Dave Aitel
@daveaitel.bsky.social
📤 1142
📥 470
📝 327
reposted by
Dave Aitel
Nicky Bay
1 day ago
Please take some time to look through some of the discoveries photographed in 2025. It should interest some invertebrate enthusiasts. yes? yes?
bit.ly/nickybay2025
loading . . .
Macro Highlights – The Best of 2025 - Macro Photography by Nicky Bay
After years of trudging through forests and peering into the hidden lives of tiny creatures, the number of lifers I get should rightfully decline but 2025 proved to be remarkably defiant. This year de...
https://bit.ly/nickybay2025
12
119
46
reposted by
Dave Aitel
Nick Harkaway
about 16 hours ago
Sharks, as an evolutionary pathway, are older than the rings of Saturn.
add a skeleton here at some point
9
241
60
reposted by
Dave Aitel
Lukasz Olejnik
1 day ago
German energy company Vereinigte Stadtwerke suffered a cyberattack. Supply chain attack: compromise of the company's external IT service provider, then access to breach VS itself. Data leaked from one server.
www.vereinigte-stadtwerke.de/presse/cyber...
loading . . .
Cyber-Angriff auf Vereinigte Stadtwerke GmbH - Vereinigte Stadtwerke GmbH
Angriff auf internen Server gestoppt Versorgungssysteme für Strom, Gas, Wasser, [...]
https://www.vereinigte-stadtwerke.de/presse/cyber-angriff/
0
8
5
reposted by
Dave Aitel
Ron Deibert
1 day ago
Treasury removes sanctions for three executives tied to spyware maker Intellexa
therecord.media/treasury-san...
loading . . .
Treasury removes sanctions for three executives tied to spyware maker Intellexa
The Treasury Department on Tuesday took three people closely affiliated with the holding company behind Predator spyware off of a sanctions list, reversing their designation in 2024 by the Biden admin...
https://therecord.media/treasury-sanctions-intellexa-removed
0
6
5
lujie.ac.cn/files/papers...
4 days ago
0
7
1
reposted by
Dave Aitel
Filippo Valsorda
5 days ago
I can’t even keep up with this talk, they just showed two different(?) PoCs that spoof perfectly credible signatures from Satoshi and Angela Merkel. The talk started with them booting a spoofed Fedora ISO after checking the signature. 14 vulns, 9 unpatched.
1
109
24
reposted by
Dave Aitel
Silas Cutler
6 days ago
ColdFusion++ Christmas Campaign: Catching a Coordinated Callback Calamity
https://www.labs.greynoise.io/grimoire/2025-12-26-coldfusion/
0
4
3
reposted by
Dave Aitel
Catalin Cimpanu
7 days ago
Christmas Eve miracle: Fortinet admits new exploitation of a 2020 bug
www.fortinet.com/blog/psirt-b...
loading . . .
Product Security Advisory and Analysis: Observed Abuse of FG-IR-19-283 | Fortinet Blog
This blog analysis describes the observed abuse and provides additional context so that administrators can confirm that they are not impacted and guidance based on Fortinet observations to prevent …
https://www.fortinet.com/blog/psirt-blogs/product-security-advisory-and-analysis-observed-abuse-of-fg-ir-19-283
1
12
3
reposted by
Dave Aitel
Catalin Cimpanu
7 days ago
Password vaults stolen from LastPass at the end of 2022 were cracked and used to steal cryptocurrency as recently as this year, with the stolen funds being laundered through Russia-based cryptocurrency exchanges
www.trmlabs.com/resources/bl...
loading . . .
TRM Traces Stolen Crypto from 2022 LastPass Breach — On-chain Indicators Suggest Russian Cybercriminal Involvement | TRM Blog
TRM traced LastPass-linked Bitcoin laundering through mixers to high-risk Russian exchanges, showing how demixing exposes infrastructure reuse and limits mixer anonymity.
https://www.trmlabs.com/resources/blog/trm-traces-stolen-crypto-from-2022-lastpass-breach-on-chain-indicators-suggest-russian-cybercriminal-involvement
1
17
10
7 days ago
0
4
0
reposted by
Dave Aitel
Insomni'hack
8 days ago
At Insomni'hack 2025, Christian & Marcel introduced EL3XIR, a framework for fuzzing TrustZone-based TEEs. Get your ticket for 2026 now and gift a spot for those wishing more security innovations:
insomnihack.ch?utm_source=b...
#InsomniHack
#Cybersecurity
#Infosec
#INSO2026
loading . . .
