๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐
6.3K posts

๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐
@scorchedx
unfiltered infosec shitpost amplifier. unforgiving insomniac wacko with chronic curiosity complex. โ ๏ธแดกแดษด'แด แดสษชแดแด แดสแด สษชษดแด สแดสแดแดก, ษช๊ฐ ษช แดกแดสแด สแดแด!โ ๏ธ
35ยฐ52โฒ57โณN 76ยฐ30โฒ48โณE Katฤฑlฤฑm Temmuz 2017
4.7K Takip Edilen785 Takipรงiler
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

๐จ๐ INTERPOL carried out Operation Ramz, the first cyber operation in the MENA region with 201 arrests, 382 additional suspects identified, 3,867 victims, and 53 servers seized across 13 countries.
The operation ran from October 2025 to February 28, 2026, and targeted phishing, malware, and cyber scam infrastructure. Around 8,000 pieces of data and intelligence were shared between participating countries: Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Libya, Morocco, Oman, Palestine, Qatar, Tunisia, and UAE.
Jordanese Police pinpointed a computer running fraudulent "trading platform" scams. A raid found 15 people running the scams, but investigators determined they were victims of human trafficking, recruited under false employment promises from Asia, passports confiscated on arrival, and forced into the scheme. Two suspects orchestrating the operation were arrested.
Other notable hits:
- Algeria dismantled a phishing-as-a-service operation, with one arrest and a server, computer, phone, and hard drives seized
- Morocco seized devices containing banking data and phishing tools, with three individuals in judicial proceedings
- Qatar identified compromised devices whose owners were themselves cyberattack victims unknowingly spreading malware
- Oman disabled a private-residence server holding sensitive information that had been infected with malware
Private-sector partners included Group-IB, Kaspersky, Shadowserver Foundation, Team Cymru, and TrendAI.




English
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

๐ฎ๐ฉ A threat actor is advertising an alleged database leak tied to Badan Siber dan Sandi Negara (BSSN), Indonesiaโs national cyber and cryptography authority.
The underground forum post references data allegedly associated with:
โข poltekssn.ac.id
โข Indonesian cyber/security education infrastructure
โข Identity-related fields
โข Passport-related references
โข National identification fields (โNIKโ)
โข SIM/license-related references
โข Timestamped extraction metadata
Based on the visible schema and context, the exposed information may include:
โข Personal identity information
โข Student/cadet records
โข Government-affiliated educational data
โข Authentication or registration-related fields
โข Passport or national identity metadata
If authentic, this incident would be particularly sensitive because BSSN is responsible for:
โข National cybersecurity coordination
โข Government cryptographic operations
โข Cyber defense initiatives
โข Security education and cyber talent development
โข Critical national cyber infrastructure oversight
Threat actors often target government cyber agencies and affiliated institutions for:
โข Intelligence gathering
โข Political signaling
โข Reputation damage
โข Espionage-related operations
โข Credential harvesting
โข Access to government-linked personnel information
Educational institutions connected to national cyber programs are increasingly targeted because they may contain:
โข Future government workforce data
โข Research information
โข Internal training materials
โข Government-linked identity datasets
โข Academic credential systems
The mention of identity-related fields such as โNIKโ and passport references raises concerns around:
โข Identity fraud
โข Social engineering
โข Credential abuse
โข Targeted phishing against government personnel or students
At this time, the authenticity of the alleged dataset and the method of compromise remain unverified.
#DDW #Intelligence #CyberSecurity #DarkWeb #DataBreach #Indonesia #Government #ThreatIntelligence #OSINT #BSSN

English
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

Martti Malmi, one of Bitcoin's earliest developers, just released a new version of Nostr VPN, an open-source mesh VPN that replaces the entire trust model of traditional VPN services.
Traditional VPNs route all your traffic through a central server operated by a company you have to trust. They see your data. They require your email. They can log your activity. They can be subpoenaed, hacked, or shut down. Even modern mesh VPNs like Tailscale, which improved on this by sending data peer-to-peer, still require you to authenticate through a centralized coordination server using third-party accounts like Google or Microsoft.
Nostr VPN eliminates the central server entirely. Your identity is a Nostr keypair, a self-generated cryptographic key pair with no registration, no email, no third-party account. The underlying transport layer is FIPS (Free Internetworking Peering System), a self-organizing encrypted mesh network where nodes authenticate each other, route traffic for each other, and establish connections without any central authority or global topology knowledge. Each node's Nostr public key (npub) serves as its network address.
The architecture uses two layers of encryption: hop-by-hop encryption between peers and independent end-to-end encryption between mesh endpoints with periodic rekeying for forward secrecy. When direct connections fail due to NAT issues, the system falls back to Nostr-based multihop routing through other FIPS nodes rather than relying on company-operated relay servers. Peer discovery and NAT traversal happen through public Nostr relays using encrypted gift-wrapped messages.
The new release adds native desktop apps for macOS, Linux, and Windows, an Android app, Nostr-based multihop routing for when NAT holepunching fails, and improved network management. It supports UDP, TCP, Ethernet, Tor, and Bluetooth transports simultaneously on a single mesh.
This is what happens when you apply Bitcoin's design philosophy, permissionless, self-sovereign, no trusted third parties, to networking infrastructure. Built by one of the people who helped Satoshi build Bitcoin in 2009.

