Bruce Barnett (@grymoire.bsky.social)

16.1K posts

Bruce Barnett (@grymoire.bsky.social) banner
Bruce Barnett (@grymoire.bsky.social)

Bruce Barnett (@grymoire.bsky.social)

@grymoire

Maker, magician, security gadabout, doomscroller, etc. @[email protected] @[email protected] https://t.co/pKMn5JBFfS

Albany, NY Katılım Aralık 2008
1.3K Takip Edilen1.9K Takipçiler
Bruce Barnett (@grymoire.bsky.social) retweetledi
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 Nice overview of prompt injection attacks! But I think if you focus only on prompt injection, you are missing a big part of how threat actors are abusing AI systems. Adversarial Prompts (IoPC) are much diverse and broad than just prompt injection!
Thomas Roccia 🤘 tweet media
English
5
34
102
5.2K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
no one is going to be like: let's spend all day reading every prompt someone makes, no ones IT departments have enough staff/time to start with LOL it's like worrying about if someone in IT is reading your emails.... can they access the data? yes are they legally allows to snoop for no reason? probably not do they have any time to: probably not is there any oversight? there bloody should be
English
9
0
13
2K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
I don't understand what kind of insane personal shit people must be using company AI prompts for when they can just: NOT DO THAT and USE THEIR OWN SUBSCRIPTION!
English
22
1
80
8.4K
Bruce Barnett (@grymoire.bsky.social) retweetledi
colonel panic
colonel panic@_colonel_panic·
My tindie store lol. Do not buy from tindie folks. Colonelpanic.tech is the spot! I fulfilled over 1k of orders that @tindie has not paid out. Where's the money lebowski?
colonel panic tweet media
English
4
9
18
834
Bruce Barnett (@grymoire.bsky.social) retweetledi
SAPSAN
SAPSAN@SAPSAN_CYBERSEC·
Turn your uConsole into a mobile command center. AIO V2 - RTL-SDR, LoRa/Meshtastic, GPS, Ethernet & USB 3.0 in one expansion board. Pre-order now.
English
0
62
455
1.6M
Bruce Barnett (@grymoire.bsky.social) retweetledi
Coin Bureau
Coin Bureau@coinbureau·
🚨 RIPPLE TO SHARE NORTH KOREA HACKER INTEL Ripple is now sharing internal threat data to help crypto firms detect North Korean-linked actors. The focus is on social engineering schemes, where hackers apply for crypto jobs to get inside, build trust and later launch attacks. Ripple is feeding Crypto ISAC profile data of the bad actors that will serve as warning signs with other companies. The goal is to stop the same suspicious “candidate” from targeting multiple crypto firms unnoticed.
Coin Bureau tweet mediaCoin Bureau tweet media
English
29
98
467
28.4K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Oh, wow - this is big
Georgy Kucherin@kucher1n

Together with @bzvr_, @2igosha and Anton Kargin, we identified that the DAEMON Tools software has been compromised in a complex supply chain attack since April 8. We see thousands of infections across 100+ countries. If you use DAEMON Tools, run a malware scan immediately! [1/7]

English
3
43
210
46.3K
Bruce Barnett (@grymoire.bsky.social) retweetledi
RFID Research Group
RFID Research Group@RfidGroup·
Feature #5: 28 cm read range 🔭 ISO 14443A extended antenna (Phase 2). Standard: 5-10 cm Proxmark5: 28 cm Long-range RFID. Finally possible. 🚀
RFID Research Group tweet media
English
1
4
22
1.2K
Bruce Barnett (@grymoire.bsky.social) retweetledi
MG
MG@_MG_·
This will probably explode AI/ML in ways I can barely understand. You can build any Boolean logic circuit (aka your whole computer) using nothing but NAND (or NOR) gates. We use them to evaluating formulas. But they came up with an “eml” that is analogous to the NAND gate. Except it’s a primitive that allows you to search the space for possible continuous functions instead.
Sabine Hossenfelder@skdh

A mathematician has come up with a new way to derive all mathematical operations from merely one. I've had a look at the paper.

English
46
67
925
115.6K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Florian Roth ⚡️ tweet media
Florian Roth ⚡️@cyb3rops

Anyone else seeing Microsoft #Defender flagging #DigiCert root certificate registry keys as malware? We’ve seen reports that Defender signature update from April 30 added a detection called: Trojan:Win32/Cerdigent.A!dha In some environments, Defender apparently detected DigiCert Root CA certificate registry entries and removed them from the trust store. The affected cert hashes mentioned so far: 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 Example path: HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 There’s also a Reddit comment suggesting Microsoft has started restoring the certs and that admins can check this via Advanced Hunting in Defender: DeviceRegistryEvents | where RegistryKey contains "0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43" or RegistryKey contains "DDFB16CD4931C973A2037D3FC83A4D7D775D05E4" | where ActionType == "RegistryKeyCreated" | where Timestamp > datetime(2026-05-03T04:00:00) | project Timestamp, DeviceName, ActionType, InitiatingProcessFileName | order by Timestamp desc On an affected device, this can also be checked with: certutil -store AuthRoot | findstr -i "digicert" Could become an annoying day for admins if this spreads reddit.com/r/cybersecurit…

