βοΈ Internal messages from Meta show employees discussing how 7.5 million child sexual abuse material reports annually disappeared after making FB Messenger end-to-end encrypted.
Meta simultaneously spent over $2 billion lobbying politicians, 4,433 grants totaling approximately $2.0 billion.
$0 of which went to child safety.
Instead, they invested millions into lobbying for app-store/OS-level age checks through the App Store Accountability Act, making sure they're not liable for age verification of children.
It seems as if Meta doesn't care about child safety or predators targeting our children. It is only concerned with making more money. They're going to lose a lot of money once a major part of their users can't be targeted by advertisers anymore.
Now the US is facing a major problem with age verification. Not only is legislation heavily influenced by big tech, but:
- Politicians are scared to be seen as ineffective and want to be reelected
- Conservatives push for it to prevent 18+ content
- Progressives push for it to stop predators from accessing children
Creating a Frankenstein set of laws...
Meta simultaneously spent over $2 billion lobbying politicians, 4,433 grants totaling approximately $2.0 billion.
$0 of which went to child safety.
Instead, they invested millions into lobbying for app-store/OS-level age checks through the App Store Accountability Act, making sure they're not liable for age verification of children.
It seems as if Meta doesn't care about child safety or predators targeting our children. It is only concerned with making more money. They're going to lose a lot of money once a major part of their users can't be targeted by advertisers anymore.
Now the US is facing a major problem with age verification. Not only is legislation heavily influenced by big tech, but:
- Politicians are scared to be seen as ineffective and want to be reelected
- Conservatives push for it to prevent 18+ content
- Progressives push for it to stop predators from accessing children
Creating a Frankenstein set of laws...
π2β€1π©1
βοΈOne of the godfathers of AI Andrej Karpathy shortly released research showing which jobs are most exposed to AI.
He deleted it afterwards, but a backup was found.
The brutal pattern: if you work behind a screen, AI is coming for you. If you work with your hands, youβre fine.
Higher education = more exposed.
Higher salary = more exposed.
143 million jobs analyzed. $3.7 trillion in wages exposed.
Every job in the US economy was scored for AI exposure from 0β10.
Some examples:
Bookkeepers: 9/10
Lawyers: 9/10
Software devs: 8/10
Roofers: 0/10
Carpenters: 2/10
Janitors: 1/10
Link: https://github.com/mariodian/jobs/
He deleted it afterwards, but a backup was found.
The brutal pattern: if you work behind a screen, AI is coming for you. If you work with your hands, youβre fine.
Higher education = more exposed.
Higher salary = more exposed.
143 million jobs analyzed. $3.7 trillion in wages exposed.
Every job in the US economy was scored for AI exposure from 0β10.
Some examples:
Bookkeepers: 9/10
Lawyers: 9/10
Software devs: 8/10
Roofers: 0/10
Carpenters: 2/10
Janitors: 1/10
Link: https://github.com/mariodian/jobs/
π2π1π©1
Please open Telegram to view this post
VIEW IN TELEGRAM
π2π©2
βΌοΈ China's biggest cybersecurity company, Qihoo 360 (461M users), just leaked their own wildcard SSL private key inside the public installer for their new AI assistant "360 Security Claw."
The private key for *.myclaw.360.cn was bundled directly in the download package under /namiclaw/components/OpenClaw/openclaw.7z/credentials. The cert is valid until April 2027.
Attackers can now impersonate their servers, intercept user traffic, and forge login pages.
Fun fact: the founder promised the product would "never leak passwords."
The private key for *.myclaw.360.cn was bundled directly in the download package under /namiclaw/components/OpenClaw/openclaw.7z/credentials. The cert is valid until April 2027.
Attackers can now impersonate their servers, intercept user traffic, and forge login pages.
Fun fact: the founder promised the product would "never leak passwords."
π©1
π¨ CVE-2026-3909 - Chromium/Edge vulnerability actively exploited in the wild.
Visit a website, get pwned. It's that simple. Patch immediately.
Visit a website, get pwned. It's that simple. Patch immediately.
π1π©1
βοΈKwamaine Jerell Ford posed as a well-known adult film star to phish NFL and NBA players, all while he was serving time in prison for doing the EXACT same thing.
He was offering explicit videos to athletes. Meanwhile, he impersonated Apple support to steal their creds and MFA codes. Dozens of players fell victim.
He also allegedly coerced a woman into sex acts with the athletes, secretly filmed them, and took a cut.
Charged with wire fraud, computer fraud, identity theft, and sex trafficking. He pleaded not guilty.
β’ https://www.justice.gov/usao-ndga/pr/georgia-felon-indicted-targeting-professional-athletes-fraud-and-sex-trafficking
He was offering explicit videos to athletes. Meanwhile, he impersonated Apple support to steal their creds and MFA codes. Dozens of players fell victim.
