October 14, 2025
October 14, 2025
The plan? At dusk, 50 people went to San Francisco's longest dead-end street and all ordered a Waymo at the same time.
— Riley Walz (@rtwlz) October 12, 2025
The world's first: WAYMO DDOS pic.twitter.com/DEDH0tdMKP
💣 We caught @ycombinator–backed @gecko_sec stealing two of our CVEs, one on @ollama , one on @Gradio.
— FuzzingLabs (@FuzzingLabs) October 13, 2025
They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts.
Here’s the full story 👇 pic.twitter.com/wp5u4Z4bQv
Hunting Conti’s Shadow
— GangExposed RU (@GangExposed_RU) October 13, 2025
How I found what the FBI, the NSA and an army of researchers couldn't
Imagine you’re hunting the most disciplined cybercriminal group in the world — Conti.
These guys wrote the textbooks on OPSEC. Impeccable digital hygiene. In 2022, all their internal… https://t.co/qulVOCe7dI pic.twitter.com/44STgSw3dZ
TARGET (CONTI) = Alexey Kurashov (23.02.1986) [Identified] Reward: up to $10M.
— GangExposed RU (@GangExposed_RU) September 10, 2025
👉 Full dossier page, archive and all evidence: https://t.co/WCc8ToIAUT
Stylometry, travel, and chat data confirm Kurashov as TARGET/BLOODRUSH. Linked to CONTI core (Professor, Stanton, Stalin,… pic.twitter.com/mnTrf4LYzP
As promised, a thread about AI in cybersecurity. I want to explain how these systems work and why I think despite the hype and the stupid sales people, there’s also something very real going on in this space. https://t.co/YeQObKxZeK
— Zack Korman (@ZackKorman) October 13, 2025
Thread by @ZackKorman on Thread Reader App – Thread Reader App
@ZackKorman: As promised, a thread about AI in cybersecurity. I want to explain how these systems work and why I think despite the hype and the stupid sales people, there’s also something very real going on...…
I just released Beads, a drop-in cognitive upgrade for your coding agent of choice. https://t.co/dl9cQO0Jjo
— Steve Yegge (@Steve_Yegge) October 13, 2025
In a nutshell, it is a magical 4-dimensional graph-based git-backed fairy-dusted issue-tracker database, designed to let coding agents track all your work and never get…
GitHub - steveyegge/beads: Beads - A memory upgrade for your coding agent
Beads - A memory upgrade for your coding agent. Contribute to steveyegge/beads development by creating an account on GitHub.
You Have Been LaTeXpOsEd: A Systematic Analysis of Information Leakage in Preprint Archives Using Large Language Models
[2510.03761] You Have Been LaTeXpOsEd: A Systematic Analysis of Information Leakage in Preprint Archives Using Large Language Models
The widespread use of preprint repositories such as arXiv has accelerated the communication of scientific results but also introduced overlooked security risks. Beyond PDFs, these platforms provide unrestricted access to original source materials, including LaTeX sources, auxiliary code, figures, and embedded comments. In the absence of sanitization, submissions may disclose sensitive information that adversaries can harvest using open-source intelligence. In this work, we present the first larg...
Between Two Nerds: The Keyser Soze of Scattered Spider - Risky Business Media
Frida 17.4 introduces Simmy, a new backend for Apple’s Simulators on macOS.
— Frida (@fridadotre) October 13, 2025
Spawn, attach, and instrument apps — just like on a real device. pic.twitter.com/7tyrVha7to
This is amazing research by Nadia Heninger and her co-authors Wenyi Morty Zhang, Annie Dai, Keegan Ryan, Dave Levin and Aaron Schulman. TL;DR a huge number of satellite links over our heads are totally unencrypted. https://t.co/tXb4RTQS6L
— Matthew Green is on BlueSky (@matthew_d_green) October 14, 2025
Analysis of GrapheneOS hardened malloc libc allocatorhttps://t.co/QqLfVv5Ecu
— 0xor0ne (@0xor0ne) October 14, 2025
Credits Nicolas Stefanski (@Synacktiv)#infosec pic.twitter.com/MPMODs6JZ4
In this post, I cover the DCOM objects in the https://t.co/yWjItiZBkt , how to fix some issues, and how to bypass Defender for MMC20.
— Haidar (@haider_kabibo) October 13, 2025
I plan to publish part two soon, focusing on new DCOM objects I discovered time ago that can be used for lateral movementhttps://t.co/AJGs4f91p2
LatentBreak: Jailbreaking Large Language Models through Latent Space Feedback. https://t.co/f7a5t1LvHe
— Natural Language Processing Papers (@HEI) October 13, 2025
‘A succulent Chinese seal?’ https://t.co/uSmXKIW2qv
— Parsley (@Parsleymael) October 13, 2025
Earlier this month, I wrote about the scale of Starlink in Myanmar's scam centres and the policy implications of its industrialised use. The scale of their use is staggering (>2k terminals in a single scam centre). So is the speed that they appeared in Febhttps://t.co/UG1pip3a5R https://t.co/v8Mhr8cUbp pic.twitter.com/lpQ8uqSuVd
— Nathan Ruser (@Nrg8000) October 14, 2025