May 10, 2025
May 10, 2025
.png)
How to turn security research into profit: a CL.0 case study | PortSwigger Research
Have you ever seen a promising hacking technique, only to try it out and struggle to find any vulnerable systems or non-duplicate findings? In this post, I'll take a concise look at the most effective
Reports of alleged Pakistan-executed cyberattacks causing major damage like power-cuts. Sound fishy so BEWARE because there’s an information warfare/propaganda going on. Unverifiable, especially beware of texts that sound as if they were generated by ChatGPT or another LLM😉 pic.twitter.com/xnbTG1JnRC
— Lukasz Olejnik (@lukOlejnik) May 10, 2025
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages https://t.co/1OOBCPYyJ2
— Project Zero Bugs (@ProjectZeroBugs) May 9, 2025
Two Hungarians detained over alleged spy plot in Ukrainehttps://t.co/bD6IcMdnFZ
— Dr. Dan Lomas (@Sandbagger_01) May 9, 2025
—
Note: this was recorded in November 2024, so not current but still interesting.
How we "guessed" the Pope using network science: inside the cardinal network. A study by me, Beppe Soda and Alessandro Iorio. Article: https://t.co/xQ0fTmpVxb @Unibocconi pic.twitter.com/dTjL9MLFr3
— Leonardo Rizzo (@LnrdRizzo) May 9, 2025