WLFI’s Hidden Blacklist Betrays DeFi Promises, Freezes Investors
I have always been an ardent supporter of President Trump and his crypto friendly policy. As an early supporter who invested heavily in World Liberty Financial, I did so because I believed in the vision that was presented to the public: a decentralized finance platform that would promote financial freedom, remove intermediaries, and bring the benefits of DeFi to mainstream Americans. What was never disclosed — to me or to any investor — is that World Liberty embedded a backdoor blacklisting function in the smart contract used to deploy WLFI tokens. This function gives the Company unilateral power to freeze, restrict, and effectively confiscate the property rights of any token holder, without notice, without cause, and without recourse. This is the opposite of decentralization. This is a trap door marketed as an open door. I denounce the ongoing token scandals by the bad actors at WLFI. I am the first and single largest victim, as a result of their wrongful blacklisting of my WLFI token wallet back in 2025, that violates basic investor rights and blockchain principles of fairness. Every action taken by the WLFI team to extract fees from users, to secretly implant backdoor controls over user assets, to freeze investor funds without disclosure or due process, and to treat the crypto community as a personal ATM — all of these actions are illegitimate and were never authorized by any fair, transparent, or good-faith community governance process. The governance votes cited to justify these actions were not conducted through a fair or transparent process. Key information was withheld from voters, meaningful participation was restricted, and the outcomes were predetermined. These votes do not represent the will of the community — they represent the will of those who designed them. These actions have nothing to do with me. They have nothing to do with the investors who believed the promises this project made. We oppose every one of these actions in the strongest possible terms. The WLFI team’s actions erode trust in the project. Unlock the tokens and uphold transparency for the community. Let’s build with integrity, not misconduct.
Bitcoin Must Upgrade for Post‑Quantum Security
Just to be clear: does this mean Bitcoin doesn't need to upgrade to be post-quantum secure? ABSOLUTELY NOT. Bitcoin should ABSOLUTELY take the necessary steps to become PQS.

MedStar Health Breach Exposes Names, SSNs, Medical Records
.@MedStarHealth has issued the following patient notification: “After a thorough analysis of the files on MedStar Health’s systems, we determined that the files accessed by the unauthorized party contained patient information that included your name, date of birth, Social Security...
Venice Keeps AI Chats Local, Adds Verifiable Encryption
"Every major AI platform — ChatGPT, Claude, Gemini, Grok, Perplexity — stores your conversations on centralized servers. That data can be reviewed, classified, subpoenaed, hacked, or sold. You're trusting the company, its employees, its vendors, and every government that asks. Venice...
Cloud Migration Shifts Risk, but Outages Spark Security Doubts
Hosting data in-house carries risks due to limited cybersecurity investment. Moving to the cloud shifts risk to providers, but significant outages from major providers raise questions about security and stability. #CloudSecurity #CyberRisk https://t.co/mjMEZ0cpkz
Public API Keys Misused as Live Gemini AI Credentials
Developers’ public API keys now function as live Gemini AI credentials, enabling attackers to run costly and unauthorized operations. https://t.co/Oo1InL5G8f
AI Cuts BEC Dwell Time From Days to Minutes
Business email compromise dwell time: 24 days to 24 minutes. That is AI-powered incident response working. 85% of organizations still run manual security. Attackers move in 72 minutes. The math does not work.

Beware: Fake Login Alerts with Password Reset Links
Received an email from X warning you of new or unusual login attempts, with a handy 'change password' link? Beware, it's a slick new phishing attack that can trick even the most vigilant user. I've seen this with other sites...
Anthropic's Mythos Triggers Unexpected Global Cybersecurity Reckoning
Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think “This is an issue that involves all of the model developers. Our goal here is just to kick things off,” Graham said. Yes, including in China... https://t.co/Wsv6owE233
Shared Observability Unites SOCs and DevOps
RT SOCs and DevOps will need shared observability for agents: data access, tool calls, MCP interactions, and risk levels in one view. #Security #DevOps @Star_CIO https://t.co/tRGwCPc4Mb
Storeless Password Manager Creates, Never Stores Credentials
What happens when a password manager generates credentials on the fly and never saves them, anywhere, by design? https://spectrum.ieee.org/storeless-password-manager?share_id=9356368
AI Uncovers 27-Year-Old Bugs, Forces Wall Street Emergency
The AI that found 27-year-old vulnerabilities no human ever caught before just forced an emergency meeting with every major Wall Street CEO https://t.co/SdPtfUg1Ic

