Advertisement · 728 × 90

Posts by Julian-Ferdinand Vögele

Preview
Exclusive: Russia to halt Kazakhstan's oil flows to Germany via Druzhba, sources say Russia is set to stop oil exports from ‌Kazakhstan to Germany via the Druzhba pipeline starting from May 1, three industry sources said.

„Russia is set to stop oil exports from #Kazakhstan to #Germany via the Druzhba pipeline starting from May 1, three industry sources said on Tuesday.“

www.reuters.com/business/ene...

#Russia #Russland

17 hours ago 14 5 4 3

🔥 This court ruling is historical! Not only does it ban LGBTI discrimination, but for the first time it issues a ruling based on Art 2 of the Treaties, that lays down the values on which the European Union is based. A big step for the European Union as a community of values

17 hours ago 24 13 0 0

#ESETresearch discovered a new #NGate malware variant that abuses the legitimate #HandyPay app, which has been patched with possibly AI-generated malicious code. The campaign is ongoing and targets Android users in Brazil. www.welivesecurity.com/en/eset-rese... 1/6

19 hours ago 7 3 1 0
Post image Post image

🇫🇷Two of NSO’s co-founders, Shalev Hulio & Omri Lavie, were questioned by an investigating judge & placed under assisted witness status at the beginning of 2026 - as part of an investigation opened in ‘22 following the Pegasus Project revelations, reports @mediapart.fr

www.lemonde.fr/pixels/artic...

23 hours ago 9 5 1 2
Preview
North Korea hackers blamed for $290M crypto theft | TechCrunch The hack against Kelp DAO is the largest crypto heist of the year so far.

NEW: North Korean government hackers are allegedly behind the theft of more than $290 million in crypto.

This is now the largest crypto heist of the year, after another recent one of $285 million.

techcrunch.com/2026/04/20/n...

1 day ago 9 8 0 0
Post image Post image Post image Post image

What do Lenovo, Kingston, Shuttle Inc, and Palit Microsystems have in common?

EV Certificates from these companies were issued and used by a Chinese crime group, #GoldenEyeDog (#APT-Q-27)!

Thanks @malwrhunterteam and @g0njxa for your contributions
1/7

1 day ago 4 2 1 0
Preview
Stabbings, kidnap threats and arson attacks: how the Iranian regime targets UK journalists Staff at outlets critical of Tehran have faced chilling intimidation and violence, amid calls for greater protection and support

Iranian journalists in London “say they fear for their lives after a recent spate of threats and physical attacks,” and I’m willing to bet the regime is leveraging digital attacks against critics too. www.theguardian.com/global-devel...

2 days ago 9 11 0 0
The Angry Spark APT Mystery: One Victim, Zero Attribution
The Angry Spark APT Mystery: One Victim, Zero Attribution YouTube video by Three Buddy Problem

NEW PROBLEM UP! 🚨

We discuss a mysterious, VM-obfuscated backdoor that lived undetected on a single U.K. machine for a year before disappearing, finding clues pointing to an elite-level APT intrusion that still evades broader industry coverage.

WATCH on YouTube www.youtube.com/watch?v=mSD9...

3 days ago 10 4 1 2

therecord.media/ukraine-conf...

3 days ago 3 3 0 1
Advertisement
Preview
AI Is Finding More Bugs Than Open-Source Teams Can Fight Off Anthropic’s Mythos and similar AI tools can identify threats and vulnerabilities faster than small teams can fix them, putting the internet at risk.

12 years ago I wrote how the internet is being protected by two guys named Steve. Today, the situation isn't all that different, except those handful of volunteers are being swamped by AI systems finding holes in our digital systems. My essay for @bloomberg.com www.bloomberg.com/news/article...

4 days ago 11 6 1 1
Post image

Restrictions in Syrian universities are now surpassing even Assad-era limits. Deans are threatening to expel students for joining “unofficial” social groups, like Facebook or WhatsApp, marking a sharp escalation in control over student life.

5 days ago 2 1 1 0
Post image

Last week, we published a @citizenlab.ca report on the ad-based location surveillance system Webloc, its capabilities and its customers.

