Diagram titled “Transformer attention.” It shows three steps of the attention computation with code snippets beside each step. The first step is “Scale factor 1/√dₖ,” highlighting code that computes the reciprocal square root. The second step is “Dot product Q · K,” showing code performing a dot-product accumulation. The third step is “Scaling + max tracking,” highlighting code that multiplies by the scale factor, stores the value, and updates a running maximum. The phrase “Transformer attention” appears prominently in the center.
The slides from my @re-verse.io talk, "Challenges in Decompilation and Reverse Engineering of CUDA-based Kernels", are now online!
Slides: nicolo.dev/files/pdf/re...
Plugin: github.com/seekbytes/pt...
08.03.2026 13:06
👍 5
🔁 2
💬 1
📌 0
Deconstructing Rust Binaries
Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical…
Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!
ringzer0.training/countermeasu...
#infosec #ReverseEngineering #rustlang #MalwareAnalysis
07.03.2026 21:14
👍 3
🔁 3
💬 0
📌 0
A Deep Dive into the GetProcessHandleFromHwnd API - Project Zero
In my previous blog post I mentioned the GetProcessHandleFromHwnd API. This was an API I didn’t know existed until I found a publicly disclosed UAC bypass us...
In the final part of his blog series, @tiraniddo.dev tells the story of how a bug was introduced into a Windows API.
Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process.
projectzero.google/2026/02/gphf...
26.02.2026 19:41
👍 5
🔁 4
💬 0
📌 0
Hacking conference Def Con bans three people linked to Epstein | TechCrunch
The Def Con hacking conference banned hackers Pablos Holman and Vincenzo Iozzo, as well as former MIT Media Lab director Joichi Ito, from attending the annual conference after their reported connectio...
NEW: Def Con banned hackers Pablos Holmes and Vincenzo Iozzo, as well as former MIT Media Lab director Joichi Ito, from attending the conference based on their links to Jeffrey Epstein.
Holmes and Iozzo exchanged emails with Epstein for several years.
18.02.2026 22:06
👍 116
🔁 37
💬 3
📌 4
Meta is putting a "Name Tag" feature in Ray-Bans - facial recognition through the glasses' camera. You look at someone, AI tells you who they are.
In an internal document, the company wrote that the timing is good because civil society groups are busy with politics and won't cause problems.
14.02.2026 17:19
👍 1224
🔁 760
💬 34
📌 151
Hello, World! Welcome back! I have new blog :-)
tracesofhumanity.org/hello-world/
01.02.2026 17:18
👍 26
🔁 5
💬 4
📌 0
Hadn't realised that the third party review of Twitter's chat protocol had been published and wow github.com/trailofbits/...
28.01.2026 18:21
👍 119
🔁 35
💬 2
📌 6
RE//verse 2026
Schedule
The RE//verse 2026 schedule is live and the lineup is stacked! Check it out:
reverse-2026.sessionize.com/schedule
16.01.2026 19:30
👍 3
🔁 3
💬 0
📌 0
REcon 2026 - Premier Reverse Engineering Conference
REcon 2026 - Premier reverse engineering and cybersecurity conference in Montreal
🚨 REcon 2026 is LIVE!
🚀 Call for papers and registration are now open!
Join the world's top reverse engineers & exploit devs in Montreal:
🛠 Trainings: June 15-18
📅 Conference: June 19-21
Tickets & early bird now open → recon.cx
Limited spots – see you in MTL! #REcon2026 #ReverseEngineering
13.01.2026 21:11
👍 8
🔁 3
💬 0
📌 2
Nicolò Altamura digs into decompiling CUDA kernels at RE//verse 2026! He takes a look at how GPU execution and NVIDIA’s IRs change the usual assumptions for decompilers and shows early work on a Binary Ninja PTX plugin aimed at real CUDA reversing. Don't miss out: shop.binary.ninja/collections/...
12.01.2026 18:45
👍 3
🔁 1
💬 0
📌 1
A Glimpse Into DexProtector | Romain Thomas
This blog post provides a high-level overview of DexProtector's security features and their limitations
I reverse engineered DexProtector, the security solution protecting applications like Revolut and other banking apps.
