sign up
sign up
sign up
sign up
pull down to refresh
CTEM in Practice: Prioritization, Validation, and Outcomes That Matter
thehackernews.com/2026/01/ctem-in-practice-prioritization.html
81 sats
\
0 comments
\
@ch0k1
28 Jan
news
related
The 5 Most Common Cybersecurity Mistakes
137 sats
\
3 comments
\
@0xbitcoiner
21 May 2024
security
Disrupting first reported AI-orchestrated cyber espionage campaign - Anthropic
www.anthropic.com/news/disrupting-AI-espionage
457 sats
\
1 comment
\
@Scoresby
13 Nov 2025
AI
Unpatched Windows Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
499 sats
\
0 comments
\
@ch0k1
18 Mar 2025
security
AI’s Hacking Skills Are Approaching an ‘Inflection Point’
www.wired.com/story/ai-models-hacking-inflection-point/
130 sats
\
0 comments
\
@0xbitcoiner
14 Jan
AI
Too much open-source AI is exposing itself to the web
www.theregister.com/2026/02/01/opensource_ai_is_a_global/
251 sats
\
3 comments
\
@0xbitcoiner
2 Feb
AI
Understanding the Twitter Hack of 2020: A Deep Dive
1001 sats
\
3 comments
\
@Daniela
5 Jan 2024
security
AI Agents vs Cybersecurity Professionals in Real-World Penetration Testing
arxiv.org/abs/2512.09882
194 sats
\
2 comments
\
@optimism
13 Dec 2025
AI
SonicWall Firewall Vulnerability Exploited After PoC Publication
www.securityweek.com/sonicwall-firewall-vulnerability-exploited-after-poc-publication/
141 sats
\
0 comments
\
@ch0k1
15 Feb 2025
security
Cyberspies Hacked Cisco Firewalls to Access Government Networks
www.wired.com/story/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks/
48 sats
\
0 comments
\
@nym
25 Apr 2024
security
Commercial Spyware Vendors Are Behind Most Zero-Day Exploits
securityaffairs.com/158750/hacking/commercial-spyware-vendors-zero-day.html
423 sats
\
0 comments
\
@0xbitcoiner
6 Feb 2024
security
PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
cybersecuritynews.com/regresshion-code-execution-vulnerability/
195 sats
\
0 comments
\
@ch0k1
7 Jan 2025
security
What is crypto malware, and how to detect it ?
cointelegraph.com/news/what-is-crypto-malware-and-how-to-detect-it
75 sats
\
0 comments
\
@0xbitcoiner
22 Dec 2023
security
Distillation, Experimentation, and Integration of AI for Adversarial Use
cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use
335 sats
\
0 comments
\
@0xbitcoiner
13 Feb
AI
Microsoft: New critical Exchange bug exploited as zero-day
www.bleepingcomputer.com/news/security/microsoft-new-critical-exchange-bug-exploited-as-zero-day/
62 sats
\
0 comments
\
@ch0k1
15 Feb 2024
security
AI agents find $4.6M in blockchain smart contract exploits
red.anthropic.com/2025/smart-contracts/
289 sats
\
2 comments
\
@0xbitcoiner
2 Dec 2025
AI
CISA orders feds to patch actively exploited Dell flaw within 3 days
www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days/
163 sats
\
0 comments
\
@winteryeti
23 Feb
tech
FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks
thehackernews.com/2024/02/fbi-warns-us-healthcare-sector-of.html
140 sats
\
0 comments
\
@doofus
28 Feb 2024
security
Democrats Claim to Care About Cybersecurity but Allow CISA to be Unfunded
www.securityweek.com/cisa-navigates-dhs-shutdown-with-reduced-staff/
328 sats
\
9 comments
\
@Cje95
17 Feb
Politics_And_Law
Is the OSC Prepared for the New Regulatory Reality of the Cyber Resilience Act?
www.linuxfoundation.org/blog/unaware-and-uncertain-is-the-open-source-community-prepared-for-the-new-regulatory-reality-of-the-cyber-resilience-act
170 sats
\
0 comments
\
@0xbitcoiner
28 Mar 2025
Politics_And_Law
Attackers are mapping your attack surface—are you?
www.bleepingcomputer.com/news/security/attackers-are-mapping-your-attack-surface-are-you/
215 sats
\
0 comments
\
@ch0k1
31 May 2025
security
Possible threats to LN Node's "actual availability"
43 sats
\
0 comments
\
@Matty
15 May 2024
lightning
more