Matthias Schulze's Avatar

Matthias Schulze

@percepticon.bsky.social

PhD in political science, studying infosec, cyber conflict & information war at IFSH. Self-taught hacker & blue team. Blog and podcast about my work over at https://percepticon.de or https://ioc.exchange/@percepticon

811 Followers  |  313 Following  |  2,371 Posts  |  Joined: 25.08.2023
Posts Following

Posts by Matthias Schulze (@percepticon.bsky.social)

Amateurs study tactics; professionals study logistics.

01.03.2026 16:13 — 👍 56    🔁 16    💬 0    📌 1

In war games the movie the #AI ultimately is smart enough to exit the game. Our current LLMs are not that smart…

27.02.2026 17:16 — 👍 3    🔁 0    💬 2    📌 0
Preview
Exclusive | Government Agencies Raise Alarm About Use of Elon Musk’s Grok Chatbot Warnings about xAI’s safety and reliability preceded the Pentagon’s decision to approve Grok for use in classified settings.

Duh

Government Agencies Raise Alarm About Use of Elon Musk’s Grok Chatbot (Gift article)
www.wsj.com/politics/nat...

27.02.2026 16:24 — 👍 2    🔁 3    💬 0    📌 0

Trump’s billionaire allies will now own CNN, Fox News, CBS, WaPo, WSJ and NY Post — plus 185+ local tv stations and news in 100 markets.

They also control X, Facebook, Instagram, Threads, WhatsApp, TikTok, Truth and Twitch.

This is all by design to manipulate and surveil us.

Pay attention.

27.02.2026 14:48 — 👍 2011    🔁 952    💬 107    📌 56
Preview
Trump, seeking executive power over elections, is urged to declare emergency Activists who say they are in coordination with the White House are circulating a draft executive order that would unlock extraordinary presidential power over voting.

Breaking WaPo:

Pro-Trump activists who say they are in coordination with the White House are circulating a 17-page draft executive order that claims China interfered in the 2020 election as a basis to declare a national emergency that would unlock extraordinary presidential power over voting.

26.02.2026 17:26 — 👍 2462    🔁 1228    💬 316    📌 391
Preview
Exclusive: US orders diplomats to fight data sovereignty initiatives An internal diplomatic cable said such efforts could interfere with AI-related services.

Ist das schon offene hybride Kriegführung?

Exclusive: US orders diplomats to fight data sovereignty initiatives

25.02.2026 15:06 — 👍 174    🔁 69    💬 14    📌 3
Preview
Meta Director of AI Safety Allows AI Agent to Accidentally Delete Her Inbox Meta Superintelligence Labs’ director of alignment called it a “rookie mistake.”

Accidentally 😂🤣

24.02.2026 01:01 — 👍 1    🔁 1    💬 0    📌 0
Preview
Putin can’t survive without war

In attempting to destroy Ukraine, Russia has turned itself into the land of the dead. My reflection on four years of war. unherd.com/2026/02/puti...

24.02.2026 05:43 — 👍 63    🔁 15    💬 1    📌 0

Ditched #windows11 for #bazzite on my gaming pc last week, which works amazing after a few tweaks. Currently testing #ZorinOS to replace my aging MacBook and so far it works great. Amazing how far #Linux has become in terms of usability + app support

