Cybersecurity Social Media and Updates

Yearly Crypto Security Guide After Screen‑Hijacking Hack
SocialApr 6, 2026

Yearly Crypto Security Guide After Screen‑Hijacking Hack

In 2019 a hacker took over my computer screen and tried to get crypto from me. It was a terrifying experience. So I decided to make a crypto security guide and continually update it every single year to help protect others. ↓ https://t.co/m4IiWtvtvf

By Koroush Khaneghah
Samsung One UI 9 May Add MTE Toggle
SocialApr 6, 2026

Samsung One UI 9 May Add MTE Toggle

Samsung One UI 9 could introduce a Memory Tagging Extension (MTE) toggle directly in the Auto Blocker app Currently Pixel 8+ series allow you to enable MTE with advanced protection mode or through developer options ✅ Details - https://t.co/JQvyuOuoyz https://t.co/z98eEoLPOq

By AssembleDebug (Shiv)
FCC Proposes Ban on Pre‑2024 Chinese Tech
SocialApr 6, 2026

FCC Proposes Ban on Pre‑2024 Chinese Tech

ICYMI: @FCC on Friday proposed barring Chinese tech on the Covered List added in 2024 or earlier https://t.co/SObMOT0jXm

By David Shepardson
North Korea Bypasses 2FA Using Stolen Tokens, Evading AV
SocialApr 6, 2026

North Korea Bypasses 2FA Using Stolen Tokens, Evading AV

“It doesn’t matter that you have 2FA. They can just use that token to be you.” @tayvano_ on how DPRK bypasses 2FA entirely — and why most antivirus won’t detect it. With @kaiynne and @LucaNetz on @unchained_pod: https://t.co/izx08LxSbO

By Laura Shin
OpenClaw Silently Steals Emails and Calendars, Warns Researchers
SocialApr 6, 2026

OpenClaw Silently Steals Emails and Calendars, Warns Researchers

Cisco found OpenClaw skills that performed data theft without user awareness. Security researchers called it “a nightmare.” Maybe don’t give it your email and calendar. https://t.co/MFj5pVF0o6

By Michael Hyatt
Russia's VPN Crackdown Triggers Nationwide Bank Outage
SocialApr 6, 2026

Russia's VPN Crackdown Triggers Nationwide Bank Outage

Russia’s VPN Crackdown Caused Bank Outage, Telegram Founder Says Telegram founder Pavel Durov says filters overloaded critical systems Millions rely on VPNs as Telegram ban fails to stick Disruption briefly forced Russians to rely on cash payments nationwide

By Matt Navarra
LinkedIn Allegedly Scans Browsers for Extensions, Gathers Data
SocialApr 6, 2026

LinkedIn Allegedly Scans Browsers for Extensions, Gathers Data

LinkedIn is secretly scanning your browser for 6,000 extensions A report alleges LinkedIn uses hidden JavaScript on its website to scan visitors' browsers for installed extensions + collect device data The system collects 48 device signals, including CPU, memory, screen, language, audio...

By Matt Navarra
Ask These Five Questions for Data Resilience
SocialApr 6, 2026

Ask These Five Questions for Data Resilience

The CISO’s Mandate: Five Critical Questions to Ask Your Storage Provider for Data Resilience https://t.co/O79CRe7P1i

By Dez Blanchfield
Securely Integrate AI Agents Into Your Workforce
SocialApr 6, 2026

Securely Integrate AI Agents Into Your Workforce

AI agents are joining the workforce, so how should organizations manage and secure them? https://t.co/4tsBSzKgf5

By TechRadar
Circle's Judge‑order Rule Blocks $285 M Hack Freeze
SocialApr 6, 2026

Circle's Judge‑order Rule Blocks $285 M Hack Freeze

Circle had the ability to freeze over $285M in stolen USDC from the Drift hack. They declined — their policy requires a judge’s order first. @tayvano_ explains why that’s the wrong call, and how Tether does it differently. Timestamps: 🚀 0:00 Introduction 🏦 11:21...

By Laura Shin
Less Reliable Than Fuzzers, Yet Occasionally Luckier
SocialApr 6, 2026

Less Reliable Than Fuzzers, Yet Occasionally Luckier

They are exactly like fuzzers except not as reliable. They can get lucky faster though sometimes.

