cpete (@crypt0peteris) 's Twitter Profile
cpete

@crypt0peteris

ID: 1443167650461409289

calendar_today29-09-2021 10:56:04

925 Tweet

130 Followers

4,4K Following

Vladimir S. | Officer's Notes (@officer_cia) 's Twitter Profile Photo

Quick “Maximum Mobile Privacy in One Weekend” Checklist (2025) [ ] Buy a used/refurb Pixel 8a or newer (€300–500) [ ] Unlock bootloader & install GrapheneOS (web installer, 30 minutes) [ ] Install F-Droid + Obtainium [ ] Set up Mullvad VPN (pay with Monero) + always-on kill

aadvark (@aadvark89) 's Twitter Profile Photo

monad is a perfect example of why you need a fck ton of apps in your ecosystem, not just the generic defi and shitcoin launchpads but diverse, innovative new shit to try out the 100th iteration of memecoins and nfts isn't going to cut it (pretty obvious from the fact that even

monad is a perfect example of why you need a fck ton of apps in your ecosystem, not just the generic defi and shitcoin launchpads but diverse, innovative new shit to try out

the 100th iteration of memecoins and nfts isn't going to cut it (pretty obvious from the fact that even
Haseeb >|< (@hosseeb) 's Twitter Profile Photo

This is ahistorical nonsense. When I first started investing in crypto in 2017, the norm was no vesting for anyone. For investors, founders, employees, all tokens circulated immediately. This norm was changed after the 2018 ICO collapse because it was led to so much bad

Wu Blockchain (@wublockchain) 's Twitter Profile Photo

Yearn Finance’s yETH product was attacked, with the exploiter apparently minting nearly unlimited yETH to drain the pool in a single transaction and profit roughly 1,000 ETH (about $3 million), some of which was sent to Tornado Cash. Blockchain data indicate the attack involved

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 PoC Exploit Released For Outlook 0-Click Remote Code Execution Vulnerability Source: cybersecuritynews.com/outlook-remote… A Proof-of-Concept (PoC) exploit code has been released for a critical remote code execution (RCE) vulnerability in Microsoft Outlook, identified as CVE-2024-21413.

🚨 PoC Exploit Released For Outlook 0-Click Remote Code Execution Vulnerability 

Source: cybersecuritynews.com/outlook-remote…

A Proof-of-Concept (PoC) exploit code has been released for a critical remote code execution (RCE) vulnerability in Microsoft Outlook, identified as CVE-2024-21413.
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 New Android malware Albiriox is being sold as a service. It can remotely control phones, stream screens from banking apps, and fake updates to steal logins. It even bypasses Android’s screen protections. Read about it here → thehackernews.com/2025/12/new-al… Spread via fake Google

🚨 New Android malware Albiriox is being sold as a service.

It can remotely control phones, stream screens from banking apps, and fake updates to steal logins.

It even bypasses Android’s screen protections.

Read about it here → thehackernews.com/2025/12/new-al…

Spread via fake Google
Europol (@europol) 's Twitter Profile Photo

Europol supports Germany and Switzerland in taking down 'Cryptomixer', seizing EUR 25 million in Bitcoin. This illicit mixing service facilitated money laundering of proceeds from a variety of criminal activities. Details ➡️ europol.europa.eu/media-press/ne…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🐼 ShadyPanda quietly turned trusted Chrome and Edge extensions into spyware. Over 4.3 million installs in 7 years — some were even once verified by Google. After silent updates in mid-2024, they began sending users’ browsing data and cookies to remote servers. 🔗 Read here →

🐼 ShadyPanda quietly turned trusted Chrome and Edge extensions into spyware.

Over 4.3 million installs in 7 years — some were even once verified by Google.

After silent updates in mid-2024, they began sending users’ browsing data and cookies to remote servers.

🔗 Read here →
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 GlassWorm is back. 24 fake VS Code and Open VSX extensions are stealing developer credentials — spreading through popular names like Flutter, React, and Tailwind. The malware hides its control data on the Solana blockchain and runs Rust implants on both Windows and macOS.

🚨 GlassWorm is back.

24 fake VS Code and Open VSX extensions are stealing developer credentials — spreading through popular names like Flutter, React, and Tailwind.

The malware hides its control data on the Solana blockchain and runs Rust implants on both Windows and macOS.
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 ALERT: A fake Rust package was downloaded over 7,000 times before it was taken down. It posed as an Ethereum tool but secretly ran malicious code on Windows, macOS, and Linux. More here ↓ thehackernews.com/2025/12/malici…