International Cyber Digest
4.72K subscribers
375 photos
19 videos
2 files
45 links
Your weekly go-to cybersecurity newsletter, curated and commented on by our senior analysts.
Download Telegram
Tesla has remotely altered tens of thousands of customer cars without consent, confirming you don't actually OWN your Tesla when you buy one.

They've demonstrated there's one single point of failure: the mothership. Whoever owns that, owns every Tesla on the road.

This past week they pushed config changes that got customers banned from using FSD. Experts confirm the mechanism is simple: an SMS wakes the car up, then software is pushed and installed from the mothership straight to the car's media control unit without user interaction.

This raises the question of how many privacy and data protection laws they broke, and how much data they collect on users, since they had enough to single out owners of third-party devices.
❀8πŸ”₯4😱3😁1πŸ€”1
πŸš¨πŸ‡ΊπŸ‡Έ A week ago, the FBI Director couldn't log into his FBI account, so he panicked and called White House aides convinced he'd been fired. It was a technical glitch.

That's just one scene from The Atlantic's new report on Kash Patel, drawn from 24+ sources, describing heavy drinking, unexplained absences, and colleagues who now view him as a national-security vulnerability.

Trump personally called Patel to express his unhappiness after a video surfaced of him chugging beer with the U.S. Olympic hockey team in Italy.

Officials question whether alcohol played a role in Patel publicly pushing bad info on active cases, including the Charlie Kirk murder investigation.

He still has the job. But senior Trump officials are already discussing replacements, and a former official calls him "rightly paranoid."

https://www.theatlantic.com/politics/2026/04/kash-patel-fbi-director-drinking-absences/686839/
🀣23❀2πŸ”₯1
‼️ Meet Devesh aka IDISSEVERYTHING, he used an exploit to gain unauthorized access to a screener company, then downloaded the latest Avatar movie and leaked it.

He was also sentenced in 2016 for breaching NFL's Twitter account. And tweeting with it. From his home IP address 🀑

This research was done by X: foilmanhacks (give him a follow).

Here's a smoking gun: the user IDISSEVERYTHING posted a screenshot of what appears to be his terminal, and the username is... DEVESH.

Not very smart.

An exploit targeting a screener company was flagged to Jason on April 10. The tool was built by IDISSEVERYTHING.

- Screener companies distribute advance film copies to critics and industry professionals, a prime target for pre-release leaks
- The exploit enabled unauthorized access to that pipeline

Every known instance of the handle "IDISSEVERYTHING" traces back to one person: Devesh. He has been distributing the exploit on Discord under "idisseverything," with the account directly tied to "Logendran Devesh."

This is also not the first time Devesh has been a naughty naughty boy.. In 2016 he broke into the NFL's official Twitter account.....

This is what he tweeted back then.... from his home IP address... Devesh is not very smarty smarty, but very naughty naughty.. He got 24 months of probation..

Moral of the story: don't be like Devesh. And hacking is illegal and for nerds as vxunderground would say.
🀣20πŸ’©4❀1πŸ₯°1😁1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸš¨πŸ‡ΊπŸ‡¦ BREAKING: Ukrainians hacked yesterday's closed-door Russian Ministry of Industry and Trade meeting on drone production.

Turns out Russia can't source even basic components and is now fully dependent on China.

They joke about even having to import copper wire and plastic.
🀣9πŸ₯°8😱4πŸ’©2❀1
Media is too big
VIEW IN TELEGRAM
β—οΈπŸ‡¨πŸ‡³ China's humanoid robots have advanced dramatically in the span of a single year. Imagine where they'll be in a couple more.
πŸ’―5😁2
🚨 BREAKING: Vercel has been breached. A threat actor has listed their customers' data, source code, databases, and keys up for sale.

Vercel has also publicly disclosed they've identified a security incident involving unauthorized access to their internal systems.

Vercel is recommending customers to rotate keys.

See: https://vercel.com/kb/bulletin/vercel-april-2026-security-incident

Developing story: https://x.com/IntCyberDigest/status/2045887361746133159?s=20
🀣10❀3😱3πŸ”₯2
So here are some images to summarize what's going on:

- Vercel told the threat actor they won't pay because they're not the real ShinyHunters.
- The real ShinyHunters confirmed to us that they are fake.
- The attackers got in through an engineer named Vojtech Miksu; they shared a screenshot of what seems to be Vercel's Enterprise dashboard.
πŸ”₯12🀣6❀1😒1