<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[PwnForums - World News]]></title>
		<link>https://pwnforums.st/</link>
		<description><![CDATA[PwnForums - https://pwnforums.st]]></description>
		<pubDate>Mon, 06 Apr 2026 01:52:04 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Oracle Strike]]></title>
			<link>https://pwnforums.st/Thread-Oracle-Strike</link>
			<pubDate>Sun, 05 Apr 2026 17:19:34 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=713046">rolex07</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Oracle-Strike</guid>
			<description><![CDATA[It happened a day ago, but just trying to start a convo!<br />
How are you pals doing?]]></description>
			<content:encoded><![CDATA[It happened a day ago, but just trying to start a convo!<br />
How are you pals doing?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Psycho-physical impacts in war and conflicts.]]></title>
			<link>https://pwnforums.st/Thread-Psycho-physical-impacts-in-war-and-conflicts</link>
			<pubDate>Sat, 28 Mar 2026 14:12:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=700406">36mn</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Psycho-physical-impacts-in-war-and-conflicts</guid>
			<description><![CDATA[As says the tittle, specially in young people.<br />
<br />
<a href="https://casebook.icrc.org/a_to_z/glossary/self-defence" target="_blank" rel="noopener" class="mycode_url">https://casebook.icrc.org/a_to_z/glossary/self-defence</a><br />
<a href="https://www.sciencedirect.com/science/article/pii/S2667009725000454" target="_blank" rel="noopener" class="mycode_url">https://www.sciencedirect.com/science/ar...9725000454</a>]]></description>
			<content:encoded><![CDATA[As says the tittle, specially in young people.<br />
<br />
<a href="https://casebook.icrc.org/a_to_z/glossary/self-defence" target="_blank" rel="noopener" class="mycode_url">https://casebook.icrc.org/a_to_z/glossary/self-defence</a><br />
<a href="https://www.sciencedirect.com/science/article/pii/S2667009725000454" target="_blank" rel="noopener" class="mycode_url">https://www.sciencedirect.com/science/ar...9725000454</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Dear Governments of the World , you should read this .]]></title>
			<link>https://pwnforums.st/Thread-Dear-Governments-of-the-World-you-should-read-this</link>
			<pubDate>Sat, 28 Mar 2026 12:29:48 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=85051">zelda</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Dear-Governments-of-the-World-you-should-read-this</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color">To the Five Kingdoms</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color">To the Sykes–Picot States</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #008e02;" class="mycode_color">We are Zelda</span></div>
<div style="text-align: center;" class="mycode_align">This is our red line, Do not test our patience. </div>
<div style="text-align: center;" class="mycode_align">If you participate in the war against the (Axis of Right), our response will not be military alone, we will strike from where you do not expect.</div>
<div style="text-align: center;" class="mycode_align">We will expose to the world your biological facilities and your most sensitive data.</div>
<div style="text-align: center;" class="mycode_align">We will not start the war, but we will be the ones to end it.</div>
<div style="text-align: center;" class="mycode_align">To anyone considering joining or supporting the old Sam you have one choice, Either you stand with what is right, or you face the consequences.</div>
<div style="text-align: center;" class="mycode_align">There is no neutrality here.</div>
<div style="text-align: center;" class="mycode_align">Whoever stands with them becomes a target for us, with no exceptions.</div>
<div style="text-align: center;" class="mycode_align">We speak for the people, people speaks for us.<br />
 <br />
 <br />
 <span style="color: #c10300;" class="mycode_color">К Пяти Королевствам</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color">К государствам Сайкса—Пико</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #008e02;" class="mycode_color">Мы </span>— <span style="color: #008e02;" class="mycode_color">Зельда</span></div>
<div style="text-align: center;" class="mycode_align">Это наша красная линия. Не испытывайте наше терпение. Если вы примете участие в войне против (Оси Справедливости), наш ответ не будет только военным — мы ударим оттуда, откуда вы не ждете. Мы раскроем миру ваши биологические объекты и ваши самые чувствительные данные.</div>
<div style="text-align: center;" class="mycode_align">Мы не начнем войну, но мы будем теми, кто ее закончит.</div>
<div style="text-align: center;" class="mycode_align">Каждому, кто думает присоединиться или поддержать Старика Сэма: перед вами один выбор. Либо вы на стороне справедливости, либо вы несете последствия. Никакого нейтралитета здесь нет. Тот, кто встанет с ними, становится для нас целью — без исключений.</div>
<div style="text-align: center;" class="mycode_align">Мы говорим от имени народа, а народ говорит от нашего имени.<br />
 <br />
 <br />
 <span style="color: #c10300;" class="mycode_color">إلى دول الممالك الخمس</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color">إلى دول سايكس بيكو</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #008e02;" class="mycode_color">نحن زيلدا</span></div>
<div style="text-align: center;" class="mycode_align">هذا هو خطنا الأحمر. لا تختبروا صبرنا. إذا أقدمتم على الاشتراك في الحرب ضد (محور الحق)، فلن يكون ردنا عسكرياً فقط… بل سنضرب من حيث لا تتوقعون. سنكشف للعالم منشآتكم الحيوية وبياناتكم الأكثر حساسية.</div>
