𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦

9.5K posts

𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦 banner
𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦

𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦

@cryptoron

Cyber Security / Hunt & Hackett / Ooit NFI/AIVD/Fox-IT/TIB/OVV/Kiesraad. Maakt podcast Cyberhelden. Zuid-Afrika is nu. 🇿🇦🇿🇦

Cape Town, South Africa Katılım Ekim 2008
3.2K Takip Edilen16.5K Takipçiler
𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦 retweetledi
WIRED
WIRED@WIRED·
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites. wired.com/story/hundreds…
English
13
191
338
30.7K
𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦 retweetledi
Lukasz Olejnik
Lukasz Olejnik@lukOlejnik·
The Russian SIGINT/SATCOM station in Vienna is intercepting C-band communications from the Eutelsat 3B, Eutelsat 10B, SES-5, and Rascom QAF1 satellites, which serve Africa and connect to UN offices, embassies, oil fields, and military bases. That’s not all. Olymp-K2, a Russian satellite capable of proximity operations (RPO - Rendezvous and Proximity Operations), is performing unusual maneuvers instead of remaining in a fixed orbital position. RPO enables it to approach Western satellites, monitor them, and even disrupt their functioning, seize control of them, or sabotage them. Owing to its close proximity, Olymp-K2 can intercept unencrypted command-and-control signals used to manage satellite positioning, antennas, and data handling. A kinetic anti-satellite strike, or close-proximity operations used to disable or seize control of a satellite, could, depending on their scale and effects, amount to a prohibited use of force and, in an extreme case, potentially an armed attack. The entire operation appears to be tightly coordinated - the station in Vienna intercepts data from ground links, while Olymp-K2 targets command-and-control signals in outer space. Together, they form a two-layered espionage network, giving Russia deep access to Western military and diplomatic communications in Africa. My assessment in @just_security justsecurity.org/86823/the-oute…
Lukasz Olejnik tweet mediaLukasz Olejnik tweet mediaLukasz Olejnik tweet mediaLukasz Olejnik tweet media
English
1
87
212
16.2K
Stefan Tanase
Stefan Tanase@stefant·
Technical breakdown of the Telegram / Google Translate vector mentioned in this investigation by @christogrozev Telegram on Android had for a long time used a free Google Translate API endpoint for the message translation feature. Thread 🧵
Christo Grozev@christogrozev

Denis Alimov, FSB Alfa veteran and senior operative of Russia's new and "most secretive" assassination unit, walked into El Dorado Airport in Bogotá on Feb 24 looking like a tourist heading to Cartagena. He walked out in handcuffs. He was undone by Google Translate. 🧵New @TheInsider investigation with @DerSpiegel — thread below.

English
4
16
116
79.2K
𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦
@stefant How does Google view those translations? Is that then a user who is logged in and does it end up in their history? I can’t imagine that the FBI is allowed to freely monitor what is being translated by Google, but I can imagine that they request data from targets.
English
1
0
1
119
𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦 retweetledi
Nav Toor
Nav Toor@heynavtoor·
🚨BREAKING: This Python tool reverses pixelation and recovers the original text from "censored" screenshots. It's called Depix. You pixelate a password. Depix reads it anyway. No AI model. No GPU. No cloud service. Just math. Here's how it works: → You feed it the pixelated screenshot → It generates a search image using a De Bruijn sequence → Matches each pixelated block against known character renders → Uses geometric proximity to eliminate false positives → Reconstructs the plaintext character by character Here's the wildest part: It was originally built because someone pixelated a Domain Admin password in a corporate screenshot. The kind of credential that controls an entire company's network. Depix cracked it. Every redaction tool you've ever used. Greenshot, Gimp, Snagit. If it uses a linear box filter for pixelation, this tool can reverse it. The original repo hit 26,152 GitHub stars before the creator reset it. That's how hard this blew up. Think about every screenshot you've ever shared with "censored" credentials, API keys, emails, or private messages. If you pixelated them instead of using solid black bars, they were never hidden. One command to run. Pure Python. 100% Open Source.
Nav Toor tweet media
English
56
295
2K
117.1K
𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦
Dan ben je een super elite Russische hit squad en faal je zo verschrikkelijk met je OPSEC. Google translate gebruiken omdat je hitman geen Russisch spreekt... En nee, de FBI monitort niet alles wat je door Google translate haalt. De hitman was al een target. Lost in translation: How Russia’s new elite hit squad was compromised by an idiotic lapse in tradecraft theins.press/en/inv/290235
Nederlands
1
15
65
7.3K
𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦 retweetledi
Olga Lautman 🇺🇸🇺🇦
This is what I received from 2 different Signal accounts
Olga Lautman 🇺🇸🇺🇦 tweet mediaOlga Lautman 🇺🇸🇺🇦 tweet media
English
1
3
9
2.8K
𝗥𝗼𝗻𝗮𝗹𝗱 𝗣𝗿𝗶𝗻𝘀 🇿🇦 retweetledi
Anthropic
Anthropic@AnthropicAI·
We partnered with Mozilla to test Claude's ability to find security vulnerabilities in Firefox. Opus 4.6 found 22 vulnerabilities in just two weeks. Of these, 14 were high-severity, representing a fifth of all high-severity bugs Mozilla remediated in 2025.
Anthropic tweet media
English
485
1.4K
15.2K
3.2M