<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-03-29T21:49:57Z</updated>
  <generator>https://nostr.ae</generator>

  <title>Nostr notes by Nethemba</title>
  <author>
    <name>Nethemba</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://nostr.ae/npub13yxp2xmwcsd28gnknpkdw4uhmf9sjvmz4vpts4lp0x929fc5va8qels5ku.rss" />
  <link href="https://nostr.ae/npub13yxp2xmwcsd28gnknpkdw4uhmf9sjvmz4vpts4lp0x929fc5va8qels5ku" />
  <id>https://nostr.ae/npub13yxp2xmwcsd28gnknpkdw4uhmf9sjvmz4vpts4lp0x929fc5va8qels5ku</id>
  <icon>https://cdn.nostrcheck.me/f4f1f341001ae518bd18bfa7c2a33e2ce618dfb3aa969dd88f284ed0aea40730.webp</icon>
  <logo>https://cdn.nostrcheck.me/f4f1f341001ae518bd18bfa7c2a33e2ce618dfb3aa969dd88f284ed0aea40730.webp</logo>




  <entry>
    <id>https://nostr.ae/nevent1qqsv9lz3g2xcvjf428v55f4ywuea67vkngwwjk3js8yvnwlma9wc3aqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ujxqppm</id>
    
      <title type="html">This is a full-day hands-on training designed for Bitcoin ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv9lz3g2xcvjf428v55f4ywuea67vkngwwjk3js8yvnwlma9wc3aqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ujxqppm" />
    <content type="html">
      This is a full-day hands-on training designed for Bitcoin holders, founders, investors, and anyone who is publicly (or quietly) involved in the space. &lt;br/&gt;&lt;a href=&#34;https://gart.io/event/gart-training-btc-prague-2026-3/register&#34;&gt;https://gart.io/event/gart-training-btc-prague-2026-3/register&lt;/a&gt;
    </content>
    <updated>2026-05-21T18:30:20Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswhvdu6jtw4rghnkjcsfyyzcq2c8jwtmqtmcmgx0r77smsnhkyxagzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ugp7aw3</id>
    
      <title type="html">First Public macOS Kernel Exploit on Apple M5 Prepared Using ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswhvdu6jtw4rghnkjcsfyyzcq2c8jwtmqtmcmgx0r77smsnhkyxagzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ugp7aw3" />
    <content type="html">
      First Public macOS Kernel Exploit on Apple M5 Prepared Using Mythos Preview in Five Days&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/first-public-macos-kernel-exploit/&#34;&gt;https://cybersecuritynews.com/first-public-macos-kernel-exploit/&lt;/a&gt;
    </content>
    <updated>2026-05-18T15:20:00Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9my3v9mvtnauamx45zyapay0m85pw2hgltytsrdulxp3mrxs64mqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ue4ed8u</id>
    
      <title type="html">A security researcher says Microsoft secretly built a backdoor ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9my3v9mvtnauamx45zyapay0m85pw2hgltytsrdulxp3mrxs64mqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ue4ed8u" />
    <content type="html">
      A security researcher says Microsoft secretly built a backdoor into BitLocker, releases an exploit to prove it&lt;br/&gt;YellowKey exploit bypasses BitLocker full volume encryption via USB stick and WinRE&lt;br/&gt;&lt;a href=&#34;https://www.techspot.com/news/112410-security-researcher-microsoft-secretly-built-backdoor-bitlocker-releases.html&#34;&gt;https://www.techspot.com/news/112410-security-researcher-microsoft-secretly-built-backdoor-bitlocker-releases.html&lt;/a&gt;
    </content>
    <updated>2026-05-17T20:10:00Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsguwhjckdast4s9fqvlf373m0h8j4tcygdlmv2k8nqquddgq4zn9gzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uju08kk</id>
    