<div style="text-align: center;" class="mycode_align">لن نبدأ الحرب، لكننا من سينهيها.</div>
<div style="text-align: center;" class="mycode_align">إلى كل من يفكر بالانضمام أو مساندة العجوز سام: أنتم أمام خيار واحد. إما أن تكونوا مع الحق، أو أن تتحملوا العواقب. لا حياد هنا. من يقف معهم يصبح هدفاً لنا بلا استثناء<br />
 </div>
<div style="text-align: center;" class="mycode_align">نحن نتحدث باسم الشعب، والشعب يتحدث باسمنا </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color"><br />
 <span style="font-weight: bold;" class="mycode_b">We'll publish a highly sensitive Documents Starting with The Kingdom of Saudi Government if those people keep supporting the Satan<br />
 <br />
  <span style="color: #e82a1f;" class="mycode_color">15,076 Files   -   12.1 GB (13,022,035,968 bytes)   of Arabian gulf highly sensitive documents <br />
</span></span></span><span style="color: #fffa1e;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">If breachforums stayed a live , and back like before ,  we shall  release the voice call between Saudi officials admitting of taking a  bribe in 2023 - 2024  from their own citizens  <br />
 </span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b">Samples of Targets industries<br />
<br />
</span></span><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fjk4bcmBM%2F1.jpg" loading="lazy"  alt="[Image: 1.jpg]" class="mycode_img" /></span></span><br />
</div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fr24FW0WJ%2F2.jpg" loading="lazy"  alt="[Image: 2.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2F1tsWBBwX%2F3.jpg" loading="lazy"  alt="[Image: 3.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FpjL1wxgT%2F4.jpg" loading="lazy"  alt="[Image: 4.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fv6ZVMN0z%2F5.png" loading="lazy"  alt="[Image: 5.png]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FF499PvdD%2F6.png" loading="lazy"  alt="[Image: 6.png]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FM5thkgK4%2F7.png" loading="lazy"  alt="[Image: 7.png]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fk6HJKqqR%2Fa1.jpg" loading="lazy"  alt="[Image: a1.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FxKBKPDYb%2Fa2.jpg" loading="lazy"  alt="[Image: a2.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fk6g0zRLS%2Fcars.jpg" loading="lazy"  alt="[Image: cars.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FCsVhWNmT%2Fx1.png" loading="lazy"  alt="[Image: x1.png]" class="mycode_img" /></span></span></div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color">To the Five Kingdoms</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color">To the Sykes–Picot States</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #008e02;" class="mycode_color">We are Zelda</span></div>
<div style="text-align: center;" class="mycode_align">This is our red line, Do not test our patience. </div>
<div style="text-align: center;" class="mycode_align">If you participate in the war against the (Axis of Right), our response will not be military alone, we will strike from where you do not expect.</div>
<div style="text-align: center;" class="mycode_align">We will expose to the world your biological facilities and your most sensitive data.</div>
<div style="text-align: center;" class="mycode_align">We will not start the war, but we will be the ones to end it.</div>
<div style="text-align: center;" class="mycode_align">To anyone considering joining or supporting the old Sam you have one choice, Either you stand with what is right, or you face the consequences.</div>
<div style="text-align: center;" class="mycode_align">There is no neutrality here.</div>
<div style="text-align: center;" class="mycode_align">Whoever stands with them becomes a target for us, with no exceptions.</div>
<div style="text-align: center;" class="mycode_align">We speak for the people, people speaks for us.<br />
 <br />
 <br />
 <span style="color: #c10300;" class="mycode_color">К Пяти Королевствам</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color">К государствам Сайкса—Пико</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #008e02;" class="mycode_color">Мы </span>— <span style="color: #008e02;" class="mycode_color">Зельда</span></div>
<div style="text-align: center;" class="mycode_align">Это наша красная линия. Не испытывайте наше терпение. Если вы примете участие в войне против (Оси Справедливости), наш ответ не будет только военным — мы ударим оттуда, откуда вы не ждете. Мы раскроем миру ваши биологические объекты и ваши самые чувствительные данные.</div>
<div style="text-align: center;" class="mycode_align">Мы не начнем войну, но мы будем теми, кто ее закончит.</div>
<div style="text-align: center;" class="mycode_align">Каждому, кто думает присоединиться или поддержать Старика Сэма: перед вами один выбор. Либо вы на стороне справедливости, либо вы несете последствия. Никакого нейтралитета здесь нет. Тот, кто встанет с ними, становится для нас целью — без исключений.</div>
<div style="text-align: center;" class="mycode_align">Мы говорим от имени народа, а народ говорит от нашего имени.<br />
 <br />
 <br />
 <span style="color: #c10300;" class="mycode_color">إلى دول الممالك الخمس</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color">إلى دول سايكس بيكو</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #008e02;" class="mycode_color">نحن زيلدا</span></div>
<div style="text-align: center;" class="mycode_align">هذا هو خطنا الأحمر. لا تختبروا صبرنا. إذا أقدمتم على الاشتراك في الحرب ضد (محور الحق)، فلن يكون ردنا عسكرياً فقط… بل سنضرب من حيث لا تتوقعون. سنكشف للعالم منشآتكم الحيوية وبياناتكم الأكثر حساسية.</div>
