/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Daniel Cuthbert

@dcuthbert
78 posts
2025-05-27
We are truly back in the 1990s when it comes to validation and processing said dirty data  —  invariantlabs.ai/blog/mcp-git...
2025-05-27 View on X
Simon Willison's Weblog

Researchers detail an exploit in GitHub's official MCP server that lets hackers trick an LLM agent into leaking private information about the MCP user

Attackers only need to open a malicious issue on the targeted repositories to exploit the vulnerability.  —  invariantlabs.ai/blog/mcp-git... Daniel Cuthbert / @dcuthbert : We are ...

2025-05-26
I've been lamenting the fact that we don't see good blog posts or written articles anymore, with everyone favouring to submit to a conference instead. However, Sean proved me wrong with a brilliant blogpost on how he found a smb vuln using o3 https://sean.heelan.io/...
2025-05-26 View on X
Sean Heelan's Blog

A security researcher details how he discovered a zero-day vulnerability in the Linux kernel's SMB implementation by analyzing the code using OpenAI's o3 API

Now finding a Linux kernel-level zero day is as simple as knowing how to prompt. sean.heelan.io/2025/05/22/h... @davidcrespo : key detail in this very good post about finding a nov...

2025-05-25
I've been lamenting the fact that we don't see good blog posts or written articles anymore, with everyone favouring to submit to a conference instead. However, Sean proved me wrong with a brilliant blogpost on how he found a smb vuln using o3 https://sean.heelan.io/...
2025-05-25 View on X
Sean Heelan's Blog

A security researcher details how he discovered a zero-day vulnerability in the Linux kernel's SMB implementation by analyzing the code using OpenAI's o3 API

In this post I'll show you how I found a zeroday vulnerability in the Linux kernel using OpenAI's o3 model.

2025-04-16
Positive www.thecvefoundation.org  —  Without the CVE process, we don't have any real way, besides legislation (which I'm arguing will help too) to keep vendors honest and hold them to account.  —  Here's hoping good comes out of recent events
2025-04-16 View on X
BleepingComputer

CISA says it will extend funding to Mitre, which runs the CVE Program, and “there will be no lapse in critical CVE services”, after Mitre said funding expired

CISA says the U.S. government has extended MITRE's funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.

Positive https://www.thecvefoundation.org/ Without the CVE process, we don't have any real way, besides legislation (which I'm arguing will help too) to keep vendors honest and hold them to account. Here's hoping good comes out of recent events
2025-04-16 View on X
BleepingComputer

CISA says it will extend funding to Mitre, which runs the CVE Program, and “there will be no lapse in critical CVE services”, after Mitre said funding expired

CISA says the U.S. government has extended MITRE's funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.

2025-01-30
“(Note: We did not execute intrusive queries beyond enumeration to preserve ethical research practices.)” https://www.wiz.io/... Whilst the research is solid, I do question what ethical paths were taken here given if this was the other way around, we'd be crying.
2025-01-30 View on X
Wired

Wiz: DeepSeek left one of its critical databases exposed, leaking more than 1M records including system logs, user prompt submissions, and users' API keys

China-based DeepSeek has exploded in popularity, drawing greater scrutiny.  Case in point: Security researchers found more than 1 million records …

2024-09-12
I welcome this classification. As someone who helped build a huge chunk of DC's (PSINet) in my time, they are indeed CNI and as such need the protection and help asssociated with CNI Nicely done
2024-09-12 View on X
CNBC

The UK gives data centers Critical National Infrastructure designation, enabling the government to coordinate better against hackers and unexpected cyber events

LONDON — The U.K. on Thursday said it now classes data centers as critical infrastructure, in a move that is expected …

2024-07-24
This is actually a very good post mortem: https://www.crowdstrike.com/ ... Someone is having some stern words with that Content Validator, for it was a very naughty boy
2024-07-24 View on X
The Register

CrowdStrike says the problematic July 19 software update that brought down 8.5M Windows PCs was deployed into production due to “a bug in the Content Validator”

CrowdStrike has blamed a bug in its own test software for the mass-crash-event it caused last week.

2024-07-03
I mean look, this is a terrible acronym to use @qualys [image]
2024-07-03 View on X
CSO

Qualys researchers say an OpenSSH flaw can let attackers remotely compromise servers and allow unauthenticated RCE as root; over 14M servers may be vulnerable

2024-07-02
I mean look, this is a terrible acronym to use @qualys [image]
2024-07-02 View on X
CSO

Qualys researchers say an OpenSSH flaw can let attackers remotely compromise servers and allow unauthenticated RCE as root; over 14M servers may be vulnerable

Researchers from Qualys say regreSSHion allows attackers to take over servers with 14 million potentially vulnerable OpenSSH instances identified.

