October 29, 2025
October 29, 2025
More interposer fun, this time with DDR5 memory. Breaking TDX, SGX, SEV and even Nvidia TEEs. Checkout our work at https://t.co/Jl1dpGnM6J, and get a personally-signed Intel attestation report at @TEEdotFail. pic.twitter.com/TNcZNZYBAN
— Daniel Genkin (@DanielGenkin) October 28, 2025
CVE-2025-55752 Apache Tomcat possible RCE
— H4x0r.DZ 🇰🇵 (@h4x0r_dz) October 28, 2025
if PUT is enabled 🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡
This is like saying i can extract your data from db if sql query is enabled pic.twitter.com/IVUOnIpYzS
Why not more prompt injection attacks?
— Graham Neray (@grahamneray) October 28, 2025
My hypothesis: not enough production AI workloads.
What do others think? @dinodaizovi? https://t.co/mza21E1389
Essentially for this reason shown by @adamjodonnell using game theory:https://t.co/d7gfQHKfDB
— Dino A. Dai Zovi (@dinodaizovi) October 28, 2025
Attackers have to retool and retrain. It's not worth the effort until target prevalence is sufficiently high. The theory predicts ~17% of targets for in-the-wild malicious attacks.
China is starting to enforce a law for online streamers and influencer accounts that tightens conduct rules and requires verified professional credentials in sensitive fields. For content that requires a higher level of professional expertise (such as in medicine and health,… pic.twitter.com/3za5RcfNgR
— Lukasz Olejnik (@lukOlejnik) October 28, 2025
Turing complete: it can be programmed to solve any problem
— Kamurocho Koyote (@RipperCoyote) October 28, 2015
Carmack complete: it runs Doom
A Brief History of Random Numbers:
— pikuma.com (@pikuma) October 28, 2025
🔗https://t.co/MSTnSww1yS
CIA was making successful cyberoperations/attacks against Venezuelan government (disabling the computer network used by Venezuelan leader Nicolás Maduro’s intelligence service). The goal apparently was to "do something". "An administration official proposed knocking a… pic.twitter.com/DSsNewM4Mr
— Lukasz Olejnik (@lukOlejnik) October 29, 2025