<div style="text-align: center;" class="mycode_align">لن نبدأ الحرب، لكننا من سينهيها.</div>
<div style="text-align: center;" class="mycode_align">إلى كل من يفكر بالانضمام أو مساندة العجوز سام: أنتم أمام خيار واحد. إما أن تكونوا مع الحق، أو أن تتحملوا العواقب. لا حياد هنا. من يقف معهم يصبح هدفاً لنا بلا استثناء<br />
 </div>
<div style="text-align: center;" class="mycode_align">نحن نتحدث باسم الشعب، والشعب يتحدث باسمنا </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color"><br />
 <span style="font-weight: bold;" class="mycode_b">We'll publish a highly sensitive Documents Starting with The Kingdom of Saudi Government if those people keep supporting the Satan<br />
 <br />
  <span style="color: #e82a1f;" class="mycode_color">15,076 Files   -   12.1 GB (13,022,035,968 bytes)   of Arabian gulf highly sensitive documents <br />
</span></span></span><span style="color: #fffa1e;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">If breachforums stayed a live , and back like before ,  we shall  release the voice call between Saudi officials admitting of taking a  bribe in 2023 - 2024  from their own citizens  <br />
 </span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b">Samples of Targets industries<br />
<br />
</span></span><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fjk4bcmBM%2F1.jpg" loading="lazy"  alt="[Image: 1.jpg]" class="mycode_img" /></span></span><br />
</div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fr24FW0WJ%2F2.jpg" loading="lazy"  alt="[Image: 2.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2F1tsWBBwX%2F3.jpg" loading="lazy"  alt="[Image: 3.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FpjL1wxgT%2F4.jpg" loading="lazy"  alt="[Image: 4.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fv6ZVMN0z%2F5.png" loading="lazy"  alt="[Image: 5.png]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FF499PvdD%2F6.png" loading="lazy"  alt="[Image: 6.png]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FM5thkgK4%2F7.png" loading="lazy"  alt="[Image: 7.png]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fk6HJKqqR%2Fa1.jpg" loading="lazy"  alt="[Image: a1.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FxKBKPDYb%2Fa2.jpg" loading="lazy"  alt="[Image: a2.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fk6g0zRLS%2Fcars.jpg" loading="lazy"  alt="[Image: cars.jpg]" class="mycode_img" /></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FCsVhWNmT%2Fx1.png" loading="lazy"  alt="[Image: x1.png]" class="mycode_img" /></span></span></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Iran report news.]]></title>
			<link>https://pwnforums.st/Thread-Iran-report-news</link>
			<pubDate>Sat, 28 Mar 2026 10:29:12 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=700406">36mn</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Iran-report-news</guid>
			<description><![CDATA[The proposal to stop the war in 15 points. Is realistic to do right now?<br />
<br />
<a href="https://understandingwar.org/research/middle-east/iran-update-special-report-march-25-2026/" target="_blank" rel="noopener" class="mycode_url">https://understandingwar.org/research/mi...h-25-2026/</a>]]></description>
			<content:encoded><![CDATA[The proposal to stop the war in 15 points. Is realistic to do right now?<br />
<br />
<a href="https://understandingwar.org/research/middle-east/iran-update-special-report-march-25-2026/" target="_blank" rel="noopener" class="mycode_url">https://understandingwar.org/research/mi...h-25-2026/</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[News about META, Updated March 17, 2026.]]></title>
			<link>https://pwnforums.st/Thread-News-about-META-Updated-March-17-2026</link>
			<pubDate>Fri, 27 Mar 2026 13:51:19 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=700406">36mn</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-News-about-META-Updated-March-17-2026</guid>
			<description><![CDATA[Check the link to read the information.<br />
<br />
<a href="https://www.reuters.com/business/world-at-work/meta-planning-sweeping-layoffs-ai-costs-mount-2026-03-14/" target="_blank" rel="noopener" class="mycode_url">https://www.reuters.com/business/world-a...026-03-14/</a>]]></description>
			<content:encoded><![CDATA[Check the link to read the information.<br />
<br />
<a href="https://www.reuters.com/business/world-at-work/meta-planning-sweeping-layoffs-ai-costs-mount-2026-03-14/" target="_blank" rel="noopener" class="mycode_url">https://www.reuters.com/business/world-a...026-03-14/</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[About the forums news?]]></title>
			<link>https://pwnforums.st/Thread-About-the-forums-news</link>
			<pubDate>Fri, 27 Mar 2026 13:38:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=700406">36mn</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-About-the-forums-news</guid>
			<description><![CDATA[Recent news about forums This means that is the end or not?]]></description>
			<content:encoded><![CDATA[Recent news about forums This means that is the end or not?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[agi in 2027?]]></title>
			<link>https://pwnforums.st/Thread-agi-in-2027</link>
			<pubDate>Tue, 10 Feb 2026 18:43:34 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=710537">datasus</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-agi-in-2027</guid>
			<description><![CDATA[is real  i dont  think so fuck  stupid .. lol lmao? <a href="https://ai-2027.com/" target="_blank" rel="noopener" class="mycode_url">AI 2027</a>]]></description>
