Chris Wysopal (@weldpond) 's Twitter Profile
Chris Wysopal

@weldpond

Hacker. Co-founder/CTO Veracode. Former L0pht security researcher. GenAI Auto-repair of vulns is the future @weld.bsky.social @[email protected]

ID: 14090906

linkhttps://en.wikipedia.org/wiki/Chris_Wysopal calendar_today06-03-2008 19:46:55

30,30K Tweet

55,55K Followers

1,1K Following

Veracode (@veracode) 's Twitter Profile Photo

Ready to reverse security debt? 🎯 Don't miss Amanda Lee at the May DevSecOps London Gathering! Learn to assess maturity, prioritize vulnerabilities & implement AI solutions. 🕕 May 21, 6-8pm | 📍 Veracode HQ. 🚀 Claim your spot today! meetup.com/devsecops-lond…

Chris Wysopal (@weldpond) 's Twitter Profile Photo

Cyber hard problems, unsolved tech & research problems for which progress toward solution would have a significant impact on the practical security of cyber systems, are frequently caused or sustained by human or societal factors & misaligned incentives nap.nationalacademies.org/catalog/29056/…

Sanjay Mandloi (@sanjaynmandloi) 's Twitter Profile Photo

.Veracode’s Chris Wysopal sat down with ISMG Network News Mathew J Schwartz at #RSAC2025 to talk about one of the biggest shifts in software development: AI-generated code. If you’re passionate about building software that’s both fast & secure, this one’s worth a watch🎥 sprou.tt/1juv1sdZZ8G

Deb Kavaler (@debkav) 's Twitter Profile Photo

Current revalation: Bitcoin is like a owning a hamster: No one knows why it was a good idea in the first place, it never sleeps, and if you lose track of it—good luck explaining that to your family. Give me a break, Allistair.

Current revalation: Bitcoin is like a owning a hamster:
No one knows why it was a good idea in the first place, it never sleeps, and if you lose track of it—good luck explaining that to your family.  Give me a break, Allistair.
Robert Morton (@robert4787) 's Twitter Profile Photo

If China’s MSS is suddenly crying foul about cyber espionage, you can bet they’re feeling the heat. Whether it’s the NSA or not, someone’s clearly poking back—and it’s hitting nerves. Spy games just went digital and global. #CyberEspionage #MSS #NSA globaltimes.cn/page/202506/13…

Chris Wysopal (@weldpond) 's Twitter Profile Photo

Researchers from Rice and Stanford refer to this recursive data contamination as Model Autophagy Disorder (MAD), analogous to mad cow disease. (Reminder: do not eat the neural tissue of your own species.) therepublicjournal.com/essays/the-cur…

Chris Wysopal (@weldpond) 's Twitter Profile Photo

Trump's new Cybersecurity EO eliminates these provisions from Biden's last Cybersecurity EO: Mandatory, machine-readable attestations from every federal software supplier that they follow NIST’s Secure Software Development Framework (SSDF) A CISA-run Repository for Software

Chris Wysopal (@weldpond) 's Twitter Profile Photo

"Absurd" 12-step malware dropper spotted in malicious npm packages. Supply chain attack effort used steganography, a "dizzying wall of Unicode characters" and more. thestack.technology/absurd-12-step…

Chris Wysopal (@weldpond) 's Twitter Profile Photo

AI is already writing code—do our AppSec programs need an update? During the RSA Conference, I sat down with Tejas Dakve (Senior Manager, AppSec @ Bloomberg Industry Group) to ask the hard question: “Gen AI is shipping features at warp speed, but can security keep pace?” Our

Dawn Song (@dawnsongtweets) 's Twitter Profile Photo

1/ 🔥 AI agents are reaching a breakthrough moment in cybersecurity. In our latest work: 🔓 CyberGym: AI agents discovered 15 zero-days in major open-source projects 💰 BountyBench: AI agents solved real-world bug bounty tasks worth tens of thousands of dollars 🤖

1/ 🔥 AI agents are reaching a breakthrough moment in cybersecurity.
 In our latest work:

 🔓 CyberGym: AI agents discovered 15 zero-days in major open-source projects

 đź’° BountyBench: AI agents solved real-world bug bounty tasks worth tens of thousands of dollars
🤖
HD Moore (@hdmoore) 's Twitter Profile Photo

I'm excited to announce our "Out-of-Band" series; focused on the security risks of management devices like BMCs, serial servers, and KVMs. "Out-of-Band, Part 1: The new generation of IP KVMs and how to find them" is now live at: runzero.com/blog/oob-p1-ip…

I'm excited to announce our "Out-of-Band" series;  focused on the security risks of management devices like BMCs, serial servers, and KVMs. "Out-of-Band, Part 1: The new generation of IP KVMs and how to find them" is now live at:
runzero.com/blog/oob-p1-ip…