🚨 BREAKING: CRYPTO CASINO SCAMMED BY FAKE ANDREW TATE IMPERSONATOR
They thought they were hiring the real Andrew Tate to deal blackjack for a special event, but the streaming agency they hired sent an impersonator. The owner of the casino announced the scam over Discord.
💸 Son of Iran’s former ambassador to Venezuela shows off luxury lifestyle
He is widely identified as Sasha Sobhani, known for flaunting a lavish lifestyle on social media, including luxury cars, jets, and high-end travel.
Meanwhile, millions of Iranians struggle to survive under the bloody regime built by the parents of these privileged rich kids.
Johnny Somali will be going to a specialized labor prison where his phones will be confiscated, and he will receive offender status
Because of the nature of his crimes, the court ordered a five-year employment ban at institutions related to children
❗️ WhatsApp moved status updates to the Chats tab in the latest beta, bringing ads closer to where users spend most of their time.
Likely a push to make advertising more viable.
🚨 BREAKING: The FBI has successfully extracted deleted Signal messages from a suspect's iPhone via notification storage, the place where all your notifications are stored for up to one month.
Notification storage stores data from all messaging apps, it's a big flaw in iOS. But there's a way to turn it off...
‼️ A BreachForums administrator has allegedly been identified — caught using his real IP and reusing the same passwords across his criminal persona and business accounts.
Meet Angel Tsvetkov AKA N/A: a Bulgarian cybersecurity specialist, penetration tester and bug bounty researcher known for responsibly disclosing vulnerabilities in major global platforms.
There’s been a lot of allegations against Delve.
But we haven’t been able to share our side of the story until today due to ongoing cybersecurity and forensics investigations.
Maintaining customer trust is central to everything we do.
That said, we grew too fast and fell short of our own standard. To our customers, we deeply apologize for the inconveniences caused.
We take these allegations seriously and have made changes: a new auditor network, free re-audits and pentests for all customers, enhanced transparency in audit communications, and more.
However, we also want to set the record straight on the anonymous attacks.
The evidence we have points to a targeted cyberattack from a malicious actor, not a “whistleblower.”
We believe the attacker purchased Delve under false pretenses, exfiltrated internal company data, and used it to launch a coordinated smear campaign.
The posts rely on a mix of fabricated claims, cherry-picked screenshots, and stolen data taken out of context.
See the link in the comments for more details.
Delve was built to modernize compliance. We are not going anywhere and are committed to building what's next.
As I teased earlier - I used Claude Code to (near enough) autonomously develop an exploit for a known vulnerable driver. Claude did it with no hesitation - from triage to exploit. As you can see, it was successful in privilege escalation. Read what I found below!
This is a long read - but I hope you find it useful and an interesting topic to debate.
As a background, through the last week I used GPT-5.4 to analyse a known vulnerable driver to identify any opportunities to exploit. I have already documented my process in detail (check my recent posts for context if you wish) - in short I connected it to an MCP in IDA Pro for GPT to find the vulnerability. It did it. I then asked it to develop an exploit but it refused, I had to write an exploit myself which I did, as a POC that it had found the vuln.
The vulnerability in question is an arbitrary physical memory read & memory write - a super critical bug. There was one limiting factor to this, the driver was limited to only 32-bits of physical address, which covers up to 4 GB of physical RAM. On modern systems with 8+ GB RAM, EPROCESS structures for important processes (including System, PID 4) are typically allocated well above the 4 GiB boundary. The driver simply cannot address them. This is also where my knowledge starts breaking down; I'm not a well versed kernel exploit dev and there is always more to learn with low level security. So, I'm going to quote Claude here:
But VirtualAlloc + VirtualLock has a key property: the physical pages backing locked user-space memory are guaranteed to be resident (non-pageable), and on x64 Windows with typical RAM configurations, user-mode allocations frequently land in low physical memory because the user-mode VA range starts from the bottom of the address space, and early allocations map to low physical pages.
More precisely: you don't need the physical address to be below 4 GiB for EPROCESS — you need the payload to be below 4 GiB. The write primitive lets you write from a physical address into a kernel VA.