      <title type="html">Steal SSH host private keys and /etc/shadow via the ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsguwhjckdast4s9fqvlf373m0h8j4tcygdlmv2k8nqquddgq4zn9gzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uju08kk" />
    <content type="html">
      Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass &#43; pidfd_getfd. Pre-31e62c2ebbfd kernels.&lt;br/&gt;&lt;a href=&#34;https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn&#34;&gt;https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn&lt;/a&gt;
    </content>
    <updated>2026-05-15T11:03:00Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstt0qz8dzeuy3pndennqh8ecpkdjqdl302w0xfxq8pt7qx3grt2fqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u55lgdg</id>
    
      <title type="html">NGINX Rift RCE Proof of concept for CVE-2026-42945, a critical ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstt0qz8dzeuy3pndennqh8ecpkdjqdl302w0xfxq8pt7qx3grt2fqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u55lgdg" />
    <content type="html">
      NGINX Rift&lt;br/&gt;RCE Proof of concept for CVE-2026-42945, a critical heap buffer overflow in NGINX&amp;#39;s ngx_http_rewrite_module introduced in 2008. The bug enables unauthenticated remote code execution against servers using rewrite and set directives.&lt;br/&gt;&lt;a href=&#34;https://github.com/DepthFirstDisclosures/Nginx-Rift&#34;&gt;https://github.com/DepthFirstDisclosures/Nginx-Rift&lt;/a&gt;
    </content>
    <updated>2026-05-15T01:00:00Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrwpgp7gm93t24fm3kxg0fahgfhxhfspwh0va5zt2kawur6hz6rjgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uc7tjmv</id>
    
      <title type="html">The Tiny UDP Cannon: An Android VPN Bypass ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrwpgp7gm93t24fm3kxg0fahgfhxhfspwh0va5zt2kawur6hz6rjgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uc7tjmv" />
    <content type="html">
      The Tiny UDP Cannon: An Android VPN Bypass&lt;br/&gt;&lt;a href=&#34;https://lowlevel.fun/posts/tiny-udp-cannon-android-vpn-bypass/&#34;&gt;https://lowlevel.fun/posts/tiny-udp-cannon-android-vpn-bypass/&lt;/a&gt;
    </content>
    <updated>2026-05-12T15:20:00Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0z2qu6w3xujh2ywqumr9rqvvk7d4yyuznfgk60497wm77hpac6kszyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uf7f06s</id>
    
      <title type="html">Using Instagram for any (private) communication is always a bad ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0z2qu6w3xujh2ywqumr9rqvvk7d4yyuznfgk60497wm77hpac6kszyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uf7f06s" />
    <content type="html">
      Using Instagram for any (private) communication is always a bad idea.&lt;br/&gt;Instagram privacy tech is turned off today - what does this mean for your DMs?&lt;br/&gt;&lt;a href=&#34;https://www.bbc.com/news/articles/clypzxl3lvqo&#34;&gt;https://www.bbc.com/news/articles/clypzxl3lvqo&lt;/a&gt;
    </content>
    <updated>2026-05-09T01:00:03Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstkj6s3qzy6fy8jzc49zm49m00jq4jwq57t4s5etkezzkpal49wggzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ujmzuk5</id>
    
      <title type="html">The Internet Is Falling Down, Falling Down, Falling Down (cPanel ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstkj6s3qzy6fy8jzc49zm49m00jq4jwq57t4s5etkezzkpal49wggzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ujmzuk5" />
    <content type="html">
      The Internet Is Falling Down, Falling Down, Falling Down (cPanel &amp;amp; WHM Authentication Bypass CVE-2026-41940)&lt;br/&gt;&lt;a href=&#34;https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/&#34;&gt;https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/&lt;/a&gt;
    </content>
    <updated>2026-05-07T18:00:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsp0g9y3xacgcwq9egg0uqk8nfmq9t87834tu2gh9x2s3ycustx7fgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u5eyxpu</id>
    
