Oh no. Nobody could have predicted this. I, certainly never predicted it the day they announced the M$ takeover. Nothing to see here. Please continue hosting your code on github.

#github #UsersareFodder #SiValleyGrift #git #ai #dataTheft

https://www.theregister.com/2026/03/26/github_ai_training_policy_changes/

GitHub hits CTRL-Z, decides it will train its AI with user data after all

: As of April 24 you'll be feeding the Octocat unless you opt out

The Register
It’s Official: Elon Must Face DOGE 'Power Overreach' Lawsuit

YouTube

waaaay past time to arrest and prosecute #ElonMusk

#privacy #DataTheft #ClassActionLawsuit #FelonMusk #Felonies

Palantir extends reach into British state as it gets access to sensitive FCA data

Exclusive: Allowing US tech firm to analyse intelligence in name of tackling fraud raises fresh concerns over privacy

The Guardian

Your iPhone can be hacked in minutes and DarkSword shows how easy it is

https://fed.brid.gy/r/https://nerds.xyz/2026/03/darksword-ios-exploit/

Your iPhone can be hacked in minutes and DarkSword shows how easy it is

A new DarkSword iOS exploit can steal your data and crypto wallets in minutes without leaving a trace. Here is what you need to know.

NERDS.xyz

Technical Analysis of SnappyClient

Zscaler ThreatLabz identified a new command-and-control framework implant called SnappyClient, delivered via HijackLoader. SnappyClient is a C++-based implant with data theft and remote access capabilities. It employs evasion techniques like AMSI bypass, Heaven's Gate, direct system calls, and transacted hollowing. The malware receives configuration files from its C2 server and uses a custom encrypted network protocol. SnappyClient's main functions include stealing browser data, taking screenshots, keylogging, and providing remote shell access. Analysis suggests potential ties to HijackLoader based on code similarities. The primary goal appears to be cryptocurrency theft, targeting wallet addresses and crypto-related applications.

Pulse ID: 69bac510532c2199bd470e30
Pulse Link: https://otx.alienvault.com/pulse/69bac510532c2199bd470e30
Pulse Author: AlienVault
Created: 2026-03-18 15:30:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #DataTheft #HijackLoader #InfoSec #Malware #OTX #OpenThreatExchange #RAT #ThreatLabz #Zscaler #bot #cryptocurrency #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign

The Konni Group conducted a sophisticated multi-stage attack campaign, initiating with a spear-phishing email disguised as a North Korean human rights lecturer appointment. The attack progressed through execution of a malicious LNK file, installation of remote access malware, and long-term persistence for data theft. A key feature was the unauthorized access to victims' KakaoTalk PC applications, used to distribute additional malicious files to selected contacts. The campaign employed multiple RAT families, including EndRAT, RftRAT, and RemcosRAT, with a distributed C2 infrastructure across Finland, Japan, and the Netherlands. The threat actor's tactics included trust-based propagation, account session abuse, and modular payload deployment, highlighting the need for advanced behavior-based detection and multi-layered defense strategies.

Pulse ID: 69ba831f2287b29db4e4645e
Pulse Link: https://otx.alienvault.com/pulse/69ba831f2287b29db4e4645e
Pulse Author: AlienVault
Created: 2026-03-18 10:49:03

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DRat #DataTheft #Email #Finland #ICS #InfoSec #Japan #Konni #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #RAT #Remcos #RemcosRAT #Rust #SpearPhishing #TheNetherlands #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
DOGE Deposition Leaks & Gets Deleted After Exposing Gross Incompetence

YouTube