Argha 🏏 📚 💻

30.1K posts

Argha 🏏 📚 💻 banner
Argha 🏏 📚 💻

Argha 🏏 📚 💻

@StringsVsAtoms

🌏 वसुधैव कुटुम्बकम् - 'the world is one family' 🌍

India Entrou em Mayıs 2012
7.5K Seguindo438 Seguidores
Argha 🏏 📚 💻 retweetou
Sam Altman
Sam Altman@sama·
we're starting rollout of GPT-5.5-Cyber, a frontier cybersecurity model, to critical cyber defenders in the next few days. we will work with the entire ecosystem and the government to figure out trusted access for cyber; we want to rapidly help secure companies/infrastructure.
English
982
744
11.8K
847.7K
Argha 🏏 📚 💻 retweetou
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
🇵🇰 A threat actor on an underground forum is claiming to have leaked approximately 39GB of alleged data linked to multiple Pakistani government, military, and intelligence-related organizations. According to the post, the alleged dataset may include restricted or classified documents, as well as personal details related to military personnel and government officials. The actor references multiple organizations, including: • Ministry of Defense • National Counter Terrorism Authority (NACTA) • Military Intelligence (MI) • Federal Investigation Agency (FIA) • Counter Terrorism Department (CTD) • Civil Defence • Intelligence fusion and threat assessment centers The claims also mention: • Internal security-related documentation • Counterterrorism-related material • Personnel information • Sensitive operational references If authentic, this would represent a highly sensitive national security-related exposure with potential geopolitical implications. Potential risks may include: • Exposure of intelligence and defense operations • Targeting of military or government personnel • Espionage and counterintelligence risks • Increased geopolitical cyber tensions • Disinformation and psychological operations • Operational security (OPSEC) failures Government and defense-sector leaks are particularly concerning because even partial authenticity can: • Aid hostile intelligence collection • Reveal organizational structures • Expose internal workflows and relationships • Support future cyber or physical targeting efforts At this time, the claims remain UNVERIFIED and no independent confirmation has been established. Due to the sensitive nature of the allegations, all shared information should be treated cautiously until validated by official or technical analysis. #Pakistan #CyberSecurity #ThreatIntelligence #DataLeak #Government #Military #DailyDarkWeb #DarkWeb #InfoSec
Dark Web Intelligence tweet media
English
0
3
10
1.6K
Argha 🏏 📚 💻 retweetou
Daniel Lunghi
Daniel Lunghi@thehellu·
We investigated a CN #APT that targeted multiple governments and companies with government contracts in Asia. In half of the targets we found a second group with different malware toolkit but sharing the infection vector and some post-exploitation tools trendmicro.com/en_us/research…
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
0
24
66
4.7K
Argha 🏏 📚 💻 retweetou
Damien Symon
Damien Symon@detresfa_·
A likely fake SUPARCO Facebook page run by a malicious actor circulated doctored imagery suggesting they were linked to Pakistan’s recently launched EO-3 satellite, checks confirm images are outdated or manipulated however content has spread widely among unaware audiences
Damien Symon tweet mediaDamien Symon tweet mediaDamien Symon tweet mediaDamien Symon tweet media
English
58
505
2.2K
116.4K
Argha 🏏 📚 💻 retweetou
DGP Punjab Police
DGP Punjab Police@DGPPunjabPolice·
A major blow to the deep-rooted terror conspiracy involving #Pakistan’s ISI and the pro-Khalistan Elements. Continuing further investigations into the Railway Track attempted IED blast at Shambhu, District #Patiala on April 27, 2026 @PatialaPolice & #SSOC Amritsar, in a joint operation, recover 01 Rocket Propelled Grenade(RPG) launcher, 01 metallic IED weighing 2.296 kg along with detonators and battery, 02 packs of RDX weighing 1.456 kg, 01 hand grenade, 03 high-end pistols with magazines and ammunition, and 02 wireless sets with headphones from Village Panjwarh Khurd, District #TarnTaran. Investigations reveal that this terror module was backed by a #Malaysia-based entity, with financial support being routed through Malaysia. The network’s links with the #Sirhind Railway Track blast and the grenade attack on CIA #Moga are being investigated . @PunjabPoliceInd remains firmly committed to dismantling terror ecosystems, breaking organised crime-terror networks, and ensuring lasting peace, public safety, and security across the state.
English
29
443
1.6K
45.7K
Argha 🏏 📚 💻 retweetou
Jawhar Sircar
Jawhar Sircar@jawharsircar·
Modi's State Media Policy of Punishing Well Deserved Independence & Dissent, + Surveillance, Raids, Fixed FIRs & Expensive Court Cases + Rewarding/Bullying Godi Media, + Flooding Fake Social Media and Letting Troll Beasts Upon Opponents + Throttling Digital Media >> HAS HAMMERED INDIAN MEDIA TO THE LOWEST POSSIBLE.
Jawhar Sircar tweet media
English
24
327
520
9.1K
Argha 🏏 📚 💻 retweetou
solst/ICE of Astarte
Cybersecurity is just software engineering’s PvP mode
English
55
661
6.3K
157.3K
Argha 🏏 📚 💻 retweetou
International Cyber Digest
International Cyber Digest@IntCyberDigest·