Mythos AI Exposes Critical Flaws Across All OSes
Anthropic's Mythos AI Uncovered Serious Security Holes in Every Major OS and Browser by @EddyTheGent https://t.co/Wz76Q174Y8 https://t.co/kUAhNoKC9j
New IDS Enhance SCADA Cybersecurity Protection
New intrusion detection systems boost protection of SCADA systems against cyber threats #energysky -- via pv magazine global: https://t.co/110epGR3u2
GPT‑5.4's Hacking Prowess Heightens Security Urgency
GPT5.4 is apparently very effective at hacking as well. Makes proactively using these models to secure the world more urgent and important than we knew.
Circle Must Act Fast to Prevent Massive Hack Losses
Agreed & hope Circle reconsiders their stance quickly since it's a big error that will lead to many millions more USD lost in hacks before they change their mind. Even as a "competitor" with $frxUSD, we have 24/7 comm channels...
Concern: Chinese Hackers May Steal Advanced Orality Detection Tech
Yo @AnthropicAI I’m worried that Chinese hackers will steal our most advanced orality detection technology

Treasury Pushes Anthropic, DoD Flags It as Risk
So the Treasury Department is encouraging banks to use and test Anthropic to prepare for new vulnerabilities… While the Department of War claims Anthropic is a “supply chain risk” for DoW and all their contractors…. Make that make sense https://t.co/vkDB1ezk88 https://t.co/jZD9h5yQVo

Quantum Threat Looms: Crypto’s Upcoming Q-Day Explained
So.. is q-day coming and is crypto cooked? definitely maybe. if you, like me, are not an expert in quantum computing and how it puts ALL blockchains at risk + want to know what changed in the last couple of weeks, then...
Seeking Real-World Feedback on SAFE GRC Platform
Do you use the SAFE GRC platform? Had a chance to see it at RSAC and was impressed but don't hear from many folks using it. Would love to hear real-world feedback from current users.
Pentesting: Human Insight Over Automated Scanners
🤖🤖🤖🤖🤖🤖🤖🤖🤖🤖🤖🤖 Pentesting is not a scanner or a fuzzer - whether SAST, DAST, AI, deterministic or non-deterministic. Pentesting is a human * using those tools * to see if they can find a security problem that your teams and tools may...
Robust Patch Management Needed Before AI Vulnerability Crisis
The technical debt repo man is coming, especially for those that don’t have robust patch creation & management — & it’s clear we can’t keep cranking out bugs in the 1st place. Stay hydrated, ops teams, & tip your doordashers...
Ultra-Powerful Vulnerability Model Reserved for Intelligence Agencies
We’ve created a model that we think could find and fix all the vulnerabilities in your application. You can’t have it. A model this powerful should only be used by the CIA and NSA to exploit your services.
Thousands of Gov Officials' Emails and Passwords Exposed Online
The emails and plaintext passwords of thousands of government representatives have been found online. https://t.co/WaJd3bjpd5
Compute Fuels Attacks, Committees Lag Defense Gap
Offense scales with compute. Defense scales with committees. New piece on why the attacker-defender gap is widening faster than anything we've built to close it -- and what actually moves the needle. Link in bio or cje.io
Legacy SDK Flaw Lets Attackers Steal Private Data
An outdated SDK carries a dangerous flaw that allows threat actors to steal private data. https://t.co/GKds3Ok79H
Aave Achieves SOC 2 Compliance, Raising DeFi Standards
Aave products and endpoints are now SOC 2 compliant, ensuring strong operational and security compliance, setting a new standard for DeFi application layer.
AI Journaling Demands Privacy as Core, Not Feature
The most personal data you will ever generate deserves more than a terms of service. When you journal with AI, you are sharing things that, for a lot of people, nobody else hears outside of a therapist. That level of trust...
Chrome's Device‑Bound Session Credentials Coming to macOS
New Device Bound Session Credentials feature for Google Chrome is also coming to macOS soon. https://t.co/AKyb6s77Fa
Tor Builds RAM‑only Relays to Thwart Hardware Seizures
The Tor Project is working with relay operators to develop "stateless" servers that run entirely in RAM. By forgetting all data upon reboot, these self-wiping relays will protect users and node operators from hardware seizures. https://t.co/C2MghAYpMj

XRP More Quantum-Resistant Than Bitcoin
Experts say XRP is less vulnerable to quantum threats than Bitcoin, thanks to key rotation and escrow time-locks, exposing fewer accounts. Source: Coindesk https://t.co/I2y893X172
Enterprises Store Data Right, but Lose Key Control
Data sovereignty is not data residency. Three things have to align: where data is stored, how it is encrypted, who controls the encryption keys. Most enterprises get the first right. Almost none get the third.