English
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

Harvard is dumping $BTC and $ETH ...
According to Q1 filings, Harvard Endowment has dumped its entire position in @Blackrock's @Ethereum ETF.
It has also reduced its Bitcoin ETF exposure by a whopping 43%, equivalent to around $117 million.
Do those geniuses know something that we don't?!
English
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

๐จ Be aware of scammers!
๐น CoinMarketCap will NEVER DM you first. If you receive a message claiming to be from CMC & asking for funds, it's a scam!
Always verify before sending out your funds!
Stay #SAFU
English
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

โ ๏ธFirst Public macOS Kernel Exploit on Apple M5 Prepared Using Mythos Preview in Five Days
Source: cybersecuritynews.com/first-public-mโฆ
Apple's M5 silicon has reportedly been exploited for the first time in a public macOS kernel memory corruption attack, successfully bypassing the company's notable hardware-level memory protection.
The exploit chain starts from an unprivileged local user account, uses only standard system calls, and delivers a full root shell, all while Apple's Memory Integrity Enforcement (MIE) is active.
The breakthrough was made possible in part by Anthropic's Mythos Preview, a powerful AI model that helped identify the two vulnerabilities and assisted throughout the exploit development process.
#cybersecuritynews

English
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

Saylor built a bitcoin buying machine that doesn't need to dilute shareholders
@MicroStrategy's $STRC preferred stock logged a record $1.53B in trading volume Thursday, 4x its 30-day average. @saylor used it to fund the purchase of 11,707 $BTC.
The product pays an 11.5% dividend without diluting common shares.
English
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

โผ๏ธ๐จ Ledger customers are receiving physical scam letters impersonating a "Quantum Resistance" security update signed by CTO Charles Guillemet.
There's a QR code that leads to a phishing site harvesting 24-word recovery seed phrases.
Letters are localized per region (Italian recipient in the wild got an Italian-language version, matching Global-e's cross-border checkout data).
The data is probably sourced from the January 2026 Global-e breach (Ledger's e-commerce processor).


English

@faucetday @netrun_xyz 4DwaVDQTnXtDbNj92aVH3dovCP4m4Gb3y1eSdvavDcCL
HT

quest live.
โข follow @netrun_xyz
โข reply with your solana wallet address
wait for a response within 24 hours โณ
English
๐๐๐๐๐๐ ๐ฑ๐๐๐๐๐ข ๐ผ๐๐๐ ๐๐๐ retweetledi

UPDATE: Your wallet should tell you who can screw you!
Few months ago we embarked on a task to make KYCed centralized crypto exchanges obsolete for our users.
We now have everything someone may need for swapping crypto-to-crypto without leaving the wallets app. Privately and with confidence.
1. we show you the best rate and whether your funds can potentailly be rejected/frozen
2. we do not pass any of your meta data to the swap provider and keep your meta data private (IP, device etc)
3. we integrate as many liquidity sources as possible and take uncompromising approach to maintain high privacy standards
4. we give preference to DEXes to extent unconditional access to crypto swap to as many currencies as possible.
Here are some improvements to land in Unstoppable swap engine end of next week:
โ Barter + CCECash integrated
โ Uniswap + PancakeSwap AMM DEXes restored
โ THORChain rapid swaps live
โ fine-tuned swap provider risk scores based on swap activity over the last three months.
โ Large swaps will trigger additional one-time warning recommending DEX routes over custodial providers.
โ for each swap you will see provider's contact info
โ High-slippage quotes are filtered out automatically
โ two new swap providers now support direct swaps into shielded Zcash addresses.
Peace!

English














