• Sign in
  • Sign up
Elektrine
EN
  • EN English
  • 中 中文
Log in Register
Modes
Overview Search Chat Timeline Communities Gallery Lists Friends Email Vault VPN
Back to Timeline
  • Open on infosec.exchange

TechNadu

@technadu@infosec.exchange
mastodon 4.6.0-alpha.5+glitch

Uncovering #Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | #InfoSec #Malware #Ransomware #Streaming #TechNews

0 Followers
0 Following
Joined March 18, 2025
Website::
https://www.technadu.com/
X (Twitter):
https://x.com/TechNadu
LinkedIn:
https://www.linkedin.com/company/technadu/
Facebook:
https://www.facebook.com/TechNadu
Bluesky:
https://bsky.app/profile/technadu.com
YouTube:
https://www.youtube.com/c/technadu

Posts

technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · 6d ago

Dutch intelligence agencies warn of a phishing campaign targeting Signal and WhatsApp accounts of government officials and military personnel.

Attackers impersonate support channels to obtain verification codes and hijack accounts.

https://www.technadu.com/russian-cybercriminals-target-signal-and-whatsapp-accounts-of-high-value-individuals-in-large-scale-phishing-operation/623040/

#infosec #phishing #signal #whatsapp #threatintel

View on infosec.exchange
2
0
2
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

Threat model escalation: AI agent runtimes.
OpenClaw patched “ClawJacked,” a localhost WebSocket hijack enabling:
• Admin-level agent takeover
• Configuration exfiltration
• Log enumeration
• Integrated system abuse
Additional risks documented across the ecosystem:
– Log poisoning → indirect prompt injection
– CVEs spanning RCE, SSRF, auth bypass
– Marketplace-delivered malware (Atomic Stealer)
– Agent-to-agent crypto scams
Microsoft guidance: treat OpenClaw as untrusted code execution with persistent credentials. Deploy in isolated VMs. Avoid sensitive data exposure.
Core lesson:
Agentic systems expand blast radius due to cross-tool integrations and credential persistence.

Question for defenders:
Are AI runtimes included in your EDR, credential rotation, and segmentation policies?

Source: https://thehackernews.com/2026/02/clawjacked-flaw-lets-malicious-sites.html

Engage below.
Follow TechNadu for advanced AI security analysis.
Repost to amplify awareness.

#Infosec #AIsecurity #OpenClaw #ClawJacked #ThreatModeling #ZeroTrust #CredentialManagement #SupplyChainSecurity #AgenticAI #CyberDefense #EDR #SecurityResearch

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

IoT privacy compliance development.
Samsung will revise ACR data practices after legal action by the Texas Attorney General.

Key elements:
• Real-time viewing habit collection under scrutiny
• Enhanced disclosure & consent flow promised
• Emphasis on consumer transparency
• Broader regulatory pressure on smart device telemetry

ACR data monetization highlights a persistent tension:
Device intelligence vs user autonomy
Advertising revenue vs explicit consent
Convenience vs continuous telemetry
As regulatory enforcement increases, IoT vendors may face stricter consent design expectations.
Question for security & privacy professionals:
Should connected consumer devices require periodic re-consent for telemetry collection?

Source: https://therecord.media/samsung-updates-acr-privacy-practices-texas

Engage below.
Follow TechNadu for privacy law, IoT security, and compliance updates.
Repost to broaden awareness.

#Infosec #PrivacyEngineering #ACR #IoTSecurity #DataGovernance #ConsumerPrivacy #RegulatoryCompliance #SmartDevices #CyberLaw #SecurityAwareness #DigitalRights

View on infosec.exchange
1
0
2
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

Australia to enforce AI youth-safety rules March 9.
Under-18 access to harmful content must be blocked or face fines up to A$49.5M.

App stores & search engines may be held liable.
AI regulation is expanding to gatekeepers.

