The Ghost Proxy Epidemic: How Attackers are Hijacking Clean IP Space

The Ghost Proxy Epidemic: How Attackers are Hijacking Clean IP Space TL;TR  Traditional security relies on “reputation”—blocking IPs known for malicious activity. However, in 2026, the “Ghost Proxy” epidemic has rendered these blocklists obsolete. Attackers are now compromising millions of residential IoT devices and small-business routers to route their traffic through “clean,” high-reputation IP space. This allows

How Large Language Models Automate Ghidra Firmware Analysis 

How Large Language Models Automate Ghidra Firmware Analysis TL;DR   Recent research demonstrates that Large Language Models can automate firmware vulnerability detection when integrated with Ghidra, the NSA’s open-source reverse engineering framework. The automated pipeline combines EMBA for binary identification, Ghidra for decompilation into pseudo-code, and GPT-based LLMs for vulnerability analysis guided by the OWASP IoT Security Testing Guide. This approach transforms firmware security from