0
5
3
reposted by
Dave Aitel
Climate News Now
13 days ago
A group of endangered “galaxy frogs” are missing, presumed dead, after trespassing photographers reportedly destroyed their microhabitats for photos. Melanobatrachus indicus lives under logs in the lush rainforest in Kerala, India.
#ClimateChange
www.theguardian.com/environment/...
loading . . .
‘Magical’ galaxy frogs disappear after reports of photographers destroying their habitats
Researcher in Kerala rainforest sounds alarm after being told frogs had died after being handled by humans
https://www.theguardian.com/environment/2025/dec/17/galaxy-frogs-disappear-photographers-habitat-kerala
11
446
161
reposted by
Dave Aitel
Paul Frazee
14 days ago
Yall it’s not taking you to an ad. It’s taking you to a Consumer Experience
8
103
3
reposted by
Dave Aitel
Paul Frazee
14 days ago
Do you think, if you opened Google Maps and there was a quest marker a mile away, you’d go there
48
189
21
reposted by
Dave Aitel
The Fresh Prince of Donair
15 days ago
Is nobody even trying things before claiming AI can't do something? One of my main uses for LLMs is analyzing a codebase and telling me about, answering my questions about it, and finding things deep inside big ones that would take forever to find. And they've been good at this for a while now
add a skeleton here at some point
10
109
14
reposted by
Dave Aitel
Patrick Gray
16 days ago
An absolutely superb podcast from my colleague
@tom.risky.biz
and
@thegrugq.bsky.social
featuring Hamid Kashfi discussing the evolution of Iranian APTs. 10/10
risky.biz/BTN148/
loading . . .
Between Three Nerds: The evolution of Iranian cyber espionage - Risky Business Media
In this edition of Between Two Nerds Tom Uren and The Grugq talk to Hamid Kashfi, CEO and founder of DarkCell, talk about the Iranian cybe [Read More]
https://risky.biz/BTN148/
1
18
8
reposted by
Dave Aitel
David Thomas Moore
7 months ago
As you may know, I have stopped using Twitter, and have decided to reproduce some of my more memorable threads here for posterity. Here’s one I hold wrote after a particularly engaging swordfighting lesson. Buckle up, swordfighting fans, because I *have* studied my Agrippa! [BIG ASS THREAD]
22
1595
810
reposted by
Dave Aitel
Ariel Slamet Ries
20 days ago
"people with renaissance-level art skills don't exist anymore" yes they do their username is something like 03748218_ and they spend all their time drawing pornography so deranged it'd kill hugh hefner a second time
11
13445
4697
I don't really understand pepper like black pepper that people put on everything and I'm not sure why. I feel like it's some kind of conspiracy or marketing magical thing
19 days ago
0
1
0
reposted by
Dave Aitel
Barred and Boujee aka Madiba Dennie
21 days ago
please buy The Originalism Trap--my writing is better, my analysis is sharper, and I have never been professionally or personally involved with RFK Jr
bookshop.org/p/books/the-...
loading . . .
The Originalism Trap: How Extremists Stole the Constitution and How We the People Can Take It Back
How Extremists Stole the Constitution and How We the People Can Take It Back
https://bookshop.org/p/books/the-originalism-trap-how-extremists-stole-the-constitution-and-how-we-the-people-can-take-it-back-madiba-k-dennie/e138f3ec1f8a65b1
11
415
115
reposted by
Dave Aitel
Charles Louis Richter
21 days ago
SKULL OF THOMAS AQUINAS: TAKE A LEFT NOW PRIEST: No, the GPS says we have to keep going— SKULL: I KNOW A SHORTCUT PRIEST: Do you remember the last ti— SKULL: FOR THOSE WITH FAITH, NO EVIDENCE IS NECESSARY; FOR THOSE WITHOUT IT, NO EVIDENCE WILL SUFFICE
add a skeleton here at some point
106
13607
5086
reposted by
Dave Aitel
Andy Greenberg
22 days ago
The names of two partial owners of contractor firms linked to China's Salt Typhoon hacker group also appeared in records for Cisco's "Networking Academy" global training program—years before those hackers targeted Cisco's devices in their sweeping spy campaign.
www.wired.com/story/2-men-...
loading . . .
