International Cyber Digest
3.4K subscribers
176 photos
11 videos
2 files
22 links
Your weekly go-to cybersecurity newsletter, curated and commented on by our senior analysts.
Download Telegram
❗️A Roblox programmer has been arrested for possessing CSAM and importing a child intercourse doll.

He admitted to importing the doll from China, repeatedly saying he felt "very lonely."

He then confessed to having CSAM on his devices and was immediately arrested.
πŸ’©1
πŸ‡―πŸ‡΅ ONLY IN JAPAN: A Japanese man spotted an AirPod in a rainwater drain. He went to an electronics store, got an Apple Watch charger, and rescued it. πŸ˜‚
πŸ”₯2
🚨 CRITICAL: Security scanner 'Trivy' has been compromised by threat actors who influenced the GitHub build process and pushed a malicious update that installs infostealer malware dubbed "TeamPCP Cloud stealer."

They created a lookalike domain (scan.aquasecurtiy[.]org) and pulled 4 malicious Golang files from it into the build process.

What it steals:
β–ͺ️ SSH keys
β–ͺ️ Cloud credentials (AWS, GCP, Azure)
β–ͺ️ Kubernetes tokens
β–ͺ️ Crypto wallets
β–ͺ️ Environment variables
β–ͺ️ 50+ sensitive file paths scanned
tg_image_43747447.png
850.6 KB
β—οΈπŸ‡ΊπŸ‡Έ A homeless man was running his burger restaurant "nasty azz cheeseburger" out of a shopping cart and selling through DoorDash.

The video went viral and people started wondering how it ever got listed.

DoorDash put the restaurant on inactive. πŸ™ƒ

I bet the burgers were nasty and full of ass. πŸ˜‚
❗️PokΓ©mon Go creator Niantic used 30 billion images crowdsourced from players to build a map for AI training and visual positioning capabilities, including for defense purposes.

143 million people spent 8 years scanning streets, parks, and storefronts with their cameras. None of them knew what they were contributing to.

Niantic is now using that data for questionable purposes.

Sources:
1)https://technologyreview.com/2026/03/10/1134099/how-pokemon-go-is-helping-robots-deliver-pizza-on-time/
2)https://tectonicdefense.com/vantor-and-niantic-spatial-team-up-on-air-to-ground-visual-positioning-system/
3)https://pokemongohub.net/post/news/niantic-announces-large-geospatial-model-trained-on-pokemon-go-player-data/
❀3🀣1
‼️DELUSIONAL: Reddit's CEO wants to 'anonymously' verify human identity through identifiable and personal data...

They want to combat their bot problem while keeping users 'anonymous'. The CEO mentioned Face ID and Touch ID as possible methods.

Someone needs to tell Reddit's CEO what anonymity means. And that passkeys authenticated through Face ID and Touch ID don't prove you're human.
🀣5
❗️A speaker at BSides SF started his talk with a half-naked gym selfie on the big screen, told the audience he's single, mentioned "some people call me a misogynist," and then said pentesting is easy because he can chat up female receptionists.
😭10
Media is too big
VIEW IN TELEGRAM
❗️Stop buying cheap Ethernet cables.

Copper-clad aluminum = 60% more resistance, degraded signals, more heat.

The insulation won't self-extinguish, you're putting a fuse inside your walls.
πŸ‘6πŸ”₯3😍1
πŸš¨β€ΌοΈ BREAKING: Crunchyroll breached through outsourcing partner in India.

A threat actor exfiltrated data from Crunchyroll's ticketing system and also managed to pull 100 GB of personally identifiable customer analytics data.

We've analyzed sample data and it includes IP addresses, email addresses, credit card details, and more.

An employee of their outsourcing partner Telus had executed malware on his system, which gave a threat actor access to Crunchyroll's environment.

The threat actor told us the breach happened on March 12, 2026. Crunchyroll revoked their access after 24 hours.

They also said Crunchyroll is ignoring all messages and still hasn't publicly disclosed the breach.
1❀9😒3😭2
‼️BREAKING: The Aqua Security Trivy breach leak has been posted on GitHub by the threat actor. Exposed repos contain private keys and credential scripts.

GitHub has since taken down the pages.

All repos were tagged: "TeamPCP Owns Aqua Security."
😒2🀣2