❗️🇩🇪 Germany says Signal is unsuitable for official communications. Members of the Bundestag have been formally urged to switch from Signal to Wire, after a Russian intelligence operation compromised the Signal account of Bundestag President Julia Klöckner. The choice of Wire is also strategic. Wire is a German company, headquartered in Berlin, operating under EU jurisdiction. The German federal cybersecurity agency BSI has approved Wire Bund for the exchange of classified information up to VS-NfD ("Restricted, For Official Use Only"). The platform is GDPR-compliant, NIS2-aligned, and self-hostable on European infrastructure. Signal, by contrast, is a US-based non-profit subject to the US CLOUD Act. The CLOUD Act allows American authorities to compel data access from US-headquartered providers regardless of where the data is physically stored. For a European parliament communicating about defence, foreign policy, or intelligence cooperation, that is a structural problem before you even reach the phishing question. Two operational reasons Wire is harder to phish: 🔴 Registration uses an email address, not a phone number 🔴 The email address is not visible to third parties Signal binds accounts to phone numbers. Anyone who knows your number can attempt to contact you, and enterprise controls like Single Sign-On are difficult to apply. The push is not new. Bundestag Vice-President Andrea Lindholz previously called for the same migration and proposed an outright ban on Signal for official parliamentary devices. Important context. This is not a vulnerability in Signal's encryption protocol. The Signal protocol remains the gold standard for end-to-end encryption. The attacks succeed at the human and account-recovery layer, the layer Signal's phone-number-based identity model exposes by design. The Bundestag move fits a much larger European pattern. Brussels is pushing GAIA-X for sovereign cloud, the EUDI Wallet for digital identity, and now Wire for parliamentary communications. The throughline is the same: reduce dependence on US-headquartered infrastructure, especially for anything touching classified or politically sensitive data. Germany is now the highest-profile government to formally treat Signal as unsuitable for official communications. The replacement is European. Other EU members will be watching as Germany takes the lead.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
57
122
562
44.9K
Argha 🏏 📚 💻 retweetou
Argha 🏏 📚 💻 retweetou
spencer
spencer@techspence·
If you’re an IT admin and you’ve never had your internal environment pentested and can’t afford one right now, do this instead: 1. Run Locksmith - fix anything that’s a High risk 2. Run ADeleginator - make sure everyone, authenticated users, domain users and domain computers doesn’t have any unsafe permissions 3. Run ScriptSentry - check for credentials in logon scripts 4. Run PingCastle - check the control paths section. It’s like bloodhound. Look for non-admins that have control paths If you do this, your environment will be much better when you’re done fixing everything.
English
13
161
1.2K
66.5K
Argha 🏏 📚 💻 retweetou
Netram Defence Review
Netram Defence Review@NetramDefence·
THREAD🧵 Gensis of Pakistan's "War from India's East" EXCLUSIVE: We studied a Pakistan-based information warfare wing for 3 months. The origins of this operation traces back to August 2025, when Pakistan's Army Chief Field Marshal Asim Munir stated "We'll start from India's East." This marked Pakistan's shift from a western-front-centric posture to exploiting vulnerabilities in India's Northeast. 1/10 @aravind @ShekharGupta @spvaid @sneheshphilip @AnchorAnandN @ARanganathan72 @jsaideepak @major_pawan @easterncomd @official_dgar @OsintTV @HMOIndia @AmitShahOffice @AmitShah @PMOIndia @DefenceMinIndia @SandeepUnnithan @manupubby @ShivAroor @VishnuNDTV @gauravcsawant @dubey_ajit
Netram Defence Review tweet media
English
112
697
1.4K
213.2K
Argha 🏏 📚 💻 retweetou
Squiblydoo
Squiblydoo@SquiblydooBlog·
We didn't know how an actor was using EV Certificates issued to Lenovo and others. We now do. From DigiCert's incident report: "the threat actor used a compromised analyst endpoint to access DigiCert's internal support portal. The threat actor used a limited function within the customer-support portal which allows authenticated DigiCert support analysts to access customer accounts from the customer's perspective to facilitate support tasks. The threat actor was able to use this function to access initialization codes for orders that were approved but pending delivery for EV Code Signing certificate orders across a finite set of customer accounts." "Possession of the initialization code, combined with an approved order, is functionally sufficient to generate and retrieve the corresponding certificate." The full report can be found here and explains the incident in great detail: bugzilla.mozilla.org/show_bug.cgi?i… The report mentions "Where we got lucky: A community member involved in security research reported the evolving pattern of misused certificates and engaged in dialogue with our support team. Without that report, the undetected compromise of ENDPOINT2 and the associated mis-issuance might have remained undiscovered for a longer period." Special thanks goes to the regular contributors to the Cert Graveyard; @g0njxa , @malwrhunterteam , and others. Also special thanks to DigiCert: this report has a high level of transparency, which is warranted, and also well executed.
Squiblydoo@SquiblydooBlog