Binance Helps Freeze $12M in Phishing Scam Funds
BIG: 🚨 Binance supported a UK National Crime Agency–led operation targeting approval phishing scams, helping freeze $12M in illicit funds and protect over 20,000 victims across the UK, US, and Canada https://t.co/dB0eSANr9o

Human Oversight Essential: AI Can’t Fully Guard Cybersecurity
Why We Can’t Let #AI Take the Wheel of Cyber Defense by Steve Durbin @SecurityWeek Learn more: https://t.co/m9sL8PCrDB #CyberSecurity #Infosec #IT #Technology https://t.co/VFKJzyJskQ
Quantum‑Safe Bitcoin Transactions Now Possible with New Binding Method
ELI5 of @avihu28's brilliant paper: 1. In a Bitcoin tx there are two parts: (1) The first part used to show that you own a Bitcoin. That part can be made post-quantum safe. (2) The second part that says who controls it...

Secure Your IoT Devices with Proven Cyber Defenses
How to Protect #IoT Devices from #CyberSecurity Threats by @antgrasso #InternetOfThings #Infosec #IT #Technology https://t.co/bHVcGm4rmX
God‑mode RCE Is Just Access; Execution Needs Capability
Even having a working 0day RCE god mode bug only gets you so far. You have initial access. Now what? What do you want to do and do you have the systems, processes, infrastructure and time to do it? Capability, opportunity,...
Lack of Hardware Attestations Leaves Privacy Vulnerable
If you inference provider doesn’t give you hardware attestations on what code was run and in turn that all your interaction were private - you are under attack.
AI Boosts Productivity, but Prompt‑injection Risks Threaten Organizations
Wonder if the AI calculus becomes “12% productivity gains per employee with the tail risk of the org going under for a week if Ralph is the victim of a convincing prompt injection and inadvertently sends out internal info to...
Mythos AI Finds 20 Zero‑days, Poised to Crack Smart Contracts
Anthropic's Mythos model is so powerful they restricted it to 12 partners and a $100M compute budget. It's already found 20 zero-days in legacy software. @kaiynne and @tayvano_ want to know when it finds the first one in a smart contract. New...
Fed and Hedge Fund Leader Warn of AI-Driven Cyber Threats
JUST IN: Scott Bessent and Jerome Powell called Wall Street execs to an urgent meeting over worries that Anthropic PBC's new AI model will ramp up cyber threats.
Shadow IT Evolves: From User Shortcuts to Autonomous Systems
Shadow IT used to mean people using tools without approval. Now it can act on its own.
Mythos Cuts Cyber Attack Surface, Makes Exploits Scarcer
Concur. Mythos shrinks the total cyber attack surface area. There will be fewer exploits remaining, and those likely harder to find. And because model capabilities scale sub-linearly with both compute and training data, it likely takes a very large $$...
DoD Switches Allies as Anthropic Unveils Dangerous AI Weapon
DoD: Friendship ended with Anthropic. Now OpenAI is my best friend. [one month later] Anthropic: We’re pleased to announce the most powerful hacker capability ever created, able to discover and exploit thousands of critical 0days. Friends only release.
New DeFi Security Premium Ratio Prices Protocol Risk
DeFi has lost between $730M and $3.1B to exploits every single year since 2021. TVL has swung from $175B peak to $45B trough and back above $100B. The loss rate as a % of TVL is 1–3% / year depending on the...
AI Cybersecurity Closes Gaps, Giving Defenders the Edge
Yes. We're closing vulnerabilities that could have been (and may have been) exploited by bad actors already. AI cyber-security may well favor defenders in the large majority of cases.
US to Weaponize Mythos, Consumers Lose Early Access
Im guessing the USA will use Mythos to decimate its adversaries and get all their secrets long before they ever have access to it. Get used to this format. The days of consumers getting the model at the same time as...
Google Resists Russia's VPN Crackdown, ZoogVPN Removed
As Russia doubles down against VPN usage, Google seems to be resisting removal requests so far, despite a popular app, ZoogVPN, having reportedly been removed from Google Play. Here's all we know. https://t.co/KtMgSkFAfK

Blockchain Boosts Data Security for Modern Enterprises
How to Use #Blockchain for Enhanced #Data Security by @antgrasso #CyberSecurity #Infosec #IT #Technology https://t.co/qDcHN7LHpe
WhatsApp Enhances Privacy, Yet Gaps Remain
WhatsApp might be improving its privacy options, but there's still more to be done. https://t.co/Ibrc6RGxAp