My mouth is dry, my todo list is long, my work is surprisingly enjoyable
| tootfinder | tootfinder |
| tootfinder | tootfinder |
RE: https://infosec.exchange/@greynoise/116002702711084624
My latest pet project, an RSS feed to alert you to the silent KEV knownRansomwareCampaignUse flips!
(Did you know there were four CVEs flipped last week?) #threatintel
Last year, a human trafficking victim trapped in a crypto scam compound in the Golden Triangle region of Laos contacted me. He proceeded to leak to me a huge collection of the compound's internal materials.
Then he had to get out alive. This is his story.
Just read this via repost from @HalvarFlake
https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms/
This post from Sean Heelan is probably the most important post in that domain (being LLMs in offensive security contexts) in quite a while. We're already discussing this in my research group, and I have some initial thoughts. Exciting times!
LLMs are reshaping software dev. I don't buy "the end of software dev": Project ambition will grow dramatically.
Ancient Egyptians could build the Pyramids but not the Empire State Building.
Pre-LLM software will be viewed like we view the Pyramids.
Now, imagine you are this VC, holding this huge wad of cash, trying to find someone to give it to. You hear two stories:
1. I will hire 10 engineers for 3 years. During that time, we will build a software system that users will love and will be happy to pay us a profitable margin for. This product is novel so we're not exactly sure on the margin.
2. I will buy a facility where I will place one trillion dollars worth of GPUs. I will rent those GPUs for one trillion, ten billion dollars.