English
15
148
941
159K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Rob Kover
Rob Kover@deseretistan·
Two weeks ago, the very first person (other than me) started running my new APRS software, Graywolf. Today, stations all over the world are running it. In fact, one of the northernmost stations on Earth is running it! Many new exciting features coming soon. Hope you try it!
Rob Kover tweet media
English
4
11
43
1.8K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Adriksh
Adriksh@Adriksh·
on linux, you can run a program in an isolated environment its own process tree, mount view, hostname, network, and more without docker or any container runtime. the kernel does it directly. it’s called unshare. only a few processes visible. the rest of the system is hidden.
Adriksh tweet media
English
11
108
1.3K
62.6K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Dhaval Makwana
Dhaval Makwana@heyDhavall·
List of 9 websites where you can download unlimited books for free: 1. smashwords .com 2. baen .com 3. feedbooks .com/publicdomain 4. wikibooks .org 5. google books 6. openstax .org 7. bookboon .com 8. freecomputerbooks .com 9. standardebooks .org
Dhaval Makwana tweet media
Dhaval Makwana@heyDhavall

SHOCKING: PowerPoint isn’t dead… but it just got outsmarted. Discovered an AI that builds full decks from any doc in 30 seconds. This is how presentations are made now. Here’s how to create stunning presentations with zero effort: 👇

English
1
32
93
7.1K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Nicolas Krassas
Nicolas Krassas@Dinosn·
Windows 9x subsystem for Linux. You can run all your favourite Windows and Linux apps side-by-side with a modern Linux kernel running cooperatively with the Windows kernel in ring 0. And unlike modern WSL, no hardware virtualisation is used so even your 486 can run it! codeberg.org/hails/wsl9x
English
6
63
290
17.3K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Aurora Martel
Aurora Martel@AuroraMar1eL·
Stop telling Claude, "do this." Stop telling Claude, "write code." Stop telling Claude, "fix this error." You're actually treating a senior AI like a junior intern. Here are 8 prompts you can copy and paste directly:
English
69
345
3K
1.1M
Bruce Barnett (@grymoire.bsky.social) retweetledi
Ihtesham Ali
Ihtesham Ali@ihtesham2005·
Say goodbye to Dropbox, iCloud, and OneDrive subscriptions. Someone open-sourced a sync tool that replaces all three for $0. And no company can shut it down. It's called Syncthing. Here's how it works: Every cloud storage company on earth routes your files through their own servers. That's not a technical requirement. That's a business model. Syncthing skips the server entirely. → Your devices connect directly to each other → Every transfer is TLS encrypted with perfect forward secrecy → Every device is authenticated by a cryptographic certificate → Nothing moves without your explicit permission → Works on Windows, macOS, Linux, Android, FreeBSD No account. No subscription. No company holding a copy of your files. Dropbox can raise prices. iCloud can change its terms. Google Drive can shut down tomorrow. Syncthing runs on your own machines. There's no server to breach. No company to pressure. No subscription to cancel. One install. Your devices. Your files. Your rules. 100% Opensource. syncthing.net
Ihtesham Ali tweet media
English
115
510
2.6K
191.1K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
We released first detection rules for Copy Fail / CVE-2026-31431. YARA rules by me: github.com/Neo23x0/signat… It covers public PoC artifacts, including known payloads, exploit code fragments and URLs seen in shared material. More generic rules for customer environments are still in testing. Sigma rules by @_swachchhanda_: github.com/SigmaHQ/sigma/… They cover suspicious Copy Fail-related exploitation patterns, including setuid binary execution behavior and NULL argv shell execution. More updates soon.
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
Florian Roth ⚡️@cyb3rops

You probably already heard about Copy Fail - the Linux LPE that affects basically every current distro and shared-kernel/container environment I’ll post a few updates here soon copy.fail

English
9
151
542
112.4K
Bruce Barnett (@grymoire.bsky.social) retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️Copy Fail (CVE-2026-31431) is a Linux privilege escalation bug that lets any local user get root using a 732-byte Python script, and itworks on basically every major Linux distro shipped since 2017. Website: copy.fail Write-up: xint.io/blog/copy-fail… GitHub: github.com/theori-io/copy… It's a logic flaw in the kernel's crypto code (authencesn via AF_ALG and splice()) that allows a small write into the page cache, which can be used to tamper with a setuid binary like /usr/bin/su. Think how bad this is going to be for shared environments like Kubernetes, CI runners, and cloud sandboxes, where it enables container escape and tenant-to-host compromise. Found by Theori's Xint Code scanner, patched in the mainline kernel, and publicly disclosed on April 29, 2026; if you can't patch right away, the recommended workaround is to disable the algif_aead module.
English
60
828
3.3K
398.5K