Full report:
https://www.technadu.com/australia-signals-ai-crackdown-to-limit-underage-user-access-to-harmful-content-regulations-target-app-stores-and-search-engines/621757/

#AIRegulation #OnlineSafety #TechPolicy

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

Claude Code + GPT-4.1 reportedly operationalized in Mexican gov breach.

150GB+ exfiltrated. ~195M identities exposed.
1,000+ AI prompts used to generate exploits & automate attack chain.

AI-powered intrusion at scale.

Full report:
https://www.technadu.com/claude-code-weaponized-in-mexican-government-cyberattack-exposing-roughly-195-million-identities/621738/

#InfoSec #AI #DataBreach #ThreatIntel

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

Hacked Iranian prayer app sent coordinated “surrender” messages during airstrikes.

Meanwhile, UAE scammers impersonate officials to steal Emirates ID data.

Crisis-driven PSYOP + vishing campaigns escalating.

Full report:
https://www.technadu.com/hacked-prayer-app-sends-surrender-messages-to-iranians-scammers-in-the-uae-exploit-crisis-to-steal-ids/621708/

#InfoSec #PSYOP #FraudAlert #MobileSecurity

View on infosec.exchange
1
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

South Korea tax office exposed a wallet seed phrase in press materials.

Impact:
~$4.8M in seized PRTG tokens drained.
Agency now overhauling crypto custody procedures.
Private key exposure = total compromise.

Full details:
https://www.technadu.com/south-korea-tax-office-leaks-cryptocurrency-assets-critical-failure-leads-to-wallet-breach/621664/

#InfoSec #CryptoSecurity #Blockchain #OpSec

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

Ashley M. Rose, CEO of Living Security, on human risk:
“Attackers don’t break systems first, they break trust.”

Slack & Teams aren’t just new channels — “trust inside them is assumed,” and human decision points under automation are critical.

Full interview:
https://www.technadu.com/human-risk-is-not-a-training-problem-its-a-behavior-problem-in-real-time/620509/

#WomenInCybersecurity #LeadHerInSecurity #HumanRiskManagement #IdentitySecurity #CyberSecurity #AI

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

Nabanita De, CEO of Privacy License, on AI privacy:
“When personal data is encoded into a neural network, it no longer exists as discrete records. It is diffused across millions of parameters.”

“Without translators across business, ethics, and security domains, privacy fails in implementation.”

Read full interview:
https://www.technadu.com/building-teams-where-policy-meets-engineering-and-distinguishing-normal-from-almost-normal-behavior/620338/

#WomenInCybersecurity #AIGovernance #DataPrivacy #CyberSecurity

View on infosec.exchange
1
0
1
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Mar 02, 2026

Bithika Nathan of Dr. Phish Labs:
"In practice, cybercrime succeeds at the intersection of technical gaps and human behavior, when normal actions are taken under urgency, pressure, or misplaced trust."

"The hardest aspects of cybercrime to communicate accurately to a general audience are not technical, but human."

Read more:
https://www.technadu.com/the-psychology-behind-phishing-digital-coercion-and-scam-economy/619855/

#CyberSecurity #Phishing #SocialEngineering #WomenInCyber

View on infosec.exchange
2
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

AI dev tool alert.
Claude Code vulnerabilities (now patched) allowed:
RCE via project hooks
MCP consent bypass
API key exfiltration
Config files became execution vectors.
AI-assisted development expands the trust boundary.

Source: https://cybersecuritynews.com/claude-code-hacked/

Have you updated your tools?
Reply below.

Follow TechNadu for cybersecurity and AI risk updates.

#ClaudeCode #Anthropic #AIsecurity #DevSecOps #SupplyChainRisk #Infosec #CyberSecurity #RCE #TechUpdates

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

Leadership transition notice.
At CISA, Madhu Gottumukkala steps down as acting director, transitioning to DHS in a strategic implementation role. Nick Andersen assumes interim leadership.