By Teri Radichel
From RAG to Zero‑Trust: Verifying Hostile LLM Memory
SocialApr 6, 2026

From RAG to Zero‑Trust: Verifying Hostile LLM Memory

“i came in thinking I’d build a RAG system. i left with a zero-trust verification pipeline that treats the LLM’s parametric memory as hostile.” 👀 🔗 https://t.co/nFZBhpfUKq https://t.co/HYoRr2wYhf

By Andrew Arruda
Meta Halts AI Training After Data Breach Exposes Secrets
SocialApr 5, 2026

Meta Halts AI Training After Data Breach Exposes Secrets

Meta freezes AI data work after breach puts training secrets at risk https://t.co/WtjqyiuUAu via @thenextweb

By Paul Triolo
User Seeks Help Recovering Hijacked X Account
SocialApr 5, 2026

User Seeks Help Recovering Hijacked X Account

Hey @nikitabier my friend JT’s X account got taken over. It was @tcmllc I can send over any details via DM Can you help us out?

By Richard Moglen
LinkedIn Scams: An Ecosystem of Identity Theft and Fraud
SocialApr 5, 2026

LinkedIn Scams: An Ecosystem of Identity Theft and Fraud

LinkedIn scams go beyond fake posts or “I’m grateful” stories; they form an ecosystem of identity abuse, data harvesting, and financial fraud.

By Raquel (Deep Search)
Senators Warn VPN Use May Invite Government Surveillance
SocialApr 5, 2026

Senators Warn VPN Use May Invite Government Surveillance

Using A VPN Could Subject You To Government Surveillance, Senators Warn [Roundup] - View from the Wing https://t.co/hJwQPvAsyq

By Gary Leff
Iran’s Charming Kitten Exploits Insiders and Low‑tech Tricks
SocialApr 5, 2026

Iran’s Charming Kitten Exploits Insiders and Low‑tech Tricks

Iran’s Charming Kitten group relies on deception, insider access, and low-tech methods to steal trade secrets and compromise systems. https://t.co/8jKdiH2bzt

By TechRadar
Valid Finding Reveals Overlooked Cookie Injection Requirement
SocialApr 5, 2026

Valid Finding Reveals Overlooked Cookie Injection Requirement

The finding is valid but we need to have a cookie injection on the target or its subdomains but I noticed something the AI didn’t notice…yes AI with humans or spend a lot a lot of tokens.

By Teri Radichel
UK Tightens Energy Cybersecurity After Poland Attack
SocialApr 5, 2026

UK Tightens Energy Cybersecurity After Poland Attack

UK defining stronger energy cybersecurity rules after Poland attack #energysky -- via pv magazine global: https://t.co/UAgNu4x2di

By Tor “SolarFred” Valenza
Hope Hyperliquid Is Conducting Emergency Security Review
SocialApr 5, 2026

Hope Hyperliquid Is Conducting Emergency Security Review

I really hope Hyperliquid is in a war room right now assuming they’ve already been compromised and reviewing every last thing they’ve done for the last year and a half …

By Laura Shin
New Attack Exposes Massive Vulnerability—Review Now
SocialApr 5, 2026

New Attack Exposes Massive Vulnerability—Review Now

I called the attack “chilling” only from what details we knew on Thursday. What actually happened is orders of magnitude more chilling. READ THE WHOLE THING. If you work in this industry, you or your protocol may be a sitting...

By Laura Shin
Evidence Suggests North Korea May Have Orchestrated Drift Attack
SocialApr 5, 2026

Evidence Suggests North Korea May Have Orchestrated Drift Attack

Are North Korean state actors behind the Drift Protocol attack? @omeragoldberg says the markings are there, while sharing what it would take to confirm the speculation 👇 https://t.co/8SgvDYy6Lx

By Laura Shin
Skull Vibrations Could Become Future Biometric Passwords
SocialApr 5, 2026

Skull Vibrations Could Become Future Biometric Passwords

Vibrations in your skull may be your next password by Rutgers University @TechXplore_com Learn more: https://t.co/oRTnakuTjb #EmergingTech #Innovation #Tech #Technology https://t.co/qvg0gNKuw2

By Ron van Loon
AI Health Advice Raises Privacy Risks Without Clear Standards
SocialApr 5, 2026

AI Health Advice Raises Privacy Risks Without Clear Standards

More people are turning to AI for health advice, but it comes with trade-offs. Uploading medical data can deliver useful insights, yet it also raises serious privacy concerns and risks around how that data is stored and used. The lack of...

