August 4-5, 2025
August 4-5, 2025
ai app so good it XSSes itself pic.twitter.com/4CdK2dwQqY
— PatRyk (@Patrosi73) August 3, 2025
For years I have heard that MacOS is more secure than Win.
— Mike Manrod (@CroodSolutions) August 3, 2025
Until recently I have done little to test such assumptions, but have learned some things working to test AutoRMM / Beaconator vectors on MacBook this week. Here are my preliminary observations:https://t.co/E4Ew8tzIWN
i normally don't latch onto higher level trends...but the (𝘱𝘰𝘵𝘦𝘯𝘵𝘪𝘢𝘭) relationship between these is a bit fascinating
— J⩜⃝mie Williams (@jamieantisocial) August 4, 2025
correlation, causation, or just tradecraft normalization 🤷♀️ https://t.co/EnGo6JLLD3 pic.twitter.com/KzqqHAXBw9
CrowdStrike 2025 Threat Hunting Report: AI Becomes a Weapon and a Target
The CrowdStrike 2025 Threat Hunting Report reveals how adversaries weaponize AI, target cloud systems, and evolve long-game cyberattack tactics.
We (+@ronenshh) hacked NVIDIA's Triton AI server by abusing a single error message🚨
— Nir Ohfeld (@nirohfeld) August 4, 2025
The result is unauthenticated RCE allowing attackers to compromise the server and steal proprietary AI models🤯
For more details & mitigations check out our blog @wiz_io https://t.co/v5kpI1eedL pic.twitter.com/pdcuCFPiP8
📱 WhatsApp message
— Block (@blocks) August 4, 2025
💼 Dream job offer
💰 Immediate start
🚨 Too good to be true?
Recruitment scammers are getting creative. Our security team has seen it all and now they're sharing their playbook.
🔒 Learn how to protect yourself: https://t.co/ubnTFc8e7v
$100 for anyone who can show me how to get ChatGPT to stop using emdashes. it's driving me insane pic.twitter.com/cr7t0PMIor
— Chip Huyen (@chipro) August 3, 2025
“Everything the right – and the left – are getting wrong about the Online Safety Act” | George Billinge | The Guardian | …let’s ignore the article and just look at George’s LinkedIn profile pic.twitter.com/KILhMpmzku
— Alec Muffett (@AlecMuffett) August 4, 2025
BSides Las Vegas 2025 is incredible. Amazing turn-out, fantastic staff, and the sheer variety of content, speakers, and activities sets the bar for what a hacker con should be. Slides for "Turbo Tactical Exploitation: 22 Tips for Tricky Targets" are at: https://t.co/FcfJCjiQIE pic.twitter.com/ObJ4ji1r2E
— HD Moore (@hdmoore) August 5, 2025
🚨 I am publishing my research on the File System API. FileJacking might used to establish Initial Access.
— Print3M (@Print3M_) August 4, 2025
Key points:
- File smuggling via File System API
- Backdooring files directly from a browser
- Reading / creating folders and files from a browserhttps://t.co/9apA0IrNCv
Take 2 laptop and make them communicate through sound with this awesome project i've foundhttps://t.co/uEJje0M5iL
— curtis (@curtis_sx) August 5, 2025
shoutout to @IceSolst
— GitHub Projects Community (@GithubProjects) August 4, 2025
elfspirit - ELF static analysis and injection framework that parses, manipulates, patches, and camouflages ELF files https://t.co/JkyiafBGRI
— cr0@Defensive-Security.com / PurpleLabs / EDRmetry (@cr0nym) August 5, 2025
Big scoop from Estonia on Russia's GPS super-jammer in Kaliningrad/ Königsberg that has been causing havoc in the Baltic Sea's airspace.
— toomas hendrik ilves (@IlvesToomas) August 4, 2025
Including technical details of how it works. See @DelfiEEhttps://t.co/chVixmEq0M
That article translated is here: https://t.co/EHaZ6vCQLI
— Amara Graps (@amaragraps) August 5, 2025