Cem Paya

10.2K posts

Cem Paya banner
Cem Paya

Cem Paya

@randomoracle

@[email protected] Personal opinions “Character is what you tweet when you think no one is following" ex-MSFT/GOOG/ABNB/Gemini

San Diego, CA 가입일 Aralık 2008
710 팔로잉2.1K 팔로워
Cem Paya
Cem Paya@randomoracle·
It was a quirk of original Bitcoin code that it even compiled for Windows. Most cypherpunks were diehard Linux fans, disdained all-things MSFT. Especially for software intended for fellow cypherpunks, Windows compatibility is a heavy burden to carry
Adam Back@adam3us

@w_s_bitcoin I worked for Microsoft 2002-2003. However as a die hard unix/Linux enthusiast I got management dispensation to install a multi socket /many thread beast mode redhat server as I don't like windows. @jwilkins can confirm he was my colleague in MS passport security at that time. 😭

English
0
1
6
539
Cem Paya 리트윗함
Rob T. Lee
Rob T. Lee@robtlee·
“The Lifetime Achievement Award isn’t about what you achieve in your lifetime. That’s part of it. It’s about how many people you influence and bring in and then take it further.”​ - Mudge Zatko It was our honor to present the Lifetime Achievement Award to @dakami Dan Kaminsky at this year's Difference Makers. Thank you to Dan's mother, Trudy Maurer who traveled to D.C. to accept the award on Dan's behalf, to Randy Howell, @dotMudge, @thedarktangent, @paulvixie, @adamshostack, Kymberlee Price, Derek Hinch, Gadi Evron, Brian Markus, Todd Jarvis, Michael J. J. Tiffany @kubla, Lena Smart, Jonathan Leitschuh, Kyle Moses, and those who did the work to put videos of Dan on YouTube so the next generation of ethical hackers can learn from him, including @defcon , @BlackHatEvents, Duo Security, r00tz, @ismg_press. @SANSInstitute
English
2
11
14
2.6K
Cem Paya
Cem Paya@randomoracle·
Now that GDATA also posted about this and cat is out of the bag. Write-up on how ScreenConnect was abusing Microsoft Authenticode signatures in a way that made it ideal for malware to repurpose their installers (previously disclosed to vendor) blog.randomoracle.io/2025/06/26/scr…
English
1
2
9
523
Cem Paya 리트윗함
Dawn Song
Dawn Song@dawnsongtweets·
1/ 🔥 AI agents are reaching a breakthrough moment in cybersecurity. In our latest work: 🔓 CyberGym: AI agents discovered 15 zero-days in major open-source projects 💰 BountyBench: AI agents solved real-world bug bounty tasks worth tens of thousands of dollars 🤖 Autonomously. A pivotal shift is underway — AI agents can now autonomously do what only elite human hackers could before.
Dawn Song tweet media
English
28
147
542
136.8K
Cem Paya
Cem Paya@randomoracle·
Recent work from River security team and @rmhrisk : how our discovery of bogus "River desktop app" in the wild lead to DigiCert revoking ConnectWise's code-signing certificate and invalidating all existing ScreenConnect binaries on Windows blog.randomoracle.io/2025/06/16/the…
English
0
1
2
485
Cem Paya 리트윗함
Eric Winer
Eric Winer@eric_winer·
Thoughts on ByBit First, the good stuff: impressive response to the hack. I've rarely seen that level of transparency + professionalism in a crisis. Usually you see slow, wishy-washy, lawyer-speak or quick meme-style responses that don't fit the seriousness of the situation. 1/n
English
2
1
4
306
Cem Paya 리트윗함
Greg Xethalis
Greg Xethalis@xethalis·
Learned a lot about security from @randomoracle @michaelbreu back in the day. Lesson one is anything that can be penetrated will be. Software and hardware, and the practices around them, must be resilient & redundant. Every step must have integrity. No shortcuts.
Marius | Kamino@y2kappa

Safe multisig smart contracts worked fine, and Bybit still got hacked. This is equivalent to a lending market's messing up the configs. Security is just a beast in itself and it can't be reduced to one single factor like smart contract audits. You have to do them all right.