Webloc obtains data from consumer apps installed on phones. How? We don't know. But the ad targeting segments shown in this 2021 Webloc screenshot caught my eye:

5 days ago 24 13 1 1
Preview
(S+) Polizist auf der Flucht: Vor Schloss Neuschwanstein setzte er sich ab, nun enthüllt dieser Mann Chinas Verbrechen Er verfolgte Uiguren und brachte sie in Foltergefängnisse. Dann floh der Polizist Zhang Yabo aus der Volksrepublik nach Deutschland – und liefert seltene Einblicke in Chinas Repressionsapparat.

A fascinating read by my colleagues on a police officer who was part of the detention system in Xinjian and now has fled the country and now is speaking out, because if one day, he was asked, what he did to fight the injustice, he can say: "I spoke the truth"

www.spiegel.de/ausland/chin...

5 days ago 12 7 1 0

Botconf is streaming live: www.youtube.com/@BotConfTV/s...

Recommend the watch. One of the Top 5 security conferences out there

5 days ago 4 3 0 0
Preview
Exclusive: Russia-linked hackers compromised scores of Ukrainian prosecutors’ email accounts, data shows Russia-linked hackers broke into more than 170 email accounts belonging to prosecutors and investigators across Ukraine during the last several ​months, according to data reviewed by Reuters, a campai...

"Reuters reviewed the underlying data and is publishing details of the hacks for the first time, including the identities of more than a dozen compromised European agencies ​and officials."

www.reuters.com/world/russia...

6 days ago 2 1 0 0
Post image

Memory-only malware leaves no trace on the file system and is commonly used by threat actors ranging from criminal organizations to ransomware operators to APT groups. In our Volatility 3 training, students gain deep hands on experience analyzing such threats:

memoryanalysis.net/courses-malw...

1 week ago 5 6 0 0
Preview
Adobe fixes PDF zero-day security bug that hackers have exploited for months | TechCrunch It's not clear how many people were compromised by this hacking campaign, but a security researcher said the hackers were targeting victims since at least November 2025.

New, by me: Adobe has fixed a bug in its flagship PDF readers that hackers have been abusing for at least four months to break into people's Windows and macOS computers and steal data.

A security researcher who discovered the hacks said it works by tricking victims into opening a malicious PDF.

1 week ago 14 10 0 2
Advertisement
Preview
Predator Spyware's iOS Kernel Exploitation Engine: PAC Bypass, NEON R/W & More Threat Labs Jamf Threat Labs examines Predator spyware's iOS kernel exploitation engine, revealing FDGuardNeonRW, a PAC bypass via JavaScriptCore gadget hunting, a 256-entry signing cache, and cross-process kerne...

Jamf's Nir Avraham has published a report looking at how the Predator spyware exploits, interacts, and modifies the iOS kernel for its operations

"The engine has never been reported on — until now"

www.jamf.com/blog/predato...

1 week ago 19 8 0 1
Preview
Preparing your security program for AI-accelerated offense | Claude We share our initial set of recommendations to shore up your defenses based on our own findings and security practices.

Great advice from Anthropic on prep for accelerated AI vulnerability discovery, including what to do if you don’t have a dedicated security team, if you’re reporting bugs you found, or are an open source maintainer.

/ht @decius.bsky.social for sending me the link

claude.com/blog/prepari...

1 week ago 25 10 1 1
Post image

-France takes first steps to ditch Windows for Linux
-OpenAI rotates certs after Axios attack
-Rockstar Games hacked again
-UK threatens jail time for tech execs
-CPUID hacked to serve malware
-Gmail E2EE expands to mobiles

Podcast: risky.biz/RBNEWS550/
Newsletter: news.risky.biz/risky-bullet...

1 week ago 31 4 2 1
Preview
Teures Krebsmedikament: Wie Keytruda zum Systemsprenger wird Keytruda: Die Gesundheitskosten für das Krebsmittel kletterten in Deutschland allein im letzten Jahr auf mehr als zwei Milliarden Euro.

(1/6) Josephina Kersten ist erst 30 Jahre alt, als Ärzte in ihrer linken Brust einen besonders aggressiven Tumor finden. Es folgen 435 Tage Therapie – 17 Mal bekommt sie ein Medikament, das als Hoffnungsträger gilt: Keytruda. The #CancerCalculus ➡️ www.zdfheute.de/politik/deut...

