itsme

373 posts

itsme banner
itsme

itsme

@HiggsSec

security researcher @ redacted.

Присоединился Şubat 2022
504 Подписки55 Подписчики
Sam Altman
Sam Altman@sama·
Also, a ton of new Codex features coming soon! Fun little bundle w/the new model.
English
325
170
5.8K
202.9K
itsme ретвитнул
Wall St Engine
Wall St Engine@wallstengine·
Anthropic said a small group of unauthorized users accessed its new Mythos model on the day it was unveiled The users got in through a mix of methods, including access linked to a third-party contractor. Anthropic is investigating and has no evidence its systems were compromised
Wall St Engine tweet media
English
11
18
104
50.1K
itsme
itsme@HiggsSec·
@nicowaisman @dinodaizovi High value exploits are not what's standing between threat actors & SMB. As a CISO of an offensive capabilities company, you should already know that.
English
0
0
0
96
Nico Waisman
Nico Waisman@nicowaisman·
That’s true, but not every company can realistically afford security by default. The real shift is that, before Mythos and similar players, the assumption was that, economically, these exploits would only be used against high-value targets. That assumption has now fundamentally changed.
English
5
11
29
12.2K
Dino A. Dai Zovi
Dino A. Dai Zovi@dinodaizovi·
This is the right assumption: assume that your adversaries *already* have exploits for vulnerabilities in software that you depend upon. The goal of security engineering is to proactively design your systems and environments to withstand security failures in that software.
chrisrohlf@chrisrohlf

"Mythos and National Power" - This is definitely worth listening to. I'm an old school security person, so my threat models are always dominated by the assumption that attackers already have knowledge of a systems vulnerabilities. chinatalk.media/p/mythos-and-n… 1/n

English
3
37
146
27.3K
itsme
itsme@HiggsSec·
@HackingLZ a CISO that has never read a DFIR report or his threat intel feed sucks.
English
0
0
0
20
Justin Elze
Justin Elze@HackingLZ·
I would probably argue that companies that couldn’t afford security by default were getting popped and ransomed via design flaws and abuse of functionality issues in Microsoft products or in the lowest cost appliance companies. The pitch here is that companies like MS, with early access to Mythos, were supposed to improve their products?
Nico Waisman@nicowaisman

That’s true, but not every company can realistically afford security by default. The real shift is that, before Mythos and similar players, the assumption was that, economically, these exploits would only be used against high-value targets. That assumption has now fundamentally changed.

English
2
2
30
4.2K
itsme
itsme@HiggsSec·
@thsottiaux where is the 5.4-Cyber Model that you guys pushed it not being only for enterprise (contrary to Anthropic) - or was that just a stunt, since only enterprise got it so far?
English
0
0
3
694
Tibo
Tibo@thsottiaux·
If you think Codex with GPT-5.4 is /fast already… we have line of sight for at least an order of magnitude in speedups this year. Good engineering compounds and it’s never been a better time to learn Codex.
English
357
188
5.7K
289.1K
itsme
itsme@HiggsSec·
@C2IRIS You'd be naive to think that only the US & Israel have such capability. I think you're informed just as I am, if you really work in this industry. So I don't think you're naive, just not sure why you'd make such a statement.
English
1
0
2
129
IRIS C2
IRIS C2@C2IRIS·
At this point, producing zero-click full chains and exquisite, stealthy implants for Android and iOS requires so much money—and much more importantly—so much proprietary knowledge and talent, that only two world powers can do it. The US (plus a little help from FVEY partners). And Israel. (+ Google Project Zero. But they only do “stunt hacking”, unfortunately) Literally no one else can build/cobble-together these products and actually manage to maintain these products, against an endless deluge of patches and new mitigations. Meanwhile… When there is an active terrorist threat against Tim Cook or Sergei Brin, or an event they are attending, like Davos, they are VERY thankful that the great people of NSO and Paragon (and many others) exist. I can promise you that. There’s even been accusations that a certain other former Google executive deployed these kinds of capabilities against his much younger girlfriend… But I digress. All of this raises a very key question: What do Apple/Google actually achieve with these endless patches/mitigations, other than making life easier for terrorists, cartel thugs, human traffickers and other total scum, while making life harder for the sheepdogs of Western Civilization who are tasked with hunting them down? I haven’t herd a good answer to this question
English
5
0
25
2.6K
itsme
itsme@HiggsSec·
@iGotRootBlog @thsottiaux Read it more carefully, this is a higher tier of verification. There is an additional form to fill. Hope this helps.
English
1
0
1
644
Mads
Mads@iGotRootBlog·
@thsottiaux Got verified for it, don’t see the cyber model in Codex app. What to do?
English
8
0
6
5.9K
Tibo
Tibo@thsottiaux·
Today we are introducing GPT-5.4-Cyber and expanding our Trusted Access for Cyber (TAC) program. openai.com/index/scaling-…
English
120
76
1.5K
110.9K
itsme ретвитнул
Vector 35
Vector 35@vector35·
Binary Ninja 5.3 (Jotunheim) is released: binary.ninja/2026/04/13/bin… Major highlights: NDS32 support, AArch64 ILP32 ABI, new Universal MachO UI, command palette upgrade, new type library helpers, ghidra export, updated IDB import, HW and conditional breakpoints, and much more!
English
0
23
84
7K
itsme
itsme@HiggsSec·
@vxunderground sounds like gpt oss & some chinese llms
English
0
0
3
840
vx-underground
vx-underground@vxunderground·
This is very good malware. This is solid-solid-SOLID B+ malware, very close to A- malware. APT37 is using a old-school playbook. They're doing EPO (Entry Point Obfuscation) on a self-delivered binary for evasion. They also unironically are using something akin to cavity infection ... but on themselves. This is something you saw more in the Windows 95 - Windows XP era, not something you see in 2026. Very cool. I respect it. The multi-staged fragmentation of shellcode phases is also really, really, really cool. This is (once again) a more old-school technique usually reserved for infected binaries, not self-delivered binaries. Despite all of these super cool features, APT37 shoots themselves in the foot immediately. - EAT walking for Kernel32 functionality (???) - XOR decryption is a huge red flag - Allocating with PAGE_EXECUTE_READWRITE (???) - Hardcoded OAuth token (???) - Used external dependency for AES (???) Why not use NT functionality to hook evasion? XOR is easily identified in static analysis, why XOR? Allocating memory with VirtualAlloc with RWX is a MASSIVE RED FLAG. They also hardcode a OAuth token ... they can multi-staged shellcode payload with old-school malware techniques but hardcore AN OAUTH TOKEN? It unironically makes me wonder if they had one old-head malware guy working on it, then they had some newer dude do the non-hardcore stuff. There is a huge gap in skill sets here. Or the old-head hasn't kept up to date on malware stuff since 2005... or they got lazy... I don't know, really weird.
Virus Bulletin@virusbtn