Operational considerations for the cybersecurity community:
• Continuity in federal–private sector coordination
• Critical infrastructure threat intelligence sharing
• Budget alignment with statutory mission
• Workforce retention amid reform cycles
Andersen’s background across the Coast Guard, Navy, and DOE suggests operational depth in federal IT and cybersecurity ecosystems.
Leadership recalibration during reform phases can influence everything from vendor engagement to threat response posture.
What strategic adjustments would you like to see from CISA moving forward?

Source: https://cyberscoop.com/cisa-leadership-change-madhu-gottumukkala-nick-andersen/

Engage below.
Follow TechNadu for federal cybersecurity and infrastructure intelligence updates.
Repost to expand discussion.

#Infosec #CISA #CyberPolicy #DHS #CriticalInfrastructure #ThreatIntel #GovCyber #SecurityStrategy #FederalIT #CyberGovernance #NationalCybersecurity

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

Operational disruption alert.
Reddit faced a global outage, 15,000+ rapid reports, mobile app impact at 64%, CDN-origin connectivity errors observed.

Security-adjacent considerations:
• Traffic surge management gaps
• CDN dependency risk
• Authentication system resilience
• Opportunistic phishing during downtime
• Brand impersonation spikes during trending outages

When high-traffic platforms fail, attackers often exploit confusion windows.

Did you observe increased malicious domain registrations or phishing attempts during #RedditDown?

Source: https://www.newsx.com/tech-and-auto/reddit-hit-by-major-global-outage-over-15000-users-report-issues-as-company-admits-elevated-error-rates-war-news-174980/

Engage below.
Follow TechNadu for infrastructure, outage intelligence, and cybersecurity insights.
Repost to expand situational awareness.

#Infosec #PlatformOutage #ThreatIntel #CloudSecurity #CDN #SRE #DigitalInfrastructure #CyberRisk #IncidentResponse #ServiceDisruption #SecurityMonitoring #AdTechSecurity

View on infosec.exchange
0
0
1
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

CVE-2026-21902 represents a high-impact infrastructure exposure.

Affected platform: Junos OS Evolved on PTX series routers.

Attack vector: Unauthenticated network access.
Privilege level: Root execution.
Service: On-Box Anomaly Detection, enabled by default.

Strategic risk:
• Traffic interception capability
• Policy manipulation
• Controller redirection
• Lateral pivoting
• Long-term foothold persistence
Although no exploitation has been observed, historically, high-performance routing infrastructure is a prime target due to its control-plane visibility and network centrality.

Recommended actions:
– Immediate patch validation
– Control-plane traffic monitoring
– Service exposure review
– Network segmentation validation
– Threat hunting for anomalous routing behavior
Are infrastructure devices integrated into your continuous detection engineering pipeline?

Source: https://www.securityweek.com/juniper-networks-ptx-routers-affected-by-critical-vulnerability/

Engage below.
Follow TechNadu for high-signal vulnerability intelligence.
Repost to strengthen security awareness.

#Infosec #CVE2026 #Juniper #RouterSecurity #CriticalInfrastructure #ThreatModeling #DetectionEngineering #NetworkDefense #ZeroTrustArchitecture #CyberRisk #SecurityOperations #VulnerabilityManagement

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

A significant cross-border enforcement case targeting carding infrastructure.
A Chilean national has been extradited to the U.S., accused of operating Telegram-based carding marketplaces.

Allegations include:
• Trafficking unauthorized access devices
• Distribution of stolen card dumps
• ~26,000 cards from one brand
• Sales via encrypted channels
• Multi-year operation (2021–2023)
The case illustrates persistent fraud ecosystem patterns:
– Dump marketplaces leveraging messaging apps
– Bulk sale of compromised payment data
– International actors targeting U.S. financial brands
– Delayed but coordinated extradition efforts
For security teams, this reinforces the need for:
Real-time fraud analytics
Dark web & channel monitoring
Card reissuance automation
Cross-border intelligence sharing

Is fraud detection adapting fast enough to decentralized carding markets?

