Si piensas que las filtraciones de datos son un accidente, resultado de un ataque complejo, podrías estar equivocado.
Más en 👇
eserror.xyz/posts/2025/fil…
Mastering Ethereum (2nd Edition) — the go-to guide for Ethereum newcomers, builders, and even auditors.
If you want to truly understand how Ethereum works under the hood, this is where you start.
📖 Read it for FREE: github.com/ethereumbook/e…
Meet VulnLLM-R-7B: a specialized AI that reads code like a security expert. It's trained to spot vulnerabilities before they become breaches. This isn't just another chatbot, it's a digital security guard for your codebase. The community is buzzing because it makes security accessible.
New Engineering blog: We tasked Opus 4.6 using agent teams to build a C compiler. Then we (mostly) walked away. Two weeks later, it worked on the Linux kernel.
Here's what it taught us about the future of autonomous software development.
Read more: anthropic.com/engineering/bu…
ollama launch is a new command in Ollama 0.15 to run Claude Code, Codex, Droid and OpenCode with Ollama!
GLM 4.7 Flash is now optimized to use much less memory for longer context lengths (64k+).
Need additional hardware? Ollama's cloud offers GLM 4.7 with full precision and context length.
CVE-2026-24061: GNU InetUtils telnetd Argument Injection Authentication Bypass.
Un atacante puede saltar la autenticación y convertirse en root simplemente ejecutando un solo comando.
Más información 👇
nvd.nist.gov/vuln/detail/CV…
Hot Update!!!🥳
See you Today!
🤖 The $250K Bug: AI Security Research Meets Bug Bounties
Kicking off 2026 with two game-changers in Web3 security.
Gabriel Balko, a top Security Researcher (Known as @ControlZ_1337), recently earned a $250,000 bug bounty - the highest ever awarded for a vulnerability discovered using AI.
@MitchellAmador, CEO of @immunefi (The leading Web3 bug bounty platform), joins to share insights on how bug bounty programs work and what this AI breakthrough means for the industry.
What happened?
• AI agent found a critical vulnerability (preventing $500M+ in potential losses)
• 10 High/Critical bugs discovered in just 3 months
• Research that would take a year manually - done in a day
• 10,000x faster than traditional security research
Join us for a double session:
Part 1 – Mitchell Amador: Bug Bounties in Web3
✅ How bug bounty programs work in crypto
✅ What makes a vulnerability worth $250K+
✅ Getting started in Web3 security research
✅ AI's impact on the bug bounty landscape
✅ Industry insights from Immunefi
Part 2 – Gabriel Balko: The AI Discovery
✅ How the AI agent was built
✅ Translating human security intuition into automation
✅ Real results and stopped attacks
✅ Technical approach and tools
📅 Today!!! (Wednesday, January 14, 2026)
🕔 17:00 Israel Time (15:00 CET · 08:00 EST)
🌐 Online & Free
🎟️ Register: luma.com/m69hd5sn
📺 Live on YouTube: youtube.com/watch?v=j7IdAN…
This is where AI-powered security meets real-world bug bounties.
🔥 Powered by @MasterkeyVC
👾 Hosted by @Web3_Devs#AI#CyberSecurity#BugBounty#Web3#SecurityResearch#MachineLearning#Blockchain#InfoSec#AIResearch#Web3Security#CryptoSecurity#Immunefi#Automation@AlonKivity@al23xyz , @ELuttenberg789, @Amit_Masterkey , @SHAP0W
First major hack of 2026, as @Truebitprotocol was drained for $26.2 million through an overflow in unverified bytecode.
The same attacker hit Sparkle weeks prior. Old code keeps bleeding - the archives have clearly become a shopping list.
rekt.news/truebit-rekt
A new report out from OX Security found that 900,000 users have had ChatGPT and DeepSeek conversations stolen by Chrome extensions.
That means full chat logs exfiltrated every 30 minutes.
Hackers want your AI history.
Why? Because you've probably pasted in code, strategy, legal questions, personal information, health info, or other material that could be used for blackmail or extortion.
A few takeaways:
1. Don't sign up for LLMs with your personal information if possible.
2. Don't input personal information into the LLM itself.
3. Be extremely careful with browser extensions. We already know that from wallet hacks.
Kali Linux 2025.4 Release (Desktop Environments, Wayland & Halloween Mode): Say hello to Kali Linux 2025.4! Expect updated tools, performance tweaks, and improved support - no fluff, just the essentials.
The summary of the changelog since the 2025.3… kali.org/blog/kali-linu…
ATTACK UPDATE: A massive supply-chain compromise has affected packages with over 2 billion weekly downloads, targeting *CRYPTO*
Here's how it works 👇
1) Injects itself into the browser
Hooks core functions like fetch, XMLHttpRequest, and wallet APIs (window.ethereum, Solana, etc.).
Ensures it can intercept both web traffic and wallet activity.
🍎🐛macos 15.6 is out, a few new CVEs and mentions...
NetAuth
Impact: An app may be able to break out of its sandbox
CVE-2025-43275
PackageKit
Impact: An app may be able to bypass certain Privacy preferences
CVE-2025-43232
CoreUtils
We would like to acknowledge...