February 11, 2026 at 01:15AM

■■■□□ UAE based Binghatti developers had a data leak and threat actor is sharing samples online. Seems legitimate. The data is apparently if sales they made includes detailed information about clients and their properties. Customer PII is leaking.

February 8, 2026 at 05:16PM

■■□□□ In the past week, several attack groups have announced that they are carrying out DDoS attacks on websites in Israel. Here are some of the websites mentioned by the attackers since the beginning of February: weizmann.ac.il new.huji.ac.il haifa.ac.il energy.gov.il knesset.tv shatil.org.il en.israel-clinics.guru haifaport.co.il elbitsystems.com kolzchut.org.il bgu4u22.bgu.ac.il rt.co.il sderot.org elco.co.il rimon1.com tami-imi.com zionutdatit.org.il invisiblealbum.com levana.org.il…

February 8, 2026 at 02:33PM

■■■■□ nmapUnleashed (nu) is a modern CLI wrapper for Nmap, designed to make network scanning more comfortable and effective. Nmap is THE tool for penetration testing and network auditing, you can use nu just like Nmap with all its familiar commands but with extended features such as multithreading, easy scan management, and improved overview of…

February 8, 2026 at 02:16AM

■■□□□ China develops technology that could affect Starlink 🚀📡 🔹 New military advancement China developed the TPG1000Cs, the most compact high-power microwave controller in the world, according to researchers from the Northwest Institute of Nuclear Technology (NINT), which is linked to the Chinese military. 🔹 What is this technology used for? ⚡ This controller allows…

February 5, 2026 at 05:49PM

■■□□□ Bitcoin creator Satoshi was either affiliated to Epstein or a character drafted by Epstein. As his emails pointed out that Epstein was in contact and in commanding position to control it and other crypto. He has many core developers of Bitcoin where he seemed to claim control on the tech. He was planning sharia…

February 4, 2026 at 01:51PM

■■□□□🛡️ Mid-market firms aren’t under-secured. IBM finds 83 security tools on average, and complexity is the real blocker. The gaps come from unused EDR, alert overload, and weak prevention—not missing tools.

February 4, 2026 at 01:50PM

■■■□□ Two cyber attacks updates from Israel: 1. Hacktivist group affiliated with Iran claims to have attacked Kibbutz Hatzor. The group is publishing several screenshots proving the breach. 2. Hacktivist Tengu publishes victim company b2m motorsport, which is engaged in car rental, spare parts supply, and more.

February 4, 2026 at 01:52AM

■■■■■ Criminals producing devices that unlock cars arrested in international operation. Five suspects were arrested during an international operation targeting a network of car thieves. The group manufactured reprogrammed speakers and other technical devices that made it possible to unlock cars with decoded keys, bypassing the security systems. The operation, coordinated by Eurojust, was carried…

February 3, 2026 at 11:58PM

■■■□□ The Jeffery Epstein million file drop by DoJ of United States yesterday is creating ripples in the geo-political world. Fallout may occur even though drip feeding of information is done to reduce overall impact.