sign up
sign up
sign up
sign up
pull down to refresh
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
www.helpnetsecurity.com/2025/07/28/vulnhuntr-open-source-tool-identify-remotely-exploitable-vulnerabilities/
210 sats
\
0 comments
\
@ch0k1
28 Jul 2025
security
related
Not in The Prophecies: Practical Attacks on Nostr
crypto-sec-n.github.io/
4110 sats
\
7 comments
\
@ek
7 Aug 2025
nostr
Lightning Surveillance as a Service is Here!
2762 sats
\
21 comments
\
@nullcount
19 Dec 2022
bitcoin
AI’s Hacking Skills Are Approaching an ‘Inflection Point’
www.wired.com/story/ai-models-hacking-inflection-point/
130 sats
\
0 comments
\
@0xbitcoiner
14 Jan
AI
Mastering Testing in DevOps: A Comprehensive Guide to Types and Techniques
130 sats
\
0 comments
\
@BytePhysics
12 Jan 2024
devs
Patch Tuesday brings 90 new Microsoft CVEs, six already under exploit
www.theregister.com/2024/08/14/august_patch_tuesday/
395 sats
\
0 comments
\
@dontforgetthekeys
14 Aug 2024
security
Analyze JoinMarket Bitcoin CoinJoin transactions using ILP.
github.com/m0wer/joinmarket_analyzer
1233 sats
\
12 comments
\
@m0wer
30 Nov 2025
bitcoin
Not Sealed: Practical Attacks on Nostr
www.blackhat.com/us-25/briefings/schedule/#not-sealed-practical-attacks-on-nostr-a-decentralized-censorship-resistant-protocol-45726
393 sats
\
3 comments
\
@ek
30 Jul 2025
crypto
The XZ Backdoor: Everything You Need to Know
www.wired.com/story/xz-backdoor-everything-you-need-to-know/#intcid=recommendations_wired-bottom-recirc-v4_cf3e2538-ba66-4408-a9c0-3af3ee784b35_similar2-3_fallback_cral2-2
74 sats
\
0 comments
\
@nym
25 Apr 2024
security
Identifying crypto scams through Static Analysis
153 sats
\
0 comments
\
@Crypto4udit
16 Mar 2025
crypto
Flaw in Gemini CLI coding tool could allow hackers to run nasty commands
arstechnica.com/security/2025/07/flaw-in-gemini-cli-coding-tool-allowed-hackers-to-run-nasty-commands-on-user-devices/
218 sats
\
1 comment
\
@0xbitcoiner
30 Jul 2025
AI
Critical Next.js Vulnerability Allows Attackers Bypass Middleware Authorization
thehackernews.com/2025/03/critical-nextjs-vulnerability-allows.html
304 sats
\
2 comments
\
@ch0k1
25 Mar 2025
security
OpenSSH Backdoors
blog.isosceles.com/openssh-backdoors/
240 sats
\
0 comments
\
@dontforgetthekeys
24 Aug 2024
security
Disrupting first reported AI-orchestrated cyber espionage campaign - Anthropic
www.anthropic.com/news/disrupting-AI-espionage
457 sats
\
1 comment
\
@Scoresby
13 Nov 2025
AI
Anthropic has launched a code vulnerability scanner
claude.com/solutions/claude-code-security
181 sats
\
0 comments
\
@lunin
26 Feb
AI
Android Trojan Campaign Uses Hugging Face Hosting for RAT Payload Delivery
www.bitdefender.com/en-us/blog/labs/android-trojan-campaign-hugging-face-hosting-rat-payload
130 sats
\
0 comments
\
@0xbitcoiner
29 Jan
AI
Latest Strikes S03E03 - December 1st - December 7th
1283 sats
\
0 comments
\
@fanis
11 Dec 2025
lightning
Antigravity Grounded! Security Vulnerabilities in Google's Latest IDE
embracethered.com/blog/posts/2025/security-keeps-google-antigravity-grounded/
239 sats
\
0 comments
\
@0xbitcoiner
25 Nov 2025
AI
Metasploit Module Released 4 Actively Exploited SharePoint 0-Day Vulnerabilities
cybersecuritynews.com/metasploit-module-for-sharepoint-0-day/
236 sats
\
0 comments
\
@ch0k1
28 Jul 2025
security
How Did I Get Here?
how-did-i-get-here.net
449 sats
\
1 comment
\
@deSign_r
12 Nov 2025
Design
API Parrot – Automatically Reverse Engineer HTTP APIs
docs.apiparrot.com/docs/category/tutorial---reverse-engineering-the-usps-api
170 sats
\
0 comments
\
@chaoticalHeavy
3 Jan 2025
devs
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code
thehackernews.com/2025/08/attackers-abuse-velociraptor-forensic.html
160 sats
\
0 comments
\
@ch0k1
30 Aug 2025
security
more