ΞVΞΠΓ HФЯƗZФΠ

15 Followers
172 Following
86 Posts

Ghost in the machine. A system glitch. Herding electric sheep.

Formerly <@>61u3int31 ΞVΞΠΓ HФЯƗZФΠ on the 'blue falcon' site.

GeolocationN51°53.044 W003°26.205
The Evolution of Pen Testing: A Conversation with Tim Medin https://thehackermaker.com/the-evolution-of-pen-testing-a-conversation-with-tim-medin/
The Evolution of Pen Testing: A Conversation with Tim Medin - Phillip Wylie

About The Guest:Tim Medin is the CEO and founder of Red Siege, a pen testing firm that specializes in offensive security. With over 15 years of experience in the field, Tim is also a lead author of the enterprise penetration testing course for the SANS Institute. He is known for his expertise in kerberoasting and…

Phillip Wylie
Tank, I need an exit.

Darknet Diaries 170: Phrack

"Phrack is legendary. It is the oldest, and arguably the most prestigious, underground hacking magazine in the world..."

🔗 https://darknetdiaries.com/episode/170/

#Phrack #Hacking #CyberSecurity

@caseynewton im confident that the hoax was intended to be a hoax. check this out:

that huge dip is when the news hit. then the news turned out to be a hoax, so the stock recovered.

if you can predict when stocks are going do do this you can print shitloads of money.

puts and shorts on the way down, calls and longs on the way up. double whammy.

RE: https://mastodon.social/@Viss/115850518356022453

https://www.platformer.news/fake-uber-eats-whisleblower-hoax-debunked/

this is the link to Caseys story.
I'm pretty confident the whole angle here was market manipulation

Preserving code that shaped generations: Zork I, II, and III go Open Source

Microsoft’s Open Source Programs Office (OSPO), Team Xbox, and Activision are making Zork I, Zork II, and Zork III available under the MIT License.

CommetJacking attack tricks Comet browser into stealing emails https://www.bleepingcomputer.com/news/security/commetjacking-attack-tricks-comet-browser-into-stealing-emails/

Maybe Apple's cautionary approach is warranted.

Prompt Injection in AI Browsers - Schneier on Security

https://www.schneier.com/blog/archives/2025/11/prompt-injection-in-ai-browsers.html

> This is why AIs are not ready to be personal assistants: A new attack called ‘CometJacking’ exploits URL parameters to pass to Perplexity’s Comet AI browser hidden instructions that allow access to sensitive data from connected services, like email and calendar. In a realistic scenario, no credentials or user interaction are required...

#LLM #agenticai #infosec #AIBrowser #perplexityai

Prompt Injection in AI Browsers - Schneier on Security

This is why AIs are not ready to be personal assistants: A new attack called ‘CometJacking’ exploits URL parameters to pass to Perplexity’s Comet AI browser hidden instructions that allow access to sensitive data from connected services, like email and calendar. In a realistic scenario, no credentials or user interaction are required and a threat actor can leverage the attack by simply exposing a maliciously crafted URL to targeted users. […] CometJacking is a prompt-injection attack where the query string processed by the Comet AI browser contains malicious instructions added using the ‘collection’ parameter of the URL...

Schneier on Security
Twitter thrived in its early days thanks to third-party apps. Twitter even acquired Tweetie for it’s iPhone app and TweetDeck. In yet another recent misstep, apps like Twitterrific have been blocked from accessing Twitter’s API 🙁