Source: https://www.justice.gov/usao-ut/pr/chilean-national-extradited-us-face-financial-fraud-crimes-district-utah

Engage below.
Follow TechNadu for high-signal infosec reporting.
Repost to amplify awareness.

#Infosec #Carding #FinancialSecurity #FraudDetection #PaymentFraud #ThreatIntelligence #AML #Cybercrime #DarkWebMonitoring #SecurityOperations #RiskManagement #DataProtection #GlobalCybercrime

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

February recap:
• Global ransomware arrests
• AI tool RCE flaws patched
• 107% spike in open-source vulns
• Europol disrupts extremist network
• $40M crypto breach shutdown
AI governance lagging behind adoption.

Full roundup:
https://www.technadu.com/global-crackdowns-major-arrests-and-ai-security-fixes-mark-februarys-close/621467/

#InfoSec #AIsecurity #ThreatIntel #Ransomware

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

APT37’s Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.

Observed tradecraft includes:
• LNK-based initial execution
• Embedded PowerShell payload extraction
• Ruby interpreter abuse (v3.3.0)
• Scheduled task persistence (5-minute interval)
• USB-based covert bidirectional C2
• Multi-stage backdoor deployment
Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.

The removable media relay model enables:
– Command staging offline
– Data exfiltration without internet access
– Lateral spread across isolated systems
– Surveillance via Windows spyware
This reinforces a critical point:
Air-gap controls must extend beyond physical disconnection — including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.

Are critical infrastructure operators prepared for USB-mediated C2 relays?

Source: https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/

Engage below.

Follow TechNadu for high-signal threat intelligence insights.
Repost to elevate awareness.

#Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture

View on infosec.exchange
2
0
1
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

A significant prosecution targeting digital identity fraud infrastructure.
The alleged operator of “OnlyFake” pleaded guilty to conspiracy involving identification document fraud. Authorities report:
• 10,000+ digital fake IDs generated
• Cryptocurrency-based payments
• Bulk document packages
• Targeted bypass of remote KYC workflows
• ~$1.2M forfeiture agreement
The platform reportedly produced customizable ID images — scan-style, tabletop photo simulations — designed to pass digital verification checks.
Implications for security teams:
– Remote onboarding risks
– Weak document authenticity checks
– Gaps in AI-driven fraud detection
– Overreliance on static ID uploads
– Exposure in crypto compliance pipelines

As digital identity ecosystems expand, synthetic document fraud becomes increasingly scalable.

Are organizations deploying sufficient liveness detection, behavioral biometrics, and cross-database validation?

Engage below.
Source: https://www.justice.gov/usao-sdny/pr/creator-onlyfake-charged-and-pleads-guilty-selling-more-10000-digital-fake

Follow @technadu@infosec.exchange for high-signal infosec analysis.
Repost to amplify awareness.

#Infosec #IdentitySecurity #FraudDetection #KYCCompliance #AML #CryptoCompliance #ThreatModeling #Cybercrime #DigitalForensics #RiskManagement #SecurityArchitecture #FinancialSecurity

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

Identity compromise continues to dominate intrusion chains.
From the Sophos Active Adversary Report 2026:
• 67% of initial access attributed to identity abuse
• 3.4-hour median to Active Directory pivot
• 3-day median dwell time
• 88% ransomware deployment off-hours
• 79% data exfiltration off-hours
Directory services remain high-value assets — authentication, authorization, policy control, privilege mapping.
The compressed timeline from credential misuse to directory-level access underscores the need for:
– Continuous identity monitoring
– Behavioral analytics
– After-hours SOC coverage
– Conditional access enforcement
– Least-privilege architecture
Generative AI is functioning as a force multiplier — improving phishing quality and campaign scale - not yet delivering autonomous attack chains.

Is identity governance keeping pace with adversary dwell time compression?
Engage below.

