Toggle light / dark theme

Dutch govt warns of Signal, WhatsApp account hijacking attacks

Russian state-sponsored hackers have been linked to an ongoing Signal and WhatsApp phishing campaign targeting government officials, military personnel, and journalists to gain access to sensitive messages.

This report comes from the Netherlands Defence Intelligence and Security Service (MIVD) and the Netherlands General Intelligence and Security Service (AIVD), who confirmed that Dutch government employees have been targeted in the attacks.

The Dutch intelligence agencies say the operation relies on phishing and social-engineering techniques that abuse legitimate authentication features to take over accounts and covertly monitor new messages.

The 15 Most Powerful Space Gods in Fiction

In the vast scale of the cosmos, the word “God” takes on a terrifying new meaning. Today, our channel performs a deep dive into the 15 most powerful space gods in fiction, ranking them not just by their size, but by their ability to rewrite the source code of reality itself. From the machine “janitors” of Mass Effect to the narrative-bending power of The One Above All, we break down six tiers of cosmic authority. We explore the “Neural Physics” of the Precursors, the entropic hunger of Unicron, and the conceptual nightmare of the Chaos Gods. In this video, we cover:
Tier 1: The Material Masters (Reapers, C’tan, Precursors)
Tier 2: The Chaos Agents (The Outsider, Bill Cipher)
Tier 3: The Entropic Consumers (Unicron, The Witness)
Tier 4: The Multiversal Shapers (The Q, Zeno, Anti-Spiral)
Tier 5: The Conceptual Deities (Arceus, Chaos Gods, Azathoth)
Tier 6: The Ultimate Sources (The Presence, The One Above All)

Which of these cosmic entities has the best design? Let us know in the comments! Watch Next: [Link] Star Destroyer vs. Mass Effect Reaper: Technical Breakdown Subscribe to Our Channel for more engineering and lore comparisons!

Weaponising the Mind: Rethinking Trust in Times of Cognitive Warfare

🧠 Cognitive warfare is real and it’s here already.

That is why the Konrad Adenauer Foundation is putting the topic on the agenda at the Munich Security Conference.

From now on, the focus will be on the following key issues: • Cognitive warfare as a security policy reality • Resilience instead of alarmism • Strategic advantage through the ability to act • Protection of democratic decision-making processes.

Cognitive warfare is changing the logic of modern conflicts. It does not target infrastructure or territory, but rather perception, trust and decision-making ability, thereby blurring the line between war and peace.

More about #MSC2026: https://www.kas.de/de/veranstaltungsberichte/detail/-/conten…t-begonnen.

#munichsecurityconference

Hybrid ‘super foam’ uses 3D-printed struts to absorb up to 10 times more energy

Aerospace engineering and materials science researchers at Texas A&M University and the DEVCOM Army Research Laboratory have developed a “super foam” that can absorb up to 10 times more energy than conventional padding.

The composite, published and described in the journal of Composite Structures, combines an ordinary foam with 3D-printed injections of stretchy, plastic columns known as struts.

The result? An affordable, lightweight and ultra-durable hybrid foam poised to redefine the defense, automotive, aerospace and consumer industries.

Why I Quit ChatGPT and Switched to Claude

“AI will most likely lead to the end of the world, but in the meantime there will be great companies created.” — Sam Altman, OpenAI CEO

I used to think that was dark humor.

This week, I stopped laughing — and cancelled my ChatGPT subscription.

Not because of the technology. Because of the values.

On February 27, Anthropic refused to give the Pentagon unrestricted access to its AI for mass surveillance and autonomous killer weapons. Within hours, OpenAI’s Sam Altman swooped in and took the deal.

One company held the line. The other sprinted to cross it.

These biological computers actually use neurons

In this video we look into one of the developing areas of computing: wetware. Most specifically neuromorphic computing, a science which uses actual neurons on chips.

We talk to Cortical labs, the company that developed the pong-playing dish brain, and professor Thomas Hartung to understand what the benefits of this technology are.

🚀 Discover deep-dive engineering stories and breakthrough technologies on Interesting Engineering:
/ @interestingengineeringie.

🪖 Explore military innovation and defense technology on Military Mechanics:
/ @militarymechanicsie.

