meik 🥋☠️✌️🤘

7.9K posts

meik 🥋☠️✌️🤘 banner
meik 🥋☠️✌️🤘

meik 🥋☠️✌️🤘

@meikk

I read your email.

Europæa Katılım Haziran 2008
3.1K Takip Edilen1.2K Takipçiler
meik 🥋☠️✌️🤘 retweetledi
Chris Wysopal
Chris Wysopal@WeldPond·
I just learned the sad news that Peter Neumann has passed away. Peter Neumann shaped how a generation of security people learned to think about risk. As editor of RISKS Digest, he gave many of us coming up in the 1990s and early 2000s a steady education in the real-world consequences of computer failures. His work made the field more serious, more thoughtful, and more honest. He will be missed. I first met Peter when we both testified at the 1998 Senate Governmental Affairs Committee meeting on Government Security where the L0pht testified. The combination of Peter and the L0pht made the hearing more powerful even if us hackers stole the spotlight. Neumann and the L0pht made the same argument from two different directions. Neumann gave the institutional, systems-engineering view: the country was becoming dependent on brittle, interconnected systems that were never designed for security, reliability, or survivability. The L0pht gave the field evidence: here are the actual flaws, here is how attackers think, here is how cheaply and quickly these systems can fail in practice. Neumann supplied the credibility of a long-time researcher warning that this was not just “hackers breaking into things,” but a structural failure of technology markets, procurement, engineering discipline, and risk management. The L0pht supplied the proof that the warnings were not theoretical. Together, we made the hearing unusually powerful: the academic risk community and the hacker community were telling the Senate the same thing, in different languages, before the rest of the world had fully caught up.
Chris Wysopal tweet media
English
4
29
75
16.7K
meik 🥋☠️✌️🤘 retweetledi
truthache
truthache@truthache68·
💾😂 It’s actually wild that Gen Z has never experienced the pure serotonin of watching MS-DOS DEFRAG do its little block dance. Your 4GB 386 is choking on life? Just run DEFRAG and stare at it like it’s 1993 Netflix. Don’t fight the hypnosis… become one with the pixels.😵‍💫
English
605
770
8.7K
616.5K
meik 🥋☠️✌️🤘 retweetledi
Center for Cyber Security Training
We are happy to announce FREE Corelan exploit development walkthrough series to help people work through the legendary tutorials step-by-step on Windows 11! Huge thanks to @corelanc0d3r for making this content freely available and @wetw0rk7 for helping modernize it.
English
1
16
73
6.4K
meik 🥋☠️✌️🤘 retweetledi
Alex Rad
Alex Rad@defendtheworld·
old school unix hacks are still "super effective" today
Alex Rad tweet media
English
0
1
5
337
meik 🥋☠️✌️🤘 retweetledi
Dave
Dave@GamewithDave·
PS1 is 31 years old PS2 is 26 years old PSP is 22 years old Xbox 360 is 21 years old Nintendo DS is 20 years old PS3 is 19 years old PS4 is 13 years old Switch is 8 years old PS5 is 6 years old You didn’t grow up with retro games. You grew up with modern classics.
English
123
2.5K
20.5K
298.7K
meik 🥋☠️✌️🤘 retweetledi
安坂星海 Azaka || VTuber
holy SHIT new killer feature i've been waiting for for ages for dnSpyEx goated @washi_dev
安坂星海 Azaka || VTuber tweet media
English
4
23
174
8.3K
meik 🥋☠️✌️🤘 retweetledi
Charly Wargnier
Charly Wargnier@DataChaz·
just like my vibe-coded app—yeah, it’s buggy, but if it works, don't touch a thing
English
63
295
3.3K
189.9K
meik 🥋☠️✌️🤘 retweetledi
scriptjunkie (Matt)
scriptjunkie (Matt)@scriptjunkie1·
I appreciate everyone dropping linux privesc 0days in the current AI renaissance, but to really make it feel like the good ol days someone needs to drop a weaponized pre-auth SMB or RDP RCE. We haven't had a good Windows worm in AGES.
English
11
42
269
21.6K
meik 🥋☠️✌️🤘 retweetledi
Olivier Poncet 🦝
Olivier Poncet 🦝@ponceto91·
Mon ressenti du mois de mai
Olivier Poncet 🦝 tweet media
Français
2
8
39
2.7K
meik 🥋☠️✌️🤘 retweetledi
tetsuo
tetsuo@tetsuoai·
John Carmack: C's simplicity makes it easier to work with, especially in projects like OpenBSD's kernel.
English
16
73
836
46.1K
meik 🥋☠️✌️🤘 retweetledi
Adam Langley
Adam Langley@BuildHackSecure·
Why are API keys not bound to an IP address allow list? I never see this option available in API services. Failing that, you should also receive an email whenever a new IP address attempts to use your API key. API keys should double up as canary tokens.
English
31
19
217
25.6K
meik 🥋☠️✌️🤘 retweetledi
Artem Tamoian
Artem Tamoian@artemtam·
В марте хакеры ФСБ провели рассылку писем со ссылкой, переход по которой мог привести к полной компрометации устройства. Я был первый, кто обратил внимание на эти письма, проанализировал их, а также отобрал у ФСБ их домен. Тред с подробностями и советами:
Artem Tamoian tweet media
Русский
22
165
936
115.7K
meik 🥋☠️✌️🤘 retweetledi
meik 🥋☠️✌️🤘 retweetledi
trish
trish@TrisH0x2A·
MIT teaches operating systems by giving students a complete Unix like kernel and asking them to modify it it is called xv6 and is about 6000 lines of C a reimplementation inspired by Unix Version 6 from 1975 rewritten in modern C for x86 multiprocessor processes system calls virtual memory and filesystem are all there and small enough to read end to end in a weekend this is what you study to understand how operating systems actually work not just how they are described
trish tweet media
English
68
564
5K
333.3K
meik 🥋☠️✌️🤘 retweetledi
sudox
sudox@kmcnam1·
sudox tweet media
ZXX
12
51
660
6.9K
meik 🥋☠️✌️🤘 retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
Time to return to their roots of putting a laptop on a table and awarding the physical device to the first person to pwn it
International Cyber Digest@IntCyberDigest

