Eric Brandel (@affablekraut) 's Twitter Profile
Eric Brandel

@affablekraut

The only way out is through | Stringer, Central Intelligence Corporation |
@affablekraut.bsky.social

ID: 2966237169

calendar_today07-01-2015 16:41:19

3,3K Tweet

913 Followers

625 Following

urlscan.io (@urlscanio) 's Twitter Profile Photo

We recently announced the GA launch of our urlscan Observe feature. With urlscan Observe you can set up hunting rules for new domains and websites, trigger notifications and additional monitoring. Observe now allows you to control the monitoring process: urlscan.io/blog/2025/02/1…

We recently announced the GA launch of our urlscan Observe feature. With urlscan Observe you can set up hunting rules for new domains and websites, trigger notifications and additional monitoring. Observe now allows you to control the monitoring process: urlscan.io/blog/2025/02/1…
Eric Brandel (@affablekraut) 's Twitter Profile Photo

LLM "safety" seems to be the most misguided pursuit. Refusing to deobfuscate code that might be malicious isn't "safety". Tired of these companies gimping their products.

Eric Brandel (@affablekraut) 's Twitter Profile Photo

God I love encountering this stuff when I'm trying to build tools to prevent abuse and malicious activity. Once again, AI safety is amongst the stupidest of pursuits and only hampers defenders.

God I love encountering this stuff when I'm trying to build tools to prevent abuse and malicious activity.

Once again, AI safety is amongst the stupidest of pursuits and only hampers defenders.
Eric Brandel (@affablekraut) 's Twitter Profile Photo

Just an absolute mess. Probably why this extension was pulled. At _best_ it was someone who thought roll-your-own encryption was a valid development path. Nothing like shipping private keys in your javascript. Extension id: mboheboacomfkpknfbiknphlkbapided

Just an absolute mess. Probably why this extension was pulled. At _best_ it was someone who thought roll-your-own encryption was a valid development path. Nothing like shipping private keys in your javascript. Extension id: mboheboacomfkpknfbiknphlkbapided
urlscan.io (@urlscanio) 's Twitter Profile Photo

The urlscan Threat Research Team identified the first large-scale consumer phishing campaigns powered by WebAssembly (WASM) targeting US gov & financial brands with stronger obfuscation and evasion. urlscan Pro has the full report and what this means for the phishing ecosystem.

The urlscan Threat Research Team identified the first large-scale consumer phishing campaigns powered by WebAssembly (WASM) targeting US gov & financial brands with stronger obfuscation and evasion. urlscan Pro has the full report and what this means for the phishing ecosystem.
MG (@_mg_) 's Twitter Profile Photo

I’m a bit concerned about the non-inquisitive celebration from infosec on this. Where is the “what does keystroke latency even mean?” Without that, you can’t implement it for yourself, nor can you identify weaknesses. ~3yrs I was privately proposing similar options. So, AS

I’m a bit concerned about the non-inquisitive celebration from infosec on this.

Where is the “what does keystroke latency even mean?” Without that, you can’t implement it for yourself, nor can you identify weaknesses.

~3yrs I was privately proposing similar options. So, AS
Eric Brandel (@affablekraut) 's Twitter Profile Photo

100k users. Tracks every URL you visit. Exfil via hxxps://service[.]voicewave[.]xyz/get_styles_for_web_tts Using a persistent uid on each "styles" request. Via a delayed API call by the extension. Totally legit. Definitely necessary. chromewebstore.google.com/detail/voice-m…

100k users. Tracks every URL you visit. Exfil via hxxps://service[.]voicewave[.]xyz/get_styles_for_web_tts

Using a persistent uid on each "styles" request. Via a delayed API call by the extension. Totally legit. Definitely necessary. 

chromewebstore.google.com/detail/voice-m…