βοΈ Mozilla just called out Microsoft for force-installing Copilot on Windows systems without user consent.
After user backlash, Microsoft partially rolled Copilot back.
Mozilla: "In the most recent case, they let their AI learn and collect data as fast as possible before people had a choice."
According to Mozilla, the same tactics apply to Edge, complex processes to change your default browser, and interfaces designed to pull users back to Microsoft's own products.
Source: https://blog.mozilla.org/en/mozilla/ai/microsoft-copilot-ai-user-choice/
After user backlash, Microsoft partially rolled Copilot back.
Mozilla: "In the most recent case, they let their AI learn and collect data as fast as possible before people had a choice."
According to Mozilla, the same tactics apply to Edge, complex processes to change your default browser, and interfaces designed to pull users back to Microsoft's own products.
Source: https://blog.mozilla.org/en/mozilla/ai/microsoft-copilot-ai-user-choice/
π₯17β€2
π¨ Adobe has released an emergency patch addressing the critical Acrobat Reader 0day vulnerability we reported on earlier. Update asap:
https://helpx.adobe.com/security/products/acrobat/apsb26-43.html
https://helpx.adobe.com/security/products/acrobat/apsb26-43.html
Adobe
Adobe Security Bulletin
Prenotification Security Advisory for Adobe Acrobat and Reader | APSB26-43
π©8
You can now check whether your ancestors were Nazis using a new tool introduced by a German newspaper.
They've traced 90% of all NSDAP members, totalling 10.2 million.
Link:
https://www.zeit.de/wissen/geschichte/2026-04/nsdap-vergangenheit-familie-nationalsozialismus-schweigen
They've traced 90% of all NSDAP members, totalling 10.2 million.
Link:
https://www.zeit.de/wissen/geschichte/2026-04/nsdap-vergangenheit-familie-nationalsozialismus-schweigen
π€£13π₯6π€―3π2π±1
There seems to be some misunderstanding about the use of the word 'eliminated' in my previous post. To clarify: they did not kill the insider... π they eliminated the threat by identifying the insider.
π€£31π4π€2
π¨ BREAKING: Rockstar Games breach data obtained through Anodot has been leaked by ShinyHunters.
The files total 8.1GB and contain anti-cheat analytics, player analytics, game data, Zendesk ticket feeds, financial data and more.
25 internal data files from Rockstar Games' production Anodot analytics pipeline were obtained through breaching Anodot.
The dataset spans 7+ years of operational data (2018β2026) and contains detailed financial revenue figures, anti-cheat intelligence, player economy data and customer support metrics, collectively representing one of the most sensitive internal datasets a gaming company could possess.
We will continue to analyse every leaked file. But first, here are some of the categories exposed:
- Actual dollar-value bookings for GTA Online and Red Dead Online
- Two files directly exposing Rockstar's cheat detection methodology
- Files exposing in-game data and player information
All 25 files are CSV data exports from Rockstar's Anodot production environment, covering GTA Online, Red Dead Online, customer support, and internal analytics pipelines.
As far as we can see no direct PII is present in any of these files. All data has been aggregated or stripped before being fed into Anodot.
Some fun metrics..
The COVID effect is visible in raw numbers. May 20, 2020 shows 9.34 million DAU, the highest in the entire dataset. May 16, 2020 saw 1.15 million new players in a single day, almost certainly from Rockstar's free GTA Online PS4 giveaway during lockdown.
Christmas is when Rockstar makes serious money. The top 9 highest ARPU days are all December 25th across consecutive years. Christmas 2021 is the single highest at $1.19 ARPU with a 3% conversion rate, meaning 1 in 33 players who logged in that day spent real money. Christmas 2025 ARPPU hit $60.68, meaning the players who did spend averaged over $60 in a single day.
31 rows in the PC cheat file have a value of exactly 2,147,483,647 VC. That's INT32_MAX... a signed 32-bit integer overflow. The cheat detection system literally couldn't store the number because a cheater's earn was too large for the data type. Rockstar's own monitoring tool was numerically overflowing on the cheats it was trying to track.
The files total 8.1GB and contain anti-cheat analytics, player analytics, game data, Zendesk ticket feeds, financial data and more.
25 internal data files from Rockstar Games' production Anodot analytics pipeline were obtained through breaching Anodot.
The dataset spans 7+ years of operational data (2018β2026) and contains detailed financial revenue figures, anti-cheat intelligence, player economy data and customer support metrics, collectively representing one of the most sensitive internal datasets a gaming company could possess.
We will continue to analyse every leaked file. But first, here are some of the categories exposed:
- Actual dollar-value bookings for GTA Online and Red Dead Online
- Two files directly exposing Rockstar's cheat detection methodology
- Files exposing in-game data and player information
All 25 files are CSV data exports from Rockstar's Anodot production environment, covering GTA Online, Red Dead Online, customer support, and internal analytics pipelines.
As far as we can see no direct PII is present in any of these files. All data has been aggregated or stripped before being fed into Anodot.
Some fun metrics..
The COVID effect is visible in raw numbers. May 20, 2020 shows 9.34 million DAU, the highest in the entire dataset. May 16, 2020 saw 1.15 million new players in a single day, almost certainly from Rockstar's free GTA Online PS4 giveaway during lockdown.
Christmas is when Rockstar makes serious money. The top 9 highest ARPU days are all December 25th across consecutive years. Christmas 2021 is the single highest at $1.19 ARPU with a 3% conversion rate, meaning 1 in 33 players who logged in that day spent real money. Christmas 2025 ARPPU hit $60.68, meaning the players who did spend averaged over $60 in a single day.
31 rows in the PC cheat file have a value of exactly 2,147,483,647 VC. That's INT32_MAX... a signed 32-bit integer overflow. The cheat detection system literally couldn't store the number because a cheater's earn was too large for the data type. Rockstar's own monitoring tool was numerically overflowing on the cheats it was trying to track.
β€14π₯6π€¬4π₯°2
βΌοΈ Booking[.]com has been breached β threat actors accessed customer data and reservations, and are actively abusing it.
A Reddit user says he reported the breach over two weeks ago after being phished with his own reservation details, but Booking said everything was fine on their end.
"Given how weak their security appears to be, I'm not surprised"
A Reddit user says he reported the breach over two weeks ago after being phished with his own reservation details, but Booking said everything was fine on their end.
"Given how weak their security appears to be, I'm not surprised"
π€¬12β€3π€1
This media is not supported in your browser
VIEW IN TELEGRAM
The future is here⦠Watch as a Chinese man uses AR glasses to live-translate what Russian tourists in the subway are saying.
Unfortunately, I have no idea if the translations are accurate, I don't read or understand Chinese. Nor do I understand Russian. But it looks cool!
Unfortunately, I have no idea if the translations are accurate, I don't read or understand Chinese. Nor do I understand Russian. But it looks cool!
π₯12π2π±1π©1
π¨ A fake Ledger Live app in the Apple App Store led to $9.5M stolen from over 50 victims in under one week, according to recent work by crypto detective ZachXBT.
The app even has fake 5-star reviews describing it as "incredibly smooth and reliable."
ZachXBT has mapped all suspected victims in a recent post in his Telegram channel.
The app was released by developer "SAS Software Company" and published under "Leva Heal Limited".
Link to fake app: https://archive.ph/4RVLf
The app even has fake 5-star reviews describing it as "incredibly smooth and reliable."
ZachXBT has mapped all suspected victims in a recent post in his Telegram channel.
The app was released by developer "SAS Software Company" and published under "Leva Heal Limited".
Link to fake app: https://archive.ph/4RVLf
π€£6π€―2