He also allegedly coerced a woman into sex acts with the athletes, secretly filmed them, and took a cut.
Charged with wire fraud, computer fraud, identity theft, and sex trafficking. He pleaded not guilty.
β’ https://www.justice.gov/usao-ndga/pr/georgia-felon-indicted-targeting-professional-athletes-fraud-and-sex-trafficking
π1π©1
This media is not supported in your browser
VIEW IN TELEGRAM
DLSS 5 is getting out of hand. π
π3π©2
βοΈX account "Breaking911" with 1.6 million followers just got compromised by a threat actor.
The channel advertises itself as "America's #1 Alternative News Source."
The channel advertises itself as "America's #1 Alternative News Source."
π©1
βοΈMeet Hellcat ransomware group operator 'Pryx' β responsible for high-profile hacks like Jaguar Land Rover, Telefonica, Schneider Electric and many more.
He started doing cybercrime as a kid.
He got 4 people killed and 27 injured after starting a fire by hacking into the SCADA network of Telecom Egypt.
An OSINT researcher just revealed who he is and how he tracked him down.
Link: https://justpaste.it/whoispryx
He started doing cybercrime as a kid.
He got 4 people killed and 27 injured after starting a fire by hacking into the SCADA network of Telecom Egypt.
An OSINT researcher just revealed who he is and how he tracked him down.
Link: https://justpaste.it/whoispryx
π©2
βοΈCybersecurity company Aura suffered a data breach after a phone phishing attack by ShinyHunters.
The attackers gained access to an employee account. Most of the stolen data came from a company Aura acquired in 2021: over 900,000 names and email addresses stored in Salesforce.
Additionally, data of fewer than 20,000 current and 15,000 former Aura customers was stolen, including names, emails, addresses, and phone numbers.
The attackers gained access to an employee account. Most of the stolen data came from a company Aura acquired in 2021: over 900,000 names and email addresses stored in Salesforce.
Additionally, data of fewer than 20,000 current and 15,000 former Aura customers was stolen, including names, emails, addresses, and phone numbers.
π©1
βοΈGTIG has identified an exploit chain targeting Apple iOS users called DarkSword.
Victims get compromised by visiting a website.
It's capabilities include stealing and performing the following:
βͺοΈ Messages, contacts, call logs
βͺοΈ Location, browser data
βͺοΈ Crypto wallets, WiFi pass, keychains
βͺοΈ Take screenshots, record audio
βοΈTargets iOS 18.4β18.7. Used by commercial surveillance vendors and a suspected Russian espionage group against targets in four countries.
How it works:
- Victim visits a compromised or fake website
- Six vulnerabilities are chained, from browser RCE to kernel-level privilege escalation
- Three malware families are deployed: GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER
Read the GTIG article:
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
Victims get compromised by visiting a website.
It's capabilities include stealing and performing the following:
βͺοΈ Messages, contacts, call logs
βͺοΈ Location, browser data
βͺοΈ Crypto wallets, WiFi pass, keychains
βͺοΈ Take screenshots, record audio
βοΈTargets iOS 18.4β18.7. Used by commercial surveillance vendors and a suspected Russian espionage group against targets in four countries.
How it works:
- Victim visits a compromised or fake website
- Six vulnerabilities are chained, from browser RCE to kernel-level privilege escalation
- Three malware families are deployed: GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER
Read the GTIG article:
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
π©2
π¨βΌοΈ CRITICAL: Ubiquiti UniFi Network Application vulnerabilities were just disclosed
CVE-2026-22557 CVSS 10.0
Remote path traversal vulnerability allowing an attacker to access and manipulate files, leading to account takeover. No authentication required.
CVE-2026-22558 β CVSS 7.7
Authenticated NoSQL Injection allowing privilege escalation.
Patch now!
https://community.ui.com/releases/Security-Advisory-Bulletin-062-062/c29719c0-405e-4d4a-8f26-e343e99f931b
CVE-2026-22557 CVSS 10.0
Remote path traversal vulnerability allowing an attacker to access and manipulate files, leading to account takeover. No authentication required.
CVE-2026-22558 β CVSS 7.7
Authenticated NoSQL Injection allowing privilege escalation.
Patch now!
https://community.ui.com/releases/Security-Advisory-Bulletin-062-062/c29719c0-405e-4d4a-8f26-e343e99f931b
π1π©1
βοΈJust in: An internal government report reveals federal cyber experts reviewed Microsoft's cloud.
They called it "a pile of shit."
Then approved it anyway. π
Microsoft's lack of proper security documentation left reviewers with a "lack of confidence in assessing the system's overall security posture," according to an internal government report reviewed by ProPublica.
https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government
They called it "a pile of shit."
Then approved it anyway. π
Microsoft's lack of proper security documentation left reviewers with a "lack of confidence in assessing the system's overall security posture," according to an internal government report reviewed by ProPublica.
https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government
π©3β€1