Richard Johnson (@richinseattle) 's Twitter Profile
Richard Johnson

@richinseattle

Computer Security, Reverse Engineering, and Fuzzing; Training & Publications @ fuzzing.io; hacking the planet since 1995; Undercurrents BOFH

ID: 80687353

linkhttps://fuzzing.io calendar_today07-10-2009 21:39:34

11,11K Tweet

17,17K Takipçi

3,3K Takip Edilen

Barack Obama (@barackobama) 's Twitter Profile Photo

After years of complaining about cancel culture, the current administration has taken it to a new and dangerous level by routinely threatening regulatory action against media companies unless they muzzle or fire reporters and commentators it doesn’t like. yahoo.com/news/articles/…

Richard Johnson (@richinseattle) 's Twitter Profile Photo

Phreaking, and social engineering as a sub-discipline of phreaking, has always been the base layer of information security bypass.

Ken Sykes (@kensyatms) 's Twitter Profile Photo

Have you ever wanted to open a TTD trace and analyze it for yourself, at the speed of .Calls()/.Memory() in WinDbg? Your wish has been granted! We have released an experimental version of our Replay API for you to use. See aka.ms/ttdsdk for documentation and samples.

Filip Jerzy Pizło (@filpizlo) 's Twitter Profile Photo

My friends! If you know the guts of Linux distros and are looking for a good time, you should: - check out this horrid hack, called Pizlix, that makes the Linux userland memory safe: github.com/pizlonator/fil… - look at the LC phase in particular, and how it slots in before

Adam Marblestone (@adammarblestone) 's Twitter Profile Photo

AI bro's, if you want true long-term alpha, especially on safety alignmentforum.org/posts/ybmDkJAj… you should be getting (at least) the songbird and mouse connectomes -- imagine being able to revisit this podcast but with Sutton and Dwarkesh pointing to specific brain circuits. Not only

Lukas Seidel (@pr0me) 's Twitter Profile Photo

I absolutely love this paper, so much reverse engineering alpha the researchers who won the rpi hacking challenge came together to describe in detail how they overcame the defenses of a secure-by-design chip, incl. custom laser fault injection and single instruction skips

I absolutely love this paper, so much reverse engineering alpha

the researchers who won the rpi hacking challenge came together to describe in detail how they overcame the defenses of a secure-by-design chip, incl. custom laser fault injection and single instruction skips
Thinking Machines (@thinkymachines) 's Twitter Profile Photo

LoRA makes fine-tuning more accessible, but it's unclear how it compares to full fine-tuning. We find that the performance often matches closely---more often than you might expect. In our latest Connectionism post, we share our experimental results and recommendations for LoRA.

LoRA makes fine-tuning more accessible, but it's unclear how it compares to full fine-tuning. We find that the performance often matches closely---more often than you might expect. In our latest Connectionism post, we share our experimental results and recommendations for LoRA.
Richard Johnson (@richinseattle) 's Twitter Profile Photo

Finally! IDA Python support coming to the Free editions! Huge in the era of getting LLMs to analyze binaries and perform initial RE tasks.

Richard Johnson (@richinseattle) 's Twitter Profile Photo

SHOTS FIRED! There's already murmurs among researchers about low values for full exploit bounties (undervalued container escapes, etc), but indeed some of the contest rules were lifted verbatim from Pwn2Own materials.

Richard Johnson (@richinseattle) 's Twitter Profile Photo

What embeddings model are you using for vector storage? It’s a commitment and there are continual improvements. I like qwen3-embedding-0.6B supporting 32k ctxlen/1k dim, but this new Gemma 300M embeddings model is competive at half the size, for 2k ctx/786dim + supports QAT quant

Wiz (@wiz_io) 's Twitter Profile Photo

💥 Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible. The vulnerability lets

💥 Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years

We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible.

The vulnerability lets
Richard Johnson (@richinseattle) 's Twitter Profile Photo

Finally got to see what Hexacon is all about. Good vibes! The previous content online has been great and this year I got to deliver my new AI Agents for Cybersecurity training class (Metaframe.ai). Super fun and interactive group. Today I did a lightning talk.

Finally got to see what <a href="/hexacon_fr/">Hexacon</a> is all about. Good vibes! The previous content online has been great and this year I got to deliver my new AI Agents for Cybersecurity training class (Metaframe.ai). Super fun and interactive group. Today I did a lightning talk.