/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Justin Elze

@hackinglz
28 posts
2026-03-07
I love these blogs because they always contain something like this.  “We ran this test several hundred times with different starting points, spending approximately $4,000 in API credits.  Despite this, Opus 4.6 was only able to actually turn the vulnerability into an exploit in two cases.”
2026-03-07 View on X
Wall Street Journal

Mozilla says Claude Opus 4.6 found 100+ bugs in Firefox in two weeks in January, 14 of them high-severity, more than the bugs typically reported in two months

2026-03-06
I love these blogs because they always contain something like this. “We ran this test several hundred times with different starting points, spending approximately $4,000 in API credits. Despite this, Opus 4.6 was only able to actually turn the vulnerability into an exploit in
2026-03-06 View on X
Wall Street Journal

Mozilla says Claude Opus 4.6 found 100+ bugs in Firefox in two weeks in January, 14 of them high-severity, more than the bugs typically reported in two months

New AI-powered tools are increasingly adept at spotting flaws.  Hacking experts worry they will be good at exploiting them, too.

2024-09-04
“when an attacker gains brief physical access” protect your neck and your Yubikey “YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel” https://arstechnica.com/...
2024-09-04 View on X
Ars Technica

Researchers detail a side channel attack, which requires ~$11K worth of equipment and can be used to clone all YubiKeys running firmware prior to version 5.7

Sophisticated attack breaks security assurances of the most popular FIDO key.  —  The YubiKey 5, the most widely used hardware token …

2024-08-06
I have heard security is important https://x.com/...
2024-08-06 View on X
GeekWire

A memo from Microsoft Chief People Officer Kathleen Hogan: “everyone at Microsoft” now has “security” as a “Core Priority”, used in performance reviews

“The Security Core Priority is not a check-the-box compliance exercise; it is a way for every employee and manager to commit to … X: Justin Elze / @hackinglz : I have heard securit...

2024-07-25
Better start looking for crowdstrike*giftcard*. domains https://x.com/...
2024-07-25 View on X
The Guardian

Insurer Parametrix estimates that the global outage sparked by CrowdStrike's faulty update will cost US Fortune 500 companies, excluding Microsoft, $5.4B

Banking and healthcare firms, major airlines expected to suffer most losses, according to insurer Parametrix

2024-06-29
Where is the ethics in hacking your favorite RMM provider... https://www.bleepingcomputer.com/ ...
2024-06-29 View on X
BleepingComputer

TeamViewer warns that its corporate environment was breached on June 26 and attributes the cyberattack to the Russian hacking group APT29, aka Midnight Blizzard

but customer and company data is safe Alex Ivanovs / Stack Diary : TeamViewer confirms Russian spies hacked its corporate network The Hacker News : TeamViewer Detects Security Brea...

2024-05-05
I'm interested to see how this works when security also generates revenue. It is definitely going to be an interesting balance. “Read Satya Nadella's Microsoft memo on putting security first” https://www.theverge.com/... [image]
2024-05-05 View on X
The Verge

Microsoft outlines security principles and goals tied to executive compensation packages, following a scathing US Cyber Safety Review Board report in April 2024

expanding Microsoft's Secure Future Initiative Tom Krazit / Runtime : Microsoft wants to be judged on security Nick Heer / Pixel Envy : Microsoft Says It Is Prioritizing Security A...

2024-05-04
I'm interested to see how this works when security also generates revenue. It is definitely going to be an interesting balance. “Read Satya Nadella's Microsoft memo on putting security first” https://www.theverge.com/... [image]
2024-05-04 View on X
The Verge

Microsoft outlines security principles and goals tied to executive compensation packages, following a scathing US Cyber Safety Review Board report in April 2024

expanding Microsoft's Secure Future Initiative Tom Warren / The Verge : Read Satya Nadella's Microsoft memo on putting security first Tom Krazit / Runtime : Microsoft wants to be j...

2024-04-30
Is there some sort of profit sharing? If I script a bunch of PUT requests can I get half? This is super broken 😂
2024-04-30 View on X
Maciej Pocwierz

How an empty, private AWS S3 bucket had ~100M PUT requests in a day, racking up a $1,300+ bill, due to a popular open-source tool using the same bucket name

Imagine you create an empty, private AWS S3 bucket in a region of your preference.  What will your AWS bill be the next morning?

2024-04-10
Cloud isn't easy https://techcrunch.com/...
2024-04-10 View on X
TechCrunch

Researchers found an exposed Azure server with Microsoft staff credentials used to access internal systems; Microsoft was told February 6 and fixed on March 5

https://techcrunch.com/...  #cybersecurity #microsoft Zack Whittaker / @zackwhittaker@mastodon.social : New, by me: Security researchers found an Azure storage server exposed to th...

