🇮🇷 Iranian radio chatter, analog: Now it’s time for us to move. Follow my instructions when I send you the code.
All posts in Uncategorized
March 8, 2026 at 01:38PM
■■■□□ The attacks by Keymous group are in phases. Phase 1 was Kuwait. Phase 2 was Jordan. The other phases will include countries that have asked with Judeo-Christian alliance.
March 7, 2026 at 08:11PM
■■■□□ Palantir and Anthropic AI helped the US hit 1k Iran targets in 24 hours. https://www.moneycontrol.com/europe/?url=https://www.moneycontrol.com/world/how-palantir-and-anthropic-ai-helped-the-us-hit-1-000-iran-targets-in-24-hours-article-13853331.html
March 7, 2026 at 02:38PM
■■■□□ OSINT: Real time map of ongoing war in middle east. https://www.iranconflicttracker.com/
March 6, 2026 at 12:22PM
■■■□□ UAE police conducts random checks on the phones of Dubai residents (asking people to unlock devices) to check photos and videos. This comes as government issues warnings to residents not to take pictures of military activities and missile interceptions as this can lead to security compromise through OSINT by enemy.
March 5, 2026 at 10:52PM
■■■□□ Further details on killing of Iranian leader. Israel’s artificial intelligence takes on a function that was previously performed by human conscience. The strikes on Tehran on February 28, which resulted in the elimination of Ali Khamenei and Iran’s top military and political leadership, were a public demonstration of technology, the possibility of whose use…
March 5, 2026 at 10:48PM
■■□□□ While not new, a self-referencing LNK file in combination with winget configuration instructions can be a viable initial access payload for environments where the Microsoft Store is not disabled. https://blog.compass-security.com/2026/03/winget-desired-state-initial-access-established/
March 5, 2026 at 09:25PM
■■□□□ ⚠️ Cisco confirms active exploitation of two Catalyst SD-WAN Manager flaws. ▶ CVE-2026-20122 enables arbitrary file overwrite via API credentials. ▶CVE-2026-20128 can expose data and grant DCA privileges after login. https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html
March 5, 2026 at 07:19PM
■■■■■ Google says 90 zero-days were exploited in attacks last year. Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances. https://www.bleepingcomputer.com/news/security/google-says-90-zero-days-were-exploited-in-attacks-last-year/
March 4, 2026 at 10:26PM
⭐️CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection. https://github.com/V33RU/CommandInWiFi-Zeroclick
