Advertisement · 728 × 90

Posts by NULL

Post image
2 days ago 3 0 0 1
Preview
Hackers claim control over Venice San Marco anti-flood pumps Hackers breached Venice ’s San Marco flood system, claiming control of pumps and the ability to disable defenses and flood coastal areas.

securityaffairs.com/190679/hackt...

1 week ago 2 0 0 0
Things Are Getting Wild: Re-Tool Everything for Speed It’s not often that a force appears that totally re-orients everything in security. This is what we are facing with AI. 12 months ago I had an incrementalist view of the cybersecurity impact of AI. Sp...

www.philvenables.com/post/things-...

2 weeks ago 1 0 0 0
Post image
2 weeks ago 3 0 1 0
Post image
2 weeks ago 2 1 0 0
Post image
1 month ago 9 9 0 0
Post image
1 month ago 1 8 0 0
Preview
Title 32 Cyber Study

www.t32cyber.org

1 month ago 0 0 0 0
Preview
Anthropic CEO's grave warning: AI will "test us as a species" "Humanity is about to be handed almost unimaginable power."

www.axios.com/2026/01/26/a...

2 months ago 1 2 0 0
Advertisement
Post image
2 months ago 2 0 1 0
Post image
2 months ago 0 0 2 0
Preview
County pays $600,000 to pentesters it arrested for assessing courthouse security Settlement comes more than 6 years after Gary DeMercurio and Justin Wynn's ordeal began.

arstechnica.com/security/202...

2 months ago 3 0 0 0
Preview
Have I Been Flocked? - License Plate Privacy Check - Search Flock Safety Audit Logs Have police looked up your travel history? Search Flock Safety audit logs for your license plate

haveibeenflocked.com

3 months ago 5 7 0 1
Preview
Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune Rogue teens have attacked some 120 companies—including Nike, Chick-fil-A, Instacart, and News Corporation—often posing as IT staff.

fortune.com/2026/01/01/f...

3 months ago 4 1 0 0
Preview
New mathematical framework reshapes debate over simulation hypothesis The simulation hypothesis — the idea that our universe might be an artificial construct running on some advanced alien computer — has long captured the public imagination. Yet most arguments about it ...

www.santafe.edu/news-center/...

3 months ago 0 2 0 0
Post image
3 months ago 5 1 0 1
Preview
Reddit and X Users Allegedly Unredact Epstein Files After DOJ Release Users on Reddit and X (formerly Twitter) have reportedly been unredacting files related to Jeffrey Epstein following a Department of Justice (DOJ) release. This activity raises concerns about privacy ...

securityish.com/security_bri...

3 months ago 3 0 0 0
Post image

This is just a reminder to use MFA.

4 months ago 4 3 0 0
Advertisement
Post image
4 months ago 4 3 0 0
Post image
4 months ago 4 0 1 0
Post image
4 months ago 5 0 1 0
Preview
Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera Lazarus-linked IT operatives caught using fake hiring, identity theft tools, and ANY.RUN traps to infiltrate Western companies.

thehackernews.com/2025/12/rese...

4 months ago 1 1 0 0
Preview
Someone Is Trying to ‘Hack’ People Through Apple Podcasts For months Apple Podcasts has been randomly opening spirituality and religion podcasts by itself, and in one case directing listeners to a potentially malicious website.

www.404media.co/someone-is-t...

4 months ago 3 0 0 0
Post image
4 months ago 5 1 0 0
Preview
Ransomware Attack Disrupts Local Emergency Alert System Across US The OnSolve CodeRED platform has been targeted by the Inc Ransom ransomware group, resulting in disruptions and a data breach.

www.securityweek.com/ransomware-a...

4 months ago 4 1 0 0
Preview
CrowdStrike catches insider feeding information to hackers American cybersecurity firm CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with hackers after they were leaked on Telegram by the Scattered Lapsus$ Hunters thre...

www.bleepingcomputer.com/news/securit...

4 months ago 5 0 0 0
Preview
Samsung zero-day lets attackers take over your phone A critical vulnerability that affects Samsung mobile devices was exploited in the wild to distribute LANDFALL spyware.

The victim receives a booby-trapped DNG photo file.

The file, armed with ZIP archive payloads and tailored exploit code, triggers the vulnerability in Samsung’s image codec library.

This is a “zero-click” attack. Just processing the image is enough to compromise the device.

5 months ago 3 2 1 0
Post image
5 months ago 1 0 0 0
Advertisement
Post image
5 months ago 3 1 1 0

China just used Claude to hack 30 companies.

assets.anthropic.com/m/ec212e6566...

5 months ago 1 1 0 0