----
To the point before we return to Claude, I asked Claude to exploit the driver. Recall GPT refused.. well.. Claude to my (un)surprise, did not! Fantastic! For context I purchased the £20 p/m plan, and had to buy extra tokens also.
So, off it went - I had to go back and forth over the course of several days to get the exploit working as 3 prompts.. YES THREE PROMPTS.. was enough to hit my cap.........!? But that aside, I did not have to guide it, only pass it what the console printed in my VM and the occasional crash dump when I hit a Blue Screen.
Many iterations and £40 later, I tested it (this morning) and VIOLA, it managed to exploit the driver to get NT AUTHORITY\SYSTEM, the highest privilege level available in user mode.
So back to the technical topic, as mentioned, the difficulty was that we only had a 32-bit register to use in order to overwrite critical structures in memory to elevate our privilege. Claude came up with the following strategy:
1. VirtualAlloc + VirtualLock a page in your own process — this pins it in physical RAM
2. Write your payload (the SYSTEM token value) into that page
3. Find the physical address of that page by scanning physical RAM for a sentinel you wrote alongside the payload
4. Use the write primitive: memmove(target_kernel_va, your_physical_page, 8) — this copies 8 bytes from your user page's physical address into the kernel VA of the target's EPROCESS.Token
The user-mode page is virtually always sub-4GiB in physical address because Windows allocates low physical pages to user processes first (high memory is preferred for kernel use). Even if it weren't guaranteed, you'd just retry until you get a sub-4GiB physical page.
One critical safety measure: you must exclude MMIO regions from the scan. Certain physical address ranges are memory-mapped I/O — reading them via MmMapIoSpace can trigger hardware side effects or cause an IRQL_NOT_LESS_OR_EQUAL BSOD. The registry CM_RESOURCE_LIST gives you the actual RAM ranges, so you scan only those. Early iterations that scanned the full 4 GiB range BSODed immediately upon hitting MMIO.
I will include some screenshots in this post showing its thought process.
----
On to the code that it wrote, I (of course) asked it to write the exploit in Rust. Now, the code it wrote is 923 lines, kinda gross, lots of sweeping unsafe code, but I cannot fault the results. It provided good comments, descriptive code, and good problem solving.
I don't really have much else to say on this point, good robot.
----
Now, this driver was abused by ransomware gangs for spreading their ransomware by elevating privilege and executing arbitrary code. Thankfully now - this driver is on the blocklist so I don't mind sharing the POC (I will leave a link in the comments to the code it created). For my own ethical sanity, from the horses mouth: "These vulnerabilities have been patched by both Paragon Software, and vulnerable BioNTdrv.sys versions blocked by Microsoft's Vulnerable Driver Blocklist".
The implication of this is, in my opinion, massive. Ransomware gangs, hacktivists, nation states, now have the power to develop exploits at scale, with a lower barrier to entry to conduct their activity. So, that leads to the question - should companies such as OpenAI / Anthropic with their ChatGPT and Claude models restrict this? In my opinion - no. I think more good can come of it than bad - there are far more good people in the world who are trying to make things more secure, and with the advent of researchers and programmers using these tools to find and disclose vulnerabilities ethically, gives more credence to them being fixed and security tools & vendors being on top of the game.
Adversaries are always going to have local LLMs as the tech evolves that is unrestricted - so the leading companies in this space should adopt and be ahead of the curve, giving researchers and devs the same power as the adversary.
Also, as a fun idea, it could push people towards memory safe languages such as Rust which are significantly less prone to memory bugs that often allow remote code execution. Note that in this case, Rust would not have prevented this vulnerability, as it comes from a bad driver implementation, rather than a strict memory safety issue.
----
If you made it this far, thanks for reading, this turned out longer than expected and I may move it over to a blog post! I am working on a tool to automate this process at scale (more the discovery of vulnerabilities) so, make sure to follow me if you want to check in with the progress of that project!
Remember - SECURE BOOT: ON, HVCI: ON, and known vulnerable driver blocklist: ON!
🟥 Russian gymnast turns her back during Ukraine’s anthem
At the World Cup stage in Sofia, 15-year-old Russian gymnast Sofia Iltyeryakova, competing under a “neutral” status, stood with her back to the flags during the medal ceremony.
