
How easy is it to tweet as anyone? | Twitter Hacks & Bug Bounty

Source link
Related Articles
All Mix →[tl;dr sec] #302 – LLM Honeypot Catches Threat Actor, Supply Chain Compromise Survey, AI-powered Malware
Table of Contents CAB AppSec Supply Chain Blue Team Red Team AI + Security Wrapping Up CAB This week Semgrep had our Customer Advisory Board…
A Brilliant Piece on Fashion
You’ll want to check out this piece over at Less Wrong on fashion. It’s the clearest thinking I’ve ever seen on the topic. I’ll summarize…
A Tale of Two Formats: Exploiting Insecure XML and ZIP File Parsers to Create a Web Shell
While researching a bug bounty target, I came across a web application that processed a custom file type. Let’s call it .xyz. A quick Google…
Jailbreaking Humans vs Jailbreaking LLMs · Joseph Thacker
Table of Contents Why is jailbreaking even possible? Humans have near-infinite context windows Alien example “Jailbreaking” an LLM and convincing it to tell you things…
Bypass parsing of transaction data, users on the phishing site will transfer/approve ERC20 tokens without being alerted
MetaMask disclosed a bug submitted by ronnyx2017: https://hackerone.com/reports/1651429 – Bounty: $1000 Source link
[Google VRP] SSRF in Google Cloud Platform StackDriver – Ron Chan
During the process of testing GAE after reading this awesome blog post, I found a debug application in Google Cloud Platform Stackdriver, user can debug…