      <title type="html">Copy Fail: 732 Bytes to Root on Every Major Linux Distribution. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsp0g9y3xacgcwq9egg0uqk8nfmq9t87834tu2gh9x2s3ycustx7fgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u5eyxpu" />
    <content type="html">
      Copy Fail: 732 Bytes to Root on Every Major Linux Distribution.&lt;br/&gt;Xint Code disclosed CVE-2026-31431, an authencesn scratch-write bug chaining AF_ALG &#43; splice() into a 4-byte page cache write. A 732-byte PoC gets root on Ubuntu, Amazon Linux, RHEL, SUSE.&lt;br/&gt;&lt;a href=&#34;https://xint.io/blog/copy-fail-linux-distributions&#34;&gt;https://xint.io/blog/copy-fail-linux-distributions&lt;/a&gt;
    </content>
    <updated>2026-05-07T12:00:02Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszkuyv78436h5evkrh7f5rjts5kl70zcm6l0lqsprfeg7e5nwy00qzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5unf5njf</id>
    
      <title type="html">Apple fixes bug that allowed FBI to read deleted Signal messages ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszkuyv78436h5evkrh7f5rjts5kl70zcm6l0lqsprfeg7e5nwy00qzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5unf5njf" />
    <content type="html">
      Apple fixes bug that allowed FBI to read deleted Signal messages&lt;br/&gt;FBI used the flaw to extract readable previews of Signal messages from an iPhone&amp;#39;s notification database even after the app was deleted.&lt;br/&gt;&lt;a href=&#34;https://cointelegraph.com/news/apple-fixes-bug-fbi-read-encrypted-messages-signal-via-notifications&#34;&gt;https://cointelegraph.com/news/apple-fixes-bug-fbi-read-encrypted-messages-signal-via-notifications&lt;/a&gt;
    </content>
    <updated>2026-05-07T06:00:02Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqnkh9er4ae3vctjdy0evnusrzhd7x0r55whdhcnj7px40dcktpuqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ulxxunm</id>
    
      <title type="html">&amp;#34;We evaluate AgentFlow on TerminalBench-2 with Claude Opus ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqnkh9er4ae3vctjdy0evnusrzhd7x0r55whdhcnj7px40dcktpuqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ulxxunm" />
    <content type="html">
      &amp;#34;We evaluate AgentFlow on TerminalBench-2 with Claude Opus 4.6 and on Google Chrome with Kimi K2.5. AgentFlow reaches 84.3% on TerminalBench-2, the highest score in the public leaderboard snapshot we evaluate against, and discovers ten previously unknown zero-day vulnerabilities in Google Chrome, including two Critical sandbox-escape vulnerabilities (CVE-2026-5280 and CVE-2026-6297). &amp;#34;&lt;br/&gt;&lt;a href=&#34;https://arxiv.org/abs/2604.20801&#34;&gt;https://arxiv.org/abs/2604.20801&lt;/a&gt;
    </content>
    <updated>2026-04-26T01:00:02Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqnuy06rm8ymfkgyem4qsjealt3903enzexz8zd3kll8s4psnnwaszyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ucde94x</id>
    
      <title type="html">CLI security scanner built for the agentic era. Detects CI/CD ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqnuy06rm8ymfkgyem4qsjealt3903enzexz8zd3kll8s4psnnwaszyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ucde94x" />
    <content type="html">
      CLI security scanner built for the agentic era. Detects CI/CD misconfigs, agent permission risks, MCP tool injection, hardcoded secrets, and DMCA-flagged AI dependencies. &lt;br/&gt;&lt;a href=&#34;https://github.com/asamassekou10/ship-safe&#34;&gt;https://github.com/asamassekou10/ship-safe&lt;/a&gt;&lt;br/&gt;&lt;a href=&#34;https://www.shipsafecli.com/&#34;&gt;https://www.shipsafecli.com/&lt;/a&gt;
    </content>
    <updated>2026-04-25T20:10:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8ls9m0ydskwkepk8st7fkt2dp790pwwn0wm004kn3u28p7j0cquczyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u5gykyg</id>
    
