Posts

How will LLM vendors mitigate Zombie Agent attacks?

What is this? Cryptojacking disabled??

How I built a system to automate the WAF rule and proof of concept generation pipeline from most WordPress Plugin CVE advisories the minute they are announced.

Is it fun buying used drives to see their private data?

Crunchyroll breach (via Telus?) ~100GB data incl emails, IPs, CC details + support logs

Just added 70+ tools to the AI bug bounty hunter

I'm a grad student writing a paper on the role of hacking as digital insurrectionary anarchism

Vista machine with a forgotten password and family photos stuck on it

DeepNet update — you can now build firewalls, set honeypot traps, and recover confiscated tools

Unauthenticated RCE in Langflow (145K GitHub stars) - one HTTP POST, arbitrary Python execution, exploited 20 hours after disclosure with no public PoC

Navia Data Breach Impacts 2.7 Million

How a Typosquatted Domain and a Fake Version Tag Turned Trivy Into a Credential Stealer