Rt.

1.4K posts

Rt. banner
Rt.

Rt.

@rt10_07

Melbourne, Victoria Katılım Ekim 2012
1K Takip Edilen267 Takipçiler
Rt. retweetledi
安坂星海 Azaka || VTuber
I have no idea when Virus Bulletin uploaded our paper - but here it is: our talk from last September at VB2025, where we talked about an APT41-adjacent group started using Google Calendar C2 as part of their espionage operation. 🔗Link below for the slides and paper
安坂星海 Azaka || VTuber tweet media
English
1
17
60
4.9K
Rt. retweetledi
Mario Nawfal
Mario Nawfal@MarioNawfal·
🇦🇺An Australian tech founder with zero biology background sequenced his dog’s tumor DNA, then used ChatGPT and AlphaFold to design a custom mRNA cancer vaccine. A month later, the tumors shrank by half. And this is just the start of AI medicine.
English
402
2.9K
20.2K
1.4M
Rt.
Rt.@rt10_07·
There’s no Tencent in the sponsors list, so what’s the point of this fake advertisement for them? I seriously don’t get why someone would bother making a fake post about an open-source project that anyone can check in just a few clicks. Help me find Tencent in this:
Rt. tweet media
Jen Zhu@jenzhuscott

As expected, @tencentcloud @TencentAI_News are now officially a sponsor to the @openclaw community. Hope more will support open source projects to make AI tools accessible for all. 🫶🌎🚀

English
0
0
0
58
Rt. retweetledi
Peter Steinberger 🦞
Peter Steinberger 🦞@steipete·
@Alfredxia Kinda... I got an email once from folks complaining that my rate limits block them from scraping fast enough. They copy yet they don't support the project in any way. 😞
English
67
67
1.3K
286.6K
Rt. retweetledi
FBI
FBI@FBI·
CASE UPDATE from @FBIChicago: Chinese Telecommunications Company Fined $50 Million for Conspiring To Steal Technology From Motorola Solutions Beginning in 2006, China-based HYTERA COMMUNICATIONS CORP. LTD. recruited and hired Motorola employees and directed them to take proprietary and trade secret information from Motorola without authorization. The stolen information was used to develop products for Hytera—at a fraction of the cost that it took Motorola to develop the exclusive technology—and competed with Motorola in the digital radio market through 2020. Learn more about the #FBI investigation: justice.gov/usao-ndil/pr/c…
FBI tweet media
English
61
139
420
23.2K
Rt. retweetledi
Jiří Vinopal
Jiří Vinopal@vinopaljiri·
#IDA Pro tip 🤙 ApplyCalleeTypeEx — ApplyCalleeType is Reborn 🔥 — — — IMO one of the most practically useful IDA plugins ever written. It died on IDA 9.x. Not anymore. Rebuilt from scratch — compatible IDA 8.x → 9.3+. github.com/Dump-GUY/Apply… — — — What's new: ✅ IDA 9.3 ready + backward compat to 8.x — single file, zero deps ✅ Right-click menu in disasm and pseudocode view ✅ Cursor on call line, call expr "(" or variable v2 — all work ✅ Multi-line editor with live SAL/MSDN/ntdoc preprocessing ✅ Paste straight from MSDN or SDK headers — no cleanup needed — — — The original plugin was perfect at its job. It just needed a new life 🙏 Big shoutout to the @Mandiant #FLARE team for building something this useful in the first place — and to @HexRaysSA for the best disassembler/decompiler on the planet. #ReverseEngineering #IDA #MalwareAnalysis #Reversing
English
3
42
176
9.1K
Rt. retweetledi
Nicolas Krassas
Nicolas Krassas@Dinosn·
38 researchers red-teamed AI agents for 2 weeks. Here's what broke. (Agents of Chaos, Feb 2026) AI Security arxiv.org/abs/2602.20021
English
9
93
367
24.7K
Rt. retweetledi
Tanmay Ganacharya
Tanmay Ganacharya@tanmayg·
Malicious browser extensions posing as AI assistants harvested ChatGPT and DeepSeek chat histories and browsing data at scale (~900k installs; 20k+ tenants). SOC teams should validate extension installs and investigate POSTs to deepaichats[.]com, chatsaigpt[.]com, and more ...
Tanmay Ganacharya tweet media
English
2
14
50
7.2K
Rt. retweetledi
Unit 42
Unit 42@Unit42_Intel·
Our research observed CL-UNK-1068 employing custom malware, modified open-source utilities and LOLBINs. This toolset ensures persistent access. Explore our full analysis: bit.ly/4cr7YOC
Unit 42 tweet media
English
1
21
69
12.2K
Rt. retweetledi
OpenAI Developers
OpenAI Developers@OpenAIDevs·
We're introducing Codex Security. An application security agent that helps you secure your codebase by finding vulnerabilities, validating them, and proposing fixes you can review and patch. Now, teams can focus on the vulnerabilities that matter and ship code faster. openai.com/index/codex-se…
English
295
780
8.9K
1.7M
Rt. retweetledi
Darius Houle (darbonzo)
Darius Houle (darbonzo)@dariushoule·
I added a shellcode analyzer to my x64dbg skills repo! It was awesome watching it unpack a multi-stage payload, annotate everything in the debugger, and produce a solid report. chuck a bin at it - the skill knows how to load raw shellcode 🦾 github.com/dariushoule/x6…
English
1
38
168
7.5K
Rt. retweetledi
Security Harvester
Security Harvester@secharvesterx·
VMDragonSlayer - An automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom virtual machine based protectors github.com/poppopjmp/VMDr…
Security Harvester tweet media
English
3
37
164
10.3K
Rt. retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Defender Experts identified a widespread ClickFix social engineering campaign in February 2026 leveraging Windows Terminal as the primary execution mechanism. Rather than the traditional Win + R → paste → execute technique, this campaign instructs targets to use the Windows + X → I shortcut to launch Windows Terminal (wt.exe) directly, guiding users into a privileged command execution environment that blends into legitimate administrative workflows and appears more trustworthy to users. This approach bypasses detections specifically tuned to Run dialog abuse while exploiting the legitimacy and familiarity of Windows Terminal. Once the terminal is opened, targets are prompted to paste malicious PowerShell commands delivered through fake CAPTCHA pages, troubleshooting prompts, or verification-style lures designed to appear routine and benign.
Microsoft Threat Intelligence tweet media
English
17
106
355
45.3K
Rt. retweetledi
LeftenantZero
LeftenantZero@LeftenantZero·
I just released some free exploit development CTFs based on real world CVEs. They include hints, walkthroughs and working exploits if you get stuck. zeropath.com/blog/zeropath-…
LeftenantZero tweet media
English
7
68
392
16K