.com/nak4rp7SR8
β Luka Ivan Jukic (@lijukic) April 29, 2025