			<content:encoded><![CDATA[is real  i dont  think so fuck  stupid .. lol lmao? <a href="https://ai-2027.com/" target="_blank" rel="noopener" class="mycode_url">AI 2027</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[State actor targets 155 countries in 'Shadow Campaigns' espionage op]]></title>
			<link>https://pwnforums.st/Thread-State-actor-targets-155-countries-in-Shadow-Campaigns-espionage-op</link>
			<pubDate>Tue, 10 Feb 2026 16:51:25 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=471762">Shadowraser</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-State-actor-targets-155-countries-in-Shadow-Campaigns-espionage-op</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><a href="https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/#comments" target="_blank" rel="noopener" class="mycode_url">State actor targets 155 countries in 'Shadow Campaigns' espionage op</a></div>
<div style="text-align: center;" class="mycode_align"> <br />
By Bill Toulas</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">A state-sponsored threat group has compromised dozens of networks of government and critical infrastructure entities in 37 countries in global-scale operations dubbed 'Shadow Campaigns'.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Between November and December last year, the actor also engaged in reconnaissance activity targeting government entities connected to 155 countries.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">According to Palo Alto Networks’ Unit 42 division, the group has been active since at least January 2024, and there is high confidence that it operates from Asia. Until definitive attribution is possible, the researchers track the actor as TGR-STA-1030/UNC6619.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">'Shadow Campaigns' activity focuses primarily on government ministries, law enforcement, border control, finance, trade, energy, mining, immigration, and diplomatic agencies.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Unit 42 researchers confirmed that the attacks successfully compromised at least 70 government and critical infrastructure organizations across 37 countries.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">This includes organizations engaged in trade policy, geopolitical issues, and elections in the Americas; ministries and parliaments across multiple European states; the Treasury Department in Australia; and government and critical infrastructure in Taiwan.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.bleepstatic.com%2Fimages%2Fnews%2Fu%2F1220909%2F2026%2FFebruary%2FF1.jpg" loading="lazy"  alt="[Image: F1.jpg]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align">Targeted countries (top) and confirmed compromises (bottom)</div>
<div style="text-align: center;" class="mycode_align">Source: Unit 42</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The list of countries with targeted or compromised organizations is extensive and focused on certain regions with particular timing that appears to have been driven by specific events.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The researchers say that during the U.S. government shutdown in October 2025, the threat actor showed increased interest in scanning entities across North, Central and South America (Brazil, Canada, Dominican Republic, Guatemala, Honduras, Jamaica, Mexico, Panama, and Trinidad and Tobago).</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Significant reconnaissance activity was discovered against "at least 200 IP addresses hosting Government of Honduras infrastructure" just 30 days before the national election, as both candidates indicated willingness to restore diplomatic ties with Taiwan.</div>
<div style="text-align: center;" class="mycode_align">  </div>
<div style="text-align: center;" class="mycode_align">Unit 42 assesses that the threat group compromised the following entities:</div>
<div style="text-align: center;" class="mycode_align"> </div><ul class="mycode_list"><li>    Brazil’s Ministry of Mines and Energy<br />
</li>
<li>    the network of a Bolivian entity associated with mining<br />
</li>
<li>    two of Mexico’s ministries<br />
</li>
<li>    a government infrastructure in Panama<br />
</li>
<li>    an IP address that geolocates to a Venezolana de Industria Tecnológica facility<br />
</li>
<li>    compromised government entities in Cyprus, Czechia, Germany, Greece, Italy, Poland, Portugal, and Serbia<br />
</li>
<li>    an Indonesian airline<br />
</li>
<li>    multiple Malaysian government departments and ministries<br />
</li>
<li>    a Mongolian law enforcement entity<br />
</li>
<li>    a major supplier in Taiwan's power equipment industry<br />
</li>
<li>    a Thai government department (likely for economic and international trade information)<br />
</li>
<li>    critical infrastructure entities in the Democratic Republic of the Congo, Djibouti, Ethiopia, Namibia, Niger, Nigeria, and Zambia<br />
 <br />
</li>
</ul>
