NULL's Avatar

NULL

@codemunkee.bsky.social

Cybersecurity Researcher | Machine Learning & Artificial Intelligence | OSINT | CTI | Threat Modeling | Apolitical | Working to Democratize Cybersecurity

3,654 Followers  |  3,155 Following  |  376 Posts  |  Joined: 28.12.2023  |  1.9232

Latest posts by codemunkee.bsky.social on Bluesky

Preview
Take Note: Cyber-Risks With AI Notetakers Transcription applications are joining your online meetings. Here's how to create policies for ensuring compliance and security of your information.

www.darkreading.com/cyber-risk/t...

10.10.2025 00:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Motion sensors in high-performance mice can be used as a microphone to spy on users, thanks to AI โ€” Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech This mouse has ears.

www.tomshardware.com/tech-industr...

09.10.2025 23:26 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks OpenAI disrupts Russian, North Korean, and Chinese threat groups misusing ChatGPT for malware and scams

thehackernews.com/2025/10/open...

08.10.2025 14:48 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data LinkedIn has filed a lawsuit against Delaware company ProAPIs Inc. and its founder and CTO, Rehmat Alam, for allegedly scraping legitimate data through more than a million fake accounts.

www.bleepingcomputer.com/news/legal/l...

07.10.2025 04:08 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Post image 06.10.2025 17:56 โ€” ๐Ÿ‘ 6    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
CISA kills agreement with nonprofit that runs MS-ISAC : The federal government's not the only thing shutting down on Oct. 1

www.theregister.com/2025/09/30/c...

30.09.2025 04:52 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
That Drone in the Sky Could Be Tracking Your Car Police are using their drones as flying automated license plate readers (ALPRs), airborne police cameras that make it easier than ever for law enforcement to follow you. "The Flock Safety drone, speci...

www.eff.org/deeplinks/20...

24.09.2025 03:46 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
App for outing Charlie Kirkโ€™s critics leaked its usersโ€™ personal data An app for anonymously reporting individuals accused of speaking ill against conservative Charlie Kirk leaked personal data about its users.

san.com/cc/app-for-o...

23.09.2025 17:34 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Post image 23.09.2025 17:32 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
American Archive of Public Broadcasting fixes bug exposing restricted media โ€‹A vulnerability in the American Archive of Public Broadcasting's website allowed downloadingย of protected and private media for years, with the flaw quietly patched this month.

www.bleepingcomputer.com/news/securit...

23.09.2025 04:52 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1
Post image 18.09.2025 18:51 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

www.akamai.com/blog/securit...

18.09.2025 03:34 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
A Comprehensive Overview of Top 5 ZTNA Open Source Components Explore the top 5 ZTNA open source solutions, key considerations for selecting a ZTNA solution, and reasons to implement ZTNA open source tools:

aimultiple.com/ztna-open-so...

18.09.2025 03:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿ‘Ž

18.09.2025 03:15 โ€” ๐Ÿ‘ 45    ๐Ÿ” 2    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0
My Cybersecurity Expert - Alex Stamos | Tosh Show
YouTube video by tosh show My Cybersecurity Expert - Alex Stamos | Tosh Show

www.youtube.com/watch?v=yncl...

17.09.2025 03:29 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Google confirms hackers gained access to law enforcement portal Google has confirmed that hackers created a fraudulent account in its Law Enforcement Request System (LERS) platform that law enforcement uses to submit official data requests to the company

www.bleepingcomputer.com/news/securit...

15.09.2025 22:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 11.09.2025 20:38 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Post image 10.09.2025 16:57 โ€” ๐Ÿ‘ 7    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 10.09.2025 00:53 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Anthropic agrees to pay $1.5 billion to settle authors' copyright lawsuit Authors had sued Anthropic, claiming the artificial intelligence startup had illegally used their books to train its models.

www.cnbc.com/2025/09/05/a...

06.09.2025 19:22 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps Trump administration contract with Paragon Solutions gives immigration agency access to one of the most powerful stealth cyberweapons

www.theguardian.com/us-news/2025...

03.09.2025 05:02 โ€” ๐Ÿ‘ 4    ๐Ÿ” 3    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Preview
Nevada state offices close after wide-ranging 'network security incident' The governor of the U.S. state of Nevada says that offices have closed, websites are offline and phone lines are patchy following an unspecified "network security incident."

www.reuters.com/world/us/nev...

28.08.2025 15:01 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
This Is the Group That's Been Swatting US Universities WIRED spoke to a self-proclaimed leader of an online group called Purgatory, which charged as little as $20 to call in fake threats against schools.

www.wired.com/story/purgat...

27.08.2025 20:49 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
F-35 pilot held 50-minute airborne conference call with engineers before fighter jet crashed in Alaska | CNN A US Air Force F-35 pilot spent 50 minutes on an airborne conference call with Lockheed Martin engineers trying to solve a problem with his fighter jet before he ejected and the plane plunged to the g...

amp.cnn.com/cnn/2025/08/...

27.08.2025 15:48 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
AegisShield: Democratizing Cyber Threat Modeling with Generative AI The increasing sophistication of technology systems makes traditional threat modeling difficult to implement and scale. This is especially true for small organizations that lack resources and expertis...

The Democratization of Threat Modeling ๐Ÿ›ก๏ธ

doi.org/10.5281/zeno...

27.08.2025 15:29 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Hackers can hide AI prompt injection attacks in resized images A new method of hiding instructions for "AI" systems takes advantage of how images are compressed when uploaded.

www.pcworld.com/article/2889...

27.08.2025 04:41 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Hosting residential IP network nodes : r/cybersecurity 47 votes, 86 comments. 1.3M subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

Archive: archive.is/qsozu
Original: www.reddit.com/r/cybersecur...

26.08.2025 17:18 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
With AI chatbots, Big Tech is moving fast and breaking people Why AI chatbots validate grandiose fantasies about revolutionary discoveries that donโ€™t exist.

arstechnica.com/information-...

26.08.2025 01:45 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 25.08.2025 01:15 โ€” ๐Ÿ‘ 12    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 21.08.2025 19:22 โ€” ๐Ÿ‘ 6    ๐Ÿ” 2    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 2

@codemunkee is following 18 prominent accounts