What do Lenovo, Kingston, Shuttle Inc, and Palit Microsystems have in common? EV Certificates from these companies were issued and used by a Chinese crime group, #GoldenEyeDog (#APT-Q-27)! Thanks @malwrhunterteam and @g0njxa for your contributions 1/7

English
4
102
453
69.9K
Argha 🏏 📚 💻 retweetou
Rewards for Justice
Have you seen this terrorist? If so, your information could be worth up to $10 million and relocation.
Rewards for Justice tweet media
English
19
38
144
19.4K
Argha 🏏 📚 💻 retweetou
Mountain Rats
Mountain Rats@mountain_rats·
Based on intelligence reports a man was arrested at Bengaluru airport bringing in a large number of USA banks debit cards . Six locations in various states were raided ad searched by ED. 25 more foreign debit cards ,40 lakh cash and documents were seized . It is seen that from 25 Nov till date Rs 95 crores crores have been drawn from widely spread ATM in different states and money distributed mainly to Bastar ad other areas in Chattisgargh mainly to fuel extremism and religious conversions . The Timothy Initiative ( TTI ) . Investigation is on .
English
39
1.9K
5.2K
147.9K
Argha 🏏 📚 💻
Argha 🏏 📚 💻@StringsVsAtoms·
Remember the cold war CIA program MK-ULTRA? Recently declassified memos reveal proof & further plans for interrogation by teams trained to utilize the polygraph, various drugs, and hypnotism “for personality control purposes.” A must read ✍️ 🔗 interc.pt/3OI01Lw
English
0
0
0
6
Argha 🏏 📚 💻 retweetou
NATO
NATO@NATO·
Cyber defence at its peak 🛡️ Organised by @ccdcoe, the world’s largest live-fire cyber defence exercise, Locked Shields 2026, brought together 41 nations to practise protecting critical infrastructure and military systems against real-time cyberattacks 🔗 ccdcoe.org/news/2026/lock…
NATO tweet media
English
44
128
528
32.1K