Two attackers physically opened ATMs, connected a laptop, installed malware, and forced the machines to dump all their cash. DOJ convictions, prison time, restitution, deportation.
Two attackers physically opened ATMs, connected a laptop, installed malware, and forced the machines to dump all their cash. DOJ convictions, prison time, restitution, deportation.
www.fda.gov/medical-devi...
www.fda.gov/medical-devi...
NTLMv1 is still in use today!
Mandiant has now released rainbow tables for NTLMv1 that can crack any pw in 12hrs on a $600 computer.
NTLMv1 is still in use today!
Mandiant has now released rainbow tables for NTLMv1 that can crack any pw in 12hrs on a $600 computer.
LLM attacks increasingly look like malware campaigns, not single exploits. This paper frames them as promptware and maps a 5-stage kill chain: initial access → priv esc → persistence → lateral movement → actions on objective.
arxiv.org/html/2601.09...
LLM attacks increasingly look like malware campaigns, not single exploits. This paper frames them as promptware and maps a 5-stage kill chain: initial access → priv esc → persistence → lateral movement → actions on objective.
arxiv.org/html/2601.09...
reclaimthenet.org/germany-bnd-...
reclaimthenet.org/germany-bnd-...
If everyone was to choose "delete and report spam" for every spam message and call would they stop? If not, what is the point?
If everyone was to choose "delete and report spam" for every spam message and call would they stop? If not, what is the point?
Joybubbles tells the story of Joe Engressi, the original phone phreak and a reminder that hacking started as curiosity, play, and defiance.
festival.sundance.org/program/film...
Joybubbles tells the story of Joe Engressi, the original phone phreak and a reminder that hacking started as curiosity, play, and defiance.
festival.sundance.org/program/film...
more attack surface, less ownership, permanent surveillance, and DRM on objects you physically bought.
Congratulations to the ad-powered fridge for completing the arc.
www.youtube.com/watch?v=cxZg...
more attack surface, less ownership, permanent surveillance, and DRM on objects you physically bought.
Congratulations to the ad-powered fridge for completing the arc.
www.youtube.com/watch?v=cxZg...
www.theguardian.com/business/202...
www.theguardian.com/business/202...
unpromptedcon.org
unpromptedcon.org
New flaws in the React Server Components “Flight” protocol (CVE-2025-55182 & CVE-2025-66478) allow unauthenticated remote code execution on default installations.
Attackers only need one malicious HTTP request to take over a server.
New flaws in the React Server Components “Flight” protocol (CVE-2025-55182 & CVE-2025-66478) allow unauthenticated remote code execution on default installations.
Attackers only need one malicious HTTP request to take over a server.
Armed forces should pay more attention to their software supply chains. These are complex networks of software components, vendors, service providers, and other companies. /1
Armed forces should pay more attention to their software supply chains. These are complex networks of software components, vendors, service providers, and other companies. /1
www.forbes.com/sites/the-wi...
www.forbes.com/sites/the-wi...
A founding force behind DEF CON’s Hackers with Disabilities, a member of cDc Ninja Strike Force, a L0pht regular who DJed our wildest parties (two of those moments captured below)
A founding force behind DEF CON’s Hackers with Disabilities, a member of cDc Ninja Strike Force, a L0pht regular who DJed our wildest parties (two of those moments captured below)