      <title type="html">Post Quantum Cryptography - Computerphile ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8ls9m0ydskwkepk8st7fkt2dp790pwwn0wm004kn3u28p7j0cquczyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u5gykyg" />
    <content type="html">
      Post Quantum Cryptography - Computerphile&lt;br/&gt;&lt;a href=&#34;https://m.youtube.com/watch?v=_MoRcYLN-7U&#34;&gt;https://m.youtube.com/watch?v=_MoRcYLN-7U&lt;/a&gt;
    </content>
    <updated>2026-04-25T01:00:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs95wpu6nfdc8yn0ds3fu0dcd730esj3fwefjeqaqp5ke525ph8mmgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5umgrxqn</id>
    
      <title type="html">A governance standard for autonomous penetration testing ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs95wpu6nfdc8yn0ds3fu0dcd730esj3fwefjeqaqp5ke525ph8mmgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5umgrxqn" />
    <content type="html">
      A governance standard for autonomous penetration testing platforms.&lt;br/&gt;&lt;a href=&#34;https://github.com/OWASP/APTS&#34;&gt;https://github.com/OWASP/APTS&lt;/a&gt;
    </content>
    <updated>2026-04-24T20:10:02Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswev7c5ju02dcrdq6ec9rhpn7d32ycy2wjqhdn68w4ujgkpt00ysgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ume38dr</id>
    
      <title type="html">Diverzifikácia rizika na &amp;#34;európsky spôsob&amp;#34; - ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswev7c5ju02dcrdq6ec9rhpn7d32ycy2wjqhdn68w4ujgkpt00ysgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ume38dr" />
    <content type="html">
      Diverzifikácia rizika na &amp;#34;európsky spôsob&amp;#34; - diskriminujeme non-EU dodávateľov a zrazu nam zostane oligopol EÚ firiem :)&lt;br/&gt;Komise zákon prezentuje jako obranu proti čínským dodavatelům. Právnická firma Bird &amp;amp; Bird ale v březnové analýze upozornila na paradox: politika „diverzifikace“ v praxi vede k menší diverzitě dodavatelského pole. Vyloučení firem ze třetích zemí koncentruje zakázky u několika velkých evropských hráčů: Bundesdruckerei, Thales, IDEMIA nebo Atos. &lt;br/&gt;&lt;a href=&#34;https://reporteri.substack.com/p/novy-kyberneticky-zakon-zavira-dvere&#34;&gt;https://reporteri.substack.com/p/novy-kyberneticky-zakon-zavira-dvere&lt;/a&gt;
    </content>
    <updated>2026-04-24T15:20:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqst0l9npts3ru890eym0czpuesaxwrv82zz9ws7t0qxngemh9mdxsgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uh9s4mf</id>
    
      <title type="html">‘Withdraw Now’—Inside Aave’s Sudden $200M Bad Debt Crisis ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqst0l9npts3ru890eym0czpuesaxwrv82zz9ws7t0qxngemh9mdxsgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uh9s4mf" />
    <content type="html">
      ‘Withdraw Now’—Inside Aave’s Sudden $200M Bad Debt Crisis&lt;br/&gt;A major exploit of KelpDAO&amp;#39;s cross-chain bridge has cascaded into Aave, one of DeFi&amp;#39;s largest lending protocols. &lt;br/&gt;&lt;a href=&#34;https://www.forbes.com/sites/digital-assets/2026/04/18/withdraw-now-inside-aaves-sudden-200m-bad-debt-crisis/&#34;&gt;https://www.forbes.com/sites/digital-assets/2026/04/18/withdraw-now-inside-aaves-sudden-200m-bad-debt-crisis/&lt;/a&gt;
    </content>
    <updated>2026-04-23T15:20:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsttpusmpz270q80l90lgel6g4tav8u0gfdl5rn4uj9xp0r7u4kz8qzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5usznudv</id>
    
