CodeAIntel

CodeAIntel

Home
Threat Intelligence
AI Research
Darknet and Hacking Forums
Data Breaches
Google's Tensor Secrets Were in Tehran: The Insider Threat That Slipped Past Silicon Valley
Three engineers. Hundreds of files. One family scheme. And trade secrets about Google's most sensitive chip technology — photographed and carried to…
12 hrs ago • Tom
PayPal’s Silent Six Months: The Breach That Hid in the Code
A software error, a loan app, and Social Security numbers sitting exposed for 165 days. PayPal had a problem — and its customers were the last to know.
15 hrs ago • Tom
Operation Red Card 2.0: The $45 Million Takedown of Africa’s Cyber Syndicate
The industrialized scale of modern cybercrime just met the industrialized scale of international law enforcement.
Feb 19 • Tom
Blockchain Fortress, Human Gatekeeper: How Figure Tech Lost 1 Million IDs to a Phone Call
The promise of blockchain is immutable security. The reality of fintech is that a single employee login is worth more than all the cryptography in the…
Feb 18 • Tom
How a Trojanized Oura Server Infiltrated AI Ecosystems
Your biometric data isn't the only thing the Oura ring can connect to anymore—now, it might be the gateway for an infostealer.
Feb 17 • Tom
ZeroDayRAT: The Nation-State Toolkit Now Available to the Highest (Telegram) Bidder
The barrier to entry for total mobile domination just hit zero.
Feb 16 • Tom
How 2,420 Russian Starlink Terminals Just Became Digital Targets
It wasn't a missile that blinded the Russian drone teams in Zaporizhzhia this week. It was a QR code and a Telegram bot.
Feb 14 • Tom
Adversaries Are Now Cloning High-End AI Reasoning
In mid-February 2026, Google Threat Intelligence Group confirmed a dangerous shift: attackers aren't just using AI tools; they are stealing the…
Feb 12 • Tom
When the Zoom Call Is the Malware: UNC1069 and the Industrialization of AI-Driven Trust Exploitation
We’ve crossed the line where AI is merely assisting phishing, and entered a phase where AI is embedded inside the social engineering infrastructure…
Feb 11 • Tom
When AI Becomes the Vulnerability Hunter, Claude Opus 4.6 and the Acceleration of Software Risk
In early February 2026, Claude Opus 4.6 identified more than 500 high-severity vulnerabilities across widely used open-source libraries.
Feb 6 • Tom
Disrupted Trust, How Scattered Lapsus$ Hunters Breached Betterment and Turned Customer Data Into a Weapon
In early January 2026, one of the largest automated investment platforms in the United States found itself exposed not by a software flaw or a zero-day…
Feb 5 • Tom
Phantom Office: How APT28 Weaponized a Just,Patched Microsoft Bug in Days
Zero,days used to be rare. Now they’re strategic accelerants , weaponized before defenders can blink.
Feb 4 • Tom
© 2026 Tom · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture