Cyber Corgi
banner
konakoffee.bsky.social
Cyber Corgi
@konakoffee.bsky.social
I post a lot of cyber, defense, and Intel stuff, and you should be impressed because I do that without opposable thumbs.
Reposted by Cyber Corgi
YARA-X 1.10.1 Release: Hash Function Warnings https://isc.sans.edu/diary/32616
January 11, 2026 at 11:10 AM
Reposted by Cyber Corgi
Waymo would not say how many of its SF Bay Area robotaxis stalled out and contributed to or caused gridlock during the massive PG&E blackouts recently because their lawyer claimed that...is considered a trade secret www.sfchronicle.com/sf/article/w... <-- by SF Chronicle's Rachel Swan
Waymo scolded by judge after robotaxi company refuses to discuss details from power outage
A judge scolded Waymo during an administrative rules proceeding after the company refused to disclose how many of its robotaxis had stalled during a power outage in San Francisco.
www.sfchronicle.com
January 10, 2026 at 11:05 PM
Reposted by Cyber Corgi
Italy's communications watchdog has fined Cloudflare €14 million for refusing to block piracy sites on its free 1.1.1.1 DNS service

torrentfreak.com/italy-fines-...
Italy Fines Cloudflare €14 Million for Refusing to Filter Pirate Sites on Public 1.1.1.1 DNS * TorrentFreak
AGCOM issued a record-breaking €14.2 million fine on Cloudflare after the company failed to implement the required piracy blocking measures.
torrentfreak.com
January 11, 2026 at 2:42 PM
Reposted by Cyber Corgi
watchTowr has published a technical analysis of a CVSS 10 pre-auth RCE vulnerability in SmartTool's SmarterMail business email platform.

The vulnerability (CVE-2025-52691) was silently patched in Oct and publicly disclosed only a few months later in Dec

labs.watchtowr.com/do-smart-peo...
Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691)
Welcome to 2026! While we are all waiting for the scheduled SSLVPN ITW exploitation programming that occurs every January, we’re back from Christmas and idle hands, idle minds, yada yada. In Decembe...
labs.watchtowr.com
January 11, 2026 at 2:44 PM
Reposted by Cyber Corgi
Today, in a message shared w me from a law-enforcement-only forum, a sheriff’s detective says he was tasked with monitoring OSINT ahead of an ICE protest and is crowdsourcing activist “groups and specific channels” to track from other cops nationwide

Local protests, national surveillance networks
January 11, 2026 at 2:33 AM
Reposted by Cyber Corgi
New scrape: Instagram allegedly had 17M rows of largely public data scraped from an API and posted to a hacking forum this week. 6.2M rows also included an email address, and some rows a phone number. 100% were already in @haveibeenpwned.com. Read more: haveibeenpwned.com/Breach/Insta...
Have I Been Pwned: Instagram Data Breach
In January 2026, data allegedly scraped via an Instagram API was posted to a popular hacking forum. The dataset contained 17M rows of public Instagram information, including usernames, display names, ...
haveibeenpwned.com
January 11, 2026 at 5:03 PM
Reposted by Cyber Corgi
Note that the sudden rise in "nudification" is not an advance in the tech itself, it's a design choice by Musk / xAI.

LMMs trained with nude images have been able to do this for years; Grok is the first time a major company has chosen to enhance this functionality for users rather than restrict it.
The “put her in a bikini” trend began quietly at the end of last year before exploding at the start of 2026. Within days, hundreds of thousands of requests were being made to the Grok chatbot, asking it to strip the clothes from photographs of women.
‘Add blood, forced smile’: how Grok’s nudification tool went viral
The ‘put her in a bikini’ trend rapidly evolved into hundreds of thousands of requests to strip clothes from photos of women, horrifying those targeted
www.theguardian.com
January 11, 2026 at 7:08 PM
Reposted by Cyber Corgi
-Apex Legends streamers hacked again
-Major Instagram leak
-Indonesia blocks Twitter
-OldGremlins ransomware suspect detained in Russia
-Armenia denies, but confirms, hack
-Two more Russian ISPs wiped by Ukrainian hackers

Newsletter: news.risky.biz/risky-bullet...
Podcast: risky.biz/RBNEWS511/
January 11, 2026 at 10:47 PM
Reposted by Cyber Corgi
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches
https://isc.sans.edu/podcastdetail/9762
January 12, 2026 at 5:35 AM
Reposted by Cyber Corgi
Malaysia and Indonesia become the first countries to block Grok, the artificial intelligence chatbot developed by Elon Musk’s xAI, after authorities said it was being misused to generate sexually explicit and non-consensual images.
Malaysia, Indonesia become first to block Musk’s Grok over AI deepfakes
Malaysia and Indonesia have blocked access to Elon Musk's AI chatbot Grok due to its misuse in generating explicit images.
bit.ly
January 12, 2026 at 6:30 AM
Reposted by Cyber Corgi
New: we've obtained material explaining how an ICE surveillance system, called Webloc, works. Draw shape on a map, see all phones available there, follow them home. All without warrant