<div style="text-align: center;" class="mycode_align">Unit 42 also believes that TGR-STA-1030/UNC6619 also tried to connect over SSH to infrastructure associated with Australia’s Treasury Department, Afghanistan’s Ministry of Finance, and Nepal’s Office of the Prime Minister and Council of Ministers.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Apart from these compromises, the researchers found evidence indicating reconnaissance activity and breach attempts targeting organizations in other countries.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">They say that the actor scanned infrastructure connected to the Czech government (Army, Police, Parliament, Ministries of Interior, Finance, Foreign Affairs, and the president's website).</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The threat group also tried to connect to the European Union infrastructure by targeting more than 600 IP hosting *.europa.eu domains. In July 2025, the group focused on Germany and initiated connections to more than 490 IP addresses that hosted government systems.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">Shadow Campaigns attack chain</span></div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Early operations relied on highly tailored phishing emails sent to government officials, with lures commonly referencing internal ministry reorganization efforts.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The emails embedded links to malicious archives with localized naming hosted on the Mega.nz storage service. The compressed files contained a malware loader called Diaoyu and a zero-byte PNG file named pic1.png.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.bleepstatic.com%2Fimages%2Fnews%2Fu%2F1220909%2F2026%2FFebruary%2Fphish.jpg" loading="lazy"  alt="[Image: phish.jpg]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align">Sample of the phishing email used in Shadow Campaigns operations</div>
<div style="text-align: center;" class="mycode_align">Source: Unit 42</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Unit 42 researcher found that the Diaoyu loader would fetch Cobalt Strike payloads and the VShell framework for command-and-control (C2) under certain conditions that equate to analysis evasion checks.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">"Beyond the hardware requirement of a horizontal screen resolution greater than or equal to 1440, the sample performs an environmental dependency check for a specific file (pic1.png) in its execution directory," the researchers say.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">They explain that the zero-byte image acts as a file-based integrity check. In its absence, the malware terminates before inspecting the compromised host.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">To evade detection, the loader looks for running processes from the following security products: Kaspersky, Avira, Bitdefender, Sentinel One, and Norton (Symantec).</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Apart from phishing, TGR-STA-1030/UNC6619 also exploited at least 15 known vulnerabilities to achieve initial access. Unit 42 found that the threat actor leveraged security issues in SAP Solution Manager, Microsoft Exchange Server, D-Link, and Microsoft Windows.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">New Linux rootkit</span></div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">TGR-STA-1030/UNC6619's toolkit used for Shadow Campaigns activity is extensive and includes webshells such as Behinder, Godzilla, and Neo-reGeorg, as well as network tunneling tools such as GO Simple Tunnel (GOST), Fast Reverse Proxy Server (FRPS), and IOX.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">However, researchers also discovered a custom Linux kernel eBPF rootkit called ‘ShadowGuard’ that they believe to be unique to the TGR-STA-1030/UNC6619 threat actor.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">“eBPF backdoors are notoriously difficult to detect because they operate entirely within the highly trusted kernel space,” the researchers explain.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">“This allows them to manipulate core system functions and audit logs before security tools or system monitoring applications can see the true data.”</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">ShadowGuard conceals malicious process information at the kernel level, hides up to 32 PIDs from standard Linux monitoring tools using syscall interception. It can also hide from manual inspection files and directories named swsecret.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Additionally, the malware features a mechanism that lets its operator define processes that should remain visible.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The infrastructure used in Shadow Campaigns relies on victim-facing servers with legitimate VPS providers in the U.S., Singapore, and the UK, as well as relay servers for traffic obfuscation, and residential proxies or Tor for proxying.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The researchers noticed the use of C2 domains that would appear familiar to the target, such as the use of .gouv top-level extension for French-speaking countries or the dog3rj[.]tech domain in attacks in the European space.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">"It’s possible that the domain name could be a reference to 'DOGE Jr,' which has several meanings in a Western context, such as the U.S. Department of Government Efficiency or the name of a cryptocurrency," the researchers explain.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">According to Unit 42, TGR-STA-1030/UNC6619 represents an operationally mature espionage actor who prioritizes strategic, economic, and political intelligence and has already impacted dozens of governments worldwide.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Unit 42's report includes indicators of compromise (IoCs) at the bottom of the report to help defenders detect and block these attacks.</div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><a href="https://www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/#comments" target="_blank" rel="noopener" class="mycode_url">State actor targets 155 countries in 'Shadow Campaigns' espionage op</a></div>
