Acoustic Keystroke Recovery - Reconstructing Typed Text from a Laptop Microphone (Full Guide, 85% success rate)
Around 85% success rate of keystroke recovery with our script :)
[link] [comments]
Around 85% success rate of keystroke recovery with our script :)
TL;DR: If a large model finds a 0-day with 90% probability, and a small model with 50% probability, but the small model costs 10x less, it is better to use the small model.
We compared the cost and recall of various models in finding real, recent zero-days and found that for most applications, smaller models run repeatedly can significantly outperform larger frontier models on cost-to-recall.
Disclaimer: I'm involved with Hacktron, the company that produced this research. This is a factual presentation of our benchmarks, which we hope the community can use to make informed decisions about models like Mythos.
Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.
As always, the content & discussion guidelines should also be observed on r/netsec.
Feedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
This new report is kind of a wake-up call. KnowBe4 says 86 percent of phishing attacks are now AI-driven, and it shows. It is not just email anymore either. Attackers are hitting Teams, calendar invites, and basically any tool people trust at work. The scary part is how convincing this stuff is getting, especially with internal impersonation and multi-channel setups. At some point, it feels like companies may need AI defending them just to keep up, because humans alone are going to have a harder time spotting this.
This new Linux kernel bug called Copy Fail (CVE-2026-31431) is kinda terrifying because itβs not complicated at all. A normal user can run a tiny 732-byte script and get root, no race conditions or luck required, and it works across major distros like Ubuntu, RHEL, and SUSE. The exploit quietly modifies the page cache instead of the file on disk, so integrity checks donβt catch it, but the kernel still executes the tampered version in memory.
Even worse, since the page cache is shared, it can potentially cross container boundaries too. Patch ASAP if your distro hasnβt already, because this one feels way too reliableβ¦
As we commonly know in appsec, not every vulnerability, even if critical 10 is relevant. This is a take from my buddy Brian Vermeer at Snyk, he's a Java Champion and offers his opinion as a developer to the Thymeleaf vulnerability CVE-2026-40478
With everything that's happened recently, the Axios npm account hijack, LiteLLM getting poisoned on PyPI, and that coordinated npm/PyPI/Docker Hub campaign in April, I finally stopped manually running npm audit and set up something proper.
Been running Dependency-Track for a few weeks now. It's an OWASP open source project that works differently from the usual scanners, you upload an SBOM for each project and it continuously monitors against NVD, OSS Index, GitHub Advisories, and more. New CVE drops affecting your stack? You get notified without doing anything.
Wrote up how I set it up on Hetzner with Docker, Traefik for HTTPS, and GitHub Actions to auto-generate and upload SBOMs on every push
Summary: Iβm disclosing a full-chain CVSS 10.0 RCE affecting Microsoft Semantic Kernel (.NET v1.74) and the new Agent Framework 1.0.
The Timeline & Conflict: > * March 24: Initial disclosure sent to MSRC with PoC.
Technical Scope:
Full paper, .cast exploit recordings, and a production-ready C# remediation filter are available at the link.
The core issue: Windows RPC runtime doesn't verify whether the server a high-privileged client connects to is legitimate. If a target RPC server is unavailable, an attacker with SeImpersonatePrivilege can spin up a fake RPC server mimicking the same endpoint, wait for a SYSTEM-level client to connect, then call RpcImpersonateClient to escalate privileges.
Five confirmed escalation paths:
- gpupdate /force β SYSTEM (coerces Group Policy service)
- Microsoft Edge launch β Administrator (no coercion needed)
- WDI background service β SYSTEM (fires every 5β15 min automatically)
- ipconfig + disabled DHCP β Administrator
- w32tm.exe β Administrator via non-existent named pipe
Microsoft assessed this as moderate severity, issued no CVE, and has no patch planned β justification being that SeImpersonatePrivilege is a prerequisite.
Questions for the community:
Are you monitoring for RPC_S_SERVER_UNAVAILABLE (Event ID 1 via ETW) in your environment?
Any Sigma/Defender rules already written for this?
Do you agree with Microsoft's severity assessment given how common SeImpersonatePrivilege is on IIS/SQL servers?
Kaspersky's full write-up + PoC: https://securelist.com/phantomrpc-rpc-vulnerability/119428/
[ Removed by Reddit on account of violating the content policy. ]