March 5, 2026
March 5, 2026
https://www.theregister.com/2026/03/02/motorola_grapheneos/https://www.theregister.com/2026/03/03/cyberwarriors_us_iran_war/
the CIA has infiltrated my family and installed a US backed cousin
— boss (@boss_on_here) July 14, 2021
https://nsarchive.gwu.edu/document/21410-document-13A 1999 assessment by DoD OGC briefly mentions a draft treaty on information warfare that circulated on the Internet in 1995. Does anyone have any idea what it was or where on the Internet it could have been circulated?
— Oleg Shakirov (@shakirov2036) March 5, 2026
(Source: https://t.co/ZKsJioGRlm) pic.twitter.com/UycssW3OeE
"How can they heal without cigarettes?" is unironically the hardest medical take of the 21st century š¤£
— Ćros Brousson (@erosbrousson) March 5, 2026
Western doctors charge you $80,000 to tell you to eat kale, Supreme Leader pulls up to the ICU, hands you a pack of Marlboro Reds, and tells your asthma to stop being a bitch⦠https://t.co/Eb2HmB9dkn
https://buff.ly/9vkSfvnAwesome bit of data that makes intuitive sense.
— Simon Kuestenmacher (@simongerman600) March 5, 2026
āFinland cut VAT on haircuts in 2007 to see if cheaper prices would boost demand and jobs. But when the tax fell by ā¬4, many salons lowered prices by only ā¬2 and kept the rest as profit. When VAT rose again, prices jumped by the⦠pic.twitter.com/SHknO4hWrI
A few lines down at the bottom of the article mention that yeah, itās a Chinese company and they donāt do encryption, and also this is probably sort of bad. pic.twitter.com/QBRB3LqSmq
— Matthew Green (@matthew_d_green) March 4, 2026
The crazy thing is that this is a Chinese firm, which just announced that itās going to maintain the ability to mine huge amounts of UK and European citizensā private comms, but the BBC is leading with the āitās good that they can intercept our dataā spin.
— Matthew Green (@matthew_d_green) March 4, 2026
TikTok announces that theyāre not going to deploy ācontroversial privacy techā thatās actually the same end-to-end encryption most other providers use to protect usersā DMs. https://t.co/INKzu9ku2z
— Matthew Green (@matthew_d_green) March 4, 2026
TikTok says it won't encrypt DMs claiming it puts users at risk
TikTok tells the BBC it won't join rival platforms such as WhatsApp and Messenger in using end-to-end encryption.
šµļøCall us the 'Headquarters Hunters': together with @pustota, we found the 'mail center' of the GRU 'Africa Corps.' You will ā and will not ā be surprised where we found it. Full thread below š½ pic.twitter.com/6g8mqD8XKA
— Mark Krutov (@kromark) March 4, 2026
omg this title, this paper pic.twitter.com/OXL9C4v2nX
— Leah Pierson (@leah_pierson) March 4, 2026
In a ānew paperā, researchers argue that:
— Steve Magness (@stevemagness) March 3, 2026
āa primary cause of the rise in mental disorders [in youth] is a decline over decades in opportunities for children and teens to play, roam, and engage in other activities independent of direct oversight and control by adults.ā pic.twitter.com/ArpX96iwBf
— stucco angel (@stucco_angel) March 2, 2026
The window between vulnerability disclosure and real-world exploitation keeps shrinking.
— Chris Wysopal (@WeldPond) March 4, 2026
The Zero Day Clock visualizes how fast attackers are operationalizing new CVEs. What used to take months now often happens in days, or hours.
The future needs to be Secure by Design.ā¦
Zero Day Clock
The gap between disclosure and exploitation is collapsing to zero.
The FreeBSD decision was the most based one: update your license to say "This software may not be used in California" and call it a day
— Jeremy Shepherd š»šµšø (@jeremy_wokka) March 4, 2026
Chat, all hell has broken loose in the Linux community.
— vx-underground (@vxunderground) March 4, 2026
Linux nerds are discussing how they'd implement age verification at the OS level (if need be to comply with laws).
Linux nerds are having a psychiatric meltdown. The nerds are revolting. pic.twitter.com/xDfWs5XlDH
http://phenoelit.deLands of Packets
— joernchen (@joernchen) March 4, 2026
TTL exceeded.
I would like to collect texts from the scene about FX in his memory. A collection of obituaries that will then be posted on https://t.co/1FIwtU55Tb.
If anyone would like to contribute, please contact me.
Mail: joernchen@phenoelit.de
Signal: jrn.07
Read an amazingly clever paper today I have to share:
— LaurieWired (@lauriewired) March 4, 2026
Imagine sourcecode that *looks* correctā¦but compiles to different logic!
Unicode has to support left-to-right, and right-to-left languages.
Visual order and logical order can be completely different! pic.twitter.com/b3rQxcZZdK
https://blog.recurity-labs.com/2026-03-02/Farewell_FelixI can't believe that @41414141 is no longer with us. A true hacker I had the honour to meet and learn next to him back in the early 2000s. From the parties, to his hacking mindset, skills... FX changed the community forever. Until we meet again, thank you.https://t.co/Af2saTBj7x
— Anastasios Pingios (@xorlgr) March 3, 2026
Senators Wyden and Brown are requesting an investigation into side-channel and TEMPEST attacks. https://t.co/I7bnPBzPDa
— Matthew Green (@matthew_d_green) March 4, 2026
How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers | WIRED
A pair of US lawmakers are calling for an investigation into how easily spies can steal information based on devicesā electromagnetic and acoustic leaksāa spying trick the NSA once codenamed TEMPEST.
The official journal of the Canadian Paediatric Society has just acknowledged that more than 100 of its case reports are fabricated. Incredible reporting from @RetractionWatch: https://t.co/ErcnEw60S6 pic.twitter.com/GVkRGeiqQ8
— David Juurlink (@DavidJuurlink) March 4, 2026
A medical journal says the case reports it has published for 25 years are, in fact, fiction ā Retraction Watch
A Canadian journal has issued corrections on 138 case reports it published over the last 25 years to add a disclaimer: The cases described are fictional. Paediatrics & Child Health, the journalā¦
šØRecent MuddyWater APT campaign, linked to Iranian intelligence, exposed by Ctrl-Alt-Intel š¬
— Ben (@polygonben) March 4, 2026
- 10+ CVEs used
- Custom-developed C2s
- EtherHiding malware
- Sensitive data stolenhttps://t.co/T7ppLU9M8C
Super fun collab-ing with @ice_wzl_cyber to get this published š„
Add a comment: