Foster Nethercott

113 posts

Foster Nethercott banner
Foster Nethercott

Foster Nethercott

@OSTact13

USMC Veteran | Cybersecurity Consultant | Ethical Hacking Advocate | Passionate Knowledge Sharer

Katılım Temmuz 2024
133 Takip Edilen166 Takipçiler
Foster Nethercott retweetledi
Jason Bassler
Jason Bassler@JasonBassler1·
🚨 NEW WEBSITE HELPS YOU AVOID FLOCK CAMERAS DontGetFlocked.com lets you plug in your start and end points, then maps how many ALPR/Flock cameras you’d hit and shows alternate routes that keep you off their surveillance grid. Because privacy shouldn’t require permission.
Jason Bassler tweet media
English
193
2.7K
8.1K
223.1K
Foster Nethercott retweetledi
Rob T. Lee
Rob T. Lee@robtlee·
Registration is OPEN for Find Evil! the first hackathon for autonomous AI incident response. Built by the community, for the community. $22K+ in prizes. Mission: Make Protocol SIFT, the framework connecting AI agents to the SIFT Workstation's full toolset, into a fully autonomous incident response agent. SIFT Workstation is a beat to shreds, open-source incident response platform with 200+ tools. 19 years of community development. 60K+ downloads annually. No incident response background required. New to AI? Good. Get your hands on the tools and learn with us. Registration open April 1. Hackathon starts April 15. Submissions due June 15. Register: findevil.devpost.com Read more: robtlee73.substack.com/p/registration… Sponsored by @SANSInstitute
Rob T. Lee tweet media
English
3
49
120
23.8K
Foster Nethercott retweetledi
Jeremy
Jeremy@Jeremybtc·
Anthropic accidentally leaked their entire source code yesterday. What happened next is one of the most insane stories in tech history. > Anthropic pushed a software update for Claude Code at 4AM. > A debugging file was accidentally bundled inside it. > That file contained 512,000 lines of their proprietary source code. > A researcher named Chaofan Shou spotted it within minutes and posted the download link on X. > 21 million people have seen the thread. > The entire codebase was downloaded, copied and mirrored across GitHub before Anthropic's team had even woken up. > Anthropic pulled the package and started firing DMCA takedowns at every repo hosting it. > That's when a Korean developer named Sigrid Jin woke up at 4AM to his phone blowing up. > He is the most active Claude Code user in the world with the Wall Street Journal reporting he personally used 25 billion tokens last year. > His girlfriend was worried he'd get sued just for having the code on his machine. > So he did what any engineer would do. > He rewrote the entire thing in Python from scratch before sunrise. > Called it claw-code and Pushed it to GitHub. > A Python rewrite is a new creative work. DMCA can't touch it. > The repo hit 30,000 stars faster than any repository in GitHub history. > He wasn't satisfied. He started rewriting it again in Rust. > It now has 49,000 stars and 56,000 forks. > Someone mirrored the original to a decentralised platform with one message, "will never be taken down." > The code is now permanent. Anthropic cannot get it back. Anthropic built a system called Undercover Mode specifically to stop Claude from leaking internal secrets. Then they leaked their own source code themselves. You cannot make this up.
Jeremy tweet mediaJeremy tweet media
English
1.5K
8.5K
53.5K
3.8M
Foster Nethercott retweetledi
vx-underground
vx-underground@vxunderground·
There is a project on GitHub called Axios. Axios is extremely popular. It is used by millions upon millions of applications. Axios is a programming library that helps your JavaScript code make HTTP/S requests (communicate with websites). In simple terms, if you're a programmer doing something with JavaScript, and want to do stuff that communicates with a website in literally any capacity, people heavily recommend using Axios due to its simplicity. Using Axios you don't have to reinvent the wheel and do a bunch of work. All you need to do is import Axios into your code and you're off to the races. Someone (currently unknown) compromised Axios (currently unknown how) to deliver malware to people. When someone updates or installs Axios, Axios itself contains malware. What the malware does is (currently) unknown, but it is being reversed engineered by probably every malware analyst on the planet at this moment. In a few hours more details will emerge. Information is being exchanged in real time on social media and private communication platforms as I write this. Due to the size and popularity of Axios, it is unknown how many are impacted, it could be millions, it could be thousands, or if we're lucky, only hundreds of people or organizations will be impacted. If this is absolute worst case scenario, millions of organizations across the planet have been infected with malware which (currently) we do not understand. However, the likelihood of this is low. It appears Axios being compromised was detected quickly, potentially within minutes (or hours) of it being compromised to deliver malware. Additionally, the likelihood of every single Axios user updating Axios as soon as it was compromised to deliver malware is astronomically low. It is basically zero. The impact from Axios being compromised is devastating, the fallout from this will be a massive headache. This is unironically a malware nuclear missile and will likely be studied in the future.
English
107
831
7.8K
586.8K
Foster Nethercott retweetledi
Hackers Teaching Hackers
Hackers Teaching Hackers@hthackers·
🚨 CFP OPEN 🚨 HTH 2026 | June 3–5 | Columbus, OH Theme: Spaceballs. Ludicrous speed engaged. 🛸 Technical. Hands-on. No vendor fluff. Got scar tissue to share? Submit it. 🗓️ Deadline: March 6 👉 Proposal link: hthackers.com/cfp
English
0
7
9
1K
Foster Nethercott retweetledi
parsa
parsa@pzrsaa·
> checks if cloudflare is down > visits downdetector > doesn't work > they use cloudflare
parsa tweet media
English
290
7.6K
128K
2.7M
Mick Douglas 🇺🇦🌻
Mick Douglas 🇺🇦🌻@bettersafetynet·
any tips/pointers for funny/wholesome shows? Stuff like Parks & Rec, Ted Lasso, Brooklyn 99. Will need something to queue up in a few weeks once a major project crunch ends. I need something to let the grey matter ooze out and enjoy while doing so.
English
21
0
13
2.3K
Foster Nethercott retweetledi
Jason Lang
Jason Lang@curi0usJack·
Titanus already getting weaponized. Won't be long before more red teams realize this is a coffloader level release.
MSec Operations@MSecOps