23.02.2026 19:17 — 👍 3    🔁 0    💬 0    📌 0
The Tiktok Problem – A Study on Cognitive Warfare NATO defines cognitive warfare as a new unconventional form of hybrid warfare, where the human mind becomes the primary battleground. The goal is to manipulate not only what people think but also how they think and act. If successful, cognitive warfare can shape individual and collective beliefs to align with an aggressor’s strategic objectives. In extreme cases, it can fracture society, eroding the collective will to resist an adversary’s intentions. This form of warfare allows an opponent to subdue a population without direct force or coercion. In today’s world, where much of our lives unfold online, social networks create an illusion of social interaction while altering fundamental human behaviors. Digital platforms have reshaped entire generations, particularly those who grew up immersed in screens. Research now confirms the long-term effects of social media and mobile applications on human psychological health, brain development, attention span, and behavior. Social media addiction, particularly among children, is rising, exacerbating issues such as cyberbullying, online grooming, disinformation, and political radicalization. These vulnerabilities present an opportunity for adversaries to exploit digital platforms for large-scale psychological operations. TikTok, a short-video social media platform owned by China-based company ByteDance, has become one of the most popular apps among Generation Z (Gen Z), a generation immersed in digital technology, the internet, and social media from childhood. While widely used for entertainment and marketing, TikTok presents unique security and cognitive risks due to its ownership, data collection practices, and algorithmic influence.

The Tiktok Problem – A Study on Cognitive Warfare #cybersecurity #infosec

21.02.2026 15:58 — 👍 1    🔁 0    💬 0    📌 0
Preview
'Students Are Being Treated Like Guinea Pigs:' Inside an AI-Powered Private School Alpha School, an “AI-powered private school” that heavily relies on AI to teach students and can cost up to $65,000 a year, is AI-generating faulty lesson plans that internal company documentation find sometimes do “more harm than good,” and scraping data from a variety of other online courses without permission to train its own AI, according to former Alpha School employees and internal company documents. 

'Students Are Being Treated Like Guinea Pigs:' Inside an AI-Powered Private School #cybersecurity #infosec

21.02.2026 03:45 — 👍 1    🔁 0    💬 0    📌 0
Preview
European Parliament bars lawmakers from using AI tools Who knows where that helpful email summary is being generated? The European Parliament has reportedly turned off AI features on lawmakers' devices amid concerns about content going where it shouldn't.…

European Parliament bars lawmakers from using AI tools #cybersecurity #infosec

20.02.2026 23:11 — 👍 0    🔁 0    💬 0    📌 0
Preview
How Russia Turns Gamers into Fighters The Kremlin’s weaponization of video games for recruitment and influence is no longer a theoretical risk. To protect the digital commons, the West must treat gaming as a core frontier of contemporary hybrid warfare.

How Russia Turns Gamers into Fighters #cybersecurity #infosec

20.02.2026 18:30 — 👍 1    🔁 0    💬 0    📌 0
Preview
Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment. "This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI [

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens #cybersecurity #infosec

20.02.2026 15:59 — 👍 1    🔁 0    💬 0    📌 0
Preview
From the BetterOffline community on Reddit: When AI tokens start costing more than your actual employees Posted by squeeemeister - 269 votes and 85 comments

Firmen realisieren gerade, dass Coder durch #KI ersetzen am Ende des Tages keine Kosten einspart, da die Tokenkosten durch die Decke gehen. Diese werden in Zukunft noch steigen, da weder #OpenAI, #Perplexity oder #Anthropic bisher profitabel sind www.reddit.com/r/BetterOffl...

20.02.2026 10:28 — 👍 1    🔁 1    💬 0    📌 0

The current state of operating systems is a disaster, thanks to #AI #vibecoding. #Windows11 is slow, buggy, full of bloat, and full of ads and unwanted AI stuff. #MacOS Tahoe runs terribly on older hardware compared to Sonoma. #iOS is so broken that iOS 27 allegedly shall be a "maintenance update".

20.02.2026 10:01 — 👍 3    🔁 2    💬 0    📌 0
Preview
Exclusive: US plans online portal to bypass content bans in Europe and elsewhere The portal could potentially put Washington in the unfamiliar position of appearing to encourage citizens to flout local laws.

