/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Tal Be'ery

@talbeerysec
19 posts
2026-02-13
Russia 🇷🇺 fully blocked @WhatsApp but is only throttling @telegram. That says a lot about which one is harder for them to surveil.
2026-02-13 View on X
Reuters

Russia confirms it has blocked WhatsApp, citing Meta's “unwillingness to comply with Russian law”, and proposes that Russians switch to the state-owned Max app

U.S. messenger app WhatsApp, owned by Meta Platforms (META.O), has been completely blocked in Russia for failing …

2026-01-28
Better later than never! Back in 2024, I predicted @WhatsApp would implement a lockdown mode because it's such a no-brainer. https://medium.com/... Can't wait to test it! [image]
2026-01-28 View on X
Reuters

WhatsApp launches Strict Account Settings, a high-security mode to protect high-risk users like journalists and public figures from sophisticated cyberattacks

Meta's WhatsApp messaging service is offering users an advanced security mode, joining a growing number of U.S. tech firms …

2025-11-08
1/ Vendor dependent (in this caseciOS/ Samsung) exploits delivered via @WhatsApp, highlights the importance of fixing WhatsApp privacy vulns leaking such data. Just like the one we recently reported [video]
2025-11-08 View on X
The Record

Unit 42: “commercial grade” spyware called Landfall, likely zero-click, was used in a hacking campaign aimed at Samsung Galaxy phones in the Middle East

Security researchers on Friday revealed the discovery of “commercial grade” spyware used in a 9-month-long hacking campaign aimed …

2025-10-23
prompt injections, the final frontier [image]
2025-10-23 View on X
@cryps1s

OpenAI CISO Dane Stuckey outlines prompt injection mitigations in ChatGPT Atlas, including a “logged out mode” that blocks agent access to user credentials

Yesterday we launched ChatGPT Atlas, our new web browser. In Atlas, ChatGPT agent can get things done for you. We're excited to see how this feature makes work and day-to-day life ...

2025-06-19
1/ Our @ZenGo analysis of the recent Iranian exchange hack. The address to which the attackers sent the funds contained 2 messages A blunt one ("Fuck iRGC Terrorists NoBiTEX") and a subtle one (" We don't care for the money") [image]
2025-06-19 View on X
TechCrunch

Nobitex, Iran's largest crypto exchange, says it was hacked, and pro-Israel group Predatory Sparrow takes credit; Elliptic: the hackers stole and “burned” $90M+

Iran's largest crypto exchange, Nobitex, said Wednesday that it was hacked and funds have been drained from its hot wallet.

2025-06-18
The Predatory Sparrow group just burned $47M of cryptocurrency taken from Iran Nobitex exchange into the BURNER address TKFuckiRGCTerroristsNoBiTEXy2r7mNX Why is it a burner 👇
2025-06-18 View on X
CyberScoop

A cyberattack claimed by pro-Israel hacktivist group Predatory Sparrow has reportedly disrupted services at Iran's state-owned Bank Sepah, including its website

The attack introduces a clear cyber element with immediate consequences for the country's critical infrastructure amid a growing conflict between Israel and Iran.

2025-04-16
Unpopular(?) opinion: CVE project requires an overhaul. Some examples: Not dealing with cloud where much of the action happens is a mistake (see https://www.cloudvulndb.org/) Website has 90s look & feel. I hope CVE will find a new home that will rejuvenate it.
2025-04-16 View on X
BleepingComputer

CISA says it will extend funding to Mitre, which runs the CVE Program, and “there will be no lapse in critical CVE services”, after Mitre said funding expired

CISA says the U.S. government has extended MITRE's funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.

2025-03-09
A few interesting details from @Mandiant report on @safe wallet hack leading to @Bybit_Official breach. 1. The initial access seems to be a social engineering a developer to “help” with a Docker FinTech project, as described by @SlowMist_Team @im23pds [image]
2025-03-09 View on X
New York Times

Source: Bybit hackers planted malicious code to manipulate transactions by compromising a developer's computer at crypto wallet provider Safe, used by Bybit

On the night of Feb. 21, Ben Zhou, the chief executive of the cryptocurrency exchange Bybit, logged on to his computer to approve what appeared to be a routine transaction.

A simplified flowchart of the ByBit Heist: 1. Attackers infects a Safe{wallet} Dev machine with malware, 2. Rides its session to change wallet website, 3. Changed website offer malicious Tx to ByBit signers, 4. which transfer ownership to attackers. 5. Attackers withdraws $1.5B [image]
2025-03-09 View on X
New York Times

Source: Bybit hackers planted malicious code to manipulate transactions by compromising a developer's computer at crypto wallet provider Safe, used by Bybit

On the night of Feb. 21, Ben Zhou, the chief executive of the cryptocurrency exchange Bybit, logged on to his computer to approve what appeared to be a routine transaction.

2025-03-08
A few interesting details from @Mandiant report on @safe wallet hack leading to @Bybit_Official breach. 1. The initial access seems to be a social engineering a developer to “help” with a Docker FinTech project, as described by @SlowMist_Team @im23pds [image]
2025-03-08 View on X
New York Times

Source: Bybit hackers planted malicious code to manipulate transactions by compromising a developer's computer at crypto wallet provider Safe, used by Bybit

On the night of Feb. 21, Ben Zhou, the chief executive of the cryptocurrency exchange Bybit, logged on to his computer to approve what appeared to be a routine transaction.

