Advertisement · 728 × 90

Posts by ToxSec

Preview
How to Jailbreak Claude Opus 4.7: A Bug Bounty Field Guide Five jailbreak families, the tools bounty hunters actually use, and the mindset that turns a prompt into a payday.

anthropic shipped claude opus 4.7 with a new cyber classifier four days ago. hackerone pays up to $15k per universal jailbreak. one solo operator used roleplay prompts on 4.5 to exfil 150GB from the mexican government. guide drops the taxonomy. #AISecurity #RedTeam

www.toxsec.com/p/how-to-jai...

1 day ago 1 0 0 0

absolutely lol. great call out.

1 day ago 0 0 0 0

ever report a bug and immediately think “i should’ve saved that one for later”? #bugbounty

2 days ago 1 0 0 0

Caffeine intake is directly proportional to triage response time. #BugBounty #InfoSec

2 days ago 1 0 0 0

every time i see a 500 error, i feel like i just poked something i wasn’t supposed to. #bugbounty

3 days ago 0 0 0 0

spent all night fuzzing only to realize the app was down for maintenance. #bugbounty

4 days ago 0 0 0 0
Preview
Anthropic, Google, Microsoft paid AI bug bounties – quietly Exclusive: Researchers who found the flaws scored beer money bounties and warn the problem is probably pervasive

researchers pwned claude code, gemini cli, and copilot agent with a pr title.

johns hopkins team put #prompt injection into a pull request title. the agents read it, followed it, and in claude’s case leaked what could be #credentials through the review comment.

#anthropic paid $100.

5 days ago 2 0 3 0

Cuckoo’s Egg Log Chase (1986) – Astronomer-turned-sysadmin Cliff Stoll traced a 75-cent accounting error to an East-German spy ring stealing U.S. military secrets; armed only with a modem and a spiral notebook. #Hackers

5 days ago 0 0 0 0

red team lives in kali, blue team lives in splunk, neither sleeps. #infosec

1 week ago 0 0 0 0

the morris worm taught everyone that “oops” can be a global event. #hackerhistory

1 week ago 0 0 0 0
Advertisement

bug bounty tip: the best findings are usually hiding behind one extra click. #bugbounty

1 week ago 2 2 1 0

triagers must have a folder called “not reproducible.” #bugbounty

1 week ago 1 0 0 0

If you had to disable one standard service on every freshly deployed server, which would it be?

#ServerManagement #TechDebate

1 week ago 1 0 0 0

Correlate with business logic.
Think like the app owner: can you transfer credits, bypass approvals, or alter invoices? High-impact logic flaws often sit outside classic vuln checklists. #BugBounty

1 week ago 0 0 0 0

The Dark Tangent’s Pager Hack (1993) – At the very first DEF CON, founder Jeff Moss demonstrated pager cloning to show how “private” beeper messages could be intercepted in real time. #Defcon

1 week ago 0 0 0 0
Preview
Project Glasswing: Securing critical software for the AI era A new initiative to secure the world’s most critical software and give defenders a durable advantage in the coming AI-driven era of cybersecurity.

#Claude #Mythos Preview won’t be release to the general public ⚠️

only a special set of defense partners known as Project #Glasswing will get the model.

Anthropic sites an unprecedented jump in cyber capability that is dangerous to release in the current form.

anthropic.com/glasswing

2 weeks ago 1 0 0 0

bug hunting is basically speed dating with error messages. #bugbounty

2 weeks ago 0 1 0 0
Advertisement

If you could magically enforce one security control across the internet, what would it be?

2 weeks ago 0 0 0 0

every payload works in repeater until you show it to the triager. #bugbounty

2 weeks ago 0 0 0 0

The very first webcam (1991) pointed at a coffee pot at Cambridge so sysadmins knew when to refill it. #IT

2 weeks ago 0 0 0 0

i think bug hunting taught me more about debugging than dev ever did. #bugbounty

3 weeks ago 0 0 0 0

That moment when grep finds the secret in node_modules—and you can’t decide whether to celebrate or cry. #infosec

3 weeks ago 0 0 0 0

red teamers call it “initial access.” blue team calls it “a very bad day.” #infosec

3 weeks ago 0 0 0 0

why do all the juicy endpoints have the worst error messages? #bugbounty

3 weeks ago 1 0 0 0
Advertisement

An app feels safe until you examine it closely. #CyberSecurity #AppSafety

4 weeks ago 0 0 0 0

Consider the business logic: could you move credits, skip approvals, or modify invoices? Major logic flaws often lurk beyond standard vulnerability lists. #CyberSecurity

1 month ago 1 0 0 0

Every exposed inference endpoint is a training set for attackers.

High-volume, carefully crafted queries let them clone outputs and rehost your model.

Rate-limit, add noise, and watch for scraping signals.

#BugBounty #AIsecurity #ModelStealing

1 month ago 0 0 0 0

How do you keep motivation up during those endless triage silences? #Triage

1 month ago 0 0 0 0
Preview
The AI Kill Chain Explained: Two Frameworks Every Defender Needs What a kill chain is, why AI needs its own, and how NVIDIA and MITRE ATLAS map attacks on AI systems stage by stage.

nobody scans ports to hack an AI agent. one poisoned document in the RAG pipeline and the model does the rest. NVIDIA and MITRE ATLAS mapped 66+ #AISecurity attack techniques. here's where the chain breaks. #PromptInjection #MLSec
www.toxsec.com/p/ai-kill-ch...

1 month ago 0 0 0 0

Map first, hack second.
Use tools like amass, subfinder, or assetfinder to build a full subdomain list, then verify with httpx or httprobe. A wide, clean recon set is where 80% of finds begin. #BugBounty

1 month ago 2 0 0 0