Tools such as PsExec.py from Impacket are usually flagged for lateral movement due to the pre-built service executable that is dropped on the remote system. However, some vendors also flag Impacket based on its behaviour. With RustPack, you can easily create service executables that won't be detected by signatures or behaviour-based detection. 😎 In this demo video, an unsigned service executable is generated. This will only fire the payload on a system with the hostname 'Win11' — environmental keying will prevent the payload from showing up in a sandbox or cloud analysis. To avoid Impacket detection, we drop and execute the binary via the recently released Titanis protocol library from @TrustedSec: github.com/trustedsec/Tit…. The result is an Adaptix C2 connection in the SYSTEM context. 🫡 #Pentest #RedTeam #Malware #OST

English
1
37
252
35.5K
Mick Douglas 🇺🇦🌻
Mick Douglas 🇺🇦🌻@bettersafetynet·
@cantcomputer I can't be the only one who puckered a bit reading that, right? That boom gonna bust eventually, no? Would love to be wrong
English
1
0
2
91
Foster Nethercott retweetledi
SANS Cyber Defense 🧢
SANS Cyber Defense 🧢@SANSDefense·
Join us at SANS Hack & Defend Summit in Austin when @OSTact13 leads a hands-on workshop on how attackers use AI to craft convincing lures — & how you can defend against them. 🗓️ Oct 28–29 | Austin, TX 🔗 Save Your Spot: sans.org/u/1AWG
SANS Cyber Defense 🧢 tweet media
English
0
1
1
383
Foster Nethercott retweetledi
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
Join us at Hack & Defend Summit in Austin when @OSTact13 leads a hands-on workshop on building a functional keylogger with AI — adding advanced features & defenses along the way. 🗓️ Summit: Oct 28–29 | Austin, TX Save Your Spot: sans.org/u/1AWB
SANS Offensive Operations tweet media
English
0
1
4
840
Mick Douglas 🇺🇦🌻
Mick Douglas 🇺🇦🌻@bettersafetynet·
@JackPosobiec who? show me a serious player on the left who fits these claims. yes, there are fringe folks... but they're just that... fringe. who has a follower count of over 10k (that's a pretty low bar) that fits your complaint
English
1
0
2
179
Jack Posobiec
Jack Posobiec@JackPosobiec·
They’re mad about Jimmy Kimmel being silenced from his show, but OK with Charlie being silenced for life
English
1.8K
9.9K
69K
1.3M
Mick Douglas 🇺🇦🌻
Mick Douglas 🇺🇦🌻@bettersafetynet·
me: the difference between malware and software is intent. random: but what about EDR? me: I didn't stutter.
English
5
6
112
37.1K
Foster Nethercott
Foster Nethercott@OSTact13·
It honestly doesn't even feel like diminishing returns, it feels like decaying returns.
English
0
0
1
42
Foster Nethercott
Foster Nethercott@OSTact13·
The "greatest" AI solution the world has ever seen.
Foster Nethercott tweet media
English
2
0
1
89
Foster Nethercott
Foster Nethercott@OSTact13·
Anyone that has talked to me about AI knows that I've been ranting about this for a couple of years now. The future is highly specialized models that are far more resource efficient, not in massive models that can do everything.
Taha ז@lordx64

NVIDIA's recent paper presents a compelling blueprint for agentic AI, challenging the dominance of Large Language Models (LLMs) by advocating for Small Language Models (SLMs) in most tasks. Current AI agents often route every operation through resource-intensive LLMs like GPT-4 or Claude, which is inefficient for repetitive, scoped activities such as summarizing documents or calling tools. SLMs, with millions to tens of millions of parameters, run on consumer hardware with low latency, making them faster, cheaper (10-30x more efficient), and just as effective for specialized tasks. Models like Phi-3 and Nemotron-H already outperform older LLMs in reasoning and tool use, while being easier to fine-tune with techniques like LoRA for domain-specific expertise. This shift toward modular agents—defaulting to SLMs and escalating to LLMs only when necessary—promises greater control, affordability, and debuggability. Real-world examples show 40-70% of LLM calls can be replaced without performance loss, though industry inertia from heavy LLM investments and biased benchmarks delays adoption. As SLMs gain traction, the future of AI lies in smarter architectures over bigger models, enabling more accessible and sustainable agentic systems. what are your thoughts on integrating SLMs into your workflows? In my day-to-day job, I’ve already identified some use cases, and currently leaning toward involving SLMs more, it’s just just make more sense. I might post some real applications on this Nvidia paper : arxiv.org/abs/2506.02153…

English
0
0
2
75
Foster Nethercott
Foster Nethercott@OSTact13·
@bettersafetynet I think we also have to consider what task is being performed, and the extent to which people hate interacting with machines for some of them. I will always use self checkout if possible, but dealing with customer service bots is going to kill me one day.
English
0
0
0
18
Mick Douglas 🇺🇦🌻
Mick Douglas 🇺🇦🌻@bettersafetynet·
I'm so sorry that you were lied to. Your work ethic means nothing in the face of automation. You cannot and will not be able to beat a machine.
English
3
0
12
1.3K
Foster Nethercott
Foster Nethercott@OSTact13·
It's incredible how far we've come as a species. Just a few short years ago we used to put our symptoms into WebMD so it could misdiagnose us. Now we put it into GPT 5 so it can misdiagnose us.
English
0
0
0
51