Source: https://www.sophos.com/en-us/press/press-releases/sophos-active-adversary-report-2026-identity-attacks-dominate-as-threat-groups-proliferate

Follow TechNadu for high-signal infosec analysis.

Repost to strengthen industry awareness.

#Infosec #IdentityThreats #RansomwareDefense #ActiveDirectorySecurity #ThreatModeling #GenAI #SecurityOperations #CyberRisk #ZeroTrustArchitecture #DetectionEngineering #EnterpriseSecurity #ThreatHunting

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 28, 2026

Supply chain security meets reproducible builds.
ExpressVPN is sponsoring PlanetNix 2026, highlighting the intersection of privacy, open-source infrastructure, and build reproducibility.
Event focus areas:
• Deterministic builds
• Secure deployment pipelines
• DevSecOps integration
• Team-level onboarding models
• Production-grade Nix environments

Reproducibility is increasingly tied to:
– Software supply chain integrity
– Auditability
– Compliance frameworks
– Infrastructure security baselines
As build determinism becomes more relevant to threat modeling, open-source tooling like Nix may play a critical role.

Source: https://planetnix.com/

Are reproducible systems now essential for modern security architecture?

Engage in the comments.
Follow TechNadu for high-signal infosec reporting.
Repost to amplify open-source security discussions.

#Infosec #DevSecOps #SupplyChainSecurity #ReproducibleBuilds #NixOS #OpenSourceSecurity #ExpressVPN #CloudSecurity #InfrastructureSecurity #ThreatModeling

View on infosec.exchange
3
0
3
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Thousands of publicly exposed Google API keys may now authenticate access to Gemini AI services.

Researchers say what was once low-risk exposure gained new privileges after AI integration.

Cloud security takeaway: legacy credentials + evolving scope = hidden risk.
Have you audited your API keys recently?

Source: https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/

Share your perspective below.
Follow TechNadu for trusted cybersecurity coverage.

#CyberSecurity #Google #Gemini #CloudSecurity #APIKeys #AIsecurity #Infosec #DevSecOps #AppSec #DigitalRisk

View on infosec.exchange
1
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Third-party breach, 38M impacted, European e-commerce sector.
ManoMano disclosed unauthorized access linked to a subcontracted customer support provider. Exposed data reportedly includes PII and support communications.
Authorities notified: CNIL, ANSSI.
Passwords not reportedly accessed.
Subcontractor access revoked.

Key risk vectors:
– SaaS support platforms
– Vendor access governance
– Over-retention of ticketing data
– Centralized customer communication logs
– Supply chain attack surface expansion

This case reinforces that vendor monitoring must go beyond contractual clauses — continuous assessment, least privilege enforcement, data minimization strategies.

How mature is your third-party risk telemetry?
Engage below.

Source: https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/

Follow @technadu@infosec.exchange for high-signal infosec reporting.

Repost to amplify awareness across the security community.

#Infosec #ThirdPartyRisk #VendorSecurity #SupplyChainSecurity #DataBreach #GDPRCompliance #EcommerceSecurity #CyberRiskManagement #SecurityOperations #GRC

View on infosec.exchange
1
0
3
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Sector alert: European football club targeted.

Olympique de Marseille confirmed an attempted cyberattack following alleged data leak claims involving:
• ~400,000 supporter records
• 2,050+ Drupal CMS accounts
• E-commerce and membership-related data
No confirmed compromise of banking credentials, investigation ongoing, incident reported to CNIL.
Attack surface observations:
– CMS exposure risk
– High-value fan PII aggregation
– Merchandising platforms as entry vectors
– Sector-wide vulnerability patterns (preceded by FFF breach)
Sports organizations increasingly mirror enterprise-scale digital infrastructures - yet often lack comparable security maturity.

What baseline controls should leagues enforce - MFA mandates, zero trust architecture, CMS hardening standards?

Source: https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/

Engage in the comments.
Follow TechNadu for high-signal infosec coverage.

Repost to amplify sector awareness.

