News
Hacker's AI: The Messy Reality of Weaponized AI
The same large language models that help us write detection rules are now being used by attackers. A junior red‑teamer with zero P...
Model Poisoning Turns Helpful AI Into a Trojan Horse
Model poisoning is the malicious manipulation of a machine learning model's training data or parameters to embed hidden, "backdoor...
Hackers May Not Need Better Skills Anymore—Just Better AI Prompts
Better prompts = bigger threats. How AI is quietly reshaping cybercrime by empowering the average attacker, not just the elite one...
CertiK Exposes the Security Gap No One in OpenClaw's Marketplace Wants to Talk A...
CertiK researchers prove OpenClaw's ClawHub marketplace can be bypassed via plausible but exploitable Skills, achieving arbitrary...
Reverse-Engineering Zomato Food Rescue: MQTT, Server-Driven UI, and a Headless M...
How I intercepted Zomato's Android traffic, found MQTT credentials in plain JSON, and built a real-time monitor to win Food Rescue...
The PS5 Controller Hack That Exposed Seven Thousand Living Rooms
A simple project to use a PS5 controller on a robot vacuum accidentally exposed 7,000 homes.
Ransomware Doesn't Need to Lock Your Files Anymore — Here's Why That's Terrifyin...
Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." About 50% of attac...
The Zero-Day Deduction
While testing a tax software API for a bug bounty, I discovered a critical Insecure Direct Object Reference (IDOR). By changing a...
Catch Secrets in Real Time on GitHub with EnvScanner 2.0 and AI
EnvScanner 2.0 is a lightweight tool for monitoring GitHub secrets. It uses Google Gemini API to validate secrets. The code is ava...
