July 10, 2025
July 10, 2025
How can the Government best protect the UK against grey zone threats?
— Defence Committee (@CommonsDefence) July 9, 2025
We have published a report. Read our recommendations ⬇️https://t.co/ISo1JKrFgU pic.twitter.com/ufd3pes4wc

dns0.eu — The European public DNS that makes your Internet safer
A free, sovereign and GDPR-compliant recursive DNS resolver with a strong focus on security to protect the citizens and organizations of the European Union.

AI security notes, July 8th: Improving our (poor) ability to forecast AI so we can do better AI security work
AI is changing so rapidly that to invest in security for AI, and AI for security, requires forecasting where AI itself will be in at least the short and medium term.

AI as Normal Technology
A new paper that we will expand into our next book
This is a great question because, as many of you have noticed, many reports will proclaim a malware payload or Threat Actor to be "highly sophisticated" when, in actuality, they're fairly generic and use recycled techniques.
— vx-underground (@vxunderground) July 10, 2025
To be direct: it's entirely subjective. There have… https://t.co/aN3KYCMQ3C
Threat Actors care, but it depends on the type of malware and their "target audience" e.g. home user, enterprise, or other governments... Ultimately, it is impossible for malware to be undetected forever. Additionally, to make your code be undetectable is very strenuous work and… https://t.co/efEStUTXKw
— vx-underground (@vxunderground) July 10, 2025
As an old fart in #xdev, I often get asked how to get into binary exploitation in 2025. I looked around, and here’s my recommendation:https://t.co/hc1SlbSHSj #pwncollege is a huge collection of free #lectures and practical #challenges maintained by a team of #hackers at @ASU. pic.twitter.com/n92pNayjmJ
— raptor@infosec.exchange (@0xdea) July 10, 2025

White Noise
A truly secure and private messenger that's lightning fast, massively scalable, and identity-free.

Out-of-Band, Part 1: The new gen of IP KVMs & how to find them
We begin the series exploring security risks of OoB management devices like BMCs, serial console servers, and IP-enabled KVMs, and share how to find them.
The Software Reverse Engineering Bookshelf https://t.co/WoVlHjKlYN . These are books that I recommend to attendees of my reverse engineering and low-level programming workshops, such as the ones I'm teaching for offical @defcon Workshops and the @MalwareVillage in a few weeks!
— Dr. Wesley McGrew (@McGrewSecurity) July 9, 2025
Perplexity’s CEO said the company’s web browser is designed to track users across the web to build detailed profiles and sell hyper-personalized ads. The browser is to monitor browsing habits, shopping activity, travel and dining interests, and time spent on sites, etc.… pic.twitter.com/vY2SBCxa1l
— Lukasz Olejnik (@lukOlejnik) July 10, 2025