English
1
1
5
625
Cem Paya 리트윗함
Solar Designer
Solar Designer@solardiz·
Until October 30, Okta generated "the cache key" by using bcrypt to "hash a combined string of userId + username + password", which allowed full password auth bypass for usernames of 52+ bytes and apparently required only partial knowledge of the password for other long usernames
Kinnaird McQuade 💻☁️💥@kmcquade3

Okta allowing login bypass for any usernames with 52+ characters is insane Official Security Advisory: trust.okta.com/security-advis…

English
1
6
19
3.5K
Cem Paya 리트윗함
Today In Infosec
Today In Infosec@todayininfosec·
1988: The Morris worm spread like wildfire and was the first worm to get wide media attention. After its author, Robert Tappan Morris, released his "experiment", it quickly spread and made many of the systems on the Internet unusable - an epoch for security...both good and bad.
Today In Infosec tweet media
English
2
55
141
12.6K
Cem Paya 리트윗함
Dawn Song
Dawn Song@dawnsongtweets·
🎉 Thrilled by the incredible enthusiasm for our LLM Agents MOOC—12K+ registered learners & 5K+ Discord members! 📣 Excited to launch today the LLM Agents MOOC Hackathon, open to all, with $200K+ in prizes & credits! 🔗 Sign up now: rdi.berkeley.edu/llm-agents-hac… & join us virtually or in person @UCBerkeley! Huge thanks to our sponsors:@OpenAI @GoogleAI @AMD @LambdaAPI @Intel @SierraPlatform @OrbyAI (and more to come) 🚀 Explore 5 exciting tracks: 1️⃣ Applications: Build cutting-edge LLM agents! 2️⃣ Benchmarks: Create innovative AI agent evaluation benchmarks! 3️⃣ Fundamentals: Strengthen core agent capabilities! 4️⃣ Safety: Address critical safety challenges in AI! 5️⃣ Decentralized & Multi-Agents: Push the boundaries of multi-agent systems! Special thanks to my co-instructor @xinyun_chen_ @GoogleDeepMind & our amazing guest speakers for making this a great MOOC: @denny_zhou @GoogleDeepMind; @PercyLiang @Stanford; @8enmann @AnthropicAI; @ShunyuYao12 @OpenAI; @chi_wang_ @GoogleDeepMind; @jerryjliu0 @llama_index; @lateinteraction @Databricks; @gneubig @CarnegieMellon; @NicolasChapados @ServiceNow; @tydsh @AIatMeta; @drjimfan @NVIDIA; Burak Gokturk @Google Join us to shape the future of LLM Agents! llmagents-learning.org 🤖✨ #AI #Hackathon #LLMAgents #UCberkeley
Dawn Song tweet media
English
17
106
387
78.6K
Cem Paya
Cem Paya@randomoracle·
Identity fails With Twitter verified profiles, users at least have some confidence they are following the genuine bloviator/influencer On GitHub still no way to know if that ace developer is really a North Korean stooge/APT operative 🤷🏽
ZachXBT@zachxbt

1/ Recently a team reached out to me for assistance after $1.3M was stolen from the treasury after malicious code had been pushed. Unbeknownst to the team they had hired multiple DPRK IT workers as devs who were using fake identities. I then uncovered 25+ crypto projects with related devs that have been active since June 2024.

English
0
0
0
322
Cem Paya 리트윗함
BINARLY🔬
BINARLY🔬@binarly_io·
The pk.fail service has an open API interface for mass scanning. By today, 7550 unique FW images had been checked, and 534 (7%) contained non-production keys or were exposed to the #PKfail. The detected keys are associated with AMI (majority), Insyde and Phoenix.
BINARLY🔬 tweet media
English
1
5
13
2K
Cem Paya
Cem Paya@randomoracle·
"Creating our own bytecode VM for detection rules will be much safer than constantly writing new code for kernel mode 💡" — said someone somewhere at #Clownstrike
English
0
0
1
309
Cem Paya
Cem Paya@randomoracle·
@GrapheneOS @rmhrisk If you are lawyering up to deal with this at EU level, also consider solving for: arstechnica.com/google/2023/11… (This is another lock-in attempt that failed when Google tried it for the web— despite Chrome's monopoly position— and is now pivoting to mobile)
English
0
0
0
51
GrapheneOS
GrapheneOS@GrapheneOS·
@randomoracle @rmhrisk We'll completely shut down any attempt by Google to claim that allowing GrapheneOS would somehow be an issue for them. They allow devices with no security patches for 8 years to pass. They allow devices which clearly cheated at the CTS/CDD certification and have clear failures.
English
2
0
3
87
Cem Paya
Cem Paya@randomoracle·
GrapheneOS threatening to sue Google is strange; it is Authy that decided to restrict their app to "genuine" Android devices based on remote attestation Also for perspective: Authy's days are numbered anyway, given that future is passwordless arstechnica.com/gadgets/2024/0…
English
5
2
11
3.4K