Cybersecurity Social Media and Updates

Secure Solutions for Journalists and At‑Risk Professionals
SocialJan 23, 2026

Secure Solutions for Journalists and At‑Risk Professionals

I started Granitt in 2022 to help journalists and other groups of at-risk people continue to do their work safely and securely. Please get in touch if you’re looking for an assessment, policy and process development, training, or presentation. https://t.co/5eyprsSuBF

By Runa Sandvik
FBI Seizes Reporter’s Devices, Including Encrypted Drive
SocialJan 23, 2026

FBI Seizes Reporter’s Devices, Including Encrypted Drive

Here are the items the FBI seized from Washington Post reporter Hannah Natanson: a recorder, two laptops, an external drive, a smart watch, an iPhone. Her December article mentioned that she stored reporting notes on an encrypted external drive, so...

By Runa Sandvik
Claude Extension Serves as Fallback when Browsers Blocked
SocialJan 22, 2026

Claude Extension Serves as Fallback when Browsers Blocked

When you don't have an Skill/MCP, a headless browser is blocked, curl and fetch are blocked... the Claude extension is a slow but serviceable backup.

By Jason Haddix
Rethink Dispute Processes to Turn Fraud Into Advantage
SocialJan 22, 2026

Rethink Dispute Processes to Turn Fraud Into Advantage

Banks can turn first-party fraud from a hidden vulnerability into a competitive advantage if they rethink dispute processes. Join our conversation with @shanthi_peace, CEO of Casap. Watch the full episode: https://t.co/aCTj9YH63K https://t.co/vmuPbei31q

By Jim Marous
Defender, Not Attacker, Determines Cyber Attack Impact
SocialJan 22, 2026

Defender, Not Attacker, Determines Cyber Attack Impact

I wrote a short post on how the impact of cyber attacks is determined by the target, not the attacker. It’s important to remember how much control the defender has over not just the terrain but the effects of an...

By The Grugq
Ethereum's Transaction Record Skewed by Address Poisoning Attacks
SocialJan 21, 2026

Ethereum's Transaction Record Skewed by Address Poisoning Attacks

Ethereum just hit an all-time high in daily transactions But much of the activity was driven by address poisoning attacks https://t.co/rBDQRtSqza

By Laura Shin
AI Fuels Buggy Bounty Incentives; cURL Exits to Reset
SocialJan 21, 2026

AI Fuels Buggy Bounty Incentives; cURL Exits to Reset

AI was the accelerant on a perverse incentive fire sparked by bug bounty platforms that reward spray & pray. Both open source & orgs without dedicated vuln response teams get overloaded when they offer cash there. cURL is right to...

By Katie Moussouris
BTQ Partners ITRI for Low-Power
SocialJan 21, 2026

BTQ Partners ITRI for Low-Power

NEW: BTQ is partnering with ITRI to build a new chip architecture for post-quantum security. $BTQ ’s QCIM targets lower-power cryptography, and is now moving into silicon validation with ITRI, the incubator behind $TSMC.

By Wendy O
Banks Overlook Billion-Dollar Fraud Crisis
SocialJan 21, 2026

Banks Overlook Billion-Dollar Fraud Crisis

[New Episode] The Billion Dollar Fraud Crisis Most Banks Are Missing. With @shanthi_peace, CEO of Casap. Watch the latest episode now: https://t.co/aCTj9YH63K https://t.co/dJky1nDo6a

By Jim Marous
PAI Boosts Claude Code Efficiency by 50% – Free Workshop
SocialJan 20, 2026

PAI Boosts Claude Code Efficiency by 50% – Free Workshop

PAI is a super power. @DanielMiessler created features on top of Claude Code that increase its efficacy by 50%... and that's a lot based on how awesome Claude Code is. Incoming FREE workshop of PAI and other tools I'm using to...

By Jason Haddix
Privacy, Security, and Scale: Non‑Negotiable Blockchain Essentials
SocialJan 20, 2026

Privacy, Security, and Scale: Non‑Negotiable Blockchain Essentials

3 things that will become non-negotiable for any chain that plans to operate in the long-term: Privacy, security, scale. - Privacy (by now it's obvious, and still) - because if we're to migrate our digital life -- financial and non-financial --...

By Eli Ben-Sasson
Newsrooms Must Adopt Holistic Safety Beyond Digital Checklists
SocialJan 17, 2026

Newsrooms Must Adopt Holistic Safety Beyond Digital Checklists

I spoke to @CJR about the FBI seizing devices from a @washingtonpost reporter and what newsrooms should know. The way forward here is more than just a digital security checklist, but a holistic focus on safety: physical, digital, emotional, legal....

By Runa Sandvik
Iran-Linked Hack Targets Middle East Gmail, WhatsApp Accounts
SocialJan 16, 2026

Iran-Linked Hack Targets Middle East Gmail, WhatsApp Accounts

Spoke to @zackwhittaker about a hacking campaign targeting high-profile Gmail and WhatsApp accounts across the Middle East, found by @NarimanGharib earlier this week. Gharib believes the campaign is linked to Iran, TechCrunch was unable to attribute it. https://t.co/XH9cRWtxh2

By Runa Sandvik
Bots Now Dominate Web Traffic, Malicious Bots Rising
SocialJan 16, 2026

Bots Now Dominate Web Traffic, Malicious Bots Rising

Here's what makes up a website's traffic today. It used to be mainly humans, but now bots make up the majority of website traffic. In addition, more malicious bots have been visiting sites than in the past. Check out the data. https://t.co/fpsvUqwlhE

By Neil Patel
New Dev Tools Promise End‑to‑End Encryption for Open‑Source L
SocialJan 16, 2026

New Dev Tools Promise End‑to‑End Encryption for Open‑Source L

Are there any other developer tools that let you encrypt your workflow? I met with the founders, video coming tomorrow, and they claim that everything is encrypted on open source LLMs even in and out of the LLM.

