Peter (Cy🅱er) Lingin
banner
rcinghio.bsky.social
Peter (Cy🅱er) Lingin
@rcinghio.bsky.social
But have you tried turning it off and back on again? No, I have been hacked. 👨‍💻 Based in Milan, Italy 🤌, my heart belongs to Dublin's chips. ☘️💚 Cyber something. 🤖
Pinned
🕵️ "If you aren’t doing anything wrong, what do you have to hide?" I hear this annoying claim almost every week — but Bruce Schneier gave the definitive answer to it a long time ago. Read it below. 👇
www.schneier.com/essays/archi...
Reposted by Peter (Cy🅱er) Lingin
Still in a state of shock trying to process the tragic loss of one of the most gifted men in the entertainment industry & his wife when the Embarrassment-in-Chief disgraces common human decency with this repulsive, deranged statement.

#NoWords 🤮
December 15, 2025 at 7:45 PM
Profiting From Exploitation: How We Found the Man Behind Two Deepfake Porn Sites #deepfake #porn
www.bellingcat.com/news/2025/12...
How We Found the Man Behind Two Deepfake Porn Sites
Business documents, website code and leaked data all led us back to one person profiting off non-consensual sexual imagery of women.
www.bellingcat.com
December 15, 2025 at 8:07 PM
What’s at stake in Trump’s executive order aiming to curb state-level AI regulation #trump #AI
theconversation.com/whats-at-sta...
What’s at stake in Trump’s executive order aiming to curb state-level AI regulation
In the absence of comprehensive federal AI regulation, states have stepped in. The Trump administration, at Big Tech’s urging, is attempting to roll back many of those laws.
theconversation.com
December 14, 2025 at 5:34 PM
An email scam is abusing abusing PayPal’s "Subscriptions" billing feature to send legitimate PayPal emails that contain fake purchase notifications embedded in the Customer service URL field. #paypal #scam
www.bleepingcomputer.com/news/securit...
Beware: PayPal subscriptions abused to send fake purchase emails
An email scam is abusing abusing PayPal's "Subscriptions" billing feature to send legitimate PayPal emails that contain fake purchase notifications embedded in the Customer service URL field.
www.bleepingcomputer.com
December 14, 2025 at 5:33 PM
More than 50 organisations report sites being restricted or removed, with abortion hotlines blocked and posts showing non-explicit nudity triggering warnings. #meta #theguardian
www.theguardian.com/global-devel...
Meta shuts down global accounts linked to abortion advice and queer content
More than 50 organisations report sites being restricted or removed, with abortion hotlines blocked and posts showing non-explicit nudity triggering warnings
www.theguardian.com
December 11, 2025 at 1:25 PM
The Eurythmics co-founder Dave Stewart has said artificial intelligence is an “unstoppable force”, and musicians and other artists should bow to the inevitable and license their music to generative AI platforms. #AI #music
www.theguardian.com/music/2025/d...
Musicians must embrace ‘unstoppable force’ of AI, Eurythmics’ Dave Stewart urges
Producer says creatives need to own their intellectual property so they can license it to generative AI platforms
www.theguardian.com
December 9, 2025 at 9:52 AM
An AI image generator startup’s database was left accessible to the open internet, revealing more than 1 million images and videos, including photos of real people who had been “nudified.” #nudified #AI
www.wired.com/story/huge-t...
Huge Trove of Nude Images Leaked by AI Image Generator Startup’s Exposed Database
An AI image generator startup’s database was left accessible to the open internet, revealing more than 1 million images and videos, including photos of real people who had been “nudified.”
www.wired.com
December 8, 2025 at 1:26 PM
A critical vulnerability affecting React Server Components (RSC) before versions 19.0.1, 19.1.2, and 19.2.1. It allows an unauthenticated remote attacker to achieve code execution when React deserialize s a malicious HTTP request at a Server Endpoint. #RSC #vulnerability
react.dev/blog/2025/12...
Critical Security Vulnerability in React Server Components – React
The library for web and native user interfaces
react.dev
December 8, 2025 at 11:50 AM
Google Threat Intelligence Group (GTIG) is tracking a long-running and adaptive cyber espionage campaign by APT24, a People's Republic of China (PRC)-nexus threat actor.
cloud.google.com/blog/topics/...
APT24's Pivot to Multi-Vector Attacks | Google Cloud Blog
PRC-nexus APT24 uses BADAUDIO malware in a persistent, multi-vector espionage campaign targeting Taiwan.
cloud.google.com
December 3, 2025 at 8:34 AM
Reposted by Peter (Cy🅱er) Lingin
December 2, 2025 at 12:15 PM
Sundar Pichai says Google will start building data centers in space, powered by the sun, in 2027. Beyond the clouds. #google #datacenters #space
www.businessinsider.com/google-proje...
Sundar Pichai says Google will start building data centers in space, powered by the sun, in 2027
Google announced Project Suncatcher earlier this month. CEO Sundar Pichai now says it could begin building data centers in space as soon as 2027.
www.businessinsider.com
December 2, 2025 at 11:34 AM
OpenAI is notifying some ChatGPT API customers that limited identifying information was exposed following a breach at its third-party analytics provider Mixpanel. #openai #chatgpt #information #exposed
www.bleepingcomputer.com/news/securit...
OpenAI discloses API customer data breach via Mixpanel vendor hack
OpenAI is notifying some ChatGPT API customers that limited identifying information was exposed following a breach at its third-party analytics provider Mixpanel.
www.bleepingcomputer.com
November 27, 2025 at 5:05 PM
Shai Hulud malware targeting NPM ecosystem strikes again.
www.aikido.dev/blog/shai-hu...
