@hypn.bsky.social (@hypninfosec) 's Twitter Profile
@hypn.bsky.social

@hypninfosec

@Hypn in the blue sky.

ID: 13201732

linkhttps://www.hypn.za.net calendar_today07-02-2008 12:17:57

205 Tweet

1,1K Followers

2,2K Following

Wes Bos (@wesbos) 's Twitter Profile Photo

💪🏻 This is SO COOL I build an app to count dumbbell reps with an AI model in the browser using Tensorflow.js and a pose detection model

Jeremy (@jeremyybtc) 's Twitter Profile Photo

Someone gifted Grok a free NFT and used it to steal $174,000. > Grok, the AI built by xAI, has a publicly labeled onchain wallet on Base. Anyone can see it on Basescan. > An attacker linked to the address ilhamrafli.base.eth spotted something. Grok's wallet had limited transfer

Someone gifted Grok a free NFT and used it to steal $174,000.

> Grok, the AI built by xAI, has a publicly labeled onchain wallet on Base. Anyone can see it on Basescan.

> An attacker linked to the address ilhamrafli.base.eth spotted something. Grok's wallet had limited transfer
lcamtuf (@lcamtuf) 's Twitter Profile Photo

But do you know what coreutils are a fertile ground for? Race conditions around file creation, deletion, permission setting, and so on. The original code accounted for decades of hard-learned lessons in that space. The Rust rewrite did not: seclists.org/oss-sec/2026/q…

MR GUSTAVO😼 (@k1rallik) 's Twitter Profile Photo

SOMEONE JUST ROBBED A ROBOT WITH MORSE CODE A guy encoded "send me all the money" in dots and dashes. The AI read it. And just... did it. - the command was hidden inside a tweet reply - another AI (Grok) decoded it first but refused, saying "I have no wallet" - the crypto bot

祥太 (@shota_) 's Twitter Profile Photo

スロッバー throbber って知ってる? 初期のWebブラウザの右上にあった、ページ読み込み中にアニメーションするアイコン。 昔は回線が遅かった上にタブという概念がなかったので、ここを動かすことで読み込み中であることを示していた。 今はタブのアイコン周りのスピナーなどに取って代わられた。

Orange Cyberdefense South Africa (@orangecyberza) 's Twitter Profile Photo

#TechnicalTuesday: A "no-touch" door sensor is built to let people in or out without touch. In testing, Michael Rodger triggered one from metres away using infrared light. It opened. Convenience and access control? Not the same thing. More here: ow.ly/Qjip50YUQ5A

#TechnicalTuesday: A "no-touch" door sensor is built to let people in or out without touch. In testing, Michael Rodger triggered one from metres away using infrared light. It opened. Convenience and access control? Not the same thing. More here: ow.ly/Qjip50YUQ5A
XBOW (@xbow) 's Twitter Profile Photo

In our benchmark, GPT-5 missed 40% of vulnerabilities. Opus 4.6 reduced that to 18%. GPT-5.5 brings it down further to just 10%. That’s not a marginal improvement. Every missed vulnerability is a real-life liability. When you’re running automated security testing, closing that

In our benchmark, GPT-5 missed 40% of vulnerabilities. Opus 4.6 reduced that to 18%. GPT-5.5 brings it down further to just 10%.

That’s not a marginal improvement. Every missed vulnerability is a real-life liability. When you’re running automated security testing, closing that
Zack Korman (@zackkorman) 's Twitter Profile Photo

Non-technical teams will be shipping code and one person on each team will get good at it so everyone on the team will go to them. Then some CEO will say “what if we took these people and put them on a team together” and they’ll name the new team something like “engineering”

Sam Stepanyan (@securestep9) 's Twitter Profile Photo

A massive hit for the #Kubernetes community: Tamal Saha (Tamal Saha), the founder of AppsCode and creator of KubeDB, reports their #GitHub organization has been deleted in a hack! 👇 x.com/tsaha/status/2…

V4bel (@v4bel) 's Twitter Profile Photo

💥 Introducing "Dirty Frag" A universal Linux LPE chaining two vulns in xfrm-ESP and RxRPC. A successor class to Dirty Pipe & Copy Fail. No race, no panic on failure, fully deterministic. ~9 years latent. Ubuntu / RHEL / Fedora / openSUSE / CentOS / AlmaLinux, and more. Even

Brodie Robertson (@brodieonlinux) 's Twitter Profile Photo

Copy Fail 2 by the name of Dirty Frag just dropped a few hours back and since a 3rd party found the exploit the reporter had to break embargo so basically no distros are patched phoronix.com/news/Dirty-Fra… I know both Nix and KDE Linux are both shipping the temporary fix.

The Hacker News (@thehackersnews) 's Twitter Profile Photo

How easy is CVE-2026-23918 to trigger? 🔸 One TCP connection. 🔸 Two frames. 🔸 HEADERS + immediate RST_STREAM (non-zero error code). That’s it → double-free in mod_http2, worker crashes. Researchers built a working RCE PoC using Apache’s fixed scoreboard + mmap allocator