Posts by Ali
California-based startup Sabi is developing a thought-to-text wearable that could usher in the cyborg future. www.wired.com/story/this-b...
Last April, a hacker hijacked crosswalk announcements to mimic Mark Zuckerberg and Elon Musk. Records obtained by WIRED reveal how unprepared local authorities were. www.wired.com/story/crossw...
As major news outlets cut off the Wayback Machine, journalists and advocacy groups are rallying to protect the Internet Archive’s vast collection of web pages. www.wired.com/story/the-in...
IOC overlap from axios attack und WAVESHAPER.
It appears highly probably that #DPRK was behind the #axios attack! (IOC comparison by x.com/dez_) A further noteworthy detail is that the #threatactors compromised the website npm.org (National Association of Pastoral Musicians) so they could host their #payloads on packages.npm.org! #cyber
Thanks!
Substack cover photo
I've just written my first blog post detailing my approach to the first installment of @bellingcat.com's Background Check series! I'd be delighted if anyone could take a read and share your thoughts 😄
#OSINT #Bellingcat #Substack #blogs
open.substack.com/pub/ali13651...
As war reshapes the Gulf, the satellite infrastructure the world relies on to see conflict clearly is being delayed, spoofed, and privately controlled—and nobody is sure who is responsible. www.wired.com/story/when-s...
This is a good write-up of the recent Trivy supply chain attack, really informative. Apparently TeamTCP "are currently extorting several multi-billion-dollar companies from which they've exfiltrated data."
#cyber #trivyattack #cybersecurity #malware #teamtcp
www.crowdstrike.com/en-us/blog/f...
This is so very frightening... The erosion of end-to-end encryption is a slippery slope for digital rights! This is surveillance creep: one more step towards a panoptikum where nothing is truly private.
#digitalrights #privacy #Meta #E2EE
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites.
Flexport CEO Ryan Petersen says the conflict is stranding cargo and threatening inflation. www.wired.com/story/iran-w...
Amsterdam Centraal
Just enjoyed a few of the latest #OSINT challenges from #TraceLabs - quite an interesting exercise, I must say. These are a great way to test one's OSINT skills, even if some are on the easier side! I employed the obvious methods: basic Google searches, reverse image searches, und a bit of #logic.
Dark Knight sonar snips
I stumbled upon this very wild open-source repo yesterday... straight out of Dark Knight! Wi-Fi can see you. 👀📡
github.com/ruvnet/RuView
This open-source project turns Wi-Fi signals into real-time human pose + vital-sign sensing. No cameras and even through walls!
#Surveillance #Technology #Cyber
haha this is insane, there not okay 🤣
Why do I have to pretend that I'm going to print something in order to save it as a PDF. Why do I have to engage in a little ruse.
Snippet of the PromptSpy malware code.
This snippet of the #malware reveals hardcoded prompts. Analysis of the sample also suggests that the #threatactor likely operated in a Chinese-speaking environment. ESET concluded that the #campaign appears to be primarily targeting users in Argentina.
Just came across this fascinating blog by @esetresearch.bsky.social. A threat actor is abusing #GoogleGemini to manipulate UIs on Android for persistence. The clever use of #GenAI enables #PromptSpy to adapt to devices, layouts, and OS versions with ease!
www.welivesecurity.com/en/eset-rese...
Hello world!! I've been getting so fed up with the piles of rubbish and #misinformation on X, so I made the jump to #Bluesky. I'm an IT contractor by day and have a growing interest in #OSINT. I'm keen to learn more about the murky waters of #cyberthreats.