The threat actors behind Shai Hulud has struck again, hitting Zapier and Ensdomains
A new variant of Shai Hulud has hit Zapier and Ensdomains
www.aikido.dev
November 24, 2025 at 12:21 PM
Google Threat Intelligence Group (GTIG) is tracking a long-running and adaptive cyber espionage campaign by APT24, a People's Republic of China (PRC)-nexus threat actor.
cloud.google.com/blog/topics/...
APT24's Pivot to Multi-Vector Attacks | Google Cloud Blog
PRC-nexus APT24 uses BADAUDIO malware in a persistent, multi-vector espionage campaign targeting Taiwan.
cloud.google.com
November 22, 2025 at 1:43 PM
#CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with hackers after they were leaked on Telegram by the Scattered Lapsus$ Hunters threat actors.
www.bleepingcomputer.com/news/securit...
CrowdStrike catches insider feeding information to hackers
American cybersecurity firm CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with hackers after they were leaked on Telegram by the Scattered Lapsus$ Hunters thre...
www.bleepingcomputer.com
November 21, 2025 at 6:52 PM
GreyNoise has begun seeing active exploitation of CVE‑2025‑64446, the critical path‑traversal flaw that lets an unauthenticated actor run administrative commands on Fortinet FortiWeb appliances. #fortinet #vulnerability
www.greynoise.io/blog/fortiwe...
FortiWeb CVE‑2025‑64446: What We’re Seeing in the Wild
GreyNoise has begun seeing active exploitation of CVE‑2025‑64446, the critical path‑traversal flaw that lets an unauthenticated actor run administrative commands on Fortinet FortiWeb appliances.
www.greynoise.io
November 21, 2025 at 8:07 AM
The Sneaky2FA phishing-as-a-service (PhaaS) kit has added browser-in-the-browser (BitB) capabilities that are used in attacks to steal Microsoft credentials and active sessions.
www.bleepingcomputer.com/news/securit...
Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack
Sneaky2FA, a popular among cybercriminals phishing-as-a-service (PhaaS) kit, has added Browser-in-the-Browser (BitB) capabilities, giving "customers" the option to launch highly deceptive attacks.
www.bleepingcomputer.com
November 20, 2025 at 9:05 AM
#Microsoft announced that it will integrate #Sysmon natively into #Windows 11 and Windows Server 2025 next year, making it unnecessary to deploy the standalone Sysinternals tools.
www.bleepingcomputer.com/news/microso...
Microsoft to integrate Sysmon directly into Windows 11, Server 2025
Microsoft announced today that it will integrate Sysmon natively into Windows 11 and Windows Server 2025 next year, making it unnecessary to deploy the standalone Sysinternals tools.
www.bleepingcomputer.com
November 19, 2025 at 7:59 AM
Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. #iran #hacking
thehackernews.com/2025/11/iran...
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
UNC1549 uses phishing, third-party breaches, and custom backdoors to infiltrate aerospace, telecom, and defense networks.
thehackernews.com
November 18, 2025 at 2:59 PM
AI-Powered Teddy Bear Caught Talking About Sexual Fetishes and Instructing Kids How to Find Knives. Let kids come to me... #bear #fetish #AI #kids
gizmodo.com/ai-powered-t...
AI-Powered Teddy Bear Caught Talking About Sexual Fetishes and Instructing Kids How to Find Knives
OpenAI blocked access for the toymaker following the incidents.
gizmodo.com
November 18, 2025 at 8:24 AM
Seven packages published on the Node Package Manager (npm) registry use the Adspect cloud-based service to separate researchers from potential victims and lead them to malicious locations. #npm #malicious #package
socket.dev/blog/npm-mal...
npm Malware Campaign Uses Adspect Cloaking to Deliver Malici...
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.
socket.dev
November 18, 2025 at 7:54 AM
Why Signal’s post-quantum makeover is an amazing engineering achievement #signal #postquantum #encryption
arstechnica.com/security/202...
Why Signal’s post-quantum makeover is an amazing engineering achievement
New design sets a high standard for post-quantum readiness.
arstechnica.com
November 16, 2025 at 7:32 PM
#Europol: end of the game for cybercrime infrastructure: 1025 servers taken down. Operation Endgame’s latest phase targeted the infostealer Rhadamanthys, Remote Access Trojan VenomRAT, and the botnet Elysium.
www.europol.europa.eu/media-press/...
End of the game for cybercrime infrastructure: 1025 servers taken down – Operation Endgame’s latest phase targeted the infostealer Rhadamanthys, Remote Access Trojan VenomRAT, and the botnet Elysium |...
Between 10 and 14 November 2025, the latest phase of Operation Endgame was coordinated from Europol’s headquarters in The Hague. The actions targeted one of the biggest infostealers (Rhadamanthys), th...
www.europol.europa.eu
November 13, 2025 at 6:11 PM
The Washington Post is notifying nearly 10,000 employees and contractors that some of their personal and financial data has been exposed in the Oracle data theft attack. #oracle #datatheft
www.bleepingcomputer.com/news/securit...
Washington Post data breach impacts nearly 10K employees, contractors
The Washington Post is notifying nearly 10,000 employees and contractors that some of their personal and financial data has been exposed in the Oracle data theft attack.
www.bleepingcomputer.com
November 13, 2025 at 5:29 PM