January 3, 2026
January 3, 2026
“Cognitive Warfare seeks “to exploit facets of cognition to disrupt, undermine, influence, or modify human decision-making by altering human behaviour and cognition through any means and technological advances”. A new Cognitive Warfare report from NATO’s chief scientist.… pic.twitter.com/uBhSUnx3M3
— Mick Ryan, AM (@WarintheFuture) January 2, 2026
its late so i'll probably regret posting this but...
— 📙 Alex Hillman (@alexhillman) January 2, 2026
enter the dragon 🔥🐲
say hi to Smaug, the helpful hoarding dragon that roams your Twitter bookmarks and helps you organize them into your personal knowledge system of choice. https://t.co/d8pEXqTGMG
special thanks to…
Let's begin the new year with some V8 exploitation!
— Gabriel Prostitis (@___prosti) January 2, 2026
Learn how to turn a broken CanonicalEquality check into arbitrary Wasm type confusion in this ASIS CTF Finals writeup by @Erge!
Read it here: https://t.co/OMofRaV0l5 pic.twitter.com/aeZEPYBkDr
The “AI is replacing penetration testers” posts and debates seem to be cropping up again. Here are my thoughts.
— Nick VanGilder (@nickvangilder) December 30, 2025
If you’re in a penetration testing role and the bulk of your value entails hunting for technical vulns or doing general technical testing, I think replacement is at…
Getting arbitrary read/write in QEMU by exploiting iret/call far instructions https://t.co/wfHSaIiDsz#infosec pic.twitter.com/iVtOsfGbR0
— 0xor0ne (@0xor0ne) January 1, 2026
XSSNow - The Ultimate XSS Payload Databasehttps://t.co/xYIpeNvVIZ pic.twitter.com/H0ZFX5nyQ0
— Het Mehta (@hetmehtaa) January 2, 2026
Full story here 👇https://t.co/qzz58A69vp
— Mehmet INCE (@mdisec) January 1, 2026
Brian Tatosky: "Getting Grok to "apologize" for generating non-co…" - Mastodon
Getting Grok to "apologize" for generating non-consensual porn is like getting Excel to apologize for generating accounting fraud.
https://t.co/txBlxmMa61 Anti-cheat evolution in Windows... New Year post while I am in vacation is ready!!! 🎉 Happy 2026!
— Andrea Allievi (@aall86) January 2, 2026
“We can’t be getting bombed, there is nothing on FlightRadar!” https://t.co/PsNky7oHuE
— Oliver Alexander (@OAlexanderDK) January 3, 2026
It is dangerously easy to build a neural network today without actually understanding how it works.
— Tech with Mak (@techNmak) January 2, 2026
We live in an era of 'import torch'. You can train a model in three lines of code, but the moment you need to debug a collapsing loss function or a vanishing gradient, syntax… pic.twitter.com/T6NUxBnc1X
''Attacking LINE Cryptography for Fun and .. Forensics - Team 501''#infosec #pentest #redteam #blueteamhttps://t.co/qZ7GjYR5Xv
— Florian Hansemann (@CyberWarship) January 2, 2026
Automate orchestration of containers and operationalize Browser in the Browser (BITB) attacks for red teams 🔥https://t.co/cryzc3tHLF
— Mehmet Ergene 🔸 (@Cyb3rMonk) January 2, 2026
Major update to claude-workflow
— CloudAI-X (@cloudxdev) January 2, 2026
After @bcherny sharing his workflow, I have added 13 new slash commands based on his patterns.
Inner-loop commands for daily work:
/project-starter:commit → auto-generate commit message
/project-starter:commit-push-pr → commit + push + create…
Add a comment: