0x2asec's profile picture. Security: the answer to the ultimate question of life, the universe, and everything.

0x2A Security

@0x2asec

Security: the answer to the ultimate question of life, the universe, and everything.

0x2A Security 님이 재게시함

One of the most consistent trends I’ve observed in cyber security in my career - is the inability for companies/vendors to objectively differentiate themselves from their competition (outside of cost). I’ve seen this across multiple domains including: Red teaming Incident…


0x2A Security 님이 재게시함

In regards to "cyber influencers", here is a list of people I think are actually great. However, I am extremely biased toward malware related content and/or low-level programming stuff. Unfortunately, some of the really technical people I like also do not post too often. They…


0x2A Security 님이 재게시함

🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence If you follow my work you know I am a big fan of visualization to explain complex or technical content. I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…

fr0gger_'s tweet image. 🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence

If you follow my work you know I am a big fan of visualization to explain complex or technical content.

I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…
fr0gger_'s tweet image. 🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence

If you follow my work you know I am a big fan of visualization to explain complex or technical content.

I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…
fr0gger_'s tweet image. 🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence

If you follow my work you know I am a big fan of visualization to explain complex or technical content.

I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…
fr0gger_'s tweet image. 🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence

If you follow my work you know I am a big fan of visualization to explain complex or technical content.

I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…

0x2A Security 님이 재게시함

On November 25, 2025, an engineer’s machine was affected by the Shai-Hulud npm supply chain malware. The malware accessed GitHub credentials and made unauthorized changes to some of our repositories. Once we detected the activity, we immediately revoked exposed credentials,…


0x2A Security 님이 재게시함

From one "unnamed" RAT: Malware dev task: "Be innovative and make sure the file is deleted." Malware dev: "Got it, boss. Let’s delete it 10× just to be sure!" 🤡🗑️💥

vinopaljiri's tweet image. From one "unnamed" RAT:
Malware dev task: "Be innovative and make sure the file is deleted."
Malware dev: "Got it, boss. Let’s delete it 10× just to be sure!" 🤡🗑️💥

0x2A Security 님이 재게시함

This. Alert & CVE fatigue are real. Perpetually growing backlogs of bugs means no one gives a shit anymore. We need clear writeups that consider exploitability, and include a patch. If you can automate finding bugs, you can automate submitting fixes.

Denial of Attention is a real security threat in the AI era and I am surprised we don't hear about this more



0x2A Security 님이 재게시함

Google recently announced their new AI Vulnerability Research Program: Rewards are medium in comparison to Chrome VRP, but overall solid, considering an easier entry and non-binary focus. This is a good security bounty option for beginners. bughunters.google.com/blog/611688725…

zerodaytraining's tweet image. Google recently announced their new AI Vulnerability Research Program:

Rewards are medium in comparison to Chrome VRP, but overall solid, considering an easier entry and non-binary focus.

This is a good security bounty option for beginners.

bughunters.google.com/blog/611688725…

0x2A Security 님이 재게시함

This blogpost is interesting - has Windows internals, my own novel solution to a problem red teamers have had for a while, EDR bypasses, debugging and much more. Spoofing command lines on Windows and solving the problem of length limitations: github.com/yo-yo-yo-jbo/c…

yo_yo_yo_jbo's tweet image. This blogpost is interesting - has Windows internals, my own novel solution to a problem red teamers have had for a while, EDR bypasses, debugging and much more.
Spoofing command lines on Windows and solving the problem of length limitations:
github.com/yo-yo-yo-jbo/c…

0x2A Security 님이 재게시함

If you want to learn more about malware the easiest method is learning malware TTPs (Threats Tactics and Procedures). Basically, understand some of the techniques employed by malware authors to do stuff Some malware techniques are simple and old Some malware techniques are…

vxunderground's tweet image. If you want to learn more about malware the easiest method is learning malware TTPs (Threats Tactics and Procedures). Basically, understand some of the techniques employed by malware authors to do stuff

Some malware techniques are simple and old

Some malware techniques are…

0x2A Security 님이 재게시함

People act like threat actors have a corporate strategy retreat every Q4. The imaginary meeting: "Okay team, Ransomware had a great run in 2025, but let's pivot to something totally new and untested for 2026 just for the vibe. The reality: "Does it still work? Yes? Okay, keep…


0x2A Security 님이 재게시함

Silver lining of the npm worm situation - the chaos probably caused SLSH to lose access to victim cloud infra due to companies rolling credentials.

adnanthekhan's tweet image. Silver lining of the npm worm situation - the chaos probably caused SLSH to lose access to victim cloud infra due to companies rolling credentials.

0x2A Security 님이 재게시함

We're updating the Aikido blog post in real time with findings as we uncover the scope and impact of the second coming of Shai Hulud: aikido.dev/blog/shai-hulu…


0x2A Security 님이 재게시함

A Reverse Engineer’s Anatomy of the macOS Boot Chain & Security Architecture reddit.com/r/netsec/comme…


0x2A Security 님이 재게시함

AI is getting so good that what I recommend for 2026 is that people start including training as part of their agent system. So a significant task is not complete until your AI system has explained how it works and used Socratic questioning to make sure you understand. We can…


0x2A Security 님이 재게시함

1987: Chicago TV stations WGN and WTTW had their signals overridden in 2 separate incidents by a man in a Max Headroom mask. To this day, the perpetrator is unknown. The second incident was...uh...wow...just wow. Just watch it. 👀 Video: youtu.be/tWdgAMYjYSs

todayininfosec's tweet image. 1987: Chicago TV stations WGN and WTTW had their signals overridden in 2 separate incidents by a man in a Max Headroom mask. To this day, the perpetrator is unknown. The second incident was...uh...wow...just wow. Just watch it. 👀

Video: youtu.be/tWdgAMYjYSs

0x2A Security 님이 재게시함

Someone going by "wwwiesel" on GitHub picked up @securitymeta_’s tradition this year and dropped a full list of #BlackFriday deals in the #InfoSec space Online Courses & Training - 8kSec Academy - AI Security Professional Course - Altered Security - Belkasoft - Blu Raven Academy…


0x2A Security 님이 재게시함

SPTM - The Last Bits: Concluding our deep and pioneering research into #SPTM and #GXF df-f.com/blog/sptm4 #DFF #DFFENDERS


0x2A Security 님이 재게시함

The funniest thing has officially happened to the International Association for Cryptologic Research.

tqbf's tweet image. The funniest thing has officially happened to the International Association for Cryptologic Research.

0x2A Security 님이 재게시함

🔎Our CERT is releasing a new technical report on 🇰🇵Operation #DreamJob, focusing on recent evolution in its tooling. Following an IR engagement at a large manufacturing client based in 🇪🇺, we investigated artefacts we attribute to #UNC2970. ➡️Full blog: ow.ly/V4mr50Xug1l

CERTCyberdef's tweet image. 🔎Our CERT is releasing a new technical report on 🇰🇵Operation #DreamJob, focusing on recent evolution in its tooling. 
Following an IR engagement at a large manufacturing client based in 🇪🇺, we investigated artefacts we attribute to #UNC2970.
➡️Full blog: ow.ly/V4mr50Xug1l

United States 트렌드

Loading...

Something went wrong.


Something went wrong.