Gertrude
baly56.bsky.social
Gertrude
@baly56.bsky.social
“It's a universal law - intolerance is the first sign of an inadequate education. An ill-educated person behaves with arrogant impatience, whereas truly profound education breeds humility.”

Aleksandr Solzhenitsyn
Lots of crummy news and some hopeful information coming out about the country’s insanity.

This has nothing to do with the above. Been using iPhone since first # 1 and I’m used to most general things, ways, and jargon, but this confusion of app prices is no bueno. Help?!? Maybe explain difference?!
February 13, 2026 at 2:31 PM
Can’t say this enough times. When I was a child there wasn’t a vaccine—-NONE.

I developed a secondary bacterial infection of sepsis. My mother reacted quickly o& I survived by a hair. Something should be done like this article to let non-experts screw with your child’s life.
This Is How a Child Dies of Measles — The Atlantic
When your family becomes a data point in an outbreak
apple.news
February 12, 2026 at 11:30 PM
Reposted by Gertrude
Reflector telescopes mirrors large aperture affordable deep sky galaxies nebulae - To know what Webb discovered today, visit https://www.jameswebbdiscovery.com and Explore Universe with this beginners telescope --> https://amzn.to/3JaxN9u #Astronomy #AmazonAffiliate #NASA #Space
Types of Telescopes: Comprehensive Guide by Telescope Advisor
Learn about different types of telescopes including refractors, reflectors, and compound telescopes. Expert advice to help you choose the right one for stargazing and astronomy.
www.telescopeadvisor.com
February 11, 2026 at 3:17 AM
Reposted by Gertrude
New funding call supporting research on diagnostic biomarkers for frontotemporal lobar degeneration, aiming to improve earlier diagnosis, care pathways, and treatment development. Letter of Intent due 6 March 2026.

www.dementiaresearcher.nihr.ac.uk/funding/ftd-...
FTD Diagnostic Biomarkers Initiative - DEMENTIA RESEARCHER
Funding supports research on biomarkers for frontotemporal lobar degeneration to improve diagnosis, care, and treatment. Letter of Intent due 6 March 2026.
www.dementiaresearcher.nihr.ac.uk
February 9, 2026 at 10:15 PM
Reposted by Gertrude
Fun fact 🏴‍☠️ 🦜 The main character in these pirate books I illustrated is inspired by the author, Keith Carson! He’s Captain Kidd in the stories and in real-life, a living legend. ⚓️✨ Get these books books & more at bookaneers.org/library/
For my Floridian friends, check out his book signings!
February 7, 2026 at 2:24 AM
Reposted by Gertrude
A cyberespionage operation compromised 37 governments worldwide
A cyberespionage operation compromised 37 governments worldwide - INCYBER NEWS
According to Palo Alto Networks, the threat actor, of Asian origin, carried out the largest state-sponsored campaign since SolarWinds.
incyber.org
February 6, 2026 at 2:37 PM
Reposted by Gertrude
Substack warns customers of data breach following hacker’s dark web claims
Substack warns customers of data breach following hacker’s dark web claims
Customers of the newsletter platform Substack were notified on Wednesday of a breach, following a hacker's claims on the dark web of a trove of stolen data.
therecord.media
February 5, 2026 at 3:37 PM
Reposted by Gertrude
Update 2/5/2026 11:30am. Sorry, no captions
February 5, 2026 at 4:42 PM
Reposted by Gertrude
🤔
February 6, 2026 at 2:31 AM
Reposted by Gertrude
If You Get This Amazon Product Recall Message, It’s An Attack
If You Get This Amazon Product Recall Message, It’s An Attack
Delete this message immediately — your Amazon account is under attack.
www.forbes.com
February 5, 2026 at 12:31 PM
Reposted by Gertrude
Spam Campaign Distributes Fake PDFs, Installing Remote Monitoring Tools for Persistent Access
Spam Campaign Distributes Fake PDFs, Installing Remote Monitoring Tools for Persistent Access
Security teams have discovered an active spam campaign that uses fake PDF documents to trick users into installing remote monitoring and management (RMM) software. The campaign targets organizations by sending emails containing PDF attachments that appear to be invoices, receipts, or important documents. When victims open these files, they see a message claiming the document failed to load. The PDF then directs users to click a link to view the content through what appears to be an Adobe Acrobat download page. This attack method is effective because it uses legitimate software rather than traditional malware. RMM tools are commonly used by IT teams to manage computers remotely. When installed by attackers, these same tools provide full control over victim systems. The software is digitally signed and trusted by most antivirus programs , allowing it to bypass standard security controls. SpiderLabs researchers noted that attackers are distributing these malicious PDF documents through ongoing spam operations. #MalspamAlert : An ongoing spam campaign distributes PDF documents that tricks users into visiting fake Adobe Acrobat download page. Instead of legitimate software, victims install remote monitoring and management (RMM) tools that provide threat actors persistent remote access to… pic.twitter.com/8knYhzjjhS — SpiderLabs (@SpiderLabs) February 5, 2026 Instead of downloading actual Adobe software, victims install RMM tools that give threat actors persistent remote access to their systems. By abusing trusted RMM software, attackers can blend in with normal IT activity while maintaining long-term access to compromised networks. The campaign uses PDF attachments with urgent-sounding names like “Invoice_Details.pdf” or “Defective_Product_Order.pdf” to create a sense of urgency. Victims believe they need to download software to view important documents, but they are actually installing remote access tools controlled by attackers. Infection Chain and Persistence Tactics The infection process begins when a victim receives an email with a PDF attachment. Opening the document shows a fake error message stating the content cannot be displayed. Users are then prompted to click a link, which leads to a page impersonating Adobe. This page hosts installers for RMM software such as ScreenConnect , Syncro, NinjaOne, and SuperOps. Once executed, the installer silently deploys the RMM agent on the victim’s computer. The tool immediately connects to servers controlled by attackers, granting them full remote access. Attackers can then view the screen in real time, control the mouse and keyboard, transfer files, and maintain access even after system restarts. Because these tools are designed for legitimate IT management, security software rarely flags them as threats. Organizations should restrict the download and installation of any RMM tools not approved by their IT departments. Deploying endpoint detection and response solutions can help identify unauthorized remote access software. Training employees to recognize phishing emails and suspicious PDF documents remains essential for preventing initial compromise. Security teams should also monitor network traffic for connections to unexpected RMM servers and block known malicious domains associated with these campaigns. Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post Spam Campaign Distributes Fake PDFs, Installing Remote Monitoring Tools for Persistent Access appeared first on Cyber Security News .
cybersecuritynews.com
February 6, 2026 at 6:52 AM
If violated before or never violated—it’s time to support the women and men who were abused as young children and teens.
Period.
February 5, 2026 at 12:52 PM
Always wonder if their loved ones or parents were shot in the same manner would it feel the same as they beat their chest bragging on attempted murder?
Gestapos opened fire, striking Martinez 5 times in the arm, chest & both legs

