Guy

1.7K posts

Guy banner
Guy

Guy

@eserror

Offensive Security & Web3 Security Researcher

Se unió Eylül 2010
191 Siguiendo193 Seguidores
Tweet fijado
Guy
Guy@eserror·
Si piensas que las filtraciones de datos son un accidente, resultado de un ataque complejo, podrías estar equivocado. Más en 👇 eserror.xyz/posts/2025/fil…
Español
0
5
10
1.1K
Guy retuiteado
Starknet Foundation (BTCFi arc)
Starknet Foundation (BTCFi arc)@StarknetFndn·
Introducing Starknet Academy 🎓 The official learning hub built for developers who want to master Cairo and build on the most powerful ZK stack.
Starknet Foundation (BTCFi arc) tweet media
English
11
28
137
11K
Guy retuiteado
Shieldify Security
Shieldify Security@ShieldifySec·
Mastering Ethereum (2nd Edition) — the go-to guide for Ethereum newcomers, builders, and even auditors. If you want to truly understand how Ethereum works under the hood, this is where you start. 📖 Read it for FREE: github.com/ethereumbook/e…
Shieldify Security tweet media
English
7
27
177
6.4K
Guy retuiteado
Hugging Models
Hugging Models@HuggingModels·
Meet VulnLLM-R-7B: a specialized AI that reads code like a security expert. It's trained to spot vulnerabilities before they become breaches. This isn't just another chatbot, it's a digital security guard for your codebase. The community is buzzing because it makes security accessible.
Hugging Models tweet media
English
24
269
1.7K
119.2K
Guy retuiteado
Anthropic
Anthropic@AnthropicAI·
New Engineering blog: We tasked Opus 4.6 using agent teams to build a C compiler. Then we (mostly) walked away. Two weeks later, it worked on the Linux kernel. Here's what it taught us about the future of autonomous software development. Read more: anthropic.com/engineering/bu…
English
873
2.5K
21.4K
8.5M
Guy retuiteado
ollama
ollama@ollama·
ollama launch is a new command in Ollama 0.15 to run Claude Code, Codex, Droid and OpenCode with Ollama! GLM 4.7 Flash is now optimized to use much less memory for longer context lengths (64k+). Need additional hardware? Ollama's cloud offers GLM 4.7 with full precision and context length.
English
106
377
3.1K
205.8K
Guy retuiteado
Geospy
Geospy@GeospyAI·
AI Built for Law Enforcement
English
44
268
2.6K
408K
Guy
Guy@eserror·
CVE-2026-24061: GNU InetUtils telnetd Argument Injection Authentication Bypass. Un atacante puede saltar la autenticación y convertirse en root simplemente ejecutando un solo comando. Más información 👇 nvd.nist.gov/vuln/detail/CV…
GIF
Español
0
0
0
119
Guy retuiteado
Medusa
Medusa@medusa_0xf·
Being in cybersecurity and not going to gym should be illegal.
English
57
129
3.9K
192.3K
Guy retuiteado
Web3 Devs Underground
Web3 Devs Underground@Web3_Devs·
Hot Update!!!🥳 See you Today! 🤖 The $250K Bug: AI Security Research Meets Bug Bounties Kicking off 2026 with two game-changers in Web3 security. Gabriel Balko, a top Security Researcher (Known as @ControlZ_1337), recently earned a $250,000 bug bounty - the highest ever awarded for a vulnerability discovered using AI. @MitchellAmador, CEO of @immunefi (The leading Web3 bug bounty platform), joins to share insights on how bug bounty programs work and what this AI breakthrough means for the industry. What happened?  • AI agent found a critical vulnerability (preventing $500M+ in potential losses) • 10 High/Critical bugs discovered in just 3 months • Research that would take a year manually - done in a day • 10,000x faster than traditional security research Join us for a double session: Part 1 – Mitchell Amador: Bug Bounties in Web3 ✅ How bug bounty programs work in crypto ✅ What makes a vulnerability worth $250K+ ✅ Getting started in Web3 security research ✅ AI's impact on the bug bounty landscape ✅ Industry insights from Immunefi Part 2 – Gabriel Balko: The AI Discovery ✅ How the AI agent was built ✅ Translating human security intuition into automation ✅ Real results and stopped attacks ✅ Technical approach and tools 📅 Today!!! (Wednesday, January 14, 2026) 🕔 17:00 Israel Time (15:00 CET · 08:00 EST) 🌐 Online & Free 🎟️ Register: luma.com/m69hd5sn 📺 Live on YouTube: youtube.com/watch?v=j7IdAN… This is where AI-powered security meets real-world bug bounties. 