Chris Takakuwa (@christakakuwa) 's Twitter Profile
Chris Takakuwa

@christakakuwa

on life, startups, leadership, tech

ID: 319318217

calendar_today17-06-2011 22:41:19

16,16K Tweet

704 Takipçi

868 Takip Edilen

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Hackers just turned GitHub into their command center. When police take down their servers, the malware just… reboots itself from GitHub. The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design. Read how it works →

Hackers just turned GitHub into their command center.

When police take down their servers, the malware just… reboots itself from GitHub.

The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design.

Read how it works →
Proton Drive (@protondrive) 's Twitter Profile Photo

Microsoft OneDrive is rolling out AI face recognition for your photos. But you can turn it off, right? Well, you CAN, but only “three times a year,” and Microsoft hasn’t clarified what that actually means. To disable (for now), go to Privacy & Permissions → People section.

Microsoft OneDrive is rolling out AI face recognition for your photos.

But you can turn it off, right? Well, you CAN, but only “three times a year,”  and Microsoft hasn’t clarified what that actually means.

To disable (for now), go to Privacy & Permissions → People section.
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔴 Microsoft just dropped fixes for 183 security flaws. 3 are already being exploited — including one buried in every Windows PC since XP. ...and at the same time, it is ending Windows 10 support (unless you pay). Details + patch info ↓ thehackernews.com/2025/10/two-ne…

CISA Cyber (@cisacyber) 's Twitter Profile Photo

🚨 Nation-state affiliated threat actors have compromised F5’s systems & downloaded portions of its BIG-IP source code—posing serious risk to FCEB agencies. Follow the guidance in ED 26-01 immediately to protect systems from potential exploits. 🔗 go.dhs.gov/isY

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Hackers just dropped a new .NET backdoor disguised as a tax notice. Open the ZIP → boom, your data’s gone. It even runs through legit Windows tools so nothing looks off. Full story → thehackernews.com/2025/10/new-ne…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 A fake CAPTCHA just breached hospitals, universities, and city networks. The scary part? Victims copied the attack code themselves — straight from their browser. It’s called ClickFix, and it hijacks users through “fix this page” pop-ups — no downloads, no phishing email

🚨 A fake CAPTCHA just breached hospitals, universities, and city networks.

The scary part? Victims copied the attack code themselves — straight from their browser.

It’s called ClickFix, and it hijacks users through “fix this page” pop-ups — no downloads, no phishing email
HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Source: cybersecuritynews.com/copilot-prompt…

🚨Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data

Source: cybersecuritynews.com/copilot-prompt…
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Hackers turned YouTube into a malware factory. Over 3,000 fake “tutorials” hide stealers like Lumma and Rhadamanthys. They hijack real channels — likes, comments, and all — to look legit. Even that “Photoshop crack” or “Roblox cheat” video could infect you. Read here ↓

🚨 Hackers turned YouTube into a malware factory. Over 3,000 fake “tutorials” hide stealers like Lumma and Rhadamanthys.

They hijack real channels — likes, comments, and all — to look legit.

Even that “Photoshop crack” or “Roblox cheat” video could infect you.

Read here ↓
The Hacker News (@thehackersnews) 's Twitter Profile Photo

77% of employees paste sensitive data into GenAI tools. Most use personal accounts, so IT can’t see it. It’s all happening in the browser — and old DLP tools miss it completely. The browser just became the biggest data leak in the enterprise ↓ thehackernews.com/2025/11/new-br…

Cybersecurity and Infrastructure Security Agency (@cisagov) 's Twitter Profile Photo

This Veterans Day, we celebrate, honor, and thank all Veterans that have served and sacrificed for our country’s freedom and safety. As America’s Cyber Defense Agency, CISA understands the importance of protecting our nation from physical & cyber threats from foreign adversaries.

The Hacker News (@thehackersnews) 's Twitter Profile Photo

The U.S. just uncovered how North Korea used fake “remote IT jobs” to sneak millions past sanctions. 👤 5 Americans pleaded guilty 🏢 136 U.S. companies hit 💰 $2.2M sent to North Korea Read the details ↓ thehackernews.com/2025/11/five-u…

Fast Company (@fastcompany) 's Twitter Profile Photo

By adding new filters at water treatment plants, PolyGone is removing microplastics from the water system—and then recycling them. f-st.co/Opd33kD

The Hacker News (@thehackersnews) 's Twitter Profile Photo

CISA added the new 10.0-rated React RCE flaw (CVE-2025-55182) to its exploited list. 🕒 Exploited within hours by Chinese hackers. 💥 Affects Next.js, React Router, Vite, Waku & more. 💰 Some attacks dropped crypto-miners & stole AWS creds. 🔗 Read: thehackernews.com/2025/12/critic…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

💻 ⚠️ Hackers are hiding inside Google Drive. Researchers found a Windows backdoor called NANOREMOTE that uses the Google Drive API to steal files and run commands. It even pretends to be Bitdefender software so it looks safe. Experts say it’s linked to a Chinese hacking group

💻 ⚠️ Hackers are hiding inside Google Drive.

Researchers found a Windows backdoor called NANOREMOTE that uses the Google Drive API to steal files and run commands.

It even pretends to be Bitdefender software so it looks safe.

Experts say it’s linked to a Chinese hacking group
Zac Bowden (@zacbowden) 's Twitter Profile Photo

Microsoft says that it will work with the FBI to unlock your Windows PCs encrypted data if asked. BitLocker encryption keys that are uploaded to the cloud via your Microsoft Account are not encrypted on Microsoft's servers, which means the company is able to see the keys and

Microsoft says that it will work with the FBI to unlock your Windows PCs encrypted data if asked.

BitLocker encryption keys that are uploaded to the cloud via your Microsoft Account are not encrypted on Microsoft's servers, which means the company is able to see the keys and
Luiza Jarovsky (@luizajarovsky) 's Twitter Profile Photo

🚨 For those who are still in doubt, this is the U.S. Copyright Office's official opinion on the COPYRIGHTABILITY of AI-generated works: "The Office concludes that, given current generally available technology, prompts alone do not provide sufficient human control to make users

🚨 For those who are still in doubt, this is the U.S. Copyright Office's official opinion on the COPYRIGHTABILITY of AI-generated works:

"The Office concludes that, given current generally available technology, prompts alone do not provide sufficient human control to make users