Mud

836 posts

Mud

Mud

@_mudpak

가입일 Nisan 2019
5 팔로잉51 팔로워
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 My @BlackHatEvents ASIA training about AI for Threat Intelligence is almost sold out but there is few remaining seats! Learn how to: - Build agentic workflows through the whole architecture: prompt design, RAG, tool calling... - Build your own agent and multi-agent system for CTI and malware analysis - Hunt for adversarial prompts (IoPC) with NOVA and monitor agent execution You can find more details here 👇 #practical-genai-for-threat-intel-real-world-agentic-workflows-for-cyber-threat-intelligence-206-49450" target="_blank" rel="nofollow noopener">blackhat.com/asia-26/traini…
Thomas Roccia 🤘 tweet media
English
0
7
23
3.2K
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 Next month at @BlackHatEvents Asia, I will be teaching my training "Practical AI for Threat Intel: Real-World Agentic Workflows for Cyber Threat Intelligence." with Maxime Cousseau! It is packed with my latest research and labs. You will learn how to: - Build agentic workflows through the whole architecture: prompt design, RAG, tool calling... - Build your own agent and multi-agent system for CTI and malware analysis - Hunt for adversarial prompts (IoPC) with NOVA and monitor agent execution You can still register here: #practical-genai-for-threat-intel-real-world-agentic-workflows-for-cyber-threat-intelligence-49450" target="_blank" rel="nofollow noopener">blackhat.com/asia-26/traini… See you in Singapore! 🤗
Thomas Roccia 🤘 tweet media
English
2
11
42
3.2K
Mud 리트윗함
Laluka@OffenSkill
Laluka@OffenSkill@TheLaluka·
Heya! 😼 Last Tuesday, Flora (twitch floratheexplorer_cyber) & I spent some time crafting, playing, and PoC'ind n-days. Demo gods were clearly against us, but hey... We won. 😎 Wekan SSRF full read & Winrar unrar to RCE! 🔥 youtube.com/live/mVjG6WDeY…
YouTube video
YouTube
English
0
3
6
1.5K
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
I said it once, I will say it again. Today we protect AI from human hacking. One day we will have to protect humans from AI.
English
7
8
41
4.2K
Mud 리트윗함
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
Read this post from @mrgretzky. This is important 👇 The death of open source as we know it seems to me inevitable for several reasons: 1 - Everyone can code today. 2 - Your project can be copied without scruples by anyone. 3 - It is impossible to keep track of the huge amount of PRs generated by AI. I think people will continue to code their own pet projects, but GitHub may become a cemetery of abandoned projects because people will get tired of sharing work that can be copied instantly. A few big projects will remain active and maintained by a community of agents. People will move back to closed source to protect their ideas. Open source will slowly die and then be reborn in a form we don't know yet.
Kuba Gretzky@mrgretzky