<div style="text-align: center;" class="mycode_align"> <br />
By Bill Toulas</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">A state-sponsored threat group has compromised dozens of networks of government and critical infrastructure entities in 37 countries in global-scale operations dubbed 'Shadow Campaigns'.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Between November and December last year, the actor also engaged in reconnaissance activity targeting government entities connected to 155 countries.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">According to Palo Alto Networks’ Unit 42 division, the group has been active since at least January 2024, and there is high confidence that it operates from Asia. Until definitive attribution is possible, the researchers track the actor as TGR-STA-1030/UNC6619.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">'Shadow Campaigns' activity focuses primarily on government ministries, law enforcement, border control, finance, trade, energy, mining, immigration, and diplomatic agencies.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Unit 42 researchers confirmed that the attacks successfully compromised at least 70 government and critical infrastructure organizations across 37 countries.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">This includes organizations engaged in trade policy, geopolitical issues, and elections in the Americas; ministries and parliaments across multiple European states; the Treasury Department in Australia; and government and critical infrastructure in Taiwan.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.bleepstatic.com%2Fimages%2Fnews%2Fu%2F1220909%2F2026%2FFebruary%2FF1.jpg" loading="lazy"  alt="[Image: F1.jpg]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align">Targeted countries (top) and confirmed compromises (bottom)</div>
<div style="text-align: center;" class="mycode_align">Source: Unit 42</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The list of countries with targeted or compromised organizations is extensive and focused on certain regions with particular timing that appears to have been driven by specific events.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The researchers say that during the U.S. government shutdown in October 2025, the threat actor showed increased interest in scanning entities across North, Central and South America (Brazil, Canada, Dominican Republic, Guatemala, Honduras, Jamaica, Mexico, Panama, and Trinidad and Tobago).</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Significant reconnaissance activity was discovered against "at least 200 IP addresses hosting Government of Honduras infrastructure" just 30 days before the national election, as both candidates indicated willingness to restore diplomatic ties with Taiwan.</div>
<div style="text-align: center;" class="mycode_align">  </div>
<div style="text-align: center;" class="mycode_align">Unit 42 assesses that the threat group compromised the following entities:</div>
<div style="text-align: center;" class="mycode_align"> </div><ul class="mycode_list"><li>    Brazil’s Ministry of Mines and Energy<br />
</li>
<li>    the network of a Bolivian entity associated with mining<br />
</li>
<li>    two of Mexico’s ministries<br />
</li>
<li>    a government infrastructure in Panama<br />
</li>
<li>    an IP address that geolocates to a Venezolana de Industria Tecnológica facility<br />
</li>
<li>    compromised government entities in Cyprus, Czechia, Germany, Greece, Italy, Poland, Portugal, and Serbia<br />
</li>
<li>    an Indonesian airline<br />
</li>
<li>    multiple Malaysian government departments and ministries<br />
</li>
<li>    a Mongolian law enforcement entity<br />
</li>
<li>    a major supplier in Taiwan's power equipment industry<br />
</li>
<li>    a Thai government department (likely for economic and international trade information)<br />
</li>
<li>    critical infrastructure entities in the Democratic Republic of the Congo, Djibouti, Ethiopia, Namibia, Niger, Nigeria, and Zambia<br />
 <br />
</li>
</ul>
<div style="text-align: center;" class="mycode_align">Unit 42 also believes that TGR-STA-1030/UNC6619 also tried to connect over SSH to infrastructure associated with Australia’s Treasury Department, Afghanistan’s Ministry of Finance, and Nepal’s Office of the Prime Minister and Council of Ministers.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Apart from these compromises, the researchers found evidence indicating reconnaissance activity and breach attempts targeting organizations in other countries.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">They say that the actor scanned infrastructure connected to the Czech government (Army, Police, Parliament, Ministries of Interior, Finance, Foreign Affairs, and the president's website).</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The threat group also tried to connect to the European Union infrastructure by targeting more than 600 IP hosting *.europa.eu domains. In July 2025, the group focused on Germany and initiated connections to more than 490 IP addresses that hosted government systems.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">Shadow Campaigns attack chain</span></div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Early operations relied on highly tailored phishing emails sent to government officials, with lures commonly referencing internal ministry reorganization efforts.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The emails embedded links to malicious archives with localized naming hosted on the Mega.nz storage service. The compressed files contained a malware loader called Diaoyu and a zero-byte PNG file named pic1.png.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.bleepstatic.com%2Fimages%2Fnews%2Fu%2F1220909%2F2026%2FFebruary%2Fphish.jpg" loading="lazy"  alt="[Image: phish.jpg]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align">Sample of the phishing email used in Shadow Campaigns operations</div>
