January 30, 2025
January 30, 2025

Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
A publicly accessible database belonging to DeepSeek allowed full control over database operations, including the ability to access internal data. The exposure includes over a million lines of log streams with highly sensitive information.
the creator of doxbin was pwned through a calorie counter app pic.twitter.com/Rugs3GwGtO
— daniel (@hackermondev) January 29, 2025
https://x.com/fr0gger_/status/1884834198286225557?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://services.google.com/fh/files/misc/adversarial-misuse-generative-ai.pdf
https://x.com/tqbf/status/1884788500572119466?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/chrisrohlf/status/1884790216906383660?s=46&t=N8BJVGmkPtsCNYzDzAaCvA

Cryptanalyzing LLMs with Nicholas Carlini
‘Let us model our large language model as a hash function—’ Sold. Our special guest Nicholas Carlini joins us to discuss differential cryptanalysis on LLMs...
https://x.com/notcamiie/status/1884614791316009455?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/sandbagger_01/status/1884567478212182151?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/mahal0z/status/1884659019400282220?s=46&t=N8BJVGmkPtsCNYzDzAaCvA

Decompiling 2024: A Year of Resurgence in Decompilation Research
The year 2024 was a resurgent year for decompilation. Academic publications from that year made up nearly 30% of all top publications ever made in decompilation. In this post, I do a summarization and retrospective of both the academic and ideological progress of decompilation in 2024. Hint: decompilation research is back.
https://x.com/debugprivilege/status/1884850038339190789?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/m_haggis/status/1884637331950592480?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/growing_daniel/status/1884705676884160959?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/cyber_o51nt/status/1884768184630120498?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/unit42_intel/status/1884754169564668310?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/binitamshah/status/1884597920688992458?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
https://x.com/masteringburp/status/1884667368430801220?s=46&t=N8BJVGmkPtsCNYzDzAaCvA

USB Army Knife: The Ultimate Close Access Penetest Tool
Whether you want to transform into a USB Ethernet adapter and capture network traffic, create custom user interface for your attacks, or use covert storage devices, the USB Army Knife has you covered.
https://x.com/androidmalware2/status/1884588797037342779?s=46&t=N8BJVGmkPtsCNYzDzAaCvA
-