A security platform to ruin your next weekend 😍
google.com·2d·
Discuss: r/selfhosted
🦹cybercrime
Flag this post
Russian hackers use fake CAPTCHA tests to spread new malware families across multiple targets
foxnews.com·2d
🦹cybercrime
Flag this post
Show HN: Pingu Unchained an Unrestricted LLM for High-Risk AI Security Research
pingu.audn.ai·1d·
Discuss: Hacker News
🔍Cyber threat intelligence
Flag this post
This Week in Security: Bogus Ransom, WordPress Plugins, and KASLR
hackaday.com·2d
🦹cybercrime
Flag this post
Google Security Researchers ID AI-Powered Malware Used in Real World Cyberattack
axios.com·4d
🦹cybercrime
Flag this post
Hacktivate: Capture the Flag
hacktivate.io·15h·
Discuss: Hacker News
🦹cybercrime
Flag this post
The Single Byte That Kills Your Exploit: Understanding Endianness
pwnforfunandprofit.substack.com·6h·
Discuss: Substack
🦹cybercrime
Flag this post
AI/ LLM Hacking — Part 6 — Excessive Agency | Insecure Plugin
infosecwriteups.com·10h
🦹cybercrime
Flag this post
I Am Mark Zuckerberg
iammarkzuckerberg.com·13h·
Discuss: Hacker News
🦹cybercrime
Flag this post
As AI-powered threat detection and response become increasin
dev.to·1h·
Discuss: DEV
🔍Cyber threat intelligence
Flag this post
Exploratory Analysis of Cyberattack Patterns on E-Commerce Platforms Using Statistical Methods
arxiv.org·3d
🦹cybercrime
Flag this post
State-Sponsored Remote Wipe Tactics Targeting Android Devices
genians.co.kr·6h·
Discuss: Hacker News
🔍Cyber threat intelligence
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·2d
🦹cybercrime
Flag this post
ID verification laws are fueling the next wave of breaches
bleepingcomputer.com·18h
🦹cybercrime
Flag this post
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
thehackernews.com·2d
🦹cybercrime
Flag this post
Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack
bespacific.com·2d
🦹cybercrime
Flag this post
How a Crypto Recovery Expert Can Help You Recover Lost Funds: Visit Techy Force Cyber Retrieval
dev.to·2d·
Discuss: DEV
🦹cybercrime
Flag this post
Driving TFEL with RP2040: Offloading the CPU step by step (2021)
zephray.me·19h·
Discuss: Hacker News
🦹cybercrime
Flag this post