JHunt🛡️
@jhuntinfosec.com
1.6K followers 2.1K following 58 posts
👨‍💻 coder + hacker + engineer. 🏹 Hunting Adversaries. 🦅 #Philly sports 🎮 Video games. Views/Opinions are my own. Freedom for all. 🇺🇸🏳️‍🌈🏳️‍⚧️🇺🇦 Posts/Skeets disappear. Re-post ≠ endorsement.
Posts Media Videos Starter Packs
Reposted by JHunt🛡️
The platform will survive but there are a lot of people I really enjoyed following who either no longer post here or rarely post here now because of various dogpiles that span a whole range of topics. This platform absolutely has a dogpiling problem, and the experience here is worse because of it
Reposted by JHunt🛡️
I do think folks really underappreciate how much dogpiles on this platform are actually just toxic behavior that has quite earnestly made the platform worse and less interesting than it would otherwise have been by now, even if it feels nice to vent in the moment
Reposted by JHunt🛡️
Think you understand how LLMs work? You might be surprised. 😳

In his latest blog post, @blaisebrignac.bsky.social explains the history, challenges, and attack primitives that make securing AI systems such an extreme challenge.

Read more: ghst.ly/497pxl0
A Gentle Crash Course to LLMs - SpecterOps
This is a crash course on the evolution of Machine Learning and modem AI, Large Language Models, and the security implications that come with them.
ghst.ly
Reposted by JHunt🛡️
Regarding F5 network compromise (see my.f5.com/manage/s/art...):

We are sharing daily IP data on F5 exposures in our Device ID www.shadowserver.org/what-we-do/n... (device_vendor set to F5).

~269K IPs seen daily, nearly half in US.

Geo breakdown: dashboard.shadowserver.org/statistics/i...
Reposted by JHunt🛡️
Axios @axios.com · 12h
The Pentagon's new rules for press credentials led to a mass exodus of nearly every Pentagon reporter.

Here's what the rules actually say.
What the new Pentagon media rules actually say
The Pentagon is standing by its policy despite protests from the press.
www.axios.com
Reposted by JHunt🛡️
Reposted by JHunt🛡️
In early October 2025, Microsoft disrupted a Vanilla Tempest campaign by revoking over 200 certificates that the threat actor had fraudulently signed and used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware.
The text "Vanilla Tempest" and the icon for financially motivated threat actors in white against a blue background.
Reposted by JHunt🛡️
Talks from the REcon 2025 security conference, which took place in June, are available on YouTube

www.youtube.com/@reconmtl/vi...
Reposted by JHunt🛡️
Reposted by JHunt🛡️
Oh look, my long-suffering friends @msrc.microsoft.com are here now.
Reposted by JHunt🛡️
NBA @nba.com · 1d
🚨 Watch the Mavs take on the Lakers LIVE on ESPN!

➡️ www.nba.com/how-to-watch...
Reposted by JHunt🛡️
I don’t hold it against them (I understand the sentiment that you don’t want to think about “politics” 24/7) BUT, to think you don’t have to consider it or think about it at all is naive, and borderline delusional.
I see it a lot, especially on the red side. “I just wanna hack shit man.”

Yeah? For who? Who are your clients? What are their politics? Many don’t want to think about it.
Reposted by JHunt🛡️
Cybersecurity was always political.
You can't escape effects on defense, intelligence, and even the increasingly flooded industry job market by closing your eyes really hard and sticking your fingers in your ears. You can't escape cybersecurity being political by being, "not really into politics".
only losers say shit like that