Advertisement · 728 × 90

Posts by Riley

Bluesky User Counter

This has moved to "increasing steadily" from "barely increasing". Today should be fun.

37 minutes ago 0 0 0 0
Preview
Residential proxies evaded IP reputation checks in 78% of 4B sessions Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.

5 days ago 7 2 0 1

Turboquant llama cpp with 1 bit bonsai models is kind of insane. I just got an 8 billion parameter bonsai 1 bit model running at 10 tokens per second with good answers running on an 8gb M1 Macbook pro with enough free ram left over for kde, vivalci, zed, and multiple terminals like it's nothing.

5 days ago 0 0 0 0

jesus christ i need a new computer and im not sure what to do about it. im not sure i can build these projects with what i got

6 days ago 0 0 0 0
Sublime - Until The Sun Explodes (Official Music Video)
Sublime - Until The Sun Explodes (Official Music Video) YouTube video by Sublime

Bradley's kid is a chip off the block and that apple landed right on the tree and stayed there.

6 days ago 0 0 0 0
The Secret Spy Tech Inside Every Credit Card
The Secret Spy Tech Inside Every Credit Card YouTube video by Veritasium

I wish I posted hopeful things, I really do.

1 week ago 0 0 0 0
Preview
Apple Gives FBI a User’s Real Name Hidden Behind ’Hide My Email’ Feature The move isn't surprising, but shows what data is available to authorities when paying Apple customers use the Hide My Email feature.

In something you don't see everyday, the Apple gave the FBI the real name and email address of one of its customers using Apple's 'Hide My Email' feature. This lets you generate random email addresses to protect your privacy www.404media.co/apple-gives-...

1 week ago 308 133 11 16
Advertisement

It's the big reason i was "shutter the Olympics" before all of this happened. Which is now of course, doubly so after this decision.

1 week ago 5 0 0 0

i have problems with the Olympics from a foundational perspective before we even get to trans rights. Have you ever dove into what it costs to be an Olympian? What MOST of them can make after all of those expenditures and loans? it's a cycle of debt and financial ruin when you deep dive that.

1 week ago 5 0 2 0

so by trying to turn a 8gb 2020 M1 into an ai experiment lab i somehow ended up spending the last 6 hours getting hyprland and quickshell running.

this is how addiction starts

1 week ago 1 0 0 0
Preview
Transformer Shortage Threatens AI Chip Factories Micron's Singapore fab needs 500 transformers, exposing a critical shortage that could delay AI chip production globally. Electrical equipment becomes the new bottleneck.

Transformer Shortage Threatens AI Chip Factories

#AI #Semiconductors #InfrastructureBottleneck #AusNews

thedailyperspective.org/article/2026-03-25-trans...

1 week ago 1 2 0 0

I think the bigger question for us isn't just "can we trust the ai's constitution and safety guardrails?". It's at the very least just as much "Can we trust absolutely every user in our org to be responsible when using an llm". For me the answer is, it depends on which llm, and HELL NO to the second

1 week ago 0 0 0 0
Video

📅 Delighted to announce that I'll be delivering the keynote at Cybercon Staffordshire on Weds 8 April, at the Wade Conference Centre, Stoke-on-Trent.

I'll be discussing how your AI workforce might actually be your biggest security risk.

Free tickets: www.grahamcluley.com/cybercon

1 week ago 14 3 1 0
Preview
Nate’s Substack | Substack Daily newsletters on AI strategy, news, and implementation for practitioners and leaders who are past the hype and ready to build. Click to read Nate’s Substack, a Substack publication with hundreds o...

Nate’s Substack Nate has a solid handle on the state of ai and agentic development. Follow Nate

1 week ago 0 0 0 0
This Is Crazy
This Is Crazy YouTube video by The PrimeTime

This seems bad

1 week ago 0 0 0 0
An excerpt from the 2024 book Play Nice: The Rise, Fall, and Future of Blizzard Entertainment, telling the story of how author Andy Weir was fired from Blizzard

An excerpt from the 2024 book Play Nice: The Rise, Fall, and Future of Blizzard Entertainment, telling the story of how author Andy Weir was fired from Blizzard

This past weekend, the new movie Project Hail Mary was a smash hit, bringing in nearly $141 million at the box office.

