1.
2.
Bad Connection: Global telecom exploitation by covert surveillance actors
(news.ycombinator.com)
4.
GTFOBins
(news.ycombinator.com)
5.
Surveillance Pricing: Exploiting Information Asymmetries
(news.ycombinator.com)
6.
Exploits Turn Windows Defender Into Attacker Tool
(darkreading.com)
7.
8.
Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw
(bleepingcomputer.com)
10.
11.
Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?
(darkreading.com)
12.
Hackers exploiting Acrobat Reader zero-day flaw since December
(bleepingcomputer.com)
13.
Breaking the console: a brief history of video game security
(news.ycombinator.com)
14.
How Do You Find an Illegal Image Without Looking at It?
(news.ycombinator.com)
15.
Vulnerability research is cooked
(news.ycombinator.com)
16.
Vulnerability Research Is Cooked
(news.ycombinator.com)
17.
18.
Jury says Meta knowingly harmed children for profit, awarding landmark verdict
(news.ycombinator.com)
19.
20.
22.
23.
24.
25.
Critical Microsoft SharePoint flaw now exploited in attacks
(bleepingcomputer.com)
26.
PSA: Hackers can raid iOS 18 with an infected link
(theverge.com)
27.
New “Darksword” iOS exploit used in infostealer attack on iPhones
(bleepingcomputer.com)
28.
Warlock Ransomware Group Augments Post-Exploitation Activities
(darkreading.com)
29.
Qualcomm responds to GBL exploit used on latest Snapdragon flagships
(androidauthority.com)
30.
Most Google Cloud Attacks Start With Bug Exploitation
(darkreading.com)
Today's top topics:
openai
apple tv
canvas
instructure
shinyhunters
anthropic
instagram
e2ee
online messaging
privacy