1 gestapo had body cam ... Martinez has said in court that it shows an officer shouting "do something b--"

The gestapo who shot her, in a group text: "I fired 5 rounds & she had 7 holes. Put that in your book, boys."
'My own government attempted to execute me,' Chicago woman shot by Border Patrol testifies
Marimar Martinez said she believes that she survived her encounter with Border Patrol agents so she could share her story.
www.yahoo.com
February 5, 2026 at 12:38 PM
Reposted by Gertrude
Annie Turnbo Malone, American chemist, inventor, businesswoman, philanthropist. Early Af-Am wmn millionaire; hair care/beauty supply entrepreneur. Founder, developer, of a prominent commercial cosmetics enterprise for blk wmn(1900s-20s) #womenshistory #WomenInSTEM #BlackHistoryMonth #ChemSky #SciSky
February 4, 2026 at 2:17 PM
Reposted by Gertrude
Sheffield Institute for Translational Neuroscience at the University of Sheffield is hiring a Postdoctoral Research Associate to study neurodegeneration using motor neuron, astrocyte and muscle co cultures.

www.dementiaresearcher.nihr.ac.uk/job/research...
Research Associate: MND Disease Modelling
Sheffield Institute for Translational Neuroscience, University of Sheffield, UK, seeks a Postdoctoral Research Associate for motor neuron co culture models.
www.dementiaresearcher.nihr.ac.uk
February 5, 2026 at 8:20 AM
Reposted by Gertrude
Microsoft releases urgent Office patch. Russian-state hackers pounce.
Microsoft releases urgent Office patch. Russian-state hackers pounce.
The window to patch vulnerabilities is shrinking rapidly.
arstechnica.com
February 5, 2026 at 3:11 AM
Reposted by Gertrude
Postdoctoral Researcher role at VIB UAntwerp Center for Molecular Neurology. Work on computational genomics and multi omics datasets to advance Alzheimer’s genetics research. Closing date: 2nd April

www.dementiaresearcher.nihr.ac.uk/job/postdoc-...
Postdoc Researcher: Computational Genomics of Alzheimer’s
VIB UAntwerp Center for Molecular Neurology seeks a Postdoctoral Researcher in computational genomics to study Alzheimer’s genetics using multi omics data.
www.dementiaresearcher.nihr.ac.uk
February 3, 2026 at 10:31 AM
Reposted by Gertrude
Please join us for an introduction to #CDR startup accelerators! We've got a great panel lined up, with Tito Jankowski from AirMiners Launchpad, Mica Taborga Claure from Marble venture studio, and Marian Krueger of remove. Register here: luma.com/mxsdp8xm #energysky #carbonremoval
February 3, 2026 at 5:51 PM
Where are the GOP in the hearing on the use of violence from ICE to citizens?

Currently recovering from a serious illness and guess missed something—sincerely wondering.

Were they invited? Ashamed? Supporting violence? Apathetic? Scared? Immoral?
@jenpsaki.bsky.social
@maddow.bsky.social
February 4, 2026 at 1:08 AM
Tired of wealthy worship. Really tired.
Privilege, abuses, dereliction of taxes, entitlement, etc… It’s just how I feel.

This read below says a lot about more wealth tenacity in projection. They want only the lower socioeconomic groups to be the only villains.

Hotel for wealthy-child abusers.
www.wric.com
February 3, 2026 at 5:31 PM
My guess he’s busted. Everyone knows he lives in Santa Rosa in Florida. Great research topic for the press!
www.al.com
February 3, 2026 at 12:27 AM
Reposted by Gertrude
Reposted by Gertrude
Here’s how I hand dye yarn for all my knitters and crocheters
February 2, 2026 at 2:27 PM
Have half sisters living in Texas (did not grow up together)and are big GOP supporters.

No problem with their choices —respect their votes— they support mine.

Now I haven’t spoken to one sibling who has a grown son, his wife, and two grandchildren—all Latino —wonder now she feels now?
February 1, 2026 at 11:29 AM