      <title type="html">&amp;#34;We took the specific vulnerabilities Anthropic showcases in ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsttpusmpz270q80l90lgel6g4tav8u0gfdl5rn4uj9xp0r7u4kz8qzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5usznudv" />
    <content type="html">
      &amp;#34;We took the specific vulnerabilities Anthropic showcases in their announcement, isolated the relevant code, and ran them through small, cheap, open-weights models. Those models recovered much of the same analysis. Eight out of eight models detected Mythos&amp;#39;s flagship FreeBSD exploit, including one with only 3.6 billion active parameters costing $0.11 per million tokens. A 5.1B-active open model recovered the core chain of the 27-year-old OpenBSD bug.&amp;#34;&lt;br/&gt;&lt;a href=&#34;https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier&#34;&gt;https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier&lt;/a&gt;
    </content>
    <updated>2026-04-22T20:10:02Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgq0el4fkwzslymu9x6cdm4rayl927d5rktladwp44yr5umqvk59czyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uzv44mz</id>
    
      <title type="html">Autonomous vulnerability scanner and source-code hunter built on ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgq0el4fkwzslymu9x6cdm4rayl927d5rktladwp44yr5umqvk59czyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uzv44mz" />
    <content type="html">
      Autonomous vulnerability scanner and source-code hunter built on LangGraph.&lt;br/&gt;&lt;a href=&#34;https://github.com/Lazarus-AI/clearwing&#34;&gt;https://github.com/Lazarus-AI/clearwing&lt;/a&gt;
    </content>
    <updated>2026-04-22T01:00:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfxxn9q9p4wkr6wr50t4ryv4sd5yw4xqutztjg9yqt2w3qnn476jczyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uleu5qm</id>
    
      <title type="html">The current state of AI hacking skills ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfxxn9q9p4wkr6wr50t4ryv4sd5yw4xqutztjg9yqt2w3qnn476jczyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uleu5qm" />
    <content type="html">
      The current state of AI hacking skills&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://postiz.nethemba.com/uploads/2026/04/16/85b2cf26fe3e6d974192bd74c10105776f.jpg&#34;&gt; 
    </content>
    <updated>2026-04-18T20:10:03Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy7atwy0hhnafqs4cvp5n0g8rfu4ye7pazekcvw0krz3ea9xaux5szyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ucu8l6s</id>
    
      <title type="html">Reverse proxy for Claude Code that anonymizes sensitive pentest ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy7atwy0hhnafqs4cvp5n0g8rfu4ye7pazekcvw0krz3ea9xaux5szyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ucu8l6s" />
    <content type="html">
      Reverse proxy for Claude Code that anonymizes sensitive pentest data (IPs, hashes, credentials, hostnames, PII) before it reaches Anthropic. Dual-layer detection: local Ollama LLM &#43; regex safety net, with per-engagement vault and self-improving feedback loop.&lt;br/&gt;&lt;a href=&#34;https://github.com/zeroc00I/LLM-anonymization&#34;&gt;https://github.com/zeroc00I/LLM-anonymization&lt;/a&gt;
    </content>
    <updated>2026-04-18T15:20:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0cqh7ka5s3h47j7lmzey5pm4vagwzhgxm73vr9gpcfa85h99tstqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ueaqc4z</id>
    
      <title type="html">&amp;#34;I Let Claude Opus Write a Chrome Exploit: The Next Model ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0cqh7ka5s3h47j7lmzey5pm4vagwzhgxm73vr9gpcfa85h99tstqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ueaqc4z" />
    <content type="html">
      &amp;#34;I Let Claude Opus Write a Chrome Exploit: The Next Model (Mythos?) Won&amp;#39;t Need My Help? &amp;#34;&lt;br/&gt;&lt;a href=&#34;https://www.hacktron.ai/blog/i-let-claude-opus-to-write-me-a-chrome-exploit&#34;&gt;https://www.hacktron.ai/blog/i-let-claude-opus-to-write-me-a-chrome-exploit&lt;/a&gt;
    </content>
    <updated>2026-04-18T01:00:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8ny3ha5r2ytk7vapuc8krdvz80nr8x3twgt3ee40atrdpckvyn0gzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ue2add7</id>
    
