November 2, 2024
November 2, 2024
Project Zero blog:
โ dmnk@infosec.exchange (@domenuk) November 1, 2024
LLMs find 0days now! ๐
And: our fuzzer setup did not reproduce it! https://t.co/xz6j2fzrWe pic.twitter.com/i6PZX9jFFB
What. The. pic.twitter.com/5hvaXeohEK
โ Matt Johansen (@mattjay) November 1, 2024
AI provides scale and efficiency, two key areas that often bottleneck defenders. But the inverse is true for most classes of threat actor. Resolving the defenders dilemma may be in sight. https://t.co/JbcLIsZPFq
โ chrisrohlf (@chrisrohlf) November 2, 2024
Key point here.
"Itโs also the first time thereโs been a public articulation of the fundamentals of how ASIS spies for Australia, namely the identification, recruitment and running of foreigners with access to secrets Australia wants and cannot otherwise obtain".https://t.co/qO7CZJSWzo
โ Dr. Dan Lomas (@Sandbagger_01) November 1, 2024
Shady exploit vendor operating in public challenge level impossible: coming up with a brand name which doesn't include โZeroโ
โ dunadan (@udunadan) November 2, 2024
Zero day? More like zero trust
โ dunadan (@udunadan) November 2, 2024
"Ghost job" listings are far more common than you might have guessed. This is just sickening behavior. We need regulations on this just like we have for false advertising.https://t.co/t304Mj3aJe pic.twitter.com/c9z2EWDlFg
โ Jake Williams (@MalwareJake) November 1, 2024
They're also used to see how low the salaries can go.
โ Mick Douglas ๐บ๐ฆ๐ป (@bettersafetynet) November 1, 2024
I know of at least a handful orgs where they float openings and see at what point they feel they stop getting a certain quality level of applications.
It's a massive problem, and IDK how you could fix this at all.
Apple Watch turns in drunk driver. This is from my local paper police log. pic.twitter.com/nQlylKF63D
โ Weld Pond | Chris Wysopal (@WeldPond) November 1, 2024
One the saddest realizations for me when we were scaling the @midjourney server at @discord in โ22 was seeing millions of US gen z kids struggle to prompt
โ Anjney Midha ๐บ๐ธ (@AnjneyMidha) November 1, 2024
They literally donโt have the words. Broken english. Pidgin lingo. Translating thought to language is insanely hard forโฆ https://t.co/nyjT2x0oD6
Thomas Joseph Kendrick OBE was the mastermind behind the whole clandestine bugging operation of WWII. With a history of being a top spymaster for MI6 in Europe in the 1920s and 1930s, he understood how to gain information from prisoners of war without resorting to 'third degree'โฆ pic.twitter.com/NGCk80p4na
โ Dr Helen Fry | WWII Historian (@DrHelenFry) October 29, 2024
Omg this is incredible: pic.twitter.com/Kb4pp2B4mi
โ Conor Sen (@conorsen) November 1, 2024