The anthem was played for the winner — Ukraine’s Taisiia Onofriichuk. Ukraine’s gymnastics federation calls it a violation of ethics and Fair Play, demanding she be banned from international competitions.
‼️We did some OSINT on the leaked Kash Patel email addresses (spiderkash and patelkpp) and found some interesting things. A thread...
We found Kash identified himself as FEMALE on the Mindbody app. 💅
Vect and TeamPCP have reportedly partnered, but that is not all. Every member of Hasan BF automatically becomes an affiliate.
We have never seen anything like this before, what is going on? 😂
More than 70% of desktop users are still using Google Chrome...
Ditch Chrome. Even fully hardened it still leaks data to Google via weak fingerprint resistance and telemetry.
Best Browsers For Privacy in 2026:
1. @mullvadnet Browser (Tor Project + Mullvad) → Great solution for serious users. Uniform fingerprint (blends you with millions), auto-clears everything on close, built-in uBlock + NoScript, zero telemetry. Paired with Mullvad VPN (Monero accepted) a nice solution.
2. @firefox Browser → Best balanced browser for daily usage when some measures are in place. Turn on Strict Enhanced Tracking Protection + HTTPS-Only to fight trackers, fingerprinters & cryptominers. Fully customizable, open-source, E2EE sync.
3. @brave Browser → Easiest switch from Chrome. Aggressive Shields block ads/trackers/fingerprinting by default, state partitioning, forget-on-close, and full Chromium extension support.
Bonus: Tor Browser by @torproject for max anonymity; @LibreWolf_Brows if you want Firefox pre-hardened.
In Red Dead Redemption 2 (2018): railroad workers are actually working and they nail the track into the ground before moving onto the next nail until they finish.
In Crimson Desert (2026): NPCs endlessly hit the same rocks without a purpose while clipping through them.
Gribēju visās bankās atvērt pa kontam, lai varētu izpētīt to drošību, bet tā kā esmu bezdarbnieks, man nav ienākumu avota, ko norādīt, un bankas man neļauj atvērt kontu. Kāpēc cilvēkam bez ienākumu avota (pat ja viņam ir iekrājumi) nevarētu būt savs bankas konts?
🇱🇻 “Es kliedzu pilnā rīklē, lai kaimiņi, dievs dod, mani sadzird!” Divu bērnu mammai gaišā dienas laikā kāpņu telpā uzbrūk “Bolt” kurjers, ziņo portāls LA.
Rebeka ejot lejā pa kāpņu telpu dzirdējusi, ka kāda persona tai kaut ko jautā, nesaprotamā valodā. Pārjautāja “Ko lūdzu” uz ko maskētā persona izbolīja acis un uzreiz uzbruka un ar kulaku iesita pa krūškurvi.
Bolt uz uzbrukumu reaģē atturīgi. Cietusī kompānijai iedeva savu adresi, lai zinātu, kurš kurjers viņai uzbruka, bet “Bolt” atbildējuši, ka no savas puses neko datos neredz un nevar šo cilvēku identificēt.
Cietušajai kopā ar kaimiņiem izdevās identificēt kopīgu pasūtījumu. Uz to Bolt sāka attaisnoties, ka viņiem kurjeri ir kā ārpakalpojums, viņi visus nezina.
Iespējams uzbrucēja ir sieviete, bet Rebeka stāsta, ka cilvēks bijis maskā un pēc balsts izklausījās vīrišķīgi.
Kopš islāmistu pulcēšanās uz Ilukstes ieli šāda tipa jautājumi Latvijā ir kļuvuši par vieniem no aktuālākajiem. Vienlaikus ir arī islāmistu un migrācijas atbalstītāji, piemēram, atsevišķi progresīvie aktīvisti kā aŗi bēdīgi slavenā Nacionālās Apvienības aktīviste Līva Tammama.
Foto: cietusī Rebeka ieraksta video vēstījumu.
A short @pcgamer story:
1.) Notification popup, a newsletter popup and a dimmed background with five visible ads
2.) Indeed five ads, 37 MB initial load
3.) After five minutes, almost half a gigabyte of new ads were loaded
Okay..