A simplified flowchart of the ByBit Heist: 1. Attackers infects a Safe{wallet} Dev machine with malware, 2. Rides its session to change wallet website, 3. Changed website offer malicious Tx to ByBit signers, 4. which transfer ownership to attackers. 5. Attackers withdraws $1.5B [image]
2025-03-08 View on X
New York Times

Source: Bybit hackers planted malicious code to manipulate transactions by compromising a developer's computer at crypto wallet provider Safe, used by Bybit

On the night of Feb. 21, Ben Zhou, the chief executive of the cryptocurrency exchange Bybit, logged on to his computer to approve what appeared to be a routine transaction.

2024-06-29
“If you can spend millions of dollars in a few seconds or a few minutes, then that's a pretty good indication you probably don't have enough layers of security around those assets” says @lopp That's how it will be solved @ZenGo #soon [image]
2024-06-29 View on X
Wired

Filings and DOJ officials describe how a gang threatened, assaulted, and tortured 11 victims in likely the worst crypto-focused serial extortion case in the US

More than a dozen men threatened, assaulted, tortured, or kidnapped 11 victims in likely the worst-ever crypto-focused serial extortion case of its kind in the US.

2024-02-21
1/ Not having a “strong” identifier in Signal is an important step for privacy. It also highlights the importance of IM E2EE identifiers: the user and device public keys. More over, to verify other party's public key, users need to use 3rd party channel which hinders privacy [image]
2024-02-21 View on X
Wired

Messaging app Signal finally rolls out usernames in beta, letting users conceal their phone numbers; Signal still requires inputting a phone number to register

We tested the end-to-end encrypted messenger's new feature aimed at addressing critics' most persistent complaint.  Here's how it works.

2023-11-15
The list of vulnerable implementations is not telling the full story. Even if the project is dead, seed phrases created with such are still as much vulnerable even if used within modern wallets. Users of such need to move their funds ASAP! https://www.unciphered.com/... [image]
2023-11-15 View on X
Washington Post

Unciphered, which helps recover cryptocurrency, finds a BitcoinJS flaw in some wallets made before 2016, and says that up to $1B of crypto is at risk of theft

At least we are making progress with entropy failures. Instead of your usual Mersenne Twister 32 bit fail, we have now ~48 bit old javascript Math.random() fails 🤦 good Job @uncipheredLLC for discovering that https://www.unciphered.com/... [image]
2023-11-15 View on X
Washington Post

Unciphered, which helps recover cryptocurrency, finds a BitcoinJS flaw in some wallets made before 2016, and says that up to $1B of crypto is at risk of theft

2023-06-23
1/ #malware's final payload is probably the LEAST interesting part to analyze, as it is “just engineering” The real “juice” (vulns etc.) will be in the first stages, therefore the real news is that @kaspersky has caught them and will publish their analysis in future. https://twitter.com/... [image]
2023-06-23 View on X
BleepingComputer

Apple patches three zero-days in macOS, iOS, iPadOS, and watchOS, exploited by the Triangulation iMessage spyware reported by Kaspersky earlier in June 2023

https://www.macrumors.com/... Twitter: Daniel Monastersky / @identidadrobada : Apple fixes software flaws behind hacks that Russia blamed on the United States - The Washington Post...

2023-06-22
1/ #malware's final payload is probably the LEAST interesting part to analyze, as it is “just engineering” The real “juice” (vulns etc.) will be in the first stages, therefore the real news is that @kaspersky has caught them and will publish their analysis in future. https://twitter.com/... [image]
2023-06-22 View on X
BleepingComputer

Apple patches three zero-days in macOS, iOS, iPadOS, and watchOS, exploited by the Triangulation iMessage spyware reported by Kaspersky earlier in June 2023

Apple addressed three new zero-day vulnerabilities exploited in attacks installing Triangulation spyware on iPhones via iMessage zero-click exploits.

2021-04-07
Hi @moxie, how will @signalapp protect its users private key (against both theft and loss)? Maybe take a look at the recent work of @ZenGo @OmerShlomovits turning the Signal network into generic MPC network https://medium.com/... https://twitter.com/...
2021-04-07 View on X
Wired

Signal says it has added support for privacy-focused cryptocurrency MobileCoin to let users send and receive money, starting in the UK on iOS and Android

Testing your first payment  —  Sending your first payment Bruce Schneier / Schneier on Security : Signal Adds Cryptocurrency Support Stephen Diehl : Et tu, Signal? Liam Tung / ZDNe...

2020-08-08
1/ Skeleton Key attacks in the wild. See our (+@ItaiGrady) 2015 talk, explaining the attack and describing detection methods. CC: @PyroTek3 @gentilkiwi @JohnLaTwC @cyb3rops https://www.slideshare.net/... https://twitter.com/... https://twitter.com/...
2020-08-08 View on X
Wired

Researchers: China's state-sponsored hackers stole source code, SDKs, and chip designs from at least seven Taiwanese chip companies over the past two years

Andy Greenberg / Wired : Tweets: @carlzha , @__winn , @hatr , @talbeerysec , @780thc , @heguisen , and @a_greenberg Tweets: Carl Zha / @carlzha : Idk if story is true but if US pl...