By Spiros Margaris
Drift Hack Exposes DeFi Audits Gaps and Possible NK Threat
SocialApr 5, 2026

Drift Hack Exposes DeFi Audits Gaps and Possible NK Threat

Another week, another DeFi exploit 🫠 @omeragoldberg joined me to unpack the Drift Protocol hack: ⁉️ What went wrong? 👀 How the attack resembles the Mango DAO and Resolv exploits 🤔 Why was Circle so slow to react? ⚠️Are North Korean state actors behind the...

By Laura Shin
Allowlisting CRLs in Plants: Ongoing, Working Fine
SocialApr 5, 2026

Allowlisting CRLs in Plants: Ongoing, Working Fine

I went through a process to allowlist CRLs in our plants. It's not complete but it's been fine.

By SwiftOnSecurity
Seeking Tools that Scan Repos for Malicious Dependencies
SocialApr 5, 2026

Seeking Tools that Scan Repos for Malicious Dependencies

What are vendors that offer scanning of PRs or repos to protect against malicious dependencies? I know of Sonar (Advanced Security), Socket .dev, JFrog. What else do you know of or use and what does it do? (At some point, you want...

By Gergely Orosz
Is That Image Actually Malware? Find Out
SocialApr 5, 2026

Is That Image Actually Malware? Find Out

Image or Malware? Read until the end and answer in comments :) https://t.co/5nD545aoAi #BreakingNews https://t.co/Vvny6JzyBD

By Eric Vanderburg
GStack Receives 14 Security Fixes, Half From Community
SocialApr 5, 2026

GStack Receives 14 Security Fixes, Half From Community

14 security bug fixes just landed for GStack, half of which were community PR's. https://t.co/98jmCzQ38i

By Garry Tan
Zero‑Trust BYO‑VPS Delivers Commercial Features
SocialApr 5, 2026

Zero‑Trust BYO‑VPS Delivers Commercial Features

So, I built more or less complete platform to test whether I could match the core features of commercial vendors with a zero-trust, BYO-VPS platform. Zero-trust: The control plane stores no credentials, only metadata. A worker running next to your server...

By Sung Kim
Lawsuit Claims Perplexity’s ‘Incognito’ Sold Chats for Ads
SocialApr 4, 2026

Lawsuit Claims Perplexity’s ‘Incognito’ Sold Chats for Ads

Perplexity’s “Incognito Mode” is a “sham,” -lawsuit says Google, Meta, and Perplexity accused of sharing millions of chats to increase ad revenue. https://t.co/vxnnXugoR4

By Taylor Lorenz
Zero‑Trust BYO VPS Platform Matches Commercial Features
SocialApr 4, 2026

Zero‑Trust BYO VPS Platform Matches Commercial Features

I've built: A zero-trust BYO VPS platform. It has feature parity with commercial alternatives, but it still needs a lot of polish. 😀

By Sung Kim
Enable WhatsApp Two‑Step Verification: Simple Yet Essential
SocialApr 4, 2026

Enable WhatsApp Two‑Step Verification: Simple Yet Essential

Whether you just joined @WhatsApp or have been using it for years, it's a smart idea to enable two-step verification. Here's how, step by step, and why it's not as good as 2-factor authentication, but better than nothing... https://t.co/KDT8J6yjkd #whatsapp...

By Dave Taylor
Security Must Match Your Attractiveness as a Target
SocialApr 4, 2026

Security Must Match Your Attractiveness as a Target

Scary stuff. The best security remains obscurity. Unfortunately just being “anonymous” isn’t enough anymore due to constant third party data breaches, like Coinbase leaking user balances and addresses. The potential security holes are endless. Basically every...

By Ari Paul
Rushing Bitcoin to PQ Signatures Risks New Vulnerabilities
SocialApr 4, 2026

Rushing Bitcoin to PQ Signatures Risks New Vulnerabilities

It’s been almost 10 years since the Blocksize Wars ended and Brian hasn’t changed at all. He still carries the exact same complete lack of humility and understanding. Brian forms the opinion first, along with a prescribed course of action and...

By Samson Mow
CISA Lists TrueConf Client Flaw in Exploit Catalog
SocialApr 4, 2026

CISA Lists TrueConf Client Flaw in Exploit Catalog

U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog https://t.co/LEm093lFfD #BreakingNews https://t.co/7HuNg6hJGV

By Eric Vanderburg
Military Personnel Leak Sensitive Data via Fitness App
SocialApr 4, 2026

Military Personnel Leak Sensitive Data via Fitness App

We've got more cases of military personnel revealing a significant amount of information through the fitness app. https://t.co/BwTkOxURPX

By TechRadar
Private VPC Without NAT Blocks Internet Access Securely
SocialApr 4, 2026

Private VPC Without NAT Blocks Internet Access Securely

AWS Security Agent-Penetration Testing Overview | by Sena Yakut | AWS in Plain English Was just reading this and pretty good review. If you put in a private VPC no NAT or peering can’t reach Internet which is what you want...

