A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens https://projectzero.google/2026/05/pixel-10-exploit.html
Google replaces your PC mouse with yelling at Gemini
‘reimagining’ the mouse pointer
https://www.youtube.com/watch?v=NSWCWnLMj-U&list=UU9rJrMVgcXTfa8xuMnbhAEA - video
https://pivottoai.libsyn.com/20260513-google-replaces-your-mouse-with-yelling-at-gemini - podcast
time: 5 min 38 sec
https://pivot-to-ai.com/2026/05/13/google-replaces-your-pc-mouse-with-yelling-at-gemini/ - blog post
Hey nerds!
I made a thing!
It's a "chore tracker*, but I took a somewhat unique take on the subject 🙈
It tracks when did you last completed a chore and how close are you to the desired frequency you set for that particular chore.
You can access it here: https://chores-mvp.azurewebsites.net/
There is #privacy policy as well. I hope it will answer most of the questions.
You can self-host it if you're into that sort of things.
The Junkyard Call for Bugs is officially open! 👾
www.districtcon.org/junkyard
For additional information, please reference our Disclosure Guidance doc: lnkd.in/ewjswJyf
And if you missed last years presentations, check them out on YouTube now: https://www.youtube.com/@DistrictCon/shorts
Missing peripheral in QEMU? Adding it yourself is easier than you think.
We hit a wall analyzing CVE-2019-14192 on real Raspberry Pi 3B+ firmware, so we added the missing driver to #QEMU. Register by register, using U-Boot's own source as the spec.
When you hear people abandoning Open Source because of the AI exploit threat, ask them if we should keep our laws secret as well.
Because there is a huge industry of accountants and lawyers specialized in finding exploits in those.
No? Thought so.
Our new multi-model agentic security system brings together more than 100 specialized agents across frontier and custom models to find exploitable bugs, delivering top performance on the CyberGym benchmark.
We used it ahead of Patch Tuesday to help find and fix 16 vulnerabilities. Today we’re announcing that customers can sign up to test it in private preview.
Will you please stop wasting time on Mythos-associated FUD and try to understand that you need to build reliable and dependable software, not stuff which changes weekly, to get security?
Mythos & LLM only bring breadth and depth to automated searching, they find nothing conceptually new, if no-one had come up with buffer overflows there would be no buffer overflows coming out of Mythos.
There will be a flood of issues, as if suddenly thousands of people were dedicated to finding bugs, then it will stop.
It is an excellent chance to ask yourselves "why?" and realise that no, we don't need software like it is being built now, you need software like it was built back when downtime mattered.
"Packages that can't be rebuilt byte-for-byte are now blocked from entering Debian's testing branch."
https://itsfoss.com/news/debian-makes-reproducible-builds-mandatory/
Poll: What is the main driver of high quality vulnerability research?
(Multiple choice. Please boost for reach :))