🔥 Powered by @MasterkeyVC 👾 Hosted by @Web3_Devs #AI #CyberSecurity #BugBounty #Web3 #SecurityResearch #MachineLearning #Blockchain #InfoSec #AIResearch #Web3Security #CryptoSecurity #Immunefi #Automation @AlonKivity @al23xyz , @ELuttenberg789, @Amit_Masterkey , @SHAP0W
YouTube video
YouTube
Web3 Devs Underground tweet media
English
2
8
38
2.8K
Guy retuiteado
Rekt News
Rekt News@RektHQ·
First major hack of 2026, as @Truebitprotocol was drained for $26.2 million through an overflow in unverified bytecode. The same attacker hit Sparkle weeks prior. Old code keeps bleeding - the archives have clearly become a shopping list. rekt.news/truebit-rekt
Rekt News tweet media
English
9
16
78
12.1K
Guy retuiteado
Immunefi
Immunefi@immunefi·
A new report out from OX Security found that 900,000 users have had ChatGPT and DeepSeek conversations stolen by Chrome extensions. That means full chat logs exfiltrated every 30 minutes. Hackers want your AI history. Why? Because you've probably pasted in code, strategy, legal questions, personal information, health info, or other material that could be used for blackmail or extortion. A few takeaways: 1. Don't sign up for LLMs with your personal information if possible. 2. Don't input personal information into the LLM itself. 3. Be extremely careful with browser extensions. We already know that from wallet hacks.
English
8
5
73
5.1K
Guy
Guy@eserror·
@jurbed Thought the same but it’s a necessary evil now.
English
0
0
0
26
Juraj Bednar
Juraj Bednar@jurbed·
Writing Rust code feels like filling a government form. What kind of evil person invented this and why do they hate humanity.
English
2
1
16
1.1K
Guy retuiteado
Kali Linux
Kali Linux@kalilinux·
Kali Linux 2025.4 Release (Desktop Environments, Wayland & Halloween Mode): Say hello to Kali Linux 2025.4! Expect updated tools, performance tweaks, and improved support - no fluff, just the essentials. The summary of the changelog since the 2025.3… kali.org/blog/kali-linu…
Kali Linux tweet media
English
21
363
2K
90.6K
Sebastian Aaltonen
Sebastian Aaltonen@SebAaltonen·
No wonder iTerm2 is so bloated. They just added a web browser inside the terminal. Who asked for this? Empty iTerm2 window now uses 400MB of RAM :(
Sebastian Aaltonen tweet media
English
203
77
2.4K
199.1K
Guy
Guy@eserror·
@midudev Qué sentido tiene pasar horas en prueba y error si precisamente la documentación es evitar eso 😅
Español
2
0
0
197
Miguel Ángel Durán
Miguel Ángel Durán@midudev·
Recuerda, unas horas de prueba y error pueden ahorrarte varios minutos de leer la documentación.
Español
24
104
1.2K
43.1K
Guy retuiteado
Aikido Security
Aikido Security@AikidoSecurity·
ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO* Here's how it works 👇 1) Injects itself into the browser Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana, etc.). Ensures it can intercept both web traffic and wallet activity.
English
8
63
174
62.4K
Guy retuiteado
Csaba Fitzl
Csaba Fitzl@theevilbit·
🍎🐛macos 15.6 is out, a few new CVEs and mentions... NetAuth Impact: An app may be able to break out of its sandbox CVE-2025-43275 PackageKit Impact: An app may be able to bypass certain Privacy preferences CVE-2025-43232 CoreUtils We would like to acknowledge...
English
5
7
52
3.6K