First there were threats (if the EU regulates US tech, face consequences such as withdrawal from nuclear sharing). Now, there are active circumvention attempts of EU social media regulation: www.reuters.com/world/us-pla... Important context for the #socialmediaban debate

20.02.2026 08:43 — 👍 1    🔁 0    💬 0    📌 0
Preview
China’s Military AI Wish List Takeaways In analyzing these requests for proposal (RFPs), the authors find that the People’s Liberation Army (PLA) is pursuing AI-enabled capabilities across all domains. The applications include decision support systems (AI-DSS), sensor enhancement tools, data fusion algorithms, and much more. The RFPs reflect China’s desire to generate, augment, and fuse increasing quantities of data to speed military decision-making and improve the precision and efficacy of the PLA’s operations. Specifically, the authors found requests for AI-DSS that can leverage open-source data for strategic decision-making. They also came across requests for AI-DSS to support tactical decisions, such as for targeting. While many militaries are investing in AI-DSS, these systems are of particular importance to the PLA, which views them as a means of compensating for perceived weaknesses in its officer corps. More specifically, the authors found an emphasis on AI applications that would counter perceived U.S. military advantages. This emphasis was especially apparent in numerous requests for technologies to detect U.S. naval assets on and under the sea, as well as technologies that could counteract U.S. space-based systems. Outside of the maritime and space domains, the PLA’s RFPs reveal it aims to acquire increasingly sophisticated surveillance and cognitive domain capabilities. RFPs for facial and gait recognition systems, digital surveillance tools capable of recovering deleted data, and technologies for generating and detecting deepfakes point to ongoing efforts to better secure military installations and develop AI-enabled psychological warfare and cognitive targeting tools. These documents, which are published by the PLA, are strikingly explicit in their requests for sensitive capabilities, including those related to operations in the space, cyber, and cognitive domains. The level of specificity is notable and likely reflects an effort to access advanced capabilities from nontraditional, commercial vendors outside China’s traditional defense industrial base. Moreover, most of the RFPs involve relatively small budgets and short acquisition timelines—often three to six months—suggesting an emphasis on experimentation, prototyping, and rapid iteration. The PLA’s AI acquisition efforts have several implications for U.S. policymakers and defense planners. First, Washington should respond to China’s interest in AI-enabled sensing and surveillance, especially in the maritime and space domains, with investments in counter sensing, deception, and resilience against China’s increasingly capable ISR systems. Second, the United States should prepare to counter emerging Chinese AI-DSS while pursuing dialogue with China on the responsible use of these systems to reduce the chances of miscalculation and escalation. While it is unlikely that Washington and Beijing will make binding commitments, continued discussions could help establish technical minimum standards and norms around the use of these systems. Third, the PLA’s interest in AI systems that ingest and process vast volumes of open-source data for strategic decision-making demands a U.S. rethink of approaches to military signaling, deterrence, and crisis management. Increasing reliance on AI to interpret global events could complicate previous approaches to escalation control. Fourth, China’s military appears ready to use AI to greatly expand its surveillance and information-manipulation capabilities, including more systematic use of deepfakes. Washington should counter with stronger public awareness efforts and public–private collaboration, as well as develop technical standards and tools to detect and blunt these tactics. Fifth, China’s embrace of prototyping and rapid acquisition timelines should further motivate U.S. leaders to support defense acquisition reform, fund a diverse research portfolio, and set the conditions for rapid experimentation and responsible AI adoption in the operating forces. Sixth, access to advanced AI hardware developed by U.S. companies enables the PLA’s modernization. Evidence that the PLA is seeking advanced U.S.-designed semiconductors, as well as leveraging large language models trained on U.S. GPUs, suggests that relaxing export controls will facilitate China’s development and use of AI-enabled C5ISRT technologies. Finally, the breadth and diversity of the PLA’s AI wish list reinforce the importance of conducting sustained open-source monitoring to track capability development, detect shifts in priorities, and identify early signs of operational deployment. Such analysis helps to rightsize current challenges to U.S. national security. Download Full Report China’s Military AI Wish List The post China’s Military AI Wish List appeared first on Center for Security and Emerging Technology.