      <title type="html">Can you steal $10,000 from a locked iPhone? ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8ny3ha5r2ytk7vapuc8krdvz80nr8x3twgt3ee40atrdpckvyn0gzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ue2add7" />
    <content type="html">
      Can you steal $10,000 from a locked iPhone?&lt;br/&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=PPJ6NJkmDAo&#34;&gt;https://www.youtube.com/watch?v=PPJ6NJkmDAo&lt;/a&gt;
    </content>
    <updated>2026-04-17T15:20:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy2sm2zfldahykqlp4uhvp6jnduzm5vhxnp6f50p2pxgyzgccydpqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u22gxps</id>
    
      <title type="html">While Anthropic’s new model only succeeded in 3 out of 10 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy2sm2zfldahykqlp4uhvp6jnduzm5vhxnp6f50p2pxgyzgccydpqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u22gxps" />
    <content type="html">
      While Anthropic’s new model only succeeded in 3 out of 10 attempts, even the average Mythos Preview run completed 22 of the 32 required infiltration steps, significantly higher than the 16-step average achieved by Claude 4.6.&lt;br/&gt;New model is the first AI system to complete a difficult multistep infiltration challenge.&lt;br/&gt;&lt;a href=&#34;https://arstechnica.com/ai/2026/04/uk-govs-mythos-ai-tests-help-separate-cybersecurity-threat-from-hype/&#34;&gt;https://arstechnica.com/ai/2026/04/uk-govs-mythos-ai-tests-help-separate-cybersecurity-threat-from-hype/&lt;/a&gt;
    </content>
    <updated>2026-04-17T01:00:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd5krjm5q0d0vu339xww29s0vduyg3npvtqadeawc8h0kdgmdn9yczyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u4xszzp</id>
    
      <title type="html">Supply chain nightmare: How Rust will be attacked and what we can ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd5krjm5q0d0vu339xww29s0vduyg3npvtqadeawc8h0kdgmdn9yczyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5u4xszzp" />
    <content type="html">
      Supply chain nightmare: How Rust will be attacked and what we can do to mitigate the inevitable&lt;br/&gt;&lt;a href=&#34;https://kerkour.com/rust-supply-chain-nightmare&#34;&gt;https://kerkour.com/rust-supply-chain-nightmare&lt;/a&gt;
    </content>
    <updated>2026-04-15T20:10:00Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0tz2hajsu6akjcn6lrpj8j5aft2uhsqjehu5kqups8q3ejjk55xszyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uh26fwk</id>
    
      <title type="html">XBOW Validation Benchmarks is a collection of web security ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0tz2hajsu6akjcn6lrpj8j5aft2uhsqjehu5kqups8q3ejjk55xszyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uh26fwk" />
    <content type="html">
      XBOW Validation Benchmarks is a collection of web security challenges designed to test automated security testing tools.&lt;br/&gt;&lt;a href=&#34;https://github.com/xbow-engineering/validation-benchmarks&#34;&gt;https://github.com/xbow-engineering/validation-benchmarks&lt;/a&gt;&lt;br/&gt;AI agent benchmark results across security platforms&lt;br/&gt;&lt;a href=&#34;https://0ca.github.io/BoxPwnr-Traces/stats/platform.html?platform=xbow&#34;&gt;https://0ca.github.io/BoxPwnr-Traces/stats/platform.html?platform=xbow&lt;/a&gt;
    </content>
    <updated>2026-04-09T20:10:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfxhrsx8rx4spu647n6vwm9y2eeduw3yq2ap3whjpd3dcuhndtg9gzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ud6sqxy</id>
    
