Yup! You can check the Credits of a song by right clicking on it and View Credits. You might see a pattern with some of the sources.
Posts by Konstantinos (Kosta) Xynos
New game on Spotify unlocked. Identify AI song and block artist. They all have a very similar autotune echo to them.
A movie couple that pretty much did have a podcast despite podcasts not yet existing.
❯ who published the first buffer overflow exploit for Windows? ⏺ That's generally credited to DilDog (Christien Rioux) of L0pht Heavy Industries, who published "The Tao of Windows Buffer Overflow" around 1998. It was a seminal piece of work because prior buffer overflow research (like Aleph One's "Smashing the Stack for Fun and Profit") had focused on Unix/Linux — DilDog's paper laid out the techniques for exploiting buffer overflows on Windows NT specifically, dealing with the different memory layout, SEH, and Win32 API considerations. Given your username, I suspect you already know this. :)
Claude knows what time it is.
Is it medieval hacking themed ?
Learning reverse engineering and hungry for some real-world tips and tricks? Check out this article by Amnesia ("Reverse Engineering Cryptography Code"). This is a solid overview with multiple approaches to the topic.
European Service Module and Earth, as seen from one of the cameras installed on one of the solar wings of the Orion spacecraft, used to take amazing selfies during the Artemis I mission.
Fun fact: the solar wings are used as selfie-sticks. 🤳
Several cameras installed on the wings will take amazing pictures of the spacecraft from different angles.
#Artemis II update: Orion has separated from the rocket's upper stage 🚀
Our European Service Module is in the driving seat!
The seas have boiled and almost all life is gone.
Three data centers remain, solar-powered, in continuous relay with one another.
They continuously transfer electronic funds back and forth with one another, silently.
At long last, the economy is perfect.
This 1-pager from Xusheng Li on GDB internals of how watchpoints are implemented is a delight to read! (especially that double-write behaviour false positive - I did not know about that)
Someone finally hacked the Xbox One (with voltage glitching)
www.tomshardware.com/video-games/...
www.youtube.com/watch?v=FTFn...
For all the people saying that Grammarly should be sued over its "expert review" feature, here is the Grammarly class action lawsuit, alleging violation of the right to privacy and the right of publicity: prf-law.com/current-case...
LIVE FROM TAIPEI, IT'S REAL WORLD CRYPTO!
#realworldcrypto
github.com/bwesterb/qua...
Latest episode of 'Where Warlocks Stay up Late" dropped Featuring yours truly. It goes pretty deep, growing up in Maine, working at Lotus, stories about L0pht you may not have heard, getting fired from @stake. Most personal interview I have ever given.
www.youtube.com/watch?v=j6jh...
Cloud Imperium Games, the game company behind Star Citizen and Squadron 42, says attackers breached systems containing some users' personal information in January.
Google has a main problem now as once benign API keys to work with Maps and Firebase now also allow Gemini access and can expose a whole lot of user data they didn't previously had access to
Almost 3k of these are exposed online
trufflesecurity.com/blog/google-...
I would like to formally announce that the #GlasgowInterfaceExplorer revD development (the next iteration: with the same FPGA but 32 digital I/Os and 8 single-ended analog channels that can be configured as 4 differential ones) is well underway with a CS campaign planned later this year; stay tuned!
RE: infosec.exchange/@harrysintonen/116136789...
"Google API Keys Weren't Secrets. ... But that's no longer true: Gemini accepts the same keys to access your private data."
"With a valid key, an attacker can access uploaded files, cached data, and charge LLM-usage to your account […]
I am sure you have considered releasing them as short stories ?
$4 per bug discovered by AI. AI agentic code audits are already operational in cybersecurity. $600 let discovering 100+ working privilege escalation exploits hiding in Windows kernel drivers shipped by AMD, Intel, NVIDIA, Lenovo, Dell, and IBM. ydinkin.substack.com/p/200-kernel...
The Cycle 2 deadline for the USENIX WOOT Conference is in just one week (March 3, 2026).
Full details are available in the Call for Papers:
www.usenix.org/conference/w...
Talks from the Hackfest 2025 security conference, which took place in October, are available on YouTube
www.youtube.com/playlist?lis...
A quick reminder of what OrangeCon stands for. 🧡 OrangeCon exist to make cybersecurity affordable and accesible for everyone. Curious to learn more about who we are and what we do? Check us out at orangecon.nl
According to a new study from a team of researchers in Europe, vibe coding is killing open-source software (OSS) and it’s happening faster than anyone predicted.
Notice reading: "Important: If you're located in the UK, you may be part of an experiment where your information will be processed by an age-assurance vendor, Persona. The information you submit will be temporarily stored for up to 7 days, then deleted. For ID document verification, all details are blurred except your photo and date of birth, so only what's truly needed for age verification is used."
Discord advises UK users that they "may be part of an experiment" where instead of their age verification data never leaving their phone, it will now actually leave their phone
www.eurogamer.net/discord-advi...