By Robert Scoble
Aave V4 Contest Ends with Record Participation
SocialJan 15, 2026

Aave V4 Contest Ends with Record Participation

The Aave V4 security contest has come to an end. With a record number of participants, enormous thanks to everyone who took part, and we hope you enjoyed our work. See you on mainnet.

By Stani Kulechov
Ethereum Foundation Tackles Quantum Threat Head‑On
SocialJan 15, 2026

Ethereum Foundation Tackles Quantum Threat Head‑On

"I HAVE to highlight the work being done by the Ethereum Foundation to solve the quantum threat." https://t.co/5TvOPraNmP

By Laura Shin
Quantum Threat Solves Crypto's Biggest Upcoming Challenge
SocialJan 15, 2026

Quantum Threat Solves Crypto's Biggest Upcoming Challenge

"For all crypto protocols... solving the quantum threat is the most significant and biggest effort they'll have to undergo." https://t.co/5TvOPraNmP

By Laura Shin
Bitcoin's Fate in the Quantum Computing Era
SocialJan 15, 2026

Bitcoin's Fate in the Quantum Computing Era

Coming next: What happens to Bitcoin when quantum computers get powerful enough? ⚛️ I'll talk with Alex Pruden of Project Eleven @qdayclock about the post-quantum roadmap 👇 https://t.co/5TvOPraNmP

By Laura Shin
Bitcoin Rallies While Unpriced Risks Loom
SocialJan 15, 2026

Bitcoin Rallies While Unpriced Risks Loom

⏰ Starting in 5 minutes (12pm ET)! Bitcoin is rallying 📈 but the biggest risks may not be priced in yet In today's @Unchained_pod livestream: 🧠 Steven Ehrlich w/ Grayscale's head of research Zach Pandl (@LowBeta_) on markets & regulatory delays then... 🔐 I'll speak...

By Laura Shin
Asia’s Payment Boom Fuels Surge in New Fraud
SocialJan 15, 2026

Asia’s Payment Boom Fuels Surge in New Fraud

Visa just exposed 5 new fraud patterns exploding in 2026 — and they're hitting hard in Asia. • Account takeover up 300% via social engineering • AI-generated deepfakes fooling KYC • Mule networks using instant payments (PIX/UPI) • Synthetic identities surging in Asia • Card-not-present...

By Richard Turrin
Auto-Close Tickets only when AI Reply Succeeds
SocialJan 15, 2026

Auto-Close Tickets only when AI Reply Succeeds

Any @Zendesk experts out there? We have a gen AI reply out there for @haveibeenpwned which attempts to answer a support question, but has a fallback for if it can’t. How can we automatically close the ticket if a reply...

By Troy Hunt
Read the Manual: Hidden Admin Paths Reveal Bypass
SocialJan 14, 2026

Read the Manual: Hidden Admin Paths Reveal Bypass

RTFM…. Literally I once was testing an older piece of software but didn’t have creds. Nothing available to me. Downloaded the manual and saw the url paths to the admin section. Plugged those in to my domain, one hit, boom 5k authorization...

By Jason Haddix
Govern AI Agents with Standards, Governance, and Oversight
SocialJan 14, 2026

Govern AI Agents with Standards, Governance, and Oversight

How Do You Manage AI Agents Before Your Tech Stack Spins Out of Control As #AIagents spread rapidly across businesses, many organizations are sleepwalking into fragmented, insecure and ungoverned #tech stacks. This article explains how leaders can regain control by...

By Bernard Marr
Flagging Breach Data as Sensitive Prevents Harmful Doxing
SocialJan 13, 2026

Flagging Breach Data as Sensitive Prevents Harmful Doxing

Occasionally, someone takes issue with me flagging a data breach as "sensitive" such that the email addresses can't be publicly searched because they want to dox the users. That's a *really* bad idea, for many reasons: https://t.co/rEtQPHkxf7

By Troy Hunt
Stay Anonymous When Using AI for Sensitive Queries
SocialJan 7, 2026

Stay Anonymous When Using AI for Sensitive Queries

If you must, use AI tools with as much anonymity as possible. Ask your medical questions but anonymized and remove all personal details before submitting. OpenAI is increasingly the most interesting target for criminals, keep your account as boring and...

By Rachel Tobac
Travel Plans, IoT Shelly Nirvana, Ubiquiti Security Fusion
SocialDec 28, 2025

Travel Plans, IoT Shelly Nirvana, Ubiquiti Security Fusion

Weekly update is up! Upcoming Travel; Reaching IoT Shelly Nirvana; Physical Security Meets Digital with Ubiquiti: https://www.troyhunt.com/weekly-update-484/

By Troy Hunt