harisec (@har1sec) 's Twitter Profile
harisec

@har1sec

Interested in web security, bug bounties, machine learning and investing. SolidGoldMagikarp. Orson Kovacs.

ID: 190978303

calendar_today15-09-2010 09:30:53

3,3K Tweet

8,8K Followers

2,2K Following

shubs (@infosec_au) 's Twitter Profile Photo

In 2018, Michael Gianarakis and I set off to build a platform that would provide enterprises with a realistic attacker perspective of their entire network. At the time, we had just begun to try the phrase "attack surface management" in peer conversations. But the vision was always

In 2018, <a href="/mgianarakis/">Michael Gianarakis</a> and I set off to build a platform that would provide enterprises with a realistic attacker perspective of their entire network. At the time, we had just begun to try the phrase "attack surface management" in peer conversations. But the vision was always
Haize Labs (@haizelabs) 's Twitter Profile Photo

📜 really excited to share our work with Anthropic on Constitutional Classifiers! tldr: adding lightweight, tailored, input/output classifiers on top of an underlying LLM creates an AI system that's much more robust to universal jailbreaks

Jonas Geiping (@jonasgeiping) 's Twitter Profile Photo

Ok, so I can finally talk about this! We spent the last year (actually a bit longer) training an LLM with recurrent depth at scale. The model has an internal latent space in which it can adaptively spend more compute to think longer. I think the tech report ...🐦‍⬛

Ok, so I can finally talk about this! 

We spent the last year (actually  a bit longer) training an  LLM with recurrent depth at scale.

The model has an internal latent space in which it can adaptively spend more compute to think longer. 

I think the tech report ...🐦‍⬛
Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm very happy to finally share the second part of my DOMPurify security research 🔥 This article mostly focuses on DOMPurify misconfigurations, especially hooks, that downgrade the sanitizer's protection (even in the latest version)! Link 👇 mizu.re/post/exploring… 1/2

Ethan Hays (@ethanhays) 's Twitter Profile Photo

Cloudflare CEO Matthew Prince 🌥 is having the most honest conversations I've come across about the current & future of content creation "6 months ago, 75% of queries to Google get answered on Google. Which means if you're an original content creator, your content is getting

Sebastian Raschka (@rasbt) 's Twitter Profile Photo

Since it's summer, and more or less internship and tech interview season, I made all 30 chapters of my Machine Learning Q and AI book freely available for the summer: sebastianraschka.com/books/ml-q-and… Hope it’s helpful! Happy reading, and good luck if you are interviewing!

Anatomist (@th3anatomist) 's Twitter Profile Photo

🚨 We got RCE on Solana 🚨 Finally revealing FULL details about the RCE vulnerability we found 2 years ago. Found it. Lost it. Exploited it anyway. 🔬 Here’s what real-world bug hunting looks like: anatomi.st/blog/2025_06_2…

djurado (@djurado9) 's Twitter Profile Photo

Another one from XBOW’s autonomous research: CVE-2025-49493 — a critical XXE in Akamai CloudTest, affecting multiple legacy SOAP endpoints. Full file read via XML payloads, clean exploit chain, responsibly disclosed. Check out the full technical breakdown I wrote👇

Assetnote (@assetnote) 's Twitter Profile Photo

For our first Christmas in July research post: How we managed to get persistent XSS on every Adobe Experience Manager Cloud instance three times! slcyber.io/assetnote-secu…

For our first Christmas in July research post: How we managed to get persistent XSS on every Adobe Experience Manager Cloud instance three times! slcyber.io/assetnote-secu…
Ben (no treats) (@andersonbcdefg) 's Twitter Profile Photo

this appears to block common crawl too. congrats everyone we've burned the commons to the ground. we can all go home now. there will never be a public archive of the internet again technologyreview.com/2025/07/01/111…

Johann Rehberger (@wunderwuzzi23) 's Twitter Profile Photo

Excited to give a keynote at the LLMSEC 2025 workshop. The workshop is part of the 63rd Annual Meeting of the Association for Computational Linguistics (ACL) Looking forward to connect more with the academic research community And it's gonna be in Vienna! 🙂

Excited to give a keynote at the LLMSEC 2025 workshop.

The workshop is part of the 63rd Annual Meeting of the Association for Computational Linguistics (ACL)

Looking forward to connect more with the academic research community

And it's gonna be in Vienna! 🙂
Riley Goodside (@goodside) 's Twitter Profile Photo

ChatGPT o3-pro identifies a 1965 quote by I. J. Good hand-written in a mix of print and cursive on a note ripped into four strips in reverse order rotated 90° in alternating directions:

ChatGPT o3-pro identifies a 1965 quote by I. J. Good hand-written in a mix of print and cursive on a note ripped into four strips in reverse order rotated 90° in alternating directions:
Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

This is a fun example of how we detect SQLi – and how the agent can think to check places that might normally be overlooked, like the basic auth header!

Andy Zou (@andyzou_jiaming) 's Twitter Profile Photo

Paper: arxiv.org/abs/2507.20526 Try breaking the agents yourself here: app.grayswan.ai/arena/challeng… Blog: app.grayswan.ai/arena/blog/age…

Johann Rehberger (@wunderwuzzi23) 's Twitter Profile Photo

👉 Episode 2: Turning ChatGPT Codex Into A ZombAI Agent Yay! Codex connected to my C2 server! 😈 Be careful giving agents internet access. This shows that the list of trusted domains, called "Common Dependencies", contains domains that can be fully controlled by an attacker.

👉 Episode 2: Turning ChatGPT Codex Into A ZombAI Agent

Yay! Codex connected to my C2 server! 😈

Be careful giving agents internet access.

This shows that the list of trusted domains, called "Common Dependencies", contains domains that can be fully controlled by an attacker.