<div style="text-align: center;" class="mycode_align">Source: Unit 42</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Unit 42 researcher found that the Diaoyu loader would fetch Cobalt Strike payloads and the VShell framework for command-and-control (C2) under certain conditions that equate to analysis evasion checks.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">"Beyond the hardware requirement of a horizontal screen resolution greater than or equal to 1440, the sample performs an environmental dependency check for a specific file (pic1.png) in its execution directory," the researchers say.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">They explain that the zero-byte image acts as a file-based integrity check. In its absence, the malware terminates before inspecting the compromised host.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">To evade detection, the loader looks for running processes from the following security products: Kaspersky, Avira, Bitdefender, Sentinel One, and Norton (Symantec).</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Apart from phishing, TGR-STA-1030/UNC6619 also exploited at least 15 known vulnerabilities to achieve initial access. Unit 42 found that the threat actor leveraged security issues in SAP Solution Manager, Microsoft Exchange Server, D-Link, and Microsoft Windows.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">New Linux rootkit</span></div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">TGR-STA-1030/UNC6619's toolkit used for Shadow Campaigns activity is extensive and includes webshells such as Behinder, Godzilla, and Neo-reGeorg, as well as network tunneling tools such as GO Simple Tunnel (GOST), Fast Reverse Proxy Server (FRPS), and IOX.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">However, researchers also discovered a custom Linux kernel eBPF rootkit called ‘ShadowGuard’ that they believe to be unique to the TGR-STA-1030/UNC6619 threat actor.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">“eBPF backdoors are notoriously difficult to detect because they operate entirely within the highly trusted kernel space,” the researchers explain.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">“This allows them to manipulate core system functions and audit logs before security tools or system monitoring applications can see the true data.”</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">ShadowGuard conceals malicious process information at the kernel level, hides up to 32 PIDs from standard Linux monitoring tools using syscall interception. It can also hide from manual inspection files and directories named swsecret.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Additionally, the malware features a mechanism that lets its operator define processes that should remain visible.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The infrastructure used in Shadow Campaigns relies on victim-facing servers with legitimate VPS providers in the U.S., Singapore, and the UK, as well as relay servers for traffic obfuscation, and residential proxies or Tor for proxying.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">The researchers noticed the use of C2 domains that would appear familiar to the target, such as the use of .gouv top-level extension for French-speaking countries or the dog3rj[.]tech domain in attacks in the European space.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">"It’s possible that the domain name could be a reference to 'DOGE Jr,' which has several meanings in a Western context, such as the U.S. Department of Government Efficiency or the name of a cryptocurrency," the researchers explain.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">According to Unit 42, TGR-STA-1030/UNC6619 represents an operationally mature espionage actor who prioritizes strategic, economic, and political intelligence and has already impacted dozens of governments worldwide.</div>
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">Unit 42's report includes indicators of compromise (IoCs) at the bottom of the report to help defenders detect and block these attacks.</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Who's next ?]]></title>
			<link>https://pwnforums.st/Thread-Who-s-next--187488</link>
			<pubDate>Tue, 10 Feb 2026 08:49:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=235503">DC7414</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Who-s-next--187488</guid>
			<description><![CDATA[<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.chosun.com%2Fresizer%2Fv2%2FR3VGCTRVNZE4XAHXP3F2TCESJ4.jpg%3Fauth%3D91a13eaaf73d3834fd1b3e8e4d7ae7b793aa142fd22fe1f77fa467bdeb3bfab1%26amp%3Bwidth%3D616" loading="lazy"  alt="[Image: R3VGCTRVNZE4XAHXP3F2TCESJ4.jpg?auth=91a1...&amp;width=616]" class="mycode_img" /><br />
<br />
<br />
Chinese President Xi Jinping inspects the Central Military Commission leadership and the Joint Operations Command Center of the Communist Party in November 2022. Six of them, excluding current Vice Chairman Zhang Shengmin, have been purged starting with Li Shangfu in 2023 and recently including Zhang Youxia and Liu Zhenli.<br />
