Jean-Luc Leleu (@jlleleu) 's Twitter Profile
Jean-Luc Leleu

@jlleleu

Co-Founder @0xInterstellar | 18 patents issued in the field of cybersecurity, blockchain and mobile device security

ID: 8926922

linkhttps://www.linkedin.com/in/jlleleu/ calendar_today17-09-2007 09:16:38

1,1K Tweet

998 Followers

977 Following

Digital Watch Observatory (@digwatchworld) 's Twitter Profile Photo

Lazarus Group uses fake firms to spread malware to the crypto industry The FBI has seized the Blocknovas website, which was part of a campaign to spread malware to crypto developers, linked to North Korean hackers. dig.watch/updates/lazaru… #dwobservatory #dwnews #digwatch

Jorge Bravo (@bravo_abad) 's Twitter Profile Photo

In-memory attention: Accelerating LLMs with analog hardware Large language models (like GPT) generate text one word at a time. To decide the next word, they compare the new input with many past words stored in a short-term “cache.” On today’s GPUs, that cache has to be

In-memory attention: Accelerating LLMs with analog hardware

Large language models (like GPT) generate text one word at a time. To decide the next word, they compare the new input with many past words stored in a short-term “cache.” On today’s GPUs, that cache has to be
Jean-Luc Leleu (@jlleleu) 's Twitter Profile Photo

Crypto’s biggest risk isn’t exploits—it’s phishing & malware. Old defenses (AV, EDR, MTD, and on-chain analysis) don’t stand a chance. A new security paradigm is needed.

Vladimir S. | Officer's Notes (@officer_cia) 's Twitter Profile Photo

Samsung device users urged to update software due to critical security flaw! Vulnerability – CVE-2025-21043 – could be exploited by an attacker to remotely gain access to devices and install malicious code without the users knowing it. If left unfixed, cyber criminals could

Jean-Luc Leleu (@jlleleu) 's Twitter Profile Photo

Passkey wallets claim superior security, but recent exploits show they’re not immune. What’s really needed are wallet designs compliant with passkey standards by design resilient to these attacks — not just bolted-on patches

Jean-Luc Leleu (@jlleleu) 's Twitter Profile Photo

Authentication fits Keith Rabois’s formula: fragmented, low NPS, and billions lost to AI-driven fraud. What’s overdue is vertical integration — and a new era of frictionless strong authentication

Jean-Luc Leleu (@jlleleu) 's Twitter Profile Photo

The paradox of strong authentication: the more secure it is, the more friction it adds. Breaking that tradeoff defines the next standard of trust.

Vladimir S. | Officer's Notes (@officer_cia) 's Twitter Profile Photo

WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File! The exploit, demonstrated in a proof-of-concept (PoC) shared by the DarkNavyOrg researchers, is initiated by sending a specially crafted malicious (DNG) image file to a victim’s WhatsApp account. As a

WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File!

The exploit, demonstrated in a proof-of-concept (PoC) shared by the DarkNavyOrg researchers, is initiated by sending a specially crafted malicious (DNG) image file to a victim’s WhatsApp account.

As a
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 A new Android banking trojan is here: Datzbro. It doesn’t just steal logins—it recreates your screen in real time for full device takeover. Victims? Seniors lured via fake “active trip” groups on Facebook. Details → thehackernews.com/2025/09/new-an…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

LinkedIn post by Gadi Evron about an ongoing attack campaign targeting AI coding agents such as Cursor and Windsurf, through extensions in the Open VSX marketplace linkedin.com/posts/gadievro…

LinkedIn post by <a href="/gadievron/">Gadi Evron</a> about an ongoing attack campaign targeting AI coding agents such as Cursor and Windsurf, through extensions in the Open VSX marketplace

linkedin.com/posts/gadievro…
Jean-Luc Leleu (@jlleleu) 's Twitter Profile Photo

The next step in security isn’t proving identity — it’s cryptographically proving human intent at the moment of action.

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 CISA Warns of Android 0-Day Vulnerability Exploited in Attacks Source: cybersecuritynews.com/android-0-day-… CISA has added two critical Android Framework vulnerabilities to its Known Exploited Vulnerabilities catalog, signaling active exploitation in the wild. The vulnerabilities

🚨 CISA Warns of Android 0-Day Vulnerability Exploited in Attacks 

Source:  cybersecuritynews.com/android-0-day-…

CISA has added two critical Android Framework vulnerabilities to its Known Exploited Vulnerabilities catalog, signaling active exploitation in the wild.

The vulnerabilities
The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚠️ ALERT — A critical RCE flaw (CVSS 9.9) was found in the n8n workflow automation platform. CVE-2025-68613 lets authenticated users execute arbitrary code, enabling full instance takeover, data access, and system-level actions. More than 103k exposed instances are observed

⚠️ ALERT — A critical RCE flaw (CVSS 9.9) was found in the n8n workflow automation platform.

CVE-2025-68613 lets authenticated users execute arbitrary code, enabling full instance takeover, data access, and system-level actions.

More than 103k exposed instances are observed
Spiros Margaris (@spirosmargaris) 's Twitter Profile Photo

A provocative claim is circulating in the agent world. A new paper argues that AI agents face a fundamental mathematical barrier that makes reliable performance impossible at scale. Unsurprisingly, much of the industry disagrees, pointing to rapid practical progress and “good