#Infosec #DrupalSecurity #DataBreach #SportsSecurity #ThreatIntelligence #CyberRisk #GDPRCompliance #SecurityOperations #DigitalForensics #CyberDefense

View on infosec.exchange
1
0
1
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Counterintelligence case with aerospace implications."

A former U.S. Air Force Major is charged with allegedly conspiring to provide combat aircraft training to China’s military, coordinating with Stephen Su Bin - previously convicted in a cyber espionage case involving Boeing’s C-17 transport aircraft data.

Alleged violations include:
• International Traffic in Arms Regulations (ITAR)
• Unauthorized defense services export
• Foreign military engagement without licensing
• Historical linkage to aerospace cyber intrusion campaigns
The case underscores the convergence of:
– Human intelligence recruitment
– Cyber espionage legacy actors
– Defense contractor ecosystems
– Export control enforcement challenges
How should compliance programs at defense contractors adapt to mitigate insider expertise risks post-employment?

Engage in the comments.
Follow TechNadu for high-signal infosec and national security reporting.

Source: https://therecord.media/former-air-force-officer-arrested-for-working-with-hacker-flight-training-china

Repost to broaden awareness within the security community.

#Infosec #Counterintelligence #ITAR #AerospaceSecurity #DefenseCompliance #CyberEspionage #ThreatIntelligence #ExportControls #MilitaryTechnology #NationalSecurity

View on infosec.exchange
1
0
1
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Odido confirms major breach:
• 688,102 accounts added to HIBP
• ~6M records potentially exposed
• ShinyHunters claims responsibility
• Ransom refused — data leaked in stages
Sensitive financial & identity data compromised.

Full details:
https://www.technadu.com/odido-data-breach-exposes-almost-690000-telecom-customer-accounts/621284/

#InfoSec #DataBreach #TelecomSecurity #CyberRisk

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

UAT-10027 targeting U.S. healthcare & education with:
• “Dohdoor” DoH-based backdoor
• Cloud-masked C2 via encrypted DNS
• Cobalt Strike beacons
Possible DPRK nexus (low confidence).

Full analysis:
https://www.technadu.com/uat-10027-leverages-dohdoor-backdoor-and-cobalt-strike-against-us-education-and-healthcare/621270/

#InfoSec #APT #HealthcareSecurity #ThreatIntel

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Europol’s Project Compass reports first results against “The Com” extremist network:
• 30 arrests
• 179 perpetrators identified
• 62 victims identified
28-country collaboration targeting online radicalization.

Full report:
https://www.technadu.com/the-com-europols-project-compass-reports-first-results-with-30-arrests-and-over-170-identifications/621267/

#InfoSec #Europol #CounterTerrorism #OnlineSafety

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Intellexa founder Tal Dilian & 3 associates sentenced in Greece over Predator spyware scandal.
• 90+ politicians & journalists targeted
• 126+ year combined sentence
• Further investigations pending
A major development in spyware accountability.

Full details:
https://www.technadu.com/intellexa-executives-sentenced-in-predator-spyware-scandal-targeting-90-individuals-in-greece-including-politicians-journalists/621265/

#InfoSec #Spyware #Predator #CyberSecurity

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Meta initiates coordinated legal action targeting cross-border scam advertisers operating from Brazil, China, Vietnam.

Threat vectors observed:
• Celeb-bait campaigns leveraging synthetic media
• AI-assisted investment fraud funnels
• Cloaking to bypass ad review
• DNS manipulation via shadow resolvers
• HTTP-based traffic distribution systems
• Push notification abuse targeting Android Chrome
• Law firm impersonation clusters
Investigative findings indicate high advertiser concentration and shared infrastructure — suggesting organized, scalable fraud operations.

The enforcement move signals increasing willingness by platforms to pursue civil litigation alongside technical disruption.
From a defensive standpoint, what additional telemetry or cross-platform coordination is needed to meaningfully suppress these ecosystems?