1 week ago 39 22 1 5
Preview
EK Strategic Communications Center | The Kremlin’s 2026 Election Campaign in Hungary EK Strategic Communications Center Report April 10, 2026

💥One of the best analyses, worth reading: "The defining feature of the Kremlin’s interference campaign in Hungary’s 2026 parliamentary elections is that for Moscow this is not simply an effort to keep a friendly government in power—it is a fight to retain its principal systemic ally inside the EU."

1 week ago 193 99 6 6
Report: Nearly half of Russia’s embassy staff in Hungary may have ties to intelligence services — Meduza Nearly half of the staff at Russia’s embassy in Hungary may have ties to intelligence services, the independent Russian investigative outlet Agentstvo found. Fifteen embassy employees have confirmed connections to the intelligence services, and six more are suspected of having such links, the outlet said, based on an analysis of leaked data spanning several years. Hungary’s Foreign Ministry lists 47 staff members at the Russian embassy.

💥Russian intelligence services are more deeply embedded in the Russian embassy in Hungary than in Belgium, where NATO’s headquarters and several EU institutions are based.

1 week ago 137 70 3 4
Jedynka - polskieradio.pl Jedynka - polskieradio.pl

🇵🇱Poland’s #Pegasus inquiry has concluded hearings after nearly two years of work and is drafting its final report, due to be published in April.

➡️The report will include a public section and a classified part for a limited group of recipients, including MPs.

jedynka.polskieradio.pl/artykul/3671...

1 week ago 12 4 1 0
Uncovering Webloc: An Analysis of Penlink’s Ad-based Geolocation Surveillance Tech - The Citizen Lab Location data collected from mobile apps and digital advertising can reveal habits, interests and almost any other aspect of someone's life. In this report, we uncover how a geolocation surveillance system called Webloc uses ad-based data to monitor hundreds of millions of people across the globe.

NEW REPORT: “Uncovering Webloc: An Analysis of Penlink’s Ad-based Geolocation Surveillance Tech”

Our research confirms that ad-based surveillance tech Webloc is used by military, intelligence, and law enforcement agencies across the globe.

citizenlab.ca/research/ana...

1 week ago 78 61 2 7
Preview
Orbán’s Spying Kit Revealed: Israeli Surveillance Tool Combined with Hungarian Technology - VSquare.org Intelligence agencies of Viktor Orbán's government have been secretly using Webloc — a mass surveillance tool that tracks hundreds of millions of people via smartphone advertising data — making Hungary the first confirmed EU country to deploy it, in likely violation of GDPR. Moreover, our investigation confirms the existence of "homegrown" OSINT and spyware tools.

"Intelligence agencies of Viktor Orbán’s government have been secretly using Webloc — a mass surveillance tool that tracks hundreds of millions of people via smartphone advertising data — making Hungary the first confirmed EU country to deploy it"

vsquare.org/orban-spying...

1 week ago 16 15 1 2
Italian spyware maker SIO still developing and distributing Spyrtacus Italian spyware maker SIO still developing and distributing Spyrtacus

“We analyzed a 2025 sample of the Spyrtacus #spyware, version 8.71. …We confirm attribution to 🇮🇹SIO S.p.A. and provide a small set of IoCs to detect infections of this malware family.”

osservatorionessuno.org/blog/2026/04...

1 week ago 4 3 0 0
Advertisement

“The FSB said the man, a resident of Chita in eastern Siberia who was born in 1960, had supplied information via Telegram to Ukrainian intelligence on a local print publication and about a ⁠critical infrastructure object in the region.”

Anecdote #924 indicating Russian access to Telegram chats.

1 week ago 4 3 0 0
Post image

Ashley Shen at Cisco Talos uncovers UAT-10362 targeting Taiwanese NGOs and suspected universities with LucidRook, a sophisticated DLL-based stager delivered through spear phishing. blog.talosintelligence.com/new-lua-base...

1 week ago 5 4 0 0
Preview
Men Are Buying Hacking Tools to Use Against Their Wives and Friends In Telegram groups, men are sharing thousands of nonconsensual images of women and girls, buying spyware, and engaging in doxing and sexual abuse.

NEW:

Thousands of men are members of Telegram groups and channels that advertise and sell hacking and surveillance services that can be used to harass friends, wives and girlfriends, and former partners, new research has uncovered.

1 week ago 221 128 15 21