🔔 Subscribe to IE Brief for daily updates on the discoveries, technologies, and global developments shaping our world:
/ @ienews-brief.

🔬 Complex tech, simply explained. Discover how the world works with IE Explains: / @ie-explains

We’ve Been Invaded By Aliens… Now What?

If aliens invaded, how would humanity respond? From planetary defense and space warfare to unexpected diplomatic twists, we’ll explore the strategies, technologies, and scenarios that could decide our fate.

Watch my exclusive video Post-Consciousness Civilizations: https://nebula.tv/videos/isaacarthur–
Get Nebula using my link for 40% off an annual subscription: https://go.nebula.tv/isaacarthur.
Get a Lifetime Membership to Nebula for only $300: https://go.nebula.tv/lifetime?ref=isa
Use the link gift.nebula.tv/isaacarthur to give a year of Nebula to a friend for just $30.

Visit our Website: http://www.isaacarthur.net.
Join Nebula: https://go.nebula.tv/isaacarthur.
Support us on Patreon: / isaacarthur.
Support us on Subscribestar: https://www.subscribestar.com/isaac-a
Facebook Group: / 1583992725237264
Reddit: / isaacarthur.
Twitter: / isaac_a_arthur on Twitter and RT our future content.
SFIA Discord Server: / discord.
Credits:
We’ve Been Invaded By Aliens… Now What?
Episode 494a; April 13, 2025
Written, Produced & Narrated by: Isaac Arthur.
Edited by: Ludwig Luska.
Graphics: Jeremy Jozwik, Ken York YD Visual, Legiontech Studios.
Select imagery/video supplied by Getty Images.
Music Courtesy of Epidemic Sound http://epidemicsound.com/creator.
Sergey Cheremisinov, \

Predator spyware hooks iOS SpringBoard to hide mic, camera activity

Intellexa’s Predator spyware can hide iOS recording indicators while secretly streaming camera and microphone feeds to its operators.

The malware does not exploit any iOS vulnerability but leverages previously obtained kernel-level access to hijack system indicators that would otherwise expose its surveillance operation.

Apple introduced recording indicators on the status bar in iOS 14 to alert users when the camera or microphone is in use, displaying a green or an orange dot, respectively.

Impact of cellular proteases on the function of antiviral antibodies

Microbiology Monday: Antibodies play a key role in clearing viruses from the body—but there are a lot of ways viruses evade them. For instance, viral infections can hijack host proteases to reduce antibody effectiveness. These proteases lob off viral antigens expressed on host cell membranes, creating soluble decoys that bind antibodies and hinder their neutralizing powers, among other mechanisms. Learn more in JVirology.


Viruses and their hosts have been co-evolving in a continual arms race for fitness and survival, respectively (1). In humans, the innate and adaptive arms of immunity intimately interact to control infection. Antibodies (Abs), secreted by certain activated B cells, are an essential portion of the adaptive immune response and are a major pillar in the viral clearance of both enveloped viruses as well as some non-enveloped viruses (15). Certain antibodies are developed with the ability, through their fragment antigen-binding region, to bind to viral epitopes and, through a variety of methods (e.g., steric obstruction or changing conformation), result in the neutralization of the target antigen (4).

Antibodies are also a bridge between the adaptive and innate immune responses. Through their fragment crystallizable (Fc) region, antibodies bind to either activators of the complement system or Fc Receptors (FcR) on effector cells, inducing the so-called antibody “effector” or “non-neutralizing” functions, such as complement-mediated cytotoxicity, antibody-dependent cellular cytotoxicity (ADCC), or antibody-dependent cellular phagocytosis (68). Together, neutralization and effector function induction place antibodies as correlates of protection across many infections (911), as well as at the center of vaccine and therapeutic monoclonal antibody design (24, 12).

Apart from complement activation, induction of effector functions depends on the formation of an immune synapse between an antibody-coated target and an effector cell. Globally, this immune synapse depends on Ab density on the target membrane, cofactors within the effector cells (adhesion molecules, signaling molecules, or cofactors such as NKG2D on NK cells), and conditioning by the microenvironment (cytokines, pH, etc.). For complement, completion of the cascade and elimination of viruses and/or infected cells depend on the initial hexamerization of the antibody’s Fc on the target surface and the presence and activity of several inhibitory factors existing within the cascade (7, 11).

/* */