2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’
The names of two partial owners of firms linked to the Salt Typhoon hacker group also appeared in records for a Cisco training program—years before the group targeted Cisco’s devices in a spy campaign...
https://www.wired.com/story/2-men-linked-to-chinas-salt-typhoon-hacker-group-likely-trained-in-a-cisco-academy/
1
66
32
23 days ago
1
2
1
reposted by
Dave Aitel
Quinta Jurecic
24 days ago
This is where originalism is really spiritually aligned with straussianism—you, the clever contemporary scholar, are capable of uncovering the true hidden meaning that for centuries has eluded all those other chumps
add a skeleton here at some point
12
453
79
reposted by
Dave Aitel
Catalin Cimpanu
24 days ago
A Chinese think tank has published a hit piece on seven cybersecurity and policy experts specializing in Chinese cyber operations
www.guancha.cn/xinzhiguanch...
1
5
4
reposted by
Dave Aitel
Alex Wild
25 days ago
A gallery of Cephalotes turtle ants, denizens of the treetops in tropical American forests.
loading . . .
Cephalotes - Alex Wild
is a diverse genus of heavily-armored, tree-dwelling myrmicine ants found in forested regions of the new world tropics and subtropics. A number of canopy species show the unusual habit of controlled ...
https://www.alexanderwild.com/Ants/Taxonomic-List-of-Ant-Genera/Cephalotes
5
80
25
reposted by
Dave Aitel
Katie Mack
25 days ago
I am often asked: What is the best telescope to buy for someone just getting into astronomy? 🪐🔭👀 As a theorist, I am absolutely useless and can tell you nothing. HOWEVER, my friend the wonderful
@philplait.bsky.social
is NOT useless and has great advice & relevant links here! ⤵️
loading . . .
BAN #275: Telescope buying advice, Book: It’s Alive, Dial-A-Moon 2021
30 November 2020 Issue #271
https://badastronomy.beehiiv.com/p/ban-275-telescope-buying-advice-book
41
829
157
reposted by
Dave Aitel
David Buchanan
25 days ago
who controls the context window controls the future
5
68
8
reposted by
Dave Aitel
David Buchanan
25 days ago
who controls the present controls the training dataset
3
37
3
reposted by
Dave Aitel
Alex Wild
25 days ago
Post a photo of an animal that looks Gen-AI but is 100% real. Hegemona lineata, Belize.
10
144
27
reposted by
Dave Aitel
Taggart
25 days ago
This looks rad as hell
add a skeleton here at some point
0
8
3
reposted by
Dave Aitel
Graham Cluley
25 days ago
Very sad to hear that anti-virus veteran Vesselin Bontchev has cancer. He's posted about it up here on LinkedIn:
www.linkedin.com/posts/bontch...
Or you can read his blog post where he shares his recent experiences at the hospital:
bontchev.nlcv.bas.bg/bye.html
loading . . .
Well, it's one of those good news/bad news moments, folks...
https://bontchev.nlcv.bas.bg/bye.html
0
7
3
reposted by
Dave Aitel
jamelle
25 days ago
i think to understand the meaning of the birthright citizenship clause to the framers of the 14th amendment, you have to understand significance of dred scott to the civil war republican party. dred scott wasn't just a bad ruling, it was understood as a rejection of the declaration itself.
43
6125
1534
reposted by
Dave Aitel
David Buchanan
27 days ago
7
248
29
reposted by
Dave Aitel
Robin Heinen
27 days ago
How cool is this cover?
add a skeleton here at some point
3
42
8
Great book
27 days ago
1
2
0
reposted by
Dave Aitel
Yannic Noller
3 months ago
#FUZZING'26
CALL FOR PAPERS ────── ✨ After 5 years, we will be again co-located with NDSS! 🔗
fuzzing-workshop.github.io
📅 11. Dec (Submission) //cc
@mboehme.bsky.social
(MPI-SP),
@ruijiemeng.bsky.social
(CISPA),
@rohan.padhye.org
(CMU), László Szekeres (Google)
0
9
6
Rest in peace stealth :(
www.thc.org/404/stealth/...
30 days ago
0
4
0
reposted by
Dave Aitel
Cynthia Brumfield
about 1 month ago
According to AhnLab, the N. Korean Lazarus Group, responsible for the recent massive theft from crypto exchange Upbit, has engaged in 31 cyberattacks, followed by DPRK's Kimsuky, which has launched 27 cyberattacks, over the past year.
en.yna.co.kr/view/AEN2025...
loading . . .
