Roger Sels (@selsroger) 's Twitter Profile
Roger Sels

@selsroger

Founder & Chief Vision Officer, VentureX. Wide interest spectrum. Dad, athlete (racer).

ID: 1276847922

linkhttps://www.linkedin.com/in/rogersels calendar_today18-03-2013 05:28:18

14,14K Tweet

1,1K Followers

1,1K Following

John Rush (@johnrushx) 's Twitter Profile Photo

Chinese AI startups: 1/6th of US funding, bad press, sanctions, brain drain, communism, little English proficiency, and no talent influx.. But after using Manus AI, Deepseek, Trae, Kling, Vidu, & Ying, I think the US is in trouble. At this pace, China will dominate AI. Demos:

Dhanesh Kizhakkinan (@dhanesh_k) 's Twitter Profile Photo

Accidentally found a WinDbg Time Travel Debugger instruction emulation bug. Wrote a rudimentary fuzzer, found more bugs. One of the bug ended up as a instruction discrepancy between INTEL and AMD CPUs. cloud.google.com/blog/topics/th…

Santiago (@svpino) 's Twitter Profile Photo

I’m starting a new business. After you fire your developers and start vibe coding everything, we’ll come in and fix all the bugs and security issues with your AI-generated code. We’ll take what you have and make it work. The service will start at $1,000/hour.

YungBinary (@yungbinary) 's Twitter Profile Photo

We have entered into a new era that renders MFA useless thanks to phishing kits like #Sneaky2FA which are designed to bypass MFA and provide threat actors with access to victim Office 365 accounts via session cookies. Check out the blog post here for more information and

We have entered into a new era that renders MFA useless thanks to phishing kits like #Sneaky2FA which are designed to bypass MFA and provide threat actors with access to victim Office 365 accounts via session cookies.

Check out the blog post here for more information and
John Scott-Railton (@jsrailton) 's Twitter Profile Photo

🚨NEW REPORT: first forensic confirmation of #Paragon mercenary spyware infections in #Italy... Known targets: Activists & journalists. We also found deployments around the world. Including ...Canada? And a lot more... Thread on our The Citizen Lab investigation 1/

🚨NEW REPORT: first forensic confirmation of #Paragon mercenary spyware infections in #Italy...

Known targets: Activists & journalists.

We also found deployments around the world. Including ...Canada?

And a lot more... Thread on our <a href="/citizenlab/">The Citizen Lab</a> investigation 1/
Lorenzo Franceschi-Bicchierai (@lorenzofb) 's Twitter Profile Photo

NEW: North Korea is reportedly launching a new cybersecurity research unit called Research Center 227, which will be housed within the intelligence agency Reconnaissance General Bureau (RGB), and will focus on AI-based hacking and stealing digital assets. techcrunch.com/2025/03/20/nor…

Ole Lehmann (@itsolelehmann) 's Twitter Profile Photo

They told Europe "you can't compete with SpaceX." But a new Munich startup just raised €350M to prove everyone wrong. Now their Spectrum rocket is set to make history as Europe's FIRST commercial orbital launch. How Isar Aerospace is rewriting Europe's space future 🧵:

They told Europe "you can't compete with SpaceX."

But a new Munich startup just raised €350M to prove everyone wrong.

Now their Spectrum rocket is set to make history as Europe's FIRST commercial orbital launch.

How Isar Aerospace is rewriting Europe's space future 🧵:
thaddeus e. grugq (@thegrugq) 's Twitter Profile Photo

This is a guide on how to communicate securely, practicing good OPSEC and COMSEC. It is written for PGP but the same core principles apply for Signal. Or any communication that needs to be secure. gist.github.com/grugq/03167bed…

chiefpie (@cplearns2h4ck) 's Twitter Profile Photo

Claude 3.7 + IDA MCP automatically reverse engineers Windows driver ctf I wrote without symbols(p1, p2). Proceeds to create structures and recreates source code(p3) with extreme accuracy compared to original source(p4). ~3mins fully automated

Claude 3.7 + IDA MCP automatically reverse engineers Windows driver ctf I wrote without symbols(p1, p2).

Proceeds to create structures and recreates source code(p3) with extreme accuracy compared to original source(p4).

~3mins fully automated
dunadan (@udunadan) 's Twitter Profile Photo

I once made quite a mind shift in vulnerability research process when I understood you should be on a lookout for good exploit primitives first & foremost, but it's such a picky & selective strategy that I haven't managed to integrate it into my work process & it is what it is.

dunadan (@udunadan) 's Twitter Profile Photo

To clarify, the point of such approach is that sometimes you may spend so much time looking for an issue only to learn there are no primitives there whatsoever and everything you can do with it is completely pointless. So you'd be more optimal by evaluating potential primitives.

Jack Rhysider 🏴‍☠️ (@jackrhysider) 's Twitter Profile Photo

I'm in a Telegram channel where someone discovered the password to NASA's mars rover is "Mars2020!" It's been doing donuts for the last hour...

I'm in a Telegram channel where someone discovered the password to NASA's mars rover is "Mars2020!" It's been doing donuts for the last hour...
Brendan Jowett (@jowettbrendan) 's Twitter Profile Photo

🚨 BREAKING: Google just launched a new internet protocol. It’s A2A. Backed by 50+ partners including Salesforce, Atlassian, and SAP. It’s designed to let AI agents collaborate across companies, platforms, and clouds. Here’s what it means for the future of enterprise AI: 🧵

🚨 BREAKING: Google just launched a new internet protocol.

It’s A2A.

Backed by 50+ partners including Salesforce, Atlassian, and SAP.

It’s designed to let AI agents collaborate across companies, platforms, and clouds.

Here’s what it means for the future of enterprise AI: 🧵
nick.eth (@nicksdjohnson) 's Twitter Profile Photo

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:

Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google's infrastructure, and given their refusal to fix it, we're likely to see it a lot more. Here's the email I got:
Interrupt Labs (@interruptlabs) 's Twitter Profile Photo

📣 Exciting news for aspiring vulnerability researchers - a selection of our internal VR Development Program training resources are now available on GitHub! Check them out at github.com/interruptlabs/… These ones are on software development: programming in C and Python.