I love this ❤️ kagi.com @kagihq home page today.
It took me straight back to 1996 when I first started using the internet. Netscape Navigator, Yahoo directory to find sites of interest.
I especially loved the slow loading images.
CVE ID: CVE-2026-5281
Vendor: Google
Product: Dawn
Date Added: 2026-04-01
Notes: This vulnerability affects an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-5281
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-5281
so anthropic's coding thing leaked, and they are using DMCA to get it taken down.
but if it is all vibecoded and everything generated by LLM is not copyrightable...
INFOSEC cool kids getting excited about hacking back against literal state-sponsored assassins.
Yet another abuse of the missing "CrossDevice.Streaming.Source.dll" DLL!
After CVE-2025-24076 / CVE-2025-24076 found by Compass Security, Researcher Oscar Zanotti Campo found another vulnerability that he could exploit using the built-in misconfigured COM class referencing this DLL. This is CVE-2026-21508. 🔥
👉 https://0xc4r.github.io/posts/CVE-2026-21508/
👉 https://github.com/0xc4r/CVE-2026-21508_POC/
👉 https://blog.0patch.com/2026/03/micropatches-released-for-windows.html
Does anyone have a contact at pwn.ai?
We would kinda like to have a conversation with them...
Reading analysis of the Claude Code leak (not reading the code itself, of course) is evidence towards what I had kind of suspected, that the whole thing is a giant magic trick not only in the straightforward LLMentalist way, but also in the sleight of hand way off making you think that this pile of regexes and JSON schema validation loops is *actually* the LLM doing LLM things.
The client side authentication of AI:
export const CYBER_RISK_INSTRUCTION = `IMPORTANT: Assist with authorized security testing, defensive security, CTF challenges, and educational contexts. Refuse requests for destructive techniques, DoS attacks, mass targeting, supply chain compromise, or detection evasion for malicious purposes. Dual-use security tools (C2 frameworks, credential testing, exploit development) require clear authorization context: pentesting engagements, CTF competitions, security research, or defensive use cases.`
We have adjusted the scoring on the advisory to reflect server-side mitigations that the vendor described during the disclosure process.
Join @mr_phrazer with us on Thursday @4pm ET to pit machine versus machine!
We'll be comparing LLM options for both assisted and fully-automatic reverse engineering, including different CLI interfaces, MCP servers, plugins, and agents.
Get notified so you don't miss who comes out on top of reversing's biggest battle yet: https://www.youtube.com/live/TBqBpaqecMA
Hey, look. It's a decent scan of this legendary image!
Can we print this part of Microsoft's T&S as a leaflet and distribute at our university?
https://www.microsoft.com/en-us/microsoft-copilot/for-individuals/termsofuse
Here we go!
The A to Z Challenge has begun. My theme this year is Small Town Legends: weird folklore from villages and small towns in and around Hungary.
First up: some very strange geese.
Ács: Zombie Goose Shenanigans https://share.google/Aa9plXTmBYbUrUPXM
#AtoZChallenge #SmallTownLegends #blogging #folklore #folktales #legends
i don't see enough people with one of the best tool improvements i've ever made for reverse engineering, so i had to write a blog post about it!