πΎ GDDRHammer and GeForge: GPU Rowhammer Now Achieves Full System Compromise β’ π€ Assessing Claude Mythos Previewβs cybersecurity capabilities
β¨ ImageMagick: From Arbitrary File Read to File Write In Every Policy β’ π§π»βπ» Leveling Up Secure Code Reviews with Claude Code β’ π€ Vulnerability Research Is Cooked
βοΈ Remote Command Execution in Google Cloud with Single Directory Deletion
π€ Testing AI for Vulnerability Research: 4 Approaches & Where I Failed β’ π οΈ Hyoketsu β Solving the Vendor Dependency Problem in RE β’ π§ Sashiko
π IronCurtain: A Personal AI Assistant Built Secure from the Ground Up β’ π₯ mitmproxy for fun and profit: Interception and Analysis of Application Traffic β’ βοΈβπ₯ Authentication Bypass in pac4j
π» Browser-Based Port Scanning in the Age of LNA β’ πͺ 100+ Kernel Bugs in 30 Days β’ βοΈ vinext: Vibe-Hacking Cloudflare's Vibe-Coded Next.js Replacement
𦫠CTFtime.org / justCTF [*] 2020 / Go-fs / Writeup β’ βοΈ Almost Impossible: Java Deserialization Through Broken Crypto in OpenText Directory Services β’ π± Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat
β¨ Breaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Security β’ βοΈ Introducing Augustus: Open Source LLM Prompt Injection Tool β’ π€Ί When Two Parsers Disagree: Exploiting Query String Differentials for XSS
π€ Semgrep's Agent Skills β’ π€Ώ Shaking the MCP Tree: A Security Deep Dive β’ π€ Evaluating and mitigating the growing risk of LLM-discovered 0-days
πͺ Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals β’ β On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025 β’ πͺ² Insecure Defaults Detection
π€― On the Coming Industrialisation of Exploit Generation with LLMs β’ π¨ Cloudflare Zero-day: Accessing Any Host Globally β’ π€ Claude Magic String Denial of Service
π€ AI models are showing a greater ability to find and exploit vulnerabilities on realistic cyber ranges β’ π΄ββ οΈ Pwning Claude Code in 8 Different Ways β’ π The State of OpenSSL for pyca/cryptography
π§ Cross-Site ETag Length Leak β’ π οΈ Detect Go's silent arithmetic bugs with go-panikint β’ π Ruby Array Pack Bleed