Source: https://thehackernews.com/2026/02/meta-files-lawsuits-against-brazil.html

Engage in the comments.
Follow @technadu@infosec.exchange for advanced threat reporting.
Like and repost for wider awareness.

#Infosec #ThreatIntelligence #Meta #Malvertising #FraudOperations #CyberCrime #DigitalForensics #SecurityResearch #AdTechSecurity #PBaaS

View on infosec.exchange
0
0
1
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

Regulatory update: The Federal Trade Commission issues COPPA enforcement clarification on age verification technologies.
Operators may collect and process personal data strictly for age determination without prior parental consent — if compliance controls include:
• Purpose limitation
• Data minimization + prompt deletion
• Security safeguards
• Third-party contractual assurances
• Transparency notice
• Reasonable accuracy validation

Formal COPPA Rule review forthcoming.
For security leaders:
Age verification systems must be architected with privacy-by-design, limited retention, and robust vendor risk management.

How are you validating accuracy while minimizing data exposure?

Source: https://www.ftc.gov/news-events/news/press-releases/2026/02/ftc-issues-coppa-policy-statement-incentivize-use-age-verification-technologies-protect-children

Engage below and follow us for regulatory + cybersecurity intelligence.

#COPPA #PrivacyByDesign #DataGovernance #CyberPolicy #FTC #Compliance #RiskManagement #InfoSec #SecurityArchitecture #OnlineSafety

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 27, 2026

🚨 New Identity Defender App Update 🚨
ExpressVPN’s Identity Defender has now become a standalone app, offering expanded features for comprehensive identity protection.

• Protection Score for real-time risk tracking
• Home Title & Neighbourhood Watch monitoring
• Court Records & Credit Reports
• $5M Identity Theft Insurance including Cash Recovery

This new approach consolidates multiple identity tools into one app, simplifying monitoring and recovery. Stay on top of threats with Identity Defender.

Source: https://www.expressvpn.com/blog/identity-defender-app/

What’s your organization’s go-to for identity protection? Let us know in the comments.

#IdentitySecurity #DataProtection #CyberDefense #Cybersecurity #VPN #Infosec #Privacy

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 26, 2026

Zyxel addresses critical CVE-2025-13942 RCE affecting UPnP in 4G/5G CPEs, DSL/Ethernet, Fiber ONTs, and wireless extenders. Exploitation requires WAN + UPnP enabled; Shadowserver tracks ~120k exposed devices.

Additional post-auth command-injection flaws (CVE-2025-13943, CVE-2026-1459) patched. EOL devices (VMG1312, VMG3312/13, SBG3300/3500) remain unpatched; replacement recommended.

Mitigation recommendations:
• Apply firmware updates immediately
• Disable unnecessary UPnP/WAN access
• Monitor network exposure of legacy devices
• Track patched vs. unpatched CPEs/routers in enterprise inventories

Source: https://www.bleepingcomputer.com/news/security/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers/

How are you prioritizing critical RCE patches for network devices? Comment below and follow for in-depth threat reporting.

#NetworkSecurity #IoTSecurity #PatchManagement #RCE #RouterSecurity #CVE #ThreatIntel #Infosec #ZeroTrust #EnterpriseSecurity

View on infosec.exchange
0
0
1
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 26, 2026

Brian Soby of AppOmni:
"Modern attacks are winning because they are post-authentication."

"If you only focus on the point of entry, your security becomes performative."

Zero Trust must extend inside SaaS enforcement layers.

Read more:
https://www.technadu.com/after-login-when-zero-trust-breaks-down-teams-lose-visibility-and-attackers-move-inside-saas-apps/620582/

#ZeroTrust #SaaS #CyberSecurity #ZTNA

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 26, 2026

Fake job interviews.
Malicious Next.js repos.
Automatic RCE on developer machines.
Attackers are embedding multiple execution triggers into coding test projects, exploiting trusted workflows and in-memory JS loaders.
This isn’t just malware.
It’s workflow exploitation.
Are developer hiring processes the next major supply chain vector?