2024-06-17
I guess you can say they swatted that spider.. [image]
2024-06-17 View on X
Krebs on Security

Report: the alleged ringleader of the Scattered Spider hacking group was arrested in Spain; sources say the accused is 22-year-old Scottish man Tyler Buchanan

A 22-year-old man from the United Kingdom arrested this week in Spain is allegedly the ringleader of Scattered Spider …Source:Murcia Today.

2024-03-30
As far as supply chain backdoors go, this is Prada level of design and style.
2024-03-30 View on X
Ars Technica

Researchers find malicious code in versions of the compression tool XZ Utils that were incorporated into Linux distributions from Red Hat, Debian, and others

Malicious code planted in xz Utils has been circulating for more than a month.  —  Researchers have found a malicious backdoor …

2024-03-01
The research by the @jfrog team is worthy of a read: https://jfrog.com/... What's old is new again and I'm drawn to @marcoslaviero's epic @sensepost Pickle research from 13 years ago https://sensepost.com/...
2024-03-01 View on X
BleepingComputer

JFrog finds ~100 malicious PyTorch and Tensorflow Keras models on Hugging Face, some of which can execute code on users' machines to give attackers a backdoor

Colour me shocked: someone pushed code up that others ran which resulted in nasty stuffs© happening https://www.bleepingcomputer.com/ ...
2024-03-01 View on X
BleepingComputer

JFrog finds ~100 malicious PyTorch and Tensorflow Keras models on Hugging Face, some of which can execute code on users' machines to give attackers a backdoor

2024-02-22
The more I pour through the isoon leaks, the more it dawns upon me how good value espionage this is for China. The rates they earn are so low, one wonders what happens when the contract is up. Hello criminality as a gun for hire?
2024-02-22 View on X
Washington Post

Leaked files detail Chinese state-linked hacking groups carrying out large-scale, systematic cyber intrusions against governments, companies, and infrastructure

A trove of leaked documents from a Chinese state-linked hacking group shows that Beijing's intelligence and military groups …

2024-02-21
As you'd come to expect with the LockBit takedown, many a group is looking at what the elders did right and wrong and are adapting. Potentially more secure portals being used, less use of PHP, more careful control of affiliates targeting etc. Mogilevich for example [image]
2024-02-21 View on X
Bloomberg

Cybersecurity experts say that global law enforcement agencies dealt Russia-linked LockBit a major blow, but history shows that ransomware gangs regroup quickly

- Disruption of LockBit praised as major blow against gang  — History has shown that hackers regroup quickly, experts say

If you, or your affiliates, target hospitals or schools/CNI, you are going to feel a special kind of love from LEA and other agencies. So it's not a surprise that they've added this to their T's and C's Anyway interesting to see how quickly the ecosystem regroups and changes [image]
2024-02-21 View on X
Bloomberg

Cybersecurity experts say that global law enforcement agencies dealt Russia-linked LockBit a major blow, but history shows that ransomware gangs regroup quickly

- Disruption of LockBit praised as major blow against gang  — History has shown that hackers regroup quickly, experts say

2023-11-29
When PR and legal get involved, no one wins. From 1% to 100%, is not ideal at all [image]
2023-11-29 View on X
Bloomberg

Okta tells customers that hackers who breached its network stole information on all users of its customer support system, greater than the 1% claimed previously

- Okta had earlier said breach affected about 1% of customers  — Company said some Okta employee information was also stolen

2023-11-13
One wonders what controls or checks are performed on the illicit goods when they land, given the rise of fake ICs and other components or potentially modified and slipped into the supply chain.
2023-11-13 View on X
Financial Times

An in-depth look inside a covert Russian operation to get dual-use specialist microchips, which are protected by EU export controls, into the hands of the state

A rare look inside a covert Russian-led operation to get strategic technology protected by European export controls into the hands of the state

2023-11-12
One wonders what controls or checks are performed on the illicit goods when they land, given the rise of fake ICs and other components or potentially modified and slipped into the supply chain.
2023-11-12 View on X
Financial Times

An in-depth look at a covert Russian operation to get dual-use specialist microchips, which are protected by EU export controls, into the hands of the state

A rare look inside a covert Russian-led operation to get strategic technology protected by European export controls into the hands of the state