China’s Military AI Wish List #cybersecurity #infosec

20.02.2026 03:45 — 👍 0    🔁 0    💬 0    📌 0
Preview
Password Managers Vulnerable to Vault Compromise Under Malicious Server Researchers at ETH Zurich have tested the security of Bitwarden, LastPass, Dashlane, and 1Password password managers. The post Password Managers Vulnerable to Vault Compromise Under Malicious Server appeared first on SecurityWeek.

Password Managers Vulnerable to Vault Compromise Under Malicious Server #cybersecurity #infosec

19.02.2026 23:11 — 👍 1    🔁 0    💬 0    📌 0
Preview
Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the "Summarize with AI" button that's being increasingly placed on websites in ways that mirror classic search engine poisoning (AI). The new AI hijacking technique has been codenamed AI Recommendation Poisoning by the Microsoft Defender Security Research Team. The tech giant

Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations #cybersecurity #infosec

19.02.2026 18:31 — 👍 1    🔁 0    💬 0    📌 0
Preview
Chatbots Are the New Influencers Brands Must Woo Companies are realizing they can no longer simply promote themselves to potential customers. They have to win over the robots, too.

Chatbots Are the New Influencers Brands Must Woo #cybersecurity #infosec

19.02.2026 15:58 — 👍 0    🔁 0    💬 0    📌 0
Preview
Rechtsextreme Jugendkultur • Z+ Empfehlung: "Es gibt Tage, da höre ich mehrmals pro Stunde das N-Wort" Gymnasiasten, die Hitler feiern oder Waffen bauen. Lehrer, die nicht mehr weiterwissen. An Schulen überall in Deutschland kippt gerade etwas – ins Rechtsextreme.

Das müsste mind. so sehr Thema sein wie Social-Media-Verbote:

„Etwa 30 Prozent der 12- bis 25-Jährigen hätten mittlerweile eine gefestigt rechtsextreme Weltsicht oder sympathisierten damit, sagt der Soziologe Klaus Hurrelmann, 82, der seit Jahrzehnten die deutsche Jugend erforscht. ..

1/x

19.02.2026 09:42 — 👍 111    🔁 37    💬 5    📌 4

In Großbritannien sollen Plattformen zukünftig intime Bilder ohne Consent innerhalb von 48 Stunden runternehmen und verhindern, dass sie später weiterverbreitet werden.

Sonst bekommen sie bis zu 10% des globalen Umsatzes Strafe oder sie werden geblockt.

19.02.2026 08:43 — 👍 141    🔁 39    💬 5    📌 3

Stichwort "transaktionale Politik": Wenn ihr Social Media reguliert, gibts keine nukleare Teilhabe mehr. Diese Drohung stand schon einmal im Raum.

19.02.2026 08:48 — 👍 0    🔁 0    💬 0    📌 0

3) Platformregulierung, bitte ja, aber das wird gegen eine antagonistische USA durchgesetzt werden müssen. DSA und Co. basieren implizit auf einer Compliance-Annahme. Was aber, wenn Zuckerberg und Co einfach nein sagen, weil sie politische Rückendeckung aus dem Weißen Haus haben....

19.02.2026 08:48 — 👍 0    🔁 0    💬 1    📌 0

2) Wir wissen aus der #Cybersecurity, dass Awarenessschulungen faktisch nichts bringen. Durch KI wird Täuschung immer besser, sodass selbst gute "Erkennungsskills" nicht mehr ausreichend sind.

19.02.2026 08:48 — 👍 0    🔁 0    💬 1    📌 0

Bin total für bessere #digitalLiteracy statt #SocialMediaVerbot, aber: 1) Wie realistisch ist es im föderalen System, dass wir das jetzt nach 30 Jahren des Scheiterns auf einmal gewuppt bekommen, wo nicht mal das Lehrpersonal entsprechend ausgebildet ist? ...

19.02.2026 08:48 — 👍 1    🔁 0    💬 1    📌 0

Ein Blick auf TikTok/X reicht, um zu sehen, dass Hass da bereits mit Klarnamen verbreitet wird.

