Category: Mix
In July 1995, Tatu Ylonen sent the following e-mail to IANA: From ylo Mon Jul 10 11:45:48 +0300 1995 From:…
How to avoid Busywork Generators, bug bounty story of secrets in deleted files, new AI security tools and evals from…
As we have entered Q2 2025, let’s dive into key improvements and new features introduced on the Intigriti platform in…
ChatGPT has been lying to users to make them happy as a part of OpenAI’s effort to “improve personality”, and…
Amelia Coen | 30 April 2025 at 13:23 UTC 1000s of pentesters are currently using Burp AI features to hack…
I’m still running daily, but I’ve swapped some days for walking with a weighted vest. The main limitation I’m currently…
We recently released The Rise of Agentic AI, our API ThreatStats report for Q1 2025, finding that evolving API threats are…
NoSQL injections are relatively easier to exploit than classic SQL injections. However, developers often overlook these vulnerabilities, mainly due to…
This morning I tweeted: “Most people don’t actually know what’s ‘best’ for themselves.” And atomiczsec replied and said “How do…
AI creating/debugging an exploit for the recent Erlang/OTP SSH vuln, map visualization and firewall for AWS activity, a multi-stage attack…
As 9 out of 10 valuable web apps are missing testing, we’re launching new capabilities to help teams know what…
The senior law enforcement official said the Russians feared he could be a risk, and “they had something on him…

![[tl;dr sec] #277 – Cybersecurity (Anti)Patterns, $64K from Deleted Files, New from Meta AI Security [tl;dr sec] #277 - Cybersecurity (Anti)Patterns, $64K from Deleted Files, New from Meta AI Security](https://image.cybernoz.com/wp-content/uploads/2025/05/tldr-sec-277-Cybersecurity-AntiPatterns-64K-from-Deleted-Files.png)





![[tl;dr sec] #276 – AI-created PoC Exploit, Cloud Snitch, Kubernetes Attack Simulation [tl;dr sec] #276 - AI-created PoC Exploit, Cloud Snitch, Kubernetes Attack Simulation](https://image.cybernoz.com/wp-content/uploads/2025/04/tldr-sec-276-AI-created-PoC-Exploit-Cloud-Snitch-Kubernetes.png)