2024-02-14
Harnessing the power of LLMs these threat actors were able to reduce the use of the recon command “whoami.exe” by 2%! https://www.microsoft.com/...
2024-02-14 View on X
The Verge

Microsoft and OpenAI say hackers, including Russian, North Korean, Iranian, and Chinese-backed groups, are already using LLMs to refine and improve cyberattacks

Microsoft and OpenAI are revealing today that hackers are already using large language models like ChatGPT to refine and improve their existing cyberattacks.

2023-11-03
Surprisingly, it turns out that cloud security and secure by default are essential.  Who would have thought?
2023-11-03 View on X
The Verge

Microsoft announces the Secure Future Initiative, which includes responding faster to vulnerabilities and using AI and automation to improve software security

Named the Secure Future Initiative, the commitment comes after hackers have been constantly exploiting many of its products for attacks on government and private sector entities. …...

So now that everyone moved into Azure/O365 it was decided this should be a bigger priority? https://blogs.microsoft.com/ ... [image]
2023-11-03 View on X
The Verge

Microsoft announces the Secure Future Initiative, which includes responding faster to vulnerabilities and using AI and automation to improve software security

Named the Secure Future Initiative, the commitment comes after hackers have been constantly exploiting many of its products for attacks on government and private sector entities. …...

2023-09-22
Trying to find a silver lining here 🤔 https://newsroom.cisco.com/...
2023-09-22 View on X
Bloomberg

Cisco plans to acquire cybersecurity company Splunk in cash for $157 per share, a 31% premium on Splunk's September 20 closing price, in a deal valued at ~$28B

https://www.reuters.com/... Chris Merkel / @chrismerkel@infosec.exchange : Scoop: Anonymous has hacked the neuralinks of the leadership teams at Splunk and Cisco.  While I can't id...

2023-09-15
I'm not sure why casinos wouldn't pay a ransomware group. The loss per hour/day they face is on the extreme side compared to many other targeted verticals. The obvious downside here is it fuels capabilities, but the business side of paying is logical, assuming they use this event...
2023-09-15 View on X
Financial Times

MGM was likely hacked by Scattered Spider, an English-speaking group that previously used help desk calls to get passwords and planned to hack the slot machines

Person claiming to represent cybercriminals explains techniques used to evade detection by casino resort company

I'm not sure why casinos wouldn't pay a ransomware group. The loss per hour/day they face is on the extreme side compared to many other targeted verticals. The obvious downside here is it fuels capabilities, but the business side of paying is logical, assuming they use this event...
2023-09-15 View on X
Wall Street Journal

Filing: Caesars confirms the casino operator was hacked via a social engineering attack on an outsourced IT support vendor; sources: Caesars paid a ~$15M ransom

CURRENT REPORT Pursuant to Section 13 or 15(d) of the Securities Exchange Act … Thomas Barrabi / New York Post : Caesars Entertainment paid about $15M to hackers who stole customer...

2023-09-07
Does this qualify as “series of unfortunate events” seems more like a group with a goal finding a way
2023-09-07 View on X
BleepingComputer

Microsoft says Chinese hackers who in June breached US government email accounts stole an MSA key from a crash dump after hacking a Microsoft engineer's account

Microsoft says Storm-0558 Chinese hackers stole a signing key used to breach government email accounts from a Windows crash dump …

2023-08-03
shots fired https://cyberscoop.com/...
2023-08-03 View on X
CyberScoop

Amit Yoran, the CEO of cyber risk management company Tenable, says Microsoft partially fixed a critical Azure bug that would let hackers access sensitive data

Cybersecurity veteran Amit Yoran says Microsoft has a culture of toxic obfuscation when it comes to addressing security threats.

2023-07-23
Good read glad someone put the research time in vs “It was a MSA key” https://www.wiz.io/...
2023-07-23 View on X
The Record

Wiz researchers: the compromised MSA signing key could have given Chinese hackers access beyond Outlook.com and Exchange Online; Microsoft disputes the report

Microsoft is disputing a new report that claims hackers may have had access to more parts of victims' systems than previously known … Source: Wiz Blog .

2023-07-22
Good read glad someone put the research time in vs “It was a MSA key” https://www.wiz.io/...
2023-07-22 View on X
The Record

A report says the Microsoft key that Chinese hackers stole could have given them more access than originally assumed; Microsoft disputes the report

Microsoft is disputing a new report that claims hackers may have had access to more parts of victims' systems than previously known in a campaign … Source: Wiz Blog .