Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows
dev.to·1h·
Discuss: DEV
🎯Threat Hunting
RevengeHotels: a new wave of attacks leveraging LLMs and VenomRAT
securelist.com·9h
🎫Kerberos Exploitation
Under the Pure Curtain: From RAT to Builder to Coder
research.checkpoint.com·6h
🔓Hacking
'FileFix' attacks use fake Facebook security alerts to trick victims into running infostealers
theregister.com·7h
🔓Hacking
MAUI: Reconstructing Private Client Data in Federated Transfer Learning
arxiv.org·15h
🔒Privacy Archives
Google releases VaultGemma, its first privacy-preserving LLM
arstechnica.com·22h·
Discuss: Hacker News
💻Local LLMs
China-linked Mustang Panda deploys advanced SnakeDisk USB worm
securityaffairs.com·12h
💿WORM Storage
Stealth radio hides signal in background noise to protect drone pilots
newscientist.com·1d·
Discuss: Hacker News
🎵Audio Steganography
Using Agent in the Middle To Ride Herd on Wayward AI
thenewstack.io·4h
🎯Threat Hunting
5 Best VPN Services (2025), Tested and Reviewed
wired.com·5h
🌐DNS over QUIC
Malvertising on Meta Serves Android Users a Crypto-Stealing Trojan
zimperium.com·6h
🎫Kerberos Attacks
Strengthening Enterprise Quantum Security
cacm.acm.org·1h
🔐Quantum Security
Discord as a C2 and the cached evidence left behind
pentestpartners.com·10h
📟Terminal Forensics
I Tested AI 'Humanizers' to See How Well They Actually Disguise AI Writing
lifehacker.com·1d
Proof Automation
Secure Semantic Communication over Wiretap Channels: Rate-Distortion-Equivocation Tradeoff
arxiv.org·15h
ℹ️Information Theory
How AI fraud Is evolving faster than AP & procurement defenses
techradar.com·5h
🎯Threat Hunting
How Space Debris Cleanup Could Become the Next Trillion-Dollar Industry
hackernoon.com·10h
📼Cassette Hacking
HTB Planning Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.com·10h
🛡️CLI Security