rogeragrimes@infosec.exchange
Posts
-
This post did not contain any content.This post did not contain any content. -
Check out my latest article: Wake Call To The World!Check out my latest article: Wake Call To The World! Quantum Computing Vendor Announces It Will Hit Q-Day by 2028-2029
Wake Call To The World! Quantum Computing Vendor Announces It Will Hit Q-Day by 2028-2029
Yesterday, IONQ (www.ionq.
(www.linkedin.com)
-
DigiCert hacked with a malicious screensaver fileDigiCert hacked with a malicious screensaver file
Risky Bulletin: DigiCert hacked with a malicious screensaver file - Risky Business Media
A threat actor gained access to DigiCert's backend and stole 27 code signing certificates they later used to sign malware.The incident too [Read More]
(risky.biz)
I can't believe this trick still works! And attackers stole code signing certs. How are code signing certs readily available? Why aren't they on an HSM?
-
"North Korean-state-backed hackers account for 76% of all crypto scam and hack losses in 2026 and have stolen $6 billion since 2017."North Korean-state-backed hackers account for 76% of all crypto scam and hack losses in 2026 and have stolen $6 billion since 2017. Tactics have evolved from remote attacks to sophisticated, months-long in-person social engineering..."
-
This post did not contain any content.This post did not contain any content. -
Hacking technique called DarkSword can take over iPhones simply by visiting websiteHacking technique called DarkSword can take over iPhones simply by visiting website
Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that simply visit infected websites.
WIRED (www.wired.com)
-
New fingerprinting technique can track Tor usershttps://news.risky.biz/risky-bulletin-new-fingerprinting-technique-can-track-tor-users/New fingerprinting technique can track Tor users
https://news.risky.biz/risky-bulletin-new-fingerprinting-technique-can-track-tor-users/When people ask me, "Hey, what do you think about Tor...", I cut them off and reply, "Whatever you're thinking about doing illegally, don't do it. You are trackable. All it takes is for law enforcement to be interested in you. Anonymity on the Internet is an illusion.
-
This is what AI was made for...fake Neil deGrasse Tyson Patriot Games videos (NSFW)This is what AI was made for...fake Neil deGrasse Tyson Patriot Games videos (NSFW)
Smart Girl Dumb Questions on Instagram: "“Disturbingly … DISTURBINGLY Entertaining” @neildegrassetyson and @nayeemaraza watch the A.I. film where Neil, SBF, Elon and Bill Gates walk into a … wormhole slash sauna?! Full episode soon on @smartgirldumbquestions"
108K likes, 2,177 comments - smartgirldumbquestions on April 22, 2026: "“Disturbingly … DISTURBINGLY Entertaining” @neildegrassetyson and @nayeemaraza watch the A.I. film where Neil, SBF, Elon and Bill Gates walk into a … wormhole slash sauna?! Full episode soon on @smartgirldumbquestions".
Instagram (www.instagram.com)
-
Anthropic's Mythos model accessed and used by unauthorized users...who accessed it through third parties and stolen credentials from previous hacks.Anthropic's Mythos model accessed and used by unauthorized users...who accessed it through third parties and stolen credentials from previous hacks. Apparently, they used it to build new websites and not vuln hunting.
-
Hackers are loving Microsoft exploits todayHackers are loving Microsoft exploits today