Genians Security Center uncovers an APT37 campaign that used social networking as an initial access vector. Two Facebook accounts set to North Korea-linked locations were used to screen targets, build trust, and move conversations to Messenger. genians.co.kr/en/blog/threat…

English
15
158
1.1K
84.8K
Nir Av
Nir Av@GotR00tAcce55·
Google's Threat Intelligence Group called this "the most technical part" of Predator's exploit chain and said it deserved its own blog post We wrote it FDGuardNeonRW, PAC bypass via JSC gadgets, 256-entry signing cache and more, all previously undocumented jamf.com/blog/predator-…
Nir Av tweet media
English
2
8
36
4.9K
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️A full-chain one-click exploit for iOS 18 through 18.7, bundled with a bonus stealer called "GHOSTBLADE," is allegedly being sold on a popular cybercrime forum. ‣ Threat Actor: rosestealer ‣ Category: Exploit / Malware ‣ Name: "EL Muncho" Full-Chain Exploit + GHOSTBLADE Stealer ‣ Target: iOS 18 to 18.7 ‣ Price: $50,000 (negotiable) Full-chain exploit stages: 01 - RCE in Safari: Victim loads a malicious page (one-click) resulting in Remote Code Execution inside the Safari process. 02 - Double Sandbox Escape: Escape WebContent sandbox to GPU Process to mediaplaybackd (higher privileges). 03 - Kernel Privilege Escalation: Full kernel read/write, complete control over the device. 04 - Post-Exploitation: Runs the GHOSTBLADE Stealer, injecting payload into a high-privilege process. All data exfiltrated back to C2. GHOSTBLADE Stealer dumps: ▪️ sms.db ▪️ ChatStorage.sqlite (WhatsApp) ▪️ Keychain / Passwords ▪️ Wi-Fi Passwords ▪️ iCloud Files ▪️ Telegram Data (messages, Axolotl.sqlite) ▪️ Device Keychain (passwords, Wi-Fi, auth tokens, saved logins) ▪️ Safari Browsing History, Cookies, and Saved Passwords ▪️ Signed-in Accounts and Device/Account Identifiers ▪️ SIM Card / Cellular Information ▪️ Full Location History ▪️ Saved/Known Wi-Fi Networks and Passwords ▪️ Find My iPhone Settings and Location Services Data ▪️ Photos (including metadata, hidden photos, screenshots) ▪️ iCloud Drive Files ▪️ Notes Database, Calendar Database ▪️ Health Data (Apple Health app) ▪️ Cryptocurrency Wallet and Exchange Data (Coinbase, Binance, MetaMask, Ledger, Trezor, Exodus, Phantom) ▪️ Keychain Items Related to Banking/Financial Apps Operates as hit-and-run with data exfiltrated to C2 and traces/logs deleted automatically.
Dark Web Informer tweet mediaDark Web Informer tweet mediaDark Web Informer tweet media
English
9
29
164
23.6K
itsme
itsme@HiggsSec·
@h4x0r_dz Welcome to 2012
English
0
0
2
1K
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
Is this legit? Or a malware WTF
H4x0r.DZ 🇰🇵 tweet media
English
50
23
406
97.9K
itsme ретвитнул
Justin Elze
Justin Elze@HackingLZ·
The problem here was taking something impressive and deciding to frame every crash or bug that can’t ever be weaponized as a cyber weapon. Exploitability and impact matter not just raw numbers. Look at CISA KEV vs total bugs found per year.
aditya@adxtyahq

Anthropic will say whatever it takes to stay in the headlines. Claude Mythos claims “thousands of vulnerabilities” off just ~198 reviewed cases • only ~198 reports actually reviewed • “thousands” comes from extrapolation • some bugs weren’t even practical to exploit • some were already patched • others blocked by basic defense layers it's all marketing gimmick now.

English
6
3
44
4.3K
itsme
itsme@HiggsSec·
@thsottiaux So effectivly us on the 200 plan now will get less usage?
English
0
0
0
93
itsme
itsme@HiggsSec·
@C2IRIS Longer. Have personal benchmarks as well.
English
1
0
2
113
IRIS C2
IRIS C2@C2IRIS·
Claude obviously totally nerfed over the last few days. I say that based upon very rigid benchmarks that we've built to monitor this over time.
English
4
2
34
3.1K