Andrey Kovalev (@avkovaleff) 's Twitter Profile
Andrey Kovalev

@avkovaleff

Security engineer at @Google. Tweets are my own.

ID: 33682082

linkhttps://avkov.io/ calendar_today20-04-2009 22:01:33

1,1K Tweet

424 Takipçi

254 Takip Edilen

Tim Willis (@itswillis) 's Twitter Profile Photo

It doesn't happen very often, but Project Zero is hiring! goo.gle/41DBQBY Please share with anyone you think would be awesome for the role 🎉 Looking for at least one person. DMs open if you want to reach out about the role. The team: youtu.be/My_13FXODdU

Binni Shah (@binitamshah) 's Twitter Profile Photo

Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282) : labs.watchtowr.com/exploitation-w…

Andrey Kovalev (@avkovaleff) 's Twitter Profile Photo

Today Google announced a new OSV-SCALIBR: A library for Software composition analysis. It allows to extract software dependencies, generate SBOM’s and scan them via osv.dev! More details in our blogpost: security.googleblog.com/2025/01/osv-sc…

Royal Hansen (@royalhansen) 's Twitter Profile Photo

"If you've ever wondered “how expensive should this LLM be to train” or “how much memory do I need to serve this model myself” or “what's an AllGather”, we hope this will be useful to you." jax-ml.github.io/scaling-book/

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Exploiting the TP-Link TL-WR940N router with CVE-2024–54887 (stack buffer overflow) infosecwriteups.com/reversing-disc… #embedded #infosec

Exploiting the TP-Link TL-WR940N router with CVE-2024–54887 (stack buffer overflow)

infosecwriteups.com/reversing-disc…

#embedded #infosec
Tavis Ormandy (@taviso) 's Twitter Profile Photo

You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…

Phil Venables (@philvenables) 's Twitter Profile Photo

New Google DeepMind research: novel framework to evaluate AI cyberattack capabilities across the entire attack chain. Grounded in 12K real-world instances. arxiv.org/pdf/2503.11917

New Google DeepMind research: novel framework to evaluate AI cyberattack capabilities across the entire attack chain. Grounded in 12K real-world instances.

arxiv.org/pdf/2503.11917
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

In 2024, attackers exploited 75 zero-days across end-user platforms and enterprise tech. Google’s latest report unpacks what this trend says about evolving threat priorities. Full analysis here: bit.ly/4cTQzMI

In 2024, attackers exploited 75 zero-days across end-user platforms and enterprise tech. Google’s latest report unpacks what this trend says about evolving threat priorities.

Full analysis here: bit.ly/4cTQzMI
Deedy (@deedydas) 's Twitter Profile Photo

It’s happening. AI models are finding zero-day vulnerabilities. This blog post is a must-read and marks a new era for cybersecurity.

It’s happening. 

AI models are finding zero-day vulnerabilities. 

This blog post is a must-read and marks a new era for cybersecurity.
GreyNoise (@greynoiseio) 's Twitter Profile Photo

GreyNoise Discovers Stealthy Backdoor Campaign Targeting ASUS Routers. Attacker tradecraft reflects APT-like behavior: quiet, durable, and designed for long-term access. Full blog: greynoise.io/blog/stealthy-… #Cybersecurity #ThreatIntel #GreyNoise #ASUS

neils (@midwestneil) 's Twitter Profile Photo

Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12 years to get this published. This vulnerability is still not patched. Here's the story:

Operation Zero (@opzero_en) 's Twitter Profile Photo

101 Chrome Exploitation — Part 0: Preface We are starting a new series on modern browsers' architecture and their exploitation using Chrome as an example. Readers will learn how browser subsystems are implemented, how their security is ensured and how it is violated with

Royal Hansen (@royalhansen) 's Twitter Profile Photo

"Developed by Google DeepMind & Google P0, Big Sleep can help security researchers find 0-day sw security vulnerabilities. Since it was introduced last year, it has continued to discover multiple flaws in widely-used software, exceeding our expectations" cloud.google.com/blog/products/…

Google Open Source (@googleoss) 's Twitter Profile Photo

Protect your systems from leaked credentials! 🚨 We're excited to announce Veles, a new open-source secret and credential scanner from Google. Veles helps you find and fix sensitive data exposures in your source code and artifacts, with more features on the way! Learn how Veles

Jeff Dean (@jeffdean) 's Twitter Profile Photo

See mathematician Michel van Garrel talking about how our latest Gemini Deep Think model was able to prove a conjecture using a very different approach than he was considering.

Heather Adkins - Ꜻ - Spes consilium non est (@argvee) 's Twitter Profile Photo

Today as part of our commitment to transparency in this space, we are proud to announce that we have reported the first 20 vulnerabilities discovered using our AI-based "Big Sleep" system powered by Gemini — goo.gle/bigsleep

Thinking Machines (@thinkymachines) 's Twitter Profile Photo

Efficient training of neural networks is difficult. Our second Connectionism post introduces Modular Manifolds, a theoretical step toward more stable and performant training by co-designing neural net optimizers with manifold constraints on weight matrices.

Efficient training of neural networks is difficult. Our second Connectionism post introduces Modular Manifolds, a theoretical step toward more stable and performant training by co-designing neural net optimizers with manifold constraints on weight matrices.
Thinking Machines (@thinkymachines) 's Twitter Profile Photo

LoRA makes fine-tuning more accessible, but it's unclear how it compares to full fine-tuning. We find that the performance often matches closely---more often than you might expect. In our latest Connectionism post, we share our experimental results and recommendations for LoRA.

LoRA makes fine-tuning more accessible, but it's unclear how it compares to full fine-tuning. We find that the performance often matches closely---more often than you might expect. In our latest Connectionism post, we share our experimental results and recommendations for LoRA.