blackwolfslaugh
banner
blackwolfslaugh.bsky.social
blackwolfslaugh
@blackwolfslaugh.bsky.social
Cybersecurity researcher following current conflicts.

Your podcast isn't special
Reposted by blackwolfslaugh
#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malware’s design clearly indicates destructive intent. 1/5
January 23, 2026 at 4:30 PM
Reposted by blackwolfslaugh
Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices.

projectzero.google/2026/01/pixe...
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero
Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...
projectzero.google
January 15, 2026 at 6:56 PM
Reposted by blackwolfslaugh
If you've ever wondered about the infrastructure behind the Internet Archive and the Wayback Machine, check out this teardown ➡️ hackernoon.com/the-long-now...
January 13, 2026 at 6:26 PM
Simple yet effective tricks from this video:
- Giving you source code, betting on people not thinking source will be malware
- Typo-squatting a package just for this
- Putting malicious code on a single line so far off to the side the code editor doesn't show it unless you are willing to scroll
December 29, 2025 at 6:57 AM
Reposted by blackwolfslaugh
The first website ever published: info.cern.ch/hypertext/WW...

See it the way it was originally accessed (line-mode browser simulator): line-mode.cern.ch/www/hypertex...
The World Wide Web project
info.cern.ch
December 29, 2025 at 4:27 AM
Reposted by blackwolfslaugh
Probably old news but my mind is always blown by all the stuff #curl can do. I had zero idea that curl has a —form argument that lets you simulate filling out a form, complete with a file upload. Let me automate a super annoying task for a friend with a dead simple bash script.
December 25, 2025 at 11:34 AM
Absolutely love that they just stuck it on her head like a fancy hat
December 26, 2025 at 11:16 PM
Reposted by blackwolfslaugh
This is a great video about the growth of Flock's persistent AI-powered video surveillance system even as they demonstrate a fundamental incompetence at software engineering and little concern for security.
www.youtube.com/watch?v=vU1-...
This Flock Camera Leak is like Netflix For Stalkers
YouTube video by Benn Jordan
www.youtube.com
December 22, 2025 at 9:55 PM
December 21, 2025 at 1:14 AM
Reposted by blackwolfslaugh
December 13, 2025 at 1:07 PM
Reposted by blackwolfslaugh
MachOs explicitly using MTE in the 26.2 beta IPSW's DMGs (not including kernel/coprocessor fws etc)
November 10, 2025 at 5:01 AM
Reposted by blackwolfslaugh
Indictment for a Ukrainian woman extradited to the U.S. for her part in Cyber Army of Russia Reborn and now NoName057(16) pro-Putin hacktivist attacks.
www.documentcloud.org/documents/26...
USA v Dubranova, et al. INDICTMENT - NoName
www.documentcloud.org
December 11, 2025 at 9:25 AM
The screams in the distance are the people who have to write dual-use sanctions tearing their papers up yet again
A typical example of Russian DIY UGV manufacturing - building a small mining and logistics UGV in a week from an exercise treadmill. t.me/inzheneryChM...
November 25, 2025 at 8:08 PM
Reposted by blackwolfslaugh
#ESETresearch discovered unique toolset, QuietEnvelope, targeting the MailGates email protection system of Taiwanesw co OpenFind. The toolset was uploaded in an archive, named spam_log.7z, to VirusTotal from Taiwan. It contains Perl scripts, 3 stealthy backdoors, argument runner, and misc files. 1/8
November 24, 2025 at 5:57 PM
Someone needs to write a programmer version of those mental load articles to explain why the people drowning open source projects in low-effort AI PRs and bug reports they themselves don't understand are not, in fact, actually helping.
One of the many joys of using AI for programming is the creation of huge PRs on complex topics that the authors barely understand, but still suggest "because they work". Here's a great example from #OCaml github.com/ocaml/ocaml/...

Kudos to OCaml's maintainers for handling this so gracefully.
DWARF support for macOS and Linux by joelreymont · Pull Request #14369 · ocaml/ocaml
DWARF v5 Debugging Support for OCaml Native Compiler This PR adds DWARF v5 debug information to the OCaml native compiler, allowing proper source-level debugging in GDB and LLDB. What's Impleme...
github.com
November 25, 2025 at 8:00 AM
Crowdstrike strikes again
November 21, 2025 at 6:35 PM
Reposted by blackwolfslaugh
Doctor says, 'Dont worry, parser design is simple. Great programmer Kate Compton has written the parser you seek’
November 16, 2025 at 2:44 PM
Tool perhaps? Asking for a friend 👀
You know how ppl say you can't decompile run-only #AppleScript ... 😜 #macOS #security
November 8, 2025 at 1:42 AM
November 7, 2025 at 8:36 PM
Reposted by blackwolfslaugh
Here’s @malwaretech.com take. I encourage more people to look at the samples because, lol.
November 5, 2025 at 8:55 PM
Reposted by blackwolfslaugh
There's some really big caveats to this. A thread.
New: Google says it has discovered at least 5 malware families that use AI to rewrite their code and generate new capabilities on the fly, suggesting AI-powered malware is finally starting to take off. cloud.google.com/blog/topics/...

Report also has interesting stories about state actors' AI use.
November 5, 2025 at 3:52 PM
Reposted by blackwolfslaugh
Huh. At least on macOS, less really is more.
October 31, 2025 at 5:02 PM