Constantin Milos

@Tinolle
12 Followers
18 Following
1.3K Posts
#Security, #Cisco,#Cyberwar, #Data,#Malware, #Privacy, #Hacking , #IoT, #E2EE.
New widespread EvilTokens kit: device code phishing as-a-service – Part 1
https://blog.sekoia.io/new-widespread-eviltokens-kit-device-code-phishing-as-a-service-part-1/
New widespread EvilTokens kit: device code phishing as-a-service - Part 1

Uncover the new sophisticated EvilTokens device code phishing as-a-service, with AI-augmented features facilitating BEC fraud

Sekoia.io Blog
European Commission Confirms 350GB Breach
Hackers compromised AWS account hosting Europa.eu, stole employee data..
https://stateofsurveillance.org/news/european-commission-aws-data-breach-350gb-march-2026/
European Commission Confirms 350GB Data Breach: AWS Account Compromise Exposes Staff Records - State of Surveillance

The European Union's executive body just confirmed hackers stole 350GB of data including employee information from its AWS cloud infrastructure. The attacker plans to dump everything publicly.

Hysteria is a powerful, lightning fast and censorship resistant proxy.
https://github.com/apernet/hysteria
GitHub - apernet/hysteria: Hysteria is a powerful, lightning fast and censorship resistant proxy.

Hysteria is a powerful, lightning fast and censorship resistant proxy. - apernet/hysteria

GitHub
Free calls built with webrtc and strictly p2p..!🚨 #privacy https://phonejack.org/
Buy a cheap satellite dish and listen: SMS, payment data, and military secrets will fall from the sky. πŸ›°οΈαŠαŠ||αŠπŸ‘‚βœοΈπŸŽ–οΈ
https://it4sec.substack.com/p/buy-a-cheap-satellite-dish-and-listen

RE: https://techhub.social/@Techmeme/116292437194618572

Coming soon - your org’s code powering every competitors products.

Three Malware in One: XWorm, a Custom Stealer, and an Unknown RAT

Today we analyze XWorm, the 6th most popular malware on AnyRun Malware Trends, along with two other threats hiding inside a single file.

Medium
Supply Chain Attack in litellm 1.82.8 on PyPI
https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/
Supply Chain Attack in litellm 1.82.8 on PyPI

litellm version 1.82.8 on PyPI contains a malicious .pth file that harvests SSH keys, cloud credentials, and secrets on every Python startup, then attempts lateral movement across Kubernetes clusters.

FutureSearch
Learn LangGraph and Build Conversational AI with Python

If you're building conversational AI and tired of messy logic or hard-to-scale workflows, LangGraph makes it easier. It uses graphs to manage dialogue flow, so your bots stay organized even as they get more complex. Great for anything from support ag...

freeCodeCamp.org