      <title type="html">This is big... Anthropic just announced a model so powerful they ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfxhrsx8rx4spu647n6vwm9y2eeduw3yq2ap3whjpd3dcuhndtg9gzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5ud6sqxy" />
    <content type="html">
      This is big... Anthropic just announced a model so powerful they won&amp;#39;t release it to the public out of fear over the damage it will cause 😨&lt;br/&gt;Claude Mythos Preview found thousands of zero-day exploits in every major operating system and web browser...&lt;br/&gt;The numbers are hard to believe:&lt;br/&gt;&amp;gt; $50 to find a 27-year-old bug in OpenBSD, one of the most security-hardened operating systems ever built &lt;br/&gt;&amp;gt; Under $1,000 to find AND build a fully working remote code execution exploit on FreeBSD that grants unauthenticated root access from anywhere on the internet&lt;br/&gt;&amp;gt; Under $2,000 to chain together multiple Linux kernel vulnerabilities into a complete privilege escalation exploit&lt;br/&gt;For context: these are the kinds of findings that previously required elite security researchers working for weeks.&lt;br/&gt;Anthropic engineers with no formal security training asked Mythos to find exploits overnight. They woke up to working code the next morning.&lt;br/&gt;The results were so impressive Anthropic assembled Apple, Google, Microsoft, Amazon, NVIDIA, and seven other organizations into Project Glasswing:&lt;br/&gt;A $100M defensive coalition. They&amp;#39;re not releasing this model publicly. Instead, they&amp;#39;re racing to patch the world&amp;#39;s infrastructure before models like this proliferate.&lt;br/&gt;&lt;a href=&#34;https://x.com/JoshKale/status/2041589742303649802&#34;&gt;https://x.com/JoshKale/status/2041589742303649802&lt;/a&gt;
    </content>
    <updated>2026-04-09T01:00:02Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsva2tqx8ckedjpqkt2895mgcjm4k87jm96p7czmtyssyhk45wqxkszyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uvg2pr5</id>
    
      <title type="html">Assessing Claude Mythos Preview’s cybersecurity capabilities ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsva2tqx8ckedjpqkt2895mgcjm4k87jm96p7czmtyssyhk45wqxkszyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uvg2pr5" />
    <content type="html">
      Assessing Claude Mythos Preview’s cybersecurity capabilities&lt;br/&gt;&lt;a href=&#34;https://red.anthropic.com/2026/mythos-preview/&#34;&gt;https://red.anthropic.com/2026/mythos-preview/&lt;/a&gt;
    </content>
    <updated>2026-04-08T15:20:12Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2tvtauyyejl825awfwtucfj0clwtu56yqkm4lrs9gaqg6e9x26hqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5unnry8j</id>
    
      <title type="html">Privacy-first mobile carrier with IMSI rotation, encrypted ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2tvtauyyejl825awfwtucfj0clwtu56yqkm4lrs9gaqg6e9x26hqzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5unnry8j" />
    <content type="html">
      Privacy-first mobile carrier with IMSI rotation, encrypted texting, SIM swap protection, anonymous payments, and no data collection&lt;br/&gt;&lt;a href=&#34;https://www.cape.co/&#34;&gt;https://www.cape.co/&lt;/a&gt;
    </content>
    <updated>2026-04-04T01:00:03Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8v6sf4glksedaenweh0xeha6yknuv6wcujk3wzyea5rzatqew2xgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uun082j</id>
    
      <title type="html">axios Compromised on npm - Malicious Versions Drop Remote Access ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8v6sf4glksedaenweh0xeha6yknuv6wcujk3wzyea5rzatqew2xgzyzysc9gmdmzp4gazw6vxe46hjldykzfnv24s9wzhu9uc4g48z3n5uun082j" />
    <content type="html">
      axios Compromised on npm - Malicious Versions Drop Remote Access Trojan:&lt;br/&gt;The attacker injected a hidden dependency that drops a cross platform RAT. We are actively investigating and will update this post with a full technical analysis.&lt;br/&gt;&lt;a href=&#34;https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan&#34;&gt;https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan&lt;/a&gt;
    </content>
    <updated>2026-03-31T15:20:02Z</updated>
  </entry>

</feed>