Advertisement · 728 × 90

Posts by x0rz

Preview
Verifium - iOS Security & Privacy Auditor An open-source iOS privacy and security auditor based on industry-standard best practices.

Is your iPhone secure? Verifium is a free open-source iOS auditor. It runs local checks against renowned security and privacy guidelines. Zero data leaves your device: verifium.app

3 weeks ago 12 9 1 1
Preview
Poland arrests Russian suspected of hacking Polish companies A Russian citizen suspected of hacking IT systems of Polish companies was arrested in Krakow, Polish Interior Minister Marcin Kierwinski said on Thursday.

"A Russian citizen suspected of hacking IT systems of Polish companies was arrested in Krakow, Polish Interior Minister Marcin Kierwinski said on Thursday."

www.reuters.com/world/poland...

4 months ago 12 4 0 1
Preview
AI assistants make widespread errors about the news, new research shows Leading AI assistants misrepresent news content in nearly half their responses, according to new research published on Wednesday by the European Broadcasting Union (EBU) and the BBC.

AI assistants make widespread errors about the news, new research shows reut.rs/4qkIfvx

5 months ago 258 122 32 76
Preview
Russia is helping prepare China to attack Taiwan, documents suggest Russia is using its battlefield experience to give Chinese airborne units the training and technical knowhow to carry out lightning-fast operations.

Taiwan having to defend itself against both China AND Russia would be a tall order. www.washingtonpost.com/world/2025/0...

6 months ago 8 9 1 0

Dubai chocolate is a psyop

6 months ago 5 2 1 0

It is

6 months ago 1 0 0 0
Post image

1/ China’s cyber capabilities didn’t start top-down, they started with raw hacking talent. The new CSS/ETH report "Before Vegas" traces how informal talent shaped China’s cyber ecosystem, moving from online forums to industry leaders (link in thread).

9 months ago 15 8 1 0
Advertisement
Preview
Telegram, the FSB, and the Man in the Middle The technical infrastructure that underpins Telegram is controlled by a man whose companies have collaborated with Russian intelligence services. An investigation by IStories

2/2 Russia at will. Although he claims to be apolitical, he denies responsibility for the crimes that are enabled by his platform. He loves to dish out advice to Western politicians, but hates paying taxes and prefers to live in a dictatorship. In short, he embodies the stereotypical Russian.

10 months ago 18 7 1 0
Preview
China accuses US of launching 'advanced' cyberattacks, names alleged NSA agents Chinese police in the northeastern city of Harbin have accused the United States National Security Agency (NSA) of launching "advanced" cyberattacks during the Asian Winter Games in February, targeting essential industries.

Following long practice of US gov indicting Chinese/Russian state hackers for breaching US systems, China has named and issued warrants for 3 NSA workers it says were behind hacks of China systems during Asian Winter Games. Also says University of California and Virginia Tech participated in attacks

1 year ago 19 8 1 1
Preview
You will always remember this as the day you finally caught FamousSparrow ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor.

ESET disputes Microsoft's classification of the FamousSparrow APT as part of the Salt Typhoon group.

ESET believes the two APTs may be using a shared digital quartermaster (malware and tools developer).

www.welivesecurity.com/en/eset-rese...

1 year ago 6 5 1 0

When the answer to "are you cheating on me?" is "who told you that?" and not "no"

1 year ago 2190 391 64 9
Post image

@hpiedcoq.bsky.social đŸ‡·đŸ‡ș👀

1 year ago 2 0 1 0
Tweet by Graham Stuart, Tory MP @grahamstuart:
We have to consider the possibility that President Trump is a Russian asset.
If so, Trump's acquisition is the crowning achievement of Putin's FSB career - and Europe is on its own.

Tweet by Graham Stuart, Tory MP @grahamstuart: We have to consider the possibility that President Trump is a Russian asset. If so, Trump's acquisition is the crowning achievement of Putin's FSB career - and Europe is on its own.

Extraordinary comment from Tory MP Graham Stuart:

“We have to consider the possibility that President Trump is a Russian asset.
If so, Trump's acquisition is the crowning achievement of Putin's FSB career.”