‼️🚨 Pwn2Own Berlin 2026 just hit a wall. For the first time in 19-years, ZDI rejected dozens of working zero-day RCE submissions because organizers ran out of contest slots. Rejected hackers are now going public with PoC demos and direct vendor disclosures, breaking Pwn2Own's usual secrecy. ▪️ AI surfaces a massive wave of 0-day RCEs. ▪️ Submissions overwhelm ZDI past max capacity. ▪️ Slots run out. Researchers with working chains get rejected. ▪️ "Revenge disclosures" begin. ← we are here. Confirmed casualties so far: ▪️ @xchglabs : 86 vulnerabilities prepared (PyTorch, NVIDIA, Linux KVM, Oracle, Docker, Ollama, Chroma, LiteLLM, llama.cpp). All rejected. Now reporting directly to vendors with writeups dropping as patches land. ▪️ @ggwhyp : full-chain Firefox RCE on Windows. Rejected. Publicly demoed (HTML page → cmd.exe → calc.exe). Responsibly disclosed to Mozilla. ▪️ @yunsu_dev : working RCE chain, rejected. Submitting elsewhere. ▪️ @ryotkak : tried to register for 3+ weeks. ZDI confirmed "at maximum capacity, can't add extra contest days." Considered canceling flight and hotel. ▪️ @anzuukino2802 : Claude Code RCE PoC. Rejected. ▪️ @desckimh : 0-day RCEs in Ollama and LM Studio. Rejected. Reported impact: a community-estimated 150+ researchers tried to register. Accepted contestants are now being warned about collisions. Rejected vulnerabilities going to bug bounty programs may trigger pre-event patches that invalidate the work of those who got in. ZDI has not publicly addressed the capacity issue. The event still runs May 14-16 in Berlin.

English
2
10
124
12.2K