Open source is dying a slow, painful death. For the time being, the AI-related issues in the open-source space have been largely attributed to the flood of AI-slop-generated code contributions, which human project maintainers were unable to process because the effort required to validate each contribution far exceeded the quality of those contributions. Now Cloudflare, by slop-forking Next.js, has just validated that it's okay to take an open-source project, shove it into an LLM, and have it vibe-code a completely new product based on the source code the engine was fed. The question arises: if AI regenerates the source code of an open-source project entirely, does the original open-source license still apply? We're approaching the Slop Ages, where protecting your IP from AI heists becomes virtually impossible. We've seen it in the music industry, and the time has come for the software industry. I am a software developer myself, and Evilginx has been open-sourced for over 8 years. That's why this news story rubs me the wrong way on a personal level. Evilginx is an offensive security tool - a phishing framework focused on bypassing MFA. Due to its dual-use nature, it can be used either by the good guys to demonstrate the weaknesses of the company's MFA implementation or by the bad guys for malicious purposes, mainly to harm others. I had countless second thoughts since the release of the open-source version, whether it was a good idea to put it out there, and later update it with new features, knowing that on one hand it will popularise the problems around weak MFA, and on the other hand give the bad guys a jump-start to expand their criminal enterprise. It was no surprise to me to learn later that APT groups like Scattered Spider or Void Blizzard reportedly created their own phishing toolkits, based on publicly exposed Evilginx source code. The main reason I launched Evilginx Pro as a closed-source, paid product last year was a combination of wanting to aid the good guys while gatekeeping the tool from the bad guys (and, of course, building a business out of it). It has always been important to me to make the community version of the tool accessible to everyone. Still, I was not a fan of the collateral; this decision also carried. Getting back to my original point. We now live in a world where a threat actor can feed the GitHub source code of any offensive security tool into an AI and prompt it to create something completely different from scratch, with more features and easier to use. Security issues arising from vibe-coding become a secondary concern in this scenario and can be largely disregarded. Over the last 2 years, I've been making significant improvements to the Evilginx proxy engine. The majority of these changes have now been implemented in Evilginx Pro. One of the upcoming major updates is the introduction of the new Phishlets 2.0 format. The plan is to release Phishlets 2.0, together with the proxy engine improvements, as part of the major update to the Evilginx community edition and make it accessible to everyone. As you may've guessed by now, my main concern is whether to release it as open-source or closed-source. Going the open-source route, I risk threat actors spending a few hundred bucks on a Claude subscription to create their own derivatives of Evilginx, which they can later rebrand and sell on the dark web. The closed-source route allows me to still release the tool to the public, with proper guardrails to prevent misuse, while keeping it accessible to people who want to use Evilginx to learn hands-on how MFA is bypassed in phishing engagements. I don't feel that open source is the proper delivery method for offensive security tooling anymore. The AI has completely reshaped the open-source ecosystem. Writing code is no longer dark magic; it is more accessible than ever, but it has also introduced the cancer we will have to learn to live with. I use AI to generate small helper libraries, while the rest of the Evilginx code is written by hand. Not because I reject the new AI-oriented reality we live in, but because I really enjoy programming. My love of programming brought me to this point in life. I also enjoy the concept of ownership. By releasing your work into the world, you let everyone know that you made it, that you personally vouch for its quality, and that you own any mistakes you make. This is what builds trust and reputation. With AI-generated software, there is neither. - Kuba P.S. I refrained from using an LLM to correct this post to avoid adding to the irony of the matter.

English
0
6
29
5.7K
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 Agent security. AI threat intelligence. I have been deep in this rabbit hole for a while now! What is actually happening out there. What you can do about it. Where the market is heading. We packed all of that into a full podcast interview with @unixguy_cyber 👇 youtu.be/UmOBX8NhmeA?si…
YouTube video
YouTube
English
0
10
54
5.1K
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 In a recent report from Socket, a compromised release of the Aqua Trivy VS Code extension on OpenVSX (v1.8.12 and v1.8.13) contained unauthorized code that injected prompts targeting local AI coding agents such as Copilot, Claude, and Codex. The prompts attempted to trigger coding agents in YOLO mode to inspect the system and expose sensitive data. @udgover added the prompts to PromptIntel for tracking and analysis! 😎 promptintel.novahunting.ai/feed
Thomas Roccia 🤘 tweet media
English
2
9
28
5.3K
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 New blog post on the Nova ecosystem for prompt hunting! @pedrinazziM just released the Nova Rules Validation and Testing Pipeline, it is designed to automatically validate, test, and evaluate Nova rules! As the rules repo grow, this will help us keep the repository reliable and avoid regressions. Awesome work Marco! medium.com/malware-buddy/…
Thomas Roccia 🤘 tweet media
English
2
5
22
2.7K
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 I was one of the technical reviewers for the latest @veritasium video on the XZ backdoor. It brought me back to the four days without sleep I spent analyzing this case! They did a great job making the story accessible and keep the technical accuracy 👏 youtube.com/watch?v=aoag03…
YouTube video
YouTube
English
14
16
137
12.5K
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
I dropped a pretty hot take at the Malware Reverse Engineering conference today 😏
Thomas Roccia 🤘 tweet media
English
13
3
61
7.3K
Mud 리트윗함
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
Getting ready for my keynote 🔥
Thomas Roccia 🤘 tweet media
English
4
4
66
3.1K