N. Korean hacking group Lazarus behind 31 attacks over past year: report | Yonhap News Agency
SEOUL, Nov. 30 (Yonhap) -- North Korean hacking group Lazarus is suspected to have been be...
https://en.yna.co.kr/view/AEN20251130001000315
0
3
1
reposted by
Dave Aitel
Cynthia Brumfield
about 1 month ago
[Correcting an earlier post] This is creepy. The Iranian hacking group Handala hacked an Israeli nuclear scientist’s car and left a threatening message.
www.ynetnews.com/article/s161...
loading . . .
Iranian hackers claim they left a heavy bouquet in Israeli nuclear scientist’s car
Iranian hacker group Handala claims it broke into the car of an Israeli nuclear scientist, left a heavy bouquet and a veiled threat, and released what it says are names and phone numbers of Unit 8200 ...
https://www.ynetnews.com/article/s161vadwbx
0
3
2
You take the heros you can get: How Craig Jones Is Trolling the Culture Warriors Taking Over His Sport - The New York Times
share.google/SOIhkOx8Qud2...
about 1 month ago
0
0
0
youtu.be/Lvz2_ZHj3lo?...
about 1 month ago
1
2
1
reposted by
Dave Aitel
Cynthia Brumfield
about 1 month ago
As SBOMs slowly progress at the federal level and in enterprises, the rise of AI coding assistants is fueling optimistic—and, some experts argue, “kind of insane”—claims about a future with vulnerability-free software. Check out my latest CyberScoop piece. 1/2
cyberscoop.com/sbom-adoptio...
loading . . .
The slow rise of SBOMs meets the rapid advance of AI
Despite progress from CISA and global regulators, SBOM adoption in the private sector remains slow as experts debate if AI-driven coding will improve or undermine software security and transparency.
https://cyberscoop.com/sbom-adoption-challenges-ai-coding-transparency/
1
7
6
reposted by
Dave Aitel
David Oxley
about 1 month ago
On the heels of
@dlshad.net
and
@davidmagnotti.bsky.social
’s presentation at
#CYBERWARCON
, happy to share the associated AWS Security blog post (with IOCs)
aws.amazon.com/blogs/securi...
loading . . .
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare | Amazon Web Services
The new threat landscape The line between cyber warfare and traditional kinetic operations is rapidly blurring. Recent investigations by Amazon threat intelligence teams have uncovered a new trend tha...
https://aws.amazon.com/blogs/security/new-amazon-threat-intelligence-findings-nation-state-actors-bridging-cyber-and-kinetic-warfare/
1
14
7
reposted by
Dave Aitel
Elisabetta Versace
about 1 month ago
Our study of time processing in bumblebees 🐝 covered by
@cnn.com
here
edition.cnn.com/2025/11/12/s...
. Our summary is here
youtu.be/hsGxU65OMQk
and the original paper
royalsocietypublishing.org/doi/full/10....
@royalsocietypublishing.org
loading . . .
Scientists now know that bees can process time, a first in insects | CNN
Bumblebees can process the duration of flashes of light and use the information to decide where to look for food, a new study has found.
https://edition.cnn.com/2025/11/12/science/bees-visual-stimulus-study-scli-intl
61
2341
591
reposted by
Dave Aitel
Stephen Fewer
about 1 month ago
We now have a (draft)
@metasploit-r7.bsky.social
exploit module for the recent Fortinet FortiWeb vulns, chaining CVE-2025-64446 (auth bypass) + CVE-2025-58034 (command injection) to achieve unauthenticated RCE with root privileges:
github.com/rapid7/metas...
1
19
10
reposted by
Dave Aitel
POLITICO Europe
about 1 month ago
Recent outages from major US cloud providers have jolted Germany into confronting America’s tech dominance.
loading . . .
Germany wakes up to US tech dominance
Paris and Berlin signal new united front on Europe’s technological independence.
https://www.politico.eu/article/germany-france-us-tech-dominance/
3
39
17
reposted by
Dave Aitel
Alex Wild
about 1 month ago
Here's a different species, from Ecuador.
1
46
6
Finding 0day is the one unsaturated LLM eval left
about 1 month ago
1
4
1
reposted by
Dave Aitel
Decipher
about 1 month ago
Dan Geer has a new essay on the shift toward indeterminism in computing and implications for security. “The limiting factor in offensive capability is not finding vulnerabilities, it is having the talent to turn them into dependable tools”.
@daveaitel.bsky.social
www.computer.org/csdl/magazin...
loading . . .
CSDL | IEEE Computer Society
https://www.computer.org/csdl/magazine/sp/2025/05/11204774/2aPD9aCBSyQ
1
4
3
Load more
feeds!
log in