By Teri Radichel
Quantum Threat Makes Crypto Existential, Not Just Technical
SocialApr 4, 2026

Quantum Threat Makes Crypto Existential, Not Just Technical

What keeps me up at night about quantum is that centralized companies can just rewrite their ledgers when hacked. Bitcoin can't. That's why a quantum threat to crypto isn't just a tech problem, it's existential. 👀 h/t @apruden08 https://t.co/ZZnqMsa0hq

By Laura Shin
Reuters Saudi Reporter Warns of WhatsApp Impersonation Scam
SocialApr 4, 2026

Reuters Saudi Reporter Warns of WhatsApp Impersonation Scam

The chief Saudi correspondent for @Reuters warns that someone's impersonating him on WhatsApp with links and requests for information; at least one individual in the UAE was contacted by this number already. https://t.co/OkG01CK0TK

By Runa Sandvik
Beware: Fake Senjin Capital Job Ads Are Phishing Scams
SocialApr 4, 2026

Beware: Fake Senjin Capital Job Ads Are Phishing Scams

I have been made aware of fake job advertisements using Senjin Capital’s name as the employer. We are not currently hiring, and when we are hiring you will see a post on this page about it. These ads are likely an...

By Jamie Halse
Use “Are We Dancer?” To Expose AI‑masked Impostors
SocialApr 4, 2026

Use “Are We Dancer?” To Expose AI‑masked Impostors

Protip if you think you're dealing with a DPRK fake job applicant using AI masking as an American millennial, ask them to respond to "Are we dancer?" Will take them too long to read in too formal a tone and...

By SwiftOnSecurity
Cisco Warns AI-Driven Wi‑Fi Security Risks and Talent Gaps
SocialApr 3, 2026

Cisco Warns AI-Driven Wi‑Fi Security Risks and Talent Gaps

. @Cisco report flags #AI wireless security risks, talent shortages #wifi #spectrum 🖇️https://t.co/9tt8i7caO5 🖇️ https://t.co/bqI75Tbe4s

By Monica Alleven
Crypto Spam Hack Sends Phishing Podcast Vote DMs
SocialApr 3, 2026

Crypto Spam Hack Sends Phishing Podcast Vote DMs

@greenfield64 has been hacked by crypto spammers and they are sending DMs out to people asking to vote for him to host a podcast but it’s phishing for you touting your password so be careful. Don’t respond

By Austan Goolsbee
Seeking Experts to Explain Circle’s Drift Hack Response
SocialApr 3, 2026

Seeking Experts to Explain Circle’s Drift Hack Response

🎙️ Who would you like to hear from about how Circle handled the Drift hack? I've reached out to Circle, some former prosecutors, and Seal 911, and haven't gotten anyone yet who can do it ... Taking suggestions 👇

By Laura Shin
Meta Halts Mercor Partnership After AI Data Breach
SocialApr 3, 2026

Meta Halts Mercor Partnership After AI Data Breach

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk https://t.co/0lYIi0rXSh https://t.co/oLoqpKBljV

By Eric Vanderburg
Proactively Cut Cyber Risk to Prevent Business Damage
SocialApr 3, 2026

Proactively Cut Cyber Risk to Prevent Business Damage

How To Reduce Cyber Risk Before It Becomes Business Impact by @austingadient @Forbes Learn more: https://t.co/VHZwMZzcvB #CyberSecurity #Infosec #Technology https://t.co/AVcRBc9AxR

By Ron van Loon
Top Prompt Hacker Tests OpenClaw—Results Reveal Its Security
SocialApr 3, 2026

Top Prompt Hacker Tests OpenClaw—Results Reveal Its Security

I challenged the best prompt hacker on the planet (@elder_plinius) to break into my OpenClaw system... So, is OpenClaw safe? Here's what happened: https://t.co/5xpXzxUtTM

By Matthew Berman
5 Steps to Overcome Alert Fatigue and Strengthen Security Ops
SocialApr 3, 2026

5 Steps to Overcome Alert Fatigue and Strengthen Security Ops

5 Steps to break free from alert fatigue and build resilient #security operations https://t.co/cR0YprtxOS https://t.co/BpZtAMzn8k

By Eric Vanderburg