Latest posts

All
fashion
lifestyle
sports
tech

Trending News

Popular

14 ways Googlers use AI to work more effectively
WIRED Roundup: Why GPT-5 Flopped
Art charity ‘buzzing’ to move into new £75m Gloucester campus
Myanmar’s massive quake hints at bigger earthquakes to come

14 ways Googlers use AI to work more effectively

11. Keeping our platforms safe. Our Trust & Safety teams use AI to help detect and flag content that may violate our policies. This saves our teams significant time — a critical advantage when our teams manually reviewed more than one billion pieces of content in 2024 alone. 12. Understanding employee feedback. NotebookLM also helps…

Read More

WIRED Roundup: Why GPT-5 Flopped

Zoë Schiffer: Right. I love how you said that. Yeah, basically, if you want to potentially try and curry favor with Trump, you buy into one of these schemes, and maybe you’ll get invited to a fancy crypto dinner, which has happened before. Maybe you get something else. But even just the optics here are…

Read More

Tenda AC20 16.03.08.12 – Command Injection

/* * Exploit Title : Tenda AC20 16.03.08.12 – Command Injection * Author : Byte Reaper * CVE : CVE-2025-9090 * Description: A vulnerability was identified in Tenda AC20 16.03.08.12. Affected is the function websFormDefine of the file /goform/telnet of the component Telnet Service. * target endpoint : /goform/telnet * place in service :…

Read More

Soosyze CMS 2.0 – Brute Force Login

# Exploit Title: Soosyze CMS 2.0 – Brute Force Login # Google Dork: N/A # Date: 2025-08-13 # Exploit Author: Beatriz Fresno Naumova (beafn28) # Vendor Homepage: https://soosyze.com/ # Software Link: https://github.com/soosyze/soosyze # Version: 2.0 (tested) # Tested on: macOS Sonoma 14.x (Apple Silicon M1), /bin/bash 3.2 & Homebrew bash 5.2, curl 8.x, BSD sed …

Read More

Microsoft Windows 10.0.19045 – NTLMv2 Hash Disclosure

# Exploit Title: Microsoft Windows 10.0.19045 – NTLMv2 Hash Disclosure # Date: 13/08/2025 # Exploit Author: Ruben Enkaoua # Author link: https://x.com/RubenLabs, https://github.com/rubenformation # Original Blog: https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ # Vendor Homepage: https://microsoft.com # Software Link: https://www.microsoft.com/en-us/software-download # Version: All versions prior to patch tuesday august 2025 # Tested on: Windows 10.0.19045 # CVE : CVE-2025-50154 #…

Read More