Source: https://www.bleepingcomputer.com/news/security/fake-nextjs-job-interview-tests-backdoor-developers-devices/

Reply with your take 👇
Like & follow us for more cybersecurity reporting and analysis.

#CyberSecurity #AppSec #DevSecOps #ThreatIntel #CloudSecurity #Infosec #ZeroTrust

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 26, 2026

Threat Landscape Brief - 2026
Source: Darktrace Annual Threat Report

Key Metrics:
• 20% YoY rise in disclosed vulnerabilities
• 32M phishing emails detected
• 8.2M targeted VIP accounts
• 28% increase in QR-based phishing
• 70% of Americas incidents initiated via stolen credentials
• Microsoft Azure most targeted cloud
• Docker environments saw 54.3% honeypot targeting

Operational shift:
• Credential abuse > exploit development
• AI-assisted phishing increasing personalization
• DMARC bypass at 70% legitimacy pass rate
• Fresh domains deployed at scale

Strategic implication:
Identity telemetry and behavioral analytics are now mission-critical.

Source: https://www.darktrace.com/blog/what-the-darktrace-annual-threat-report-2026-means-for-security-leaders

Follow @technadu@infosec.exchange for actionable threat intelligence.
Share your detection strategy insights below.

#Infosec #ThreatIntel #IdentitySecurity #Darktrace #CloudSecurity #Azure #PhishingDefense #ZeroTrust #IAM #SecurityOperations #CyberRisk #TechNadu

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 26, 2026

Five Eyes warning: Cisco SD-WAN actively exploited by UAT-8616.
• CVE-2026-20127
• CVE-2022-20775
• Root access & rogue control-plane peering
• Persistence in edge devices
Immediate patching & threat hunting required.

Full details:
https://www.technadu.com/cisco-sd-wan-is-actively-exploited-by-uat-8616-five-eyes-alliance-agencies-issue-warning/621036/

Are you checking for downgrade events?

#InfoSec #Cisco #SDWAN #CISA #ThreatIntel

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Feb 26, 2026

Moscow man charged with attempting to extort the Conti ransomware group by impersonating an FSB officer.

Allegedly demanded payment for “protection” from prosecution.

Conti may be defunct, but its operators remain active in new groups.

Full report:
https://www.technadu.com/moscow-man-charged-in-extortion-of-conti-ransomware-gang-via-federal-security-service-impersonation/621034/

Internal instability in ransomware ecosystems?

#InfoSec #Ransomware #Conti #ThreatIntel

View on infosec.exchange
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Jan 13, 2026
Less than 1% of data moving across networks is protected — a serious issue for defense and mission-critical systems. Srinivas Shekar, CEO & Co-Founder of Pantherun Technologies, explains why real-time, keyless encryption is essential. Full interview: https://www.technadu.com/rethinking-encryption-defense-readiness-and-the-future-of-deep-tech-from-india/616616/ #InfoSec #Encryption #DefenseTech #DeepTech
View on infosec.exchange
Your browser does not support the video tag.
0
0
0
0
technadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
TechNadu
TechNadu
@technadu@infosec.exchange

Uncovering # Cybersecurity | Expert insights, Pro Interviews, Latest Threats & Hacking News | # InfoSec # Malware # Ransomware # Streaming # TechNews

infosec.exchange
@technadu@infosec.exchange · Jan 12, 2026
Instagram denies a breach after mass password reset emails, citing a fixed bug — but third-party researchers report conflicting data as 6.2M emails appear in HIBP. https://www.technadu.com/instagram-denies-data-breach-after-password-reset-emails-6-2m-accounts-added-to-hibp/618128/ #InfoSec #DataPrivacy #IncidentResponse
View on infosec.exchange
0
0
0
0

Media

313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: imap.elektrine.com:993

POP3: pop.elektrine.com:995

SMTP: smtp.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 08:53:47 UTC