| Blog | https://www.skullsecurity.org |
| GitHub | https://github.com/iagox86 |
| Bluesky | https://bsky.app/profile/iagox86.bsky.social |
| Blog | https://www.skullsecurity.org |
| GitHub | https://github.com/iagox86 |
| Bluesky | https://bsky.app/profile/iagox86.bsky.social |
RE: https://infosec.exchange/@suricata/116414683723784654
One to watch, folks.
Hyperbridge exploited two weeks after April Fools' hack joke
April 13, 2026
https://www.web3isgoinggreat.com/?id=hyperbridge-exploit
⚡️ 𝗦𝗲𝗮𝘁𝘀 𝗮𝗿𝗲 𝗴𝗼𝗶𝗻𝗴 𝗳𝗮𝘀𝘁 𝗳𝗼𝗿 𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲'𝘀 𝗘𝗺𝗲𝗿𝗴𝗶𝗻𝗴 𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝗶𝗲𝘀 𝘁𝗿𝗮𝗰𝗸!
Three trainings. Niche skills. High demand.
Reverse, Bypass, Exploit: Mobile Hacking Workshop
David Backer & Steven Smiley (Corellium, a Cellebrite Company) | May 11
You'll learn: Configure mobile test environments, exploit data at rest and in transit, reverse engineer apps, and manipulate runtime behavior.
Hacking the Invisible: SDR for Red Team Operations
Sébastien Dudek (Penthertz) | May 11-13
You'll learn: Leverage SDR for SIGINT and COMINT. Build custom tools with GNU Radio to attack wireless systems, drones, IoT, and connected hardware.
Practical AI Security: Go Beyond Theory, Build, Break, and Defend
Harish Ramadoss | May 11-13
You'll learn: Build real-world GenAI applications with LLMs, agents, and RAG. Attack and defend AI systems with practical techniques and tooling.
Not your track? We also offer trainings in Offensive Operations and Threat Modeling & Defense. Check the full lineup at nsec.io/training-sessions.
➡️ Practical details
• Location: on-site OR online (check on the trainings page)
• CPE credits available
• All skill levels welcome (intermediate to advanced)
👉 Spots are limited and filling up. Register now: nsec.io/training-sessions
#NorthSec #infosec
Okay everyone was right, Expedition 33 is a pretty good game
I love how unapologetically French the whole thing feels