“A very stable and straightforward exploit” across distros, developed after Xint Code pointed an LLM at the Linux kernel for “about an hour”
Read the full storyThe Stack
Interviews, insight, intelligence, and exclusive events for digital leaders.
All the latest
All the latest
"You’ll be responsible for inventing clever ways of utilising AI for breaching customer networks and bypassing security controls."
No full exploit chain yet but plenty of hints in new breakdown from WatchTowr
The Windows Endpoint Security Ecosystem Summit on September 10th is expected to sow the seeds of major industry change.
"These individuals appear to be gaining cyber experience and enhancing their technical skills through conducting cyber operations and intrusions."
With 100,000 H100s and 50,000 H200s incoming, xAI can deliver Grok 3 by Xmas says NVIDIA rep in now-deleted post.