
🚨 New podcast alert!! A great conversation between @ARedbord of @trmlabs and @LindseyOD123 on the insane $250M Drift protocol heist backstory and how it all went down. youtu.be/gh_KLN6DB1A?si…
Decipher
4.2K posts

@DecipherSec
Security without fear. Cybersecurity news that informs and inspires. Editors: @DennisF & @lindseyOD123. https://t.co/jcYvCZ704o

🚨 New podcast alert!! A great conversation between @ARedbord of @trmlabs and @LindseyOD123 on the insane $250M Drift protocol heist backstory and how it all went down. youtu.be/gh_KLN6DB1A?si…








Influence Operations Bulletin Q1 2026 Google Security blog.google/security/influ… (Google) terminated 80 YouTube channels as part of our investigation into coordinated influence operations linked to Russia. (Google) terminated 1,096 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to the PRC. @Google


In my estimation, defenders (of organizations) have roughly 1 year before attackers have 10-100x'd their capabilities at vulnerability discovery and exploitation. While top-tier projects such as Linux, Chrome, Firefox can remediate this volume of vulnerabilities, not all can.



Dug into EVILTOKENS with @sherrod_im and @gleeda this week Catch up below huntress.com/eviltokens-ai-…


