August 22, 2025
August 22, 2025
AWS CEO says using AI to replace junior staff is 'Dumbest thing I've ever heard'
“I think the skills that should be emphasized are how do you think for yourself? How do you develop critical reasoning for solving problems? How do you develop creativity? How do you develop a learning mindset that you're going to go learn to do the next thing?”
The revenge of the Humanities.
https://www.theregister.com/2025/08/21/aws_ceo_entry_level_jobs_opinion/We hacked Gemini CLI, Vertex AI, Assistant, and other AI systems by embedding prompts into images that are not visible to users. pic.twitter.com/PN9zGl8fBH
— Trail of Bits (@trailofbits) August 21, 2025
I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard to figure out what to do. Try the PhrackCTF which I've now open-sourced. It's not a contrived CTF - modeled after real vulnerabilities https://t.co/u001gVqa5c
— chompie (@chompie1337) August 20, 2025
https://monthofaibugs.com

None
Want some quick memory on the Heap?
— db (@whokilleddb) August 21, 2025
Don't wanna call HeapAlloc() directly?
Meet `ProxyHelperClientAllocateMemory()` from `httpprxc.dll` which does the hard job for you!
Found using: https://t.co/eFOTKG0F3h
PS: Now you can buy me a coffee to help me pull more all nighters! pic.twitter.com/RwqekXulT6
No paywall v: https://t.co/WxUGMmL2F1
— Tay 💖 (@tayvano_) August 21, 2025
Trad co’s struggling just like crypto co’s.
But..the bar is so much lower in crypto. It’s pretty rare we get one w a real ID operating from a laptop farm.
Per usual, they do exactly what’s required to achieve their goal and nothing more. https://t.co/ZoD0WDHMji pic.twitter.com/SwoppzT8jR
The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: https://t.co/CWLknch5RZ
— Synacktiv (@Synacktiv) August 21, 2025
This python utility offers a stable, modular and stealthy exploitation framework targeting Group Policy Objects in Active Directory!
Secure enclaves in post-exploitation world.
— SEKTOR7 Institute (@SEKTOR7net) August 21, 2025
A strategy to exploit vulnerable enclave DLLs and transform ROP-based execution to hide implant memory during sleep.
Fantastic post by Cedric Van Bockhaven (@c3c) of Outflank Team (@OutflankNL)!
Source: https://t.co/WlO4UGDyAx… pic.twitter.com/qiaJsPzcu2