“This is a very dangerous tool in the hands of an out-of-control agency.” www.404media.co/inside-ices-...
Inside ICE’s Tool to Monitor Phones in Entire Neighborhoods
404 Media has obtained material that explains how Tangles and Webloc, two surveillance systems ICE recently purchased, work. Webloc can track phones without a warrant and follow their owners home or t...
www.404media.co
January 8, 2026 at 2:03 PM
Reposted by Cyber Corgi
Two NSA senior leaders are being assigned to run the agency's cybersecurity directorate in an acting capacity as the Trump administration's pick to lead the NSA and Cyber Command makes his way through the confirmation process therecord.media/nsa-cyber-di...
NSA cyber directorate gets new acting leadership
David Imbordino, a NSA senior executive who is currently serving as the directorate’s deputy chief, will take the reins in an acting capacity at the end of the month.
therecord.media
January 8, 2026 at 3:14 PM
Reposted by Cyber Corgi
NEW

Social media is being flooded with AI-altered images claiming to "unmask" the ICE agent involved in yesterday's shooting in Minnesota.

AI cannot do this, but people are already sharing names of people they believe are the shooter.

www.wired.com/story/people...
People Are Using AI to Falsely Identify the Federal Agent Who Shot Renee Good
Online detectives are inaccurately claiming to have identified the federal agent who shot and killed a 37-year-old woman in Minnesota based on AI-manipulated images.
www.wired.com
January 8, 2026 at 4:47 PM
Reposted by Cyber Corgi
GreyNoise analyzed activity targeting exposed Ollama and LLM infrastructure, identifying SSRF abuse attempts and large-scale probing of LLM model endpoints.
#GreyNoise #ThreatIntelligence #LLMSecurity
Threat Actors Actively Targeting LLMs
Our Ollama honeypot infrastructure captured 91,403 attack sessions between October 2025 and January 2026. Buried in that data: two distinct campaigns that reveal how threat actors are systematically m...
www.greynoise.io
January 8, 2026 at 7:58 PM
Reposted by Cyber Corgi
The State of Texas has obtained a temporary restraining order (TRO) against Samsung that prohibits the South Korean company from collecting audio and visual data about what Texas consumers are watching on their TVs.
Texas court blocks Samsung from collecting smart TV viewing data
The State of Texas has obtained a temporary restraining order (TRO) against Samsung that prohibits the South Korean company from collecting audio and visual data about what Texas consumers are watching on their TVs.
www.bleepingcomputer.com
January 8, 2026 at 4:47 PM
Reposted by Cyber Corgi
Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit that seems to have been developed more than a year before the targeted vulnerabilities became publicly known.
VMware ESXi zero-days likely exploited a year before disclosure
Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit that seems to have been developed more than a year before the targeted vulnerabilities became publicly known.
www.bleepingcomputer.com
January 8, 2026 at 9:27 PM
Reposted by Cyber Corgi
NEW: NSO Group has released a transparency report that is even less transparent than its own previous transparency reports, as it contains no data or information on customers at all.

Experts say the report is just an attempt to appease and push the U.S. government to be removed from a blocklist.
Critics pan spyware maker NSO's transparency claims amid its push to enter US market | TechCrunch
The infamous spyware maker released a new transparency report claiming to be a responsible spyware maker, without providing insight into how the company dealt with problematic customers in the past.
techcrunch.com
January 8, 2026 at 7:17 PM
Reposted by Cyber Corgi
I reached out to more than three dozen X advertisers, xAI investors, politicians, and government agencies about the growing library of sexualized deepfakes generated with Grok—now including Renee Good. I only heard back from four, with three declining to comment.
spitfirenews.com/p/grok-deepf...
Why isn't there a bigger Grok boycott?
Advertisers, politicians, and investors are still all-in on X, despite a sexual abuse crisis.
spitfirenews.com
January 8, 2026 at 9:04 PM
Reposted by Cyber Corgi
Every time there are widespread protests in Iran, the regime shuts down the internet. This time is no different.

Preciously, shutdowns have stopped people organising and protesting, limited information sharing, and helped to cover up brutal law enforcement actions
As of 18:45 UTC (10:15 PM local), traffic to Iran has stopped as the country has completely severed itself from the global internet.
January 8, 2026 at 8:59 PM
Reposted by Cyber Corgi
A sophisticated threat actor that uses Linux-based malware to target telecommunications providers has recently broadened its operations to include organizations in Southeastern Europe.
New China-linked hackers breach telcos using edge device exploits
A sophisticated threat actor that uses Linux-based malware to target telecommunications providers has recently broadened its operations to include organizations in Southeastern Europe.
www.bleepingcomputer.com
January 8, 2026 at 11:39 PM
Reposted by Cyber Corgi
I just want to call what I am doing here “tweeting” and “retweeting” and I think I’ll start and it’ll be an adorable little eccentric affectation that starts a movement to reclaim the verbiage
January 8, 2026 at 11:41 PM
Reposted by Cyber Corgi
New, by me:

Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we’ll dig through digital clues left […]

[Original post on infosec.exchange]
January 8, 2026 at 11:45 PM
Reposted by Cyber Corgi
The Conscience of a Hacker, also known as The Hacker Manifesto, turns 40 today!

Written by Loyd "The Mentor" Blankenship, its spirit still resonates with hackers and makers everywhere. A cornerstone of hacker culture.

phrack.org/issues/7/3

#HackThePlanet #HackerManifesto
January 8, 2026 at 10:11 PM