19.02.2026 08:40 — 👍 2    🔁 1    💬 0    📌 0
Preview
UK.gov launches cyber 'lockdown' campaign as 80% of orgs still leave door open Digital burglaries remain routine, and data shows most corps still don't stick to basic infosec standards Britain is telling businesses to "lock the door" on cybercrims as new government data suggests most still haven't even found the latch.…

UK.gov launches cyber 'lockdown' campaign as 80% of orgs still leave door open #cybersecurity #infosec

19.02.2026 03:45 — 👍 1    🔁 1    💬 0    📌 0
Preview
ZeroDayRAT spyware targets Android and iOS devices via commercial toolkit A new cross-platform spyware sold openly through Telegram is lowering the barrier for hackers seeking remote access to mobile devices. Called “ZeroDayRAT” by its developer, the toolkit is being marketed through Telegram channels as a ready-to-deploy remote access solution. iVerify researchers traced its first activity to 2nd February, with the spyware being distributed as an APK for Android and a payload for iOS. “The developer runs dedicated channels for sales, customer support, and regular updates, giving buyers a single point of access to a fully operational spyware panel,” the researchers said in a blog post. “No technical expertise is required. The platform goes beyond typical data collection into real-time surveillance and direct financial theft.” Capabilities once reserved for nation-state operators are now packaged, documented, and sold simply on Telegram with customer support, they noted. Broad surveillance and credential theft ZeroDayRAT is designed as a mobile surveillance and data exfiltration platform rather than a simple infostealer. According to iVerify, the malware can collect a wide range of sensitive data from the infected devices, including messages, call logs, contacts, location information, photos, and files. It can also harvest notifications and device metadata, giving operators visibility into both user activity and installed applications. “Notifications are captured separately: app name, title, content, timestamp,” the researchers said. “WhatsApp messages, Instagram notifications, missed calls, Telegram updates, YouTube alerts, system events. Without opening a single app, an attacker has passive visibility into nearly everything happening on the phone.” The platform’s “Accounts” panel was highlighted as particularly concerning as it enumerates every account registered (with associated usernames or email addresses) on the infected device, including services such as Google, WhatsApp, Instagram, Facebook, Telegram, Amazon, Flipkart, PhonePe, Paytm, and Spotify. The researchers warned that this consolidated view of a victim’s digital footprint could provide attackers with sufficient information to attempt account takeovers or conduct highly targeted social engineering attacks. Data exfiltration is managed through a centralized command infrastructure, allowing operators to monitor multiple victims and retrieve information on demand. iVerify noted that the toolkit is packaged with a web-based management panel, documentation, and updates, indicating a commercialized offering intended for repeat use rather than a one-off campaign. The stretch of supported operating system versions, spanning Android 5 through 16 and iOS up to 26, further increases the toolkit’s potential reach across consumer and enterprise devices. Reliance on deception and not exploits Despite the name, ZeroDayRAT does not depend on undisclosed operating system vulnerabilities to infect devices. Instead, the primary infection vector is social engineering. Victims are persuaded to install a malicious application or configuration profile disguised as legitimate software, often delivered through links shared via SMS, email, or messaging platforms. While the researchers did not elaborate on the infection chain, on Android, this typically involves sideloading an app outside the official Play Store, sometimes accompanied by prompts to grant extensive permissions. On iOS, installation may rely on enterprise provisioning mechanisms or user-approved profiles that allow the malicious app to run outside the App Store review process. Because infection depends on user interaction rather than zero-click exploits, preventing unauthorized app installation remains a key control against such threats. “Detecting threats like ZeroDayRAT requires mobile EDR that goes beyond traditional device management,” the researchers said, claiming that iVerify has detection, forensics, and automated response solutions to help users identify a compromise across BYOD and managed fleets.

ZeroDayRAT spyware targets Android and iOS devices via commercial toolkit #cybersecurity #infosec

18.02.2026 23:10 — 👍 1    🔁 0    💬 0    📌 0