May 19, 2026
May 19, 2026
Nice write up from the Cloudflare team, but the post here is misleading. Patch faster is not the wrong answer, because most teams are patching on the order of weeks or months. You must patch faster than that right now. But I will agree that 2 hours is infeasible beyond the… https://t.co/OQFMn0FO1Z
— Heather Adkins - Ꜻ - Spes consilium non est (@argvee) May 18, 2026
🏴☠️ I can finally share a VMware 0day I discovered that led to CVE-2026-41702 (LPE as root). Funny enough, I found the bug in my hotel room after the second day of attending Csaba Fitzl (@theevilbit) & Gergely Kalman (@gergely_kalman) training at Zer0con.https://t.co/mG55Ksc4gE pic.twitter.com/qSjzSKNXDi
— Coiffeur (@Coiffeur0x90) May 17, 2026
C111000: Race Against The Virtual Machine or how a SUID binary in VMware Fusion was raced to gain root privileges on macOS | Coiffeur’s blog
Vulnerability research blog
Only a very few cyber operations benefit from high speed on target. Generally speaking, most cyber ops want dwell time measured in months, not in minutes. https://t.co/po7lXhgvTW
— thaddeus e. grugq (@thegrugq) May 19, 2026
Speed on-target will primarily benefit cybercriminals and disruptors who alert defenders to their presence as a matter of course. It may be a liability in cyber espionage. https://t.co/Tsd8oc48GZ
— John Hultquist (@JohnHultquist) May 18, 2026
still not quite over the fact that i watched 15 year olds get sued for millions of dollars for downloading twelve songs and now we all have to accept AI slop because every tech company in the known universe decided that IP laws don't exist now that they're inconvenient for them
— theselongwars (@theselongwars_) May 18, 2026
I didn't know Helen of Troy could generate so much conflict.
— Everything Price Sufferer (but especially eggs) (@agraybee) May 18, 2026
The mystery of Fast16 has been solved by @symantec and physicist @DAVIDHALBRIGHT1. Fast16 changed data produced by simulator software to trick Iranian engineers into thinking their nuclear weapons designs were bad. It didn't predate Stuxnet but was developed around the same time https://t.co/MUxh380Wpu
— Kim Zetter (@KimZetter) May 18, 2026
Sometimes it confuses me how the security field today fails to remember why things like least privilege and privilege separation were built into qmail, postfix, and SSH long ago.
— Dino A. Dai Zovi (@dinodaizovi) May 18, 2026
Then I remember that an astonishingly small percentage of the field today were around back then.
Earlier today Cloudflare's CSO shared how they tested Anthropic Mythos using an unreleased 8-stage vulnerability-discovery agent. So I asked Opus to implement the agent for me, it works via Claude SDK with a Pro or Max subscription, no API.
— Simone Margaritelli (@evilsocket) May 18, 2026
Enjoy https://t.co/McoZbTvTLL pic.twitter.com/FGOrxhBW4X
GitHub - evilsocket/audit: An 8-stage vulnerability-discovery agent. · GitHub
An 8-stage vulnerability-discovery agent. Contribute to evilsocket/audit development by creating an account on GitHub.
evilsocket/audit (160 stars, Python) An 8-stage vulnerability-discovery agent.
source: Simone Margaritelli (@evilsocket)
Here's the PoC for Nginx CVE-2026-42945 which works against vanilla Ubuntu (and any other distro?) + Nginx with ASLR enabled. I have included all iterations of the PoC the LLM was kicked to improve.
— Hamid Kashfi (@hkashfi) May 18, 2026
TL;DR: We can use an LFI/file-read primitive to leak enough details from…
GitHub - Hamid-K/nginx-rift-private-lab: Private Nginx Rift ASLR lab, exploit chain, and demo recordings · GitHub
Private Nginx Rift ASLR lab, exploit chain, and demo recordings - Hamid-K/nginx-rift-private-lab
Hamid-K/nginx-rift-private-lab (20 stars, Python) Private Nginx Rift ASLR lab, exploit chain, and demo recordings
source: Hamid Kashfi (@hkashfi)
NATO war game ended with Russia cutting off the Baltics in 24 hours — because Germany froze politically while the US stayed out.
— Tymofiy Mylovanov (@Mylovanov) May 17, 2026
Retired Ukrainian Gen. Romanenko, playing Russia’s commander, says NATO’s biggest weakness was not troops but hesitation, FP. 1/ pic.twitter.com/z6YIXRDiUD
https://foreignpolicy.com/2026/05/15/russia-war-game-nato-invasion-baltics-ukraine-putin-germany-ernstfall/Source: https://t.co/RxzOYw0alI
— Tymofiy Mylovanov (@Mylovanov) May 17, 2026
I just learned the sad news that Peter Neumann has passed away.
— Chris Wysopal (@WeldPond) May 17, 2026
Peter Neumann shaped how a generation of security people learned to think about risk. As editor of RISKS Digest, he gave many of us coming up in the 1990s and early 2000s a steady education in the real-world… pic.twitter.com/pTctaUK7KW
Reminds me of the findings from various fuzzers (symbolic execution guided like SAGE, dumb bit flips, etc). They all discovered partially overlapping sets of bugs. Both now and back then, there is a also partially overlapping set that are discoverable manually by humans. https://t.co/PRDt4MxSJu
— Dino A. Dai Zovi (@dinodaizovi) May 17, 2026
Just dropped my full notes on Pwn2Own Berlin 2026. Broke down the big wins by DEVCORE, the actual techniques they used, why these matter in the real world, and exactly where you can practice the same skills yourself. Full article here #Pwn2Own #P2OBerlin #CyberSecurity https://t.co/4vE4KCrJ3a
— 𝕡𝕨𝕟.𝕋∅𝕔𝕙! (@0day_ninja) May 17, 2026
I have often wondered how exactly external groups distill the frontier models - this is how. By doing this they get the benefits of genuine user prompts (multi-turn, real codebases, human feedback), subsidize the cost of distilling many tokens, and display real usage patterns and… https://t.co/MdzwQDUjOz
— Brendan O'Donoghue (@bodonoghue85) May 16, 2026
In 1562 a French gentleman was arrested for attending meetings of Protestants, but was acquitted after admitting he’d only gone in the hope of participating in the orgies Catholic propaganda claimed Protestants got up to. pic.twitter.com/bnuHMy2YHl
— Stakeholder Consultant (@echetus) May 17, 2026
https://codecolor.ist/talks/Astonishing work! Remind me about @CodeColorist's brilliant logical chains against iOS 14 Safari, which were rooted in Loki more than a decade ago.
— Toan Pham (@__suto) May 18, 2026
I wonder whether Edge might do something unexpected with URL schemes or web content involving AI features.
Looking forward for the… https://t.co/23V7IKqd1t
This applies to frontier labs, governments, AI-for-pentesting companies as well.
— Sean Heelan (@seanhn) May 17, 2026
It is worth thinking about the fact that there is very little incentive (and often a strong disincentive) to say the second sentence publicly. https://t.co/IET2JL0MZn
CIA counterintelligence chief James Angleton was running a paranoid hunt for Soviet infiltrators while playing a game of "Pee-pee Touch (No Homo)" with *two* actual KGB agents. I imagine a lot of recent Iranian intelligence failures went down the same way. pic.twitter.com/eMUbL7vXlP
— Matthew Petti 🫒 🌲 🌷 🌻 (@matthew_petti) May 17, 2026
Add a comment: