Markus Vervier

8.1K posts

Markus Vervier banner
Markus Vervier

Markus Vervier

@marver

Security Vulnerability Coach, responsible for @x41sec and @persistent_psi Tweets here are my own.

Right here Katılım Ocak 2009
599 Takip Edilen3.3K Takipçiler
Sabitlenmiş Tweet
Markus Vervier
Markus Vervier@marver·
At this year's @hack_lu I did a shorter but content wise updated version of the eSIM security talk, watch this if you want to have a good overview and a better to follow presentation! youtube.com/watch?v=Ka7032…
YouTube video
YouTube
English
0
4
10
3K
Markus Vervier retweetledi
TMZ
TMZ@TMZ·
🕊️ Chuck Norris has died at 86. tmz.me/N3EVxQe
TMZ tweet media
English
11.7K
56.8K
272.7K
23.2M
Markus Vervier
Markus Vervier@marver·
MCP is just another API, no need to panic.
English
0
0
1
187
Markus Vervier
Markus Vervier@marver·
@evilsocket Looking at all the bugs that constantly appear in Claude Code, I feel they are heavily vibe-coding on it without proper testing....
English
0
0
8
835
Simone Margaritelli
Simone Margaritelli@evilsocket·
A Claude Code instance in a terminal, consumes more RAM and CPU than a freaking web browser. How is this possible? Under the hood, Claude is a nodejs React app using some monstrosity called Ink for "TUI". How does this make any sense? Make software great (& optimized) again!
Simone Margaritelli tweet media
English
43
11
415
61.2K
Markus Vervier retweetledi
LaurieWired
LaurieWired@lauriewired·
the most mass produced computer in history is likely a SIM card
English
137
312
14.4K
284.6K
Markus Vervier retweetledi
Lord Bebo
Lord Bebo@MyLordBebo·
🎂 How to know if the caller is an AI, just ask for a cupcake recipe! lol …
English
764
7.8K
48.8K
2.4M
Markus Vervier retweetledi
vx-underground
vx-underground@vxunderground·
vx-underground tweet media
ZXX
13
280
5.2K
88.9K
Markus Vervier
Markus Vervier@marver·
In soviet russia, AI is learning you.
English
0
0
0
153
Markus Vervier retweetledi
Ben Miller
Ben Miller@bensen·
If you happen to be rate limited again, just use #Claude for free through Amazon customer support
Ben Miller tweet media
English
121
445
6.4K
750.3K
Markus Vervier retweetledi
Vadim
Vadim@VadimStrizheus·
Maturing is realizing that Tony Stark was a vibe-coder.
English
313
1.7K
24.7K
829.3K
Markus Vervier
Markus Vervier@marver·
wise words
Stephen Sims@Steph3nSims

I want to share a quick thought for people in cyber security. This will be my longest tweet ever. I’ve spoken to many lately who are having an existential crisis from the constant posts about “the end of cybersecurity jobs.” Yes, things are changing quickly. This is a significant moment for the tech industry. Change can be uncomfortable. But we’ve seen cycles like this before. • When GitHub and open source took off, people said software engineers would disappear because code was free. • When AWS and cloud computing emerged, people said infrastructure jobs would vanish. • When fuzzing and SAST tools improved, people said vulnerability research would disappear. • Virtualization would eliminate infrastructure jobs. • Mobile computing was going to end desktop dev. • Exploit mitigations would end exploitability. It didn't. Each time automation improved, the amount of software grew faster than the automation. It does feel "different" this time as it's explosive. Some roles will shrink: • repetitive pentesting • basic vulnerability scanning • tier-1 SOC monitoring But other areas are expanding rapidly: • AI system security • supply chain security • identity architecture • autonomous agent security • critical infrastructure protection Historically, every time we eliminate one class of bugs, new classes emerge. Right now people are vibe-coding entire systems, giving AI access to their machines, crossing trust boundaries, and deploying autonomous agents with excessive permissions. The legal and regulatory world is nowhere close to ready. There will absolutely be new failure modes. Humans are amazing and always adapt, finding new ways to do things. The worst thing you can do right now is fall into a doom loop. ...and I’ll be honest, I too have felt the "psychological paralysis" a few times thinking, “Is this time different?” It's especially impactful when it comes from someone I respect in the community. There are certainly unknowns, in an industry where we've become accustomed to predictability. But... the majority of those reactions are usually driven by social media, not reality. Platforms like X reward engagement, and sensational doom posts spread faster than measured thinking. If you see something like: “Holy #$%^! Opus 66.6 just found every bug in Chrome and replaced 50 startups!” …mute it and move on. Instead: Stay curious. Learn the new technology. Adapt your skillsets. Build things. We’ll get through this transition the same way we always have. If I'm wrong then Sam Altman better be right about UBI! :) I'm sure that if this tweet gets any engagement that I'll get some heat for it, but a good friend of mine reminds me often to focus on what you have control over. I'll revisit this tweet at DEF CON 40!

English
0
0
1
199
Markus Vervier
Markus Vervier@marver·
This touches an important point, OSS is under pressure. Also OSS funding is under pressure - developers are classically paid for implementing features in OSS software or prioritizing certain things - which can be done on-the-fly now.
Kuba Gretzky@mrgretzky

Open source is dying a slow, painful death. For the time being, the AI-related issues in the open-source space have been largely attributed to the flood of AI-slop-generated code contributions, which human project maintainers were unable to process because the effort required to validate each contribution far exceeded the quality of those contributions. Now Cloudflare, by slop-forking Next.js, has just validated that it's okay to take an open-source project, shove it into an LLM, and have it vibe-code a completely new product based on the source code the engine was fed. The question arises: if AI regenerates the source code of an open-source project entirely, does the original open-source license still apply? We're approaching the Slop Ages, where protecting your IP from AI heists becomes virtually impossible. We've seen it in the music industry, and the time has come for the software industry. I am a software developer myself, and Evilginx has been open-sourced for over 8 years. That's why this news story rubs me the wrong way on a personal level. Evilginx is an offensive security tool - a phishing framework focused on bypassing MFA. Due to its dual-use nature, it can be used either by the good guys to demonstrate the weaknesses of the company's MFA implementation or by the bad guys for malicious purposes, mainly to harm others. I had countless second thoughts since the release of the open-source version, whether it was a good idea to put it out there, and later update it with new features, knowing that on one hand it will popularise the problems around weak MFA, and on the other hand give the bad guys a jump-start to expand their criminal enterprise. It was no surprise to me to learn later that APT groups like Scattered Spider or Void Blizzard reportedly created their own phishing toolkits, based on publicly exposed Evilginx source code. The main reason I launched Evilginx Pro as a closed-source, paid product last year was a combination of wanting to aid the good guys while gatekeeping the tool from the bad guys (and, of course, building a business out of it). It has always been important to me to make the community version of the tool accessible to everyone. Still, I was not a fan of the collateral; this decision also carried. Getting back to my original point. We now live in a world where a threat actor can feed the GitHub source code of any offensive security tool into an AI and prompt it to create something completely different from scratch, with more features and easier to use. Security issues arising from vibe-coding become a secondary concern in this scenario and can be largely disregarded. Over the last 2 years, I've been making significant improvements to the Evilginx proxy engine. The majority of these changes have now been implemented in Evilginx Pro. One of the upcoming major updates is the introduction of the new Phishlets 2.0 format. The plan is to release Phishlets 2.0, together with the proxy engine improvements, as part of the major update to the Evilginx community edition and make it accessible to everyone. As you may've guessed by now, my main concern is whether to release it as open-source or closed-source. Going the open-source route, I risk threat actors spending a few hundred bucks on a Claude subscription to create their own derivatives of Evilginx, which they can later rebrand and sell on the dark web. The closed-source route allows me to still release the tool to the public, with proper guardrails to prevent misuse, while keeping it accessible to people who want to use Evilginx to learn hands-on how MFA is bypassed in phishing engagements. I don't feel that open source is the proper delivery method for offensive security tooling anymore. The AI has completely reshaped the open-source ecosystem. Writing code is no longer dark magic; it is more accessible than ever, but it has also introduced the cancer we will have to learn to live with. I use AI to generate small helper libraries, while the rest of the Evilginx code is written by hand. Not because I reject the new AI-oriented reality we live in, but because I really enjoy programming. My love of programming brought me to this point in life. I also enjoy the concept of ownership. By releasing your work into the world, you let everyone know that you made it, that you personally vouch for its quality, and that you own any mistakes you make. This is what builds trust and reputation. With AI-generated software, there is neither. - Kuba P.S. I refrained from using an LLM to correct this post to avoid adding to the irony of the matter.

English
0
0
1
279