But many years ago, before he was writing novels adapted into mega-hit films, Andy Weir was fired from his dream job... at Blizzard Entertainment. Excerpt from my latest book:

2 weeks ago 1857 229 41 12
Preview
the case for hydrant why should you use hydrant? how does it compare to tap?

i wrote a little something ^^

2 weeks ago 76 30 1 5
Advertisement
What AI was built for 😹
What AI was built for 😹 YouTube video by BYTE JOKE
2 weeks ago 1 0 0 1
🛡️ Straylight Sentinel Intelligence Report | Saturday, March 21, 2026 | 14:50 UTC | Riley image 🛡️ Straylight Sentinel Intelligence Report | Saturday, March 21, 2026 | 14:50 UTC 🛡️ /Straylight Sentinel Brief \[Saturday, March 21, 2026 | 14:50 UTC Edition] Listen to the Sentinel Brief B...

This morning's Straylight Sentinel Intelligence Brief for all of my #cybersecurity and #infosec friends may have been late this morning because someone insisted on watching @btsofficialtweets.bsky.social BTS The Comeback Live this morning. But I cannot confirm or deny that.

2 weeks ago 0 0 0 0
Portable hardware-backed passkeys using TPM 2.0 I built a tool that makes TPM 2.0 passkeys portable across devices: https://github.com/mimi89999/webauthn_tpm_portable The problem: password managers store passkey private keys in software, which m...

Portable hardware-backed passkeys using TPM 2.0

2 weeks ago 3 1 0 0
🛡️ Straylight Sentinel Intelligence Report | Saturday, March 21, 2026 | 05:23 UTC | Riley image 🛡️ Straylight Sentinel Intelligence Report | Saturday, March 21, 2026 | 05:23 UTC 🛡️ /Straylight Sentinel Brief \[Saturday, March 21, 2026 | 05:23 UTC Edition] Listen to the Sentinel Brief B...

Hello #cybersecurity and #infosec people. Here's your edition of the Straylight Sentinel Intelligence Report and Podcast.

2 weeks ago 0 0 0 0
Preview
a man in a suit and tie is making a funny face with his eyes closed and his hands folded . Alt: a man in a suit and tie is making a funny face with his eyes closed and his hands folded .

That moment you realize you just spent 15 hours yesterday building an Ubuntu server on your own time so you could then, wipe that server and install a different operating system today, because, reasons

2 weeks ago 0 0 0 0

Thanks to AI-driven exploit dev, no hardware or OS is "secure" by default anymore. We have to move toward friction-based defense. A 24-hour timer is a simple, effective tool to slow down an adversary that never sleeps.

2 weeks ago 2 0 0 0

From a vendor standpoint, this also addresses liability. If a user bypasses multiple warnings and waits out a day-long timer to install a malicious file, the OS provider has done its due diligence to prevent a catastrophe.

2 weeks ago 2 0 1 0

In this environment, time is the defender's only remaining lever. By forcing a 24-hour wait period for unsigned code, we break the "instant-pwn" cycle. It creates a window for automated Play Protect scans to catch a new signature before it can execute.

2 weeks ago 2 0 1 0
Advertisement

The goal for these agents is often the deployment of bespoke malware via custom APKs. Whether a user is social-engineered into a manual install or an exploit chain triggers a remote download, the objective is the same: code execution.

2 weeks ago 2 0 1 0

These AI agents operate in "autonomy mode," acting as a 24/7 automated red team. They methodically develop, test, and deploy exploits, systematically cycling through every known disclosure to find a way into a target device.

2 weeks ago 2 0 1 0

We are currently tracking multiple APT (Advanced Persistent Threat) groups and state-sponsored actors using LLM-based coding agents. These entities ingest entire vulnerability databases from CISA and ENISA to feed their development pipelines.

2 weeks ago 3 0 3 0

Google’s decision to implement a 24-hour timer for non-signed APKs is a necessary response to a massive shift in the threat landscape. As a defender, I see "doing nothing" as a non-starter. Here is why this delay matters from a cybersecurity perspective.

2 weeks ago 3 0 1 0

Theres no point

2 weeks ago 0 0 0 0