How Armenia Exposed Its Voters for 20 Years

Armenia's Central Election Commission exposed voter personal data -- names, addresses, birth dates, phone numbers, and passport numbers -- through at least 6 different public web systems from 2003 to 2025. An unauthenticated SOAP API let anyone query voter records by address. OWL recovered the evidence from the Wayback Machine.

https://owlorg.com/en/investigations/elections-voter-data-breach/

#Armenia #OSINT #Investigation

How Armenia Exposed Its Voters for 20 Years

Armenia's CEC exposed voter data -- names, addresses, birth dates, phone numbers, passport numbers -- through 6 public web systems. An unauthenticated API let anyone query voter records. OWL recovered the evidence.

The best gift is appreciation 🫡. It comes from the heart. ❣️

This week I taught a 16-hour bootcamp style course to the US 🇺🇸 Navy ⚓️ in Norfolk, Virginia ! [Navy Cyber Defense Operations Command - NCDOC]

Course: 🕵🏽‍♂️ Next Level #OSINT. It blew their minds! 🤯

One of the students gifted me his Navy recruit challenge coin ⚓︎ and another guy gave me this 1924 silver 🪙 one $ coin; the last silver coin in circulation. (the word "TRUST" on it actually says "TRVST", not a typo, the "V" stands for victory). It meant a lot to them, so it meant a lot to me!

30 years ago I could not imagine myself teaching hacker-style intelligence to Law Enforcement, spy agencies, and the US Navy Cyber folks for fighting crime!
🦾While the results may not be in your hands, your effort certainly is!

One of things that resonated with the young students who called me "Sir" (awkward 😖) was:
"The difference between an ethical hacker and a malicious hacker is INTENTION.....Even a murdered can avoid jail time if the reason was self-defense or temporary insanity.... If you're using your powers for good, you have nothing to fear."

#OSINT Masterclass - UnMasking The Mask Magic - a.k.a. Leonardo Dominic Chimienti
themaskmagic.com
https://www.youtube.com/watch?v=WaeKwNzkMGM

🟡 Drone Activity | 6/10
🇺🇦

Drone activity over Sumy, Kharkiv, and Dnipropetrovsk regions
According to @raketa_trevoga, drone movement was detected towards Krasnopillia (Sumy region), Velykyi Burluk (Kharkiv region), and Petropavlivka (Dnipropetrovsk region).

💬 SENTINEL: Можлива підготовка до ударів по прикордонним регіонам України. Рекомендовано моніторити FIRMS та повітряну тривогу.

#Ukraine #DroneThreat #OSINT

CVE Alert: CVE-2026-35638 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the Control UI that allows unauthenticated sessions to retain self-declared

RedPacket Security
CVE Alert: CVE-2026-35637 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.3.22 performs cite expansion before completing channel and DM authorization checks, allowing cite work and content handling prior to

RedPacket Security
CVE Alert: CVE-2026-35625 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where silent local shared-auth reconnects auto-approve scope-upgrade requests,

RedPacket Security
CVE Alert: CVE-2026-33797 - Juniper Networks - Junos OS - RedPacket Security

**Risk verdict:** High-impact availability risk in BGP environments; treat as an urgent patching item despite no confirmed exploitation or KEV indicator,

RedPacket Security
CVE Alert: CVE-2026-35629 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability in multiple channel extensions that fail to properly guard configured base URLs

RedPacket Security
CVE Alert: CVE-2026-34512 - OpenClaw - OpenClaw - RedPacket Security

OpenClaw before 2026.3.25 contains an improper access control vulnerability in the HTTP /sessions/:sessionKey/kill route that allows any bearer-authenticated

RedPacket Security