September 1, 2025
September 1, 2025
Was in a bookshop and asked a worker if he could recommend books to me. He said "Sure, they're great".
— Andy Ryan (@ItsAndyRyan) August 30, 2025
Just like how corp and prod are fundamentally different environments (corp is all 3rd-party software you can't modify), so are "home" and "homelab". The best results come from keeping them separated so that their configurations can be tailored to their highly disparate use-cases. https://t.co/ejPOUcpwV2
— Dino A. Dai Zovi (@dinodaizovi) August 30, 2025
Working on tons of new features including passive OS detection. Ducky’s usually do OS detection by sending lock keys and response timing.
— 丂卄ㄖᗪ卂几 - 👋 crack fingers (@therealshodan) August 30, 2025
But it’s better to not be a keyboard at all and just check how the host enumerates the USB stack.
Not sure if I’ll release publicly https://t.co/iKWFX6xOJn
Malicious meeting invites and device linking — #UNC6293 is using these tactics to target prominent academics, critics of Russia, and journalists.
— Mandiant (part of Google Cloud) (@Mandiant) August 30, 2025
Learn more about this group's tactics and how to defend against the threat by reading our blog post.
🔗: https://t.co/kDpptOl7fa pic.twitter.com/82knfpWkcm
If you want to avoid your exec team buying vaporware from some snake oil cybersecurity vendor, my honest advice is to be more proactive in going out and finding products you do believe in. Execs don’t want to hear “that won’t work”, but they love “we’re already doing that” https://t.co/P9mCy2HM8Y
— Zack Korman (@ZackKorman) August 31, 2025
Do you remember your 1980s Blackberry? pic.twitter.com/M8V1rUInHF
— Paul Asadoorian @paulasadoorian@infosec.exchange (@securityweekly) August 31, 2025
BRILLIANT @GoogleDeepMind research.
— Rohan Paul (@rohanpaul_ai) August 31, 2025
Even the best embeddings cannot represent all possible query-document combinations, which means some answers are mathematically impossible to recover.
Reveals a sharp truth, embedding models can only capture so many pairings, and beyond that,… pic.twitter.com/6iNVuCL51E
NEW LEAK: Price sheet of 200+ crypto influencers and their wallet addresses from a project they were recently contacted by to promote.
— ZachXBT (@zachxbt) September 1, 2025
From 160+ accounts who accepted the deal I only saw <5 accounts actually disclose the promotional posts as an advertisement. pic.twitter.com/Kph9dUvDxB
> sniffer written in go
— mel (@melqtx) August 31, 2025
> looks inside
> python pic.twitter.com/HZ72209rr8
The paper trains cybersecurity agents using simulated Capture The Flag environments, skipping real runtimes while still boosting results.
— Rohan Paul (@rohanpaul_ai) September 1, 2025
Up to 13.1% absolute gains, an open 32B model rivals top closed systems at lower cost.
These challenges are stepwise puzzles where a solver… pic.twitter.com/KRCNdTB2dZ