July 31, 2025
July 31, 2025
Interesting and detailed explanation of how smartphones can be intercepted through the vulnerabilities of the SS7 signaling channel:https://t.co/qFdSK4wYFm
— Electrospaces (@electrospaces) July 30, 2025
Over the last 2 yrs LLMs have vastly improved their ability to write syntactically correct code, but they haven’t improved in ability to write code without vulnerabilities which is steady at 45% coding tasks with vulns. pic.twitter.com/5j9VVlCxo7
— Chris Wysopal (@WeldPond) July 30, 2025
The Cyber Patents China Didn’t Want Us to Find… @LabsSentinel has uncovered 10+ patents for highly intrusive forensics and data collection tools—filed by companies named in U.S. government indictments for working with the Chinese Hafnium (aka Silk Typhoon) APT group.
— SentinelOne (@SentinelOne) July 30, 2025
🧵 Why… pic.twitter.com/NGLp0MKAzV
Full reporthttps://t.co/4fVqbAU9Kv
— Dakota Cary (@DakotaInDC) July 30, 2025
"DNS tunnelling is annoying...so deal with it"
— J⩜⃝mie Williams (@jamieantisocial) July 30, 2025
-🐼 malware dev (𝘱𝘳𝘰𝘣𝘢𝘣𝘭𝘺) https://t.co/LKfRU6i95j pic.twitter.com/Hyw5dyfqGa

The Covert Operator's Playbook: Infiltration of Global Telecom Networks
Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth. Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth.
A public company CEO told me AI coding has had negligible impact on his engineering teams, instead the real transformation has been on their product and design teams using Replit.
— Amjad Masad (@amasad) July 29, 2025
I asked him how does he reconcile this with CEOs saying that 25-50% of code is generated by AI?…
pretty clever
— rat king 🐀 (@MikeIsaac) July 30, 2025
someone who claims to have scraped public listening data from a number of public figures — politicians, celebrities, journalists — spun up their alleged playlists and made it into a site
thankfully mine isnt too embarrassing but others…https://t.co/3LBhzY1UQm pic.twitter.com/5Hf1FHhp3u
#OTD 70 years ago, the leadership of #KGB Second Chief Directorate (counterintel) met in Moscow.
— Filip Kovacevic (@ChekistMonitor) July 30, 2025
I located & obtained the meeting transcript from the Lithuanian Special Archives in Vilnius.
I translated it & wrote an analysis for the Wilson Center. ⬇️
https://t.co/lRddyFdARu
Breaking : Coindcx employee Rahul Agarwal arrested in connection with the $44 Million Crypto theft reported by the company.
— Crypto India (@CryptooIndia) July 31, 2025
Investigations revealed that hackers compromised Agarwal's login credentials to access the system and siphon off $44 million. pic.twitter.com/s4kWP8BBra
>is a software engineer
— ZachXBT (@zachxbt) July 31, 2025
>yet opens random files sent to him on a company laptop
why are people so negligent? pic.twitter.com/ZytDs1SczZ
Kinda sus that the guy got paid 45k USD and his laptop was “hacked” by running some files sent to him by a WhatsApp number.
**EXCLUSIVE**
— H I Sutton (@CovertShores) July 30, 2025
You heard it here first!
Revealing for the first time, the story of the first Ukrainian maritime drones (USV) from summer 2022.
Spoiler: Magura has 7 major variants starting with the previously unseen V1https://t.co/Jb8ohM4tWo
Another APTeen ?
BleepingComputer has learned that a wave of data breaches impacting companies like Qantas, Allianz Life, LVMH, and Adidas has been linked to the ShinyHunters extortion group.
— BleepingComputer (@BleepinComputer) July 30, 2025
The threat actors have been using voice phishing attacks to steal data from Salesforce CRM instances.
You can read more about the ShinyHunter's data-theft attacks on Salesforce customers here:https://t.co/XNtsqNdvSN
— BleepingComputer (@BleepinComputer) July 30, 2025
big things are happening in the C community pic.twitter.com/pYawJUSFik
— ksa 🏴☠️ (@kosa12m) July 30, 2025
Announcing our whitepaper on the future of endpoint security.https://t.co/NogsQiku9B
— Prelude Research (@PreludeResearch) July 30, 2025