GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Untitled attachment

Download link

Notices where this attachment appears

  1. Embed this notice
    Miguel Afonso Caetano (remixtures@tldr.nettime.org)'s status on Wednesday, 08-Apr-2026 04:29:45 JST Miguel Afonso Caetano Miguel Afonso Caetano

    RT @HedgieMarkets
    🦔An AI agent using Claude autonomously developed two working exploits for a critical FreeBSD kernel vulnerability in roughly four hours of compute time, moving from vulnerability disclosure to a functional root shell attack without human assistance. FreeBSD powers Netflix's content delivery, PlayStation's operating system, and WhatsApp's infrastructure. The same researcher has since used the same pipeline to identify 500 additional high-severity vulnerabilities across various codebases. Developing a single kernel exploit of this complexity previously required weeks of work from elite security specialists.

    My Take
    The number worth understanding here is not four hours. It's 60 days. Industry surveys consistently show the median time for organizations to patch critical vulnerabilities in enterprise environments is around 60 days. An AI can now develop a working exploit within hours of a vulnerability being disclosed publicly. That window between patch availability and weaponized exploit has effectively collapsed to near zero for any organization that isn't patching immediately.

    Kernel exploits have historically been scarce and expensive precisely because building them required deep expertise and significant time. Nation states paid enormous sums for them because they were rare. AI is compressing that cost curve the same way precision munitions moved from superpower monopoly to near-commodity over decades, except this is happening in months. The 500 vulnerabilities already in the pipeline from one researcher using one model suggests this is not an isolated result. Every organization still treating security as a periodic audit rather than a continuous process is now operating on a fundamentally outdated threat model.

    Hedgie🤗

    https://www.forbes.com/sites/amirhusain/2026/04/01/ai-just-hacked-one-of-the-worlds-most-secure-operating-systems/

    In conversation about 6 days ago from tldr.nettime.org permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.