(Narrator: It’s extraordinary because our own gd government didn’t say it first.)

1 year ago 2656 975 126 71

It shouldn’t take a panic over Chinese AI to remind people that most companies in the business set the terms for how they use your private data.

And when you use their AI apps, you’re doing work for them, not the other way round.

1 year ago 75 19 3 0

being able to walk away from the internet, even via laptops was nice

1 year ago 8 2 0 1
Advertisement
Post image Post image

Ah yes. We're at the 'pUt It On ThE bLoCkChAiN' stage.

1 year ago 293 35 27 13

It's like Ivanti. Every month is zero-day awareness month.

1 year ago 2 1 0 0

I can never fully know if I already read this "Fortinet 0day in the wild" article 3 weeks ago or if it’s new. Ha, never mind! It’s new đŸ„Č

1 year ago 16 8 2 0
Preview
StravaLeaks : des dates de patrouilles des sous-marins nuclĂ©aires français dĂ©voilĂ©es par l’imprudence de membres d’équipage Des membres d’équipage des sous-marins français dotĂ©s de l’arme atomique partagent publiquement leurs activitĂ©s sportives par le biais de l’application Strava, divulguant ainsi, par inadvertance, des ...

LeMonde investigation finds that members of a French nuclear-armed submarine crew inadvertently shared sensitive information about the patrol schedule of the ship via the Strava workout app: www.lemonde.fr/videos/artic...

1 year ago 26 17 2 5

We're witnessing the evolution of ransomware.

Yesterday someone informed us of the existence of the new TTP of AWS S3 extortion. More specifically, Threat Actors abusing the Amazon Key Management Service (KMS) to encrypt company AWS buckets (or any cloud provider).

1 year ago 88 30 8 4
Preview
How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons Massive “Typhoon” cyberattacks on U.S. infrastructure and telecoms sought to lay the groundwork for potential conflict with Beijing, as intruders gathered data and got in position to impede response a...

incredibly detailed piece on Salt and Volt Typhoon (apparently named as if they're brothers)

"a cybersecurity vendor notices the activity and flags it to the port's cybersecurity chief, who examines it and decides it's a false alarm. He heads to lunch at Whataburger."

www.wsj.com/tech/cyberse...

1 year ago 27 8 1 0
Court order text. Link to follow

Court order text. Link to follow

Court order text. Link to follow

Court order text. Link to follow

Court order text. Link to follow

Court order text. Link to follow

Court order text. Link to follow

Court order text. Link to follow

BREAKING: court finds NSO Group liable for #Pegasus hacking of #WhatsApp users.

Big win for spyware victims.

Big loss for NSO.

Bad time to be a spyware company.

Landmark case. Huge implications. 1/ đŸ§”

1 year ago 650 318 12 30
Post image

This aspect of restructuring authority between NSA and USCYBERCOM in light of a dual-hat split is one I hadn’t considered before:

1 year ago 9 4 1 0
Advertisement

I don’t normally get worked up about the naming threat actors thing.

But the Volt & Salt Typhoon is a disaster as it’s so hard for non-specialists to tell them apart:

- Salt is Snowden style espionage by China against US

- Volt is a direct 🇹🇳 military threat to degrade western infrastructure 1/2

1 year ago 131 39 7 6

The US Treasury has sanctioned Sichuan Silence, the Chinese company that developed exploits against Sophos firewalls

home.treasury.gov/news/press-r...

1 year ago 18 10 1 1

Free backup service!

1 year ago 1 0 0 0

Why the f*ck does my Windows trying to reach browser.events.data.msn[.]cn

1 year ago 4 0 1 0
Preview
Top senator calls Salt Typhoon ‘worst telecom hack in our nation’s history’ The severity of the Chinese breach highlights the need for more telecommunications regulation, lawmakers say.

"The networks are still compromised, and booting the hackers out could involve physically replacing “literally thousands and thousands and thousands of pieces of equipment across the country,” specifically outdated routers and switches" đŸ•”ïžâ€â™‚ïž

1 year ago 44 37 1 3