From custom ELF loaders to vtable hooking, here is an insight into how these protections work and their limitations.
www.romainthomas.fr/post/26-01-d...
05.01.2026 06:11
👍 33
🔁 12
💬 0
📌 0
Excited to bring Deconstructing Rust Binaries to NorthSec in March! Chat with me here or at @decoderloop.com if you have questions about the training.
Take advantage of the early bird rate for the onsite option! Pricing is in CAD, take advantage of the exchange rate (:
nsec.io/training/202...
18.12.2025 22:13
👍 5
🔁 3
💬 0
📌 0
Google Project Zero
Make zeroday hard
We launched a redesigned Project Zero website today at projectzero.google !
To mark the occasion, we released some older posts that never quite made it out of drafts.
Enjoy!
17.12.2025 00:22
👍 18
🔁 4
💬 0
📌 1
Exploiting Anno 1404
Exploiting Anno 1404
[New blog post] As part of an R&D project, @tomtombinary.bsky.social identified several critical vulnerabilities in the LAN multiplayer mode of the game Anno 1404 (released in 2009) 🔍
Want to know more?
Read the full article on our blog 👇
www.synacktiv.com/en/publicati...
16.12.2025 15:56
👍 3
🔁 3
💬 0
📌 0
V8 now has a JS bytecode verifier!
IMO a good example for the benefits of the V8 Sandbox architecture:
- Hard: verify that bytecode is correct (no memory corruption)
- Easier: verify that it is secure (no out-of-sandbox memory corruption)
The sandbox basically separates correctness from security.
09.12.2025 10:00
👍 20
🔁 4
💬 1
📌 0
YARA fans, check out this great new @binary.ninja plugin!!!
08.12.2025 21:30
👍 3
🔁 1
💬 0
📌 0
Binary Ninja 5.2, Io, is live and it's out of this world! binary.ninja/2025/11/13/b...
With some of our most requested features of all time including bitfield support, containers, hexagon, Ghidra import, and a huge upgrade to TTD capabilities, plus a ton more, make sure to check out the changelog!
13.11.2025 21:16
👍 9
🔁 3
💬 1
📌 0
A screenshot of DiaSymbolView inspecting combase.pdb
I wanted to understand what information is available in .pdb files, so I made a tool for it 🔎🐛
Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA: github.com/diversenok/D...
10.11.2025 21:04
👍 10
🔁 4
💬 1
📌 0
What the hell are we doing? · Addison Crump
Homepage for Addison Crump
Must-read for fuzzing folks (read: tooling/algorithms/academia) by Addison Crump
addisoncrump.info/research/wha...
26.10.2025 03:16
👍 30
🔁 11
💬 1
📌 1
if u want a high quality curated source of news relevant to defenders, LOOK AT THIS SITE
25.10.2025 05:11
👍 6
🔁 2
💬 0
📌 0
Impressive reverse engineering kung fu against widevine L3 by Felipe (x.com/_localo_) ! #hacklu
Cc @mrphrazer.bsky.social
23.10.2025 13:01
👍 3
🔁 2
💬 1
📌 0
U.S. government accuses former L3Harris cyber boss of stealing trade secrets | TechCrunch
The U.S. Department of Justice accused Peter Williams, former general manager of L3Harris’ hacking division Trenchant, of stealing trade secrets and selling them to a buyer in Russia.
NEW: The U.S. govt accused Peter Williams, ex general manager of hacking tool maker L3Harris Trenchant, of stealing trade secrets and selling them to buyer in Russia.
As we reported earlier, Trenchant investigated a leak of internal tools this year. It's unclear if that investigation is related.
23.10.2025 15:47
👍 25
🔁 21
💬 1
📌 4
Exclusive: Apple alerts exploit developer that his iPhone was targeted with government spyware
A developer at Trenchant, a leading Western spyware and zero-day maker, was suspected of leaking company tools and fired. Weeks later, Apple notified him that his personal iPhone was targeted with spy...
SCOOP: A man who worked on developing hacking and surveillance tools for defense contractor L3Harris Trenchant was notified by Apple that his iPhone was targeted with mercenary spyware.
The developer believes he was targeted after he was wrongly accused of leaking zero-days developed by Trenchant.
21.10.2025 14:54
👍 27
🔁 24
💬 2
📌 3