Wim Vandebroeck (@wim_vdb) 's Twitter Profile
Wim Vandebroeck

@wim_vdb

Technology consultant with more than 18 years’ experience in bringing to market new solutions. #storage #cloud #Virtualization #automation #security

ID: 1390332986

calendar_today29-04-2013 19:53:01

607 Tweet

164 Followers

579 Following

International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

‼️ Scattered LAPSUS$ Hunters and Crimson Collective uploaded samples of the Red Hat breach. We reviewed the files, and it's serious. These documents show information on organizations that is very sensitive, we would mark these files as confidential.

‼️ Scattered LAPSUS$ Hunters and Crimson Collective uploaded samples of the Red Hat breach.

We reviewed the files, and it's serious. These documents show information on organizations that is very sensitive, we would mark these files as confidential.
FalconFeeds.io (@falconfeedsio) 's Twitter Profile Photo

🚨 Scattered Spider’s New Playbook — Insider Recruitment & Access Marketplace The group has moved from chaotic data leaks to an organized cybercrime model. They’re now: 🔸 Recruiting employees and insiders in telecom, SaaS, gaming, and hosting firms (US/UK/AU/CA/FR). 🔸

🚨 Scattered Spider’s New Playbook — Insider Recruitment & Access Marketplace

The group has moved from chaotic data leaks to an organized cybercrime model.

They’re now:
🔸 Recruiting employees and insiders in telecom, SaaS, gaming, and hosting firms (US/UK/AU/CA/FR).
🔸
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

#USA 🇺🇸 - Oracle has patched a critical zero-day (CVE−2025−61882) exploited by Cl0p, while another group, Scattered LAPSUS$ Hunters, now claims the exploit was originally theirs. dailydarkweb.net/oracle-patches…

#USA 🇺🇸 - Oracle has patched a critical zero-day (CVE−2025−61882) exploited by Cl0p, while another group, Scattered LAPSUS$ Hunters, now claims the exploit was originally theirs. dailydarkweb.net/oracle-patches…
mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

How do criminals hack in? They log in? How do they do that? with valid credentials... Commonly obtained via Phishing and malware (info stealers) and data breaches (e.g. third party sites where creds have been re-used etc.)

How do criminals hack in? They log in?

How do they do that? with valid credentials...

Commonly obtained via Phishing and malware (info stealers) and data breaches (e.g. third party sites where creds have been re-used etc.)
HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨Cyber Alert‼️ 🇺🇸USA - F5 In August 2025, a nation-state threat actor gained long-term access to F5 Networks’ systems, exfiltrating BIG-IP source code and details on undisclosed vulnerabilities. Some customer configuration data was also taken. No access to financial, CRM, or

🚨Cyber Alert‼️

🇺🇸USA - F5

In August 2025, a nation-state threat actor gained long-term access to F5 Networks’ systems, exfiltrating BIG-IP source code and details on undisclosed vulnerabilities.

Some customer configuration data was also taken. No access to financial, CRM, or
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Over 266,000 F5 BIG-IP instances exposed to remote attacks - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

WarTranslated (@wartranslated) 's Twitter Profile Photo

Russian FSB-controlled state messenger MAX likely hacked, 46.2 million data rows stolen, hacker posted sample rows from database on dark web.

Russian FSB-controlled state messenger MAX likely hacked, 46.2 million data rows stolen, hacker posted sample rows from database on dark web.
HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨Cyber Alert‼️ Windows Zero-Day Exploit Actively Abused in Diplomatic Attacks. No Patch Available Yet Chinese group UNC6384 exploited an unpatched Windows zero-day (CVE-2025-9491) to target EU diplomats via spearphishing in September–October 2025. Victims downloaded fake

🚨Cyber Alert‼️

Windows Zero-Day Exploit Actively Abused in Diplomatic Attacks. No Patch Available Yet

Chinese group UNC6384 exploited an unpatched Windows zero-day (CVE-2025-9491) to target EU diplomats via spearphishing in September–October 2025. 

Victims downloaded fake
International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

‼️ China's largest cybersecurity firm, Knownsec, was breached, exposing details of China's state cyber operations. The data includes cyberweapon documentation, internal hacking tool source code, and global target lists covering over 20 countries, including Japan, Vietnam, and

‼️ China's largest cybersecurity firm, Knownsec, was breached, exposing details of China's state cyber operations.

The data includes cyberweapon documentation, internal hacking tool source code, and global target lists covering over 20 countries, including Japan, Vietnam, and
Min Choi (@minchoi) 's Twitter Profile Photo

This story is wild Chinese state-backed hackers hijacked Claude Code to run one of the first AI-orchestrated cyber-espionage Using autonomous agents to infiltrate ~30 global companies, banks, manufacturers and government networks🤯 How the attack was carried out in 5 phases

This story is wild

Chinese state-backed hackers hijacked Claude Code to run one of the first AI-orchestrated cyber-espionage

Using autonomous agents to infiltrate ~30 global companies, banks, manufacturers and government networks🤯

How the attack was carried out in 5 phases
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

French Interior Ministry confirms cyberattack on email servers - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

❗️A black-hat hacker named Davy de Valk, who studied computer science but was officially on welfare, installed a remote access tool on Port of Antwerp systems to facilitate undetected drug smuggling. He was selling intelligence to narcos. He has been sentenced in Amsterdam to 7

❗️A black-hat hacker named Davy de Valk, who studied computer science but was officially on welfare, installed a remote access tool on Port of Antwerp systems to facilitate undetected drug smuggling.

He was selling intelligence to narcos.

He has been sentenced in Amsterdam to 7
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

EDR killer tool uses signed kernel driver from forensic software - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨Cyber Alert‼️ 🇪🇺European Commission The European Commission disclosed a data breach affecting its mobile device management system, detected on January 30, 2026. The incident may have exposed staff names and mobile phone numbers, with no evidence of device compromise. The

🚨Cyber Alert‼️

🇪🇺European Commission

The European Commission disclosed a data breach affecting its mobile device management system, detected on January 30, 2026. 

The incident may have exposed staff names and mobile phone numbers, with no evidence of device compromise. 

The
David Hendrickson (@teksedge) 's Twitter Profile Photo

🚀 I just hosted MiniMax-M2.5 UNCOMPRESSED (full BF16, 230B total / 10B active MoE, 457 GB weights) on a single Mac Ultra 512 GB! Fits with ~50 GB left for OS + modest KV cache (perfect for 4k-16k ctx). Using native MLX — zero swapping, max quality local inference. 16K context

🚀 I just hosted MiniMax-M2.5 UNCOMPRESSED (full BF16, 230B total / 10B active MoE, 457 GB weights) on a single Mac Ultra 512 GB!

Fits with ~50 GB left for OS + modest KV cache (perfect for 4k-16k ctx). Using native MLX — zero swapping, max quality local inference.

16K context
Wim Vandebroeck (@wim_vdb) 's Twitter Profile Photo

The sovereign AI cookbook: building a private multi-model platform from scratch with @apple mac ultra. techevangelist.eu/#blog/sovereig…