<hr class="mycode_hr" />
My friend would be very interested if you knew anything.]]></description>
			<content:encoded><![CDATA[<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.chosun.com%2Fresizer%2Fv2%2FR3VGCTRVNZE4XAHXP3F2TCESJ4.jpg%3Fauth%3D91a13eaaf73d3834fd1b3e8e4d7ae7b793aa142fd22fe1f77fa467bdeb3bfab1%26amp%3Bwidth%3D616" loading="lazy"  alt="[Image: R3VGCTRVNZE4XAHXP3F2TCESJ4.jpg?auth=91a1...&amp;width=616]" class="mycode_img" /><br />
<br />
<br />
Chinese President Xi Jinping inspects the Central Military Commission leadership and the Joint Operations Command Center of the Communist Party in November 2022. Six of them, excluding current Vice Chairman Zhang Shengmin, have been purged starting with Li Shangfu in 2023 and recently including Zhang Youxia and Liu Zhenli.<br />
<hr class="mycode_hr" />
My friend would be very interested if you knew anything.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Who's next ?]]></title>
			<link>https://pwnforums.st/Thread-Who-s-next--187486</link>
			<pubDate>Tue, 10 Feb 2026 08:25:20 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=235503">DC7414</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Who-s-next--187486</guid>
			<description><![CDATA[<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.chosun.com%2Fresizer%2Fv2%2FR3VGCTRVNZE4XAHXP3F2TCESJ4.jpg%3Fauth%3D91a13eaaf73d3834fd1b3e8e4d7ae7b793aa142fd22fe1f77fa467bdeb3bfab1%26amp%3Bwidth%3D616" loading="lazy"  alt="[Image: R3VGCTRVNZE4XAHXP3F2TCESJ4.jpg?auth=91a1...&amp;width=616]" class="mycode_img" /><br />
<br />
<br />
Chinese President Xi Jinping inspects the Central Military Commission leadership and the Joint Operations Command Center of the Communist Party in November 2022. Six of them, excluding current Vice Chairman Zhang Shengmin, have been purged starting with Li Shangfu in 2023 and recently including Zhang Youxia and Liu Zhenli.]]></description>
			<content:encoded><![CDATA[<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.chosun.com%2Fresizer%2Fv2%2FR3VGCTRVNZE4XAHXP3F2TCESJ4.jpg%3Fauth%3D91a13eaaf73d3834fd1b3e8e4d7ae7b793aa142fd22fe1f77fa467bdeb3bfab1%26amp%3Bwidth%3D616" loading="lazy"  alt="[Image: R3VGCTRVNZE4XAHXP3F2TCESJ4.jpg?auth=91a1...&amp;width=616]" class="mycode_img" /><br />
<br />
<br />
Chinese President Xi Jinping inspects the Central Military Commission leadership and the Joint Operations Command Center of the Communist Party in November 2022. Six of them, excluding current Vice Chairman Zhang Shengmin, have been purged starting with Li Shangfu in 2023 and recently including Zhang Youxia and Liu Zhenli.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Chinese Hackers Hijack Notepad++ Updates for 6 Months]]></title>
			<link>https://pwnforums.st/Thread-Chinese-Hackers-Hijack-Notepad-Updates-for-6-Months</link>
			<pubDate>Mon, 09 Feb 2026 04:23:29 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=284601">miyako</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Chinese-Hackers-Hijack-Notepad-Updates-for-6-Months</guid>
			<description><![CDATA[The breach, which lasted between between June and December of 2025, stemmed from an infrastructure-level compromise at Notepad++'s hosting provider that allowed the attackers to intercept update traffic destined for the legitimate notepad-plus-plus.org domain and redirect it to attacker-controlled servers that delivered malicious payloads.<br />
<br />
<a href="https://www.darkreading.com/application-security/chinese-hackers-hijack-notepad-updates-6-months" target="_blank" rel="noopener" class="mycode_url">https://www.darkreading.com/application-...s-6-months</a>]]></description>
			<content:encoded><![CDATA[The breach, which lasted between between June and December of 2025, stemmed from an infrastructure-level compromise at Notepad++'s hosting provider that allowed the attackers to intercept update traffic destined for the legitimate notepad-plus-plus.org domain and redirect it to attacker-controlled servers that delivered malicious payloads.<br />
<br />
<a href="https://www.darkreading.com/application-security/chinese-hackers-hijack-notepad-updates-6-months" target="_blank" rel="noopener" class="mycode_url">https://www.darkreading.com/application-...s-6-months</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[US police believe Savannah Guthrie's missing mother is 'still out there']]></title>
			<link>https://pwnforums.st/Thread-US-police-believe-Savannah-Guthrie-s-missing-mother-is-still-out-there</link>
			<pubDate>Thu, 05 Feb 2026 22:42:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=710125">roguebonha</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-US-police-believe-Savannah-Guthrie-s-missing-mother-is-still-out-there</guid>
			<description><![CDATA[Arizona police say they believe Nancy Guthrie, the missing mother of US news anchor Savannah Guthrie, "is still out there", though they have yet to identify a suspect in her disappearance]]></description>
			<content:encoded><![CDATA[Arizona police say they believe Nancy Guthrie, the missing mother of US news anchor Savannah Guthrie, "is still out there", though they have yet to identify a suspect in her disappearance]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Epstein Files — Real Leaks or Just Another Psyop?]]></title>
			<link>https://pwnforums.st/Thread-Epstein-Files-%E2%80%94-Real-Leaks-or-Just-Another-Psyop</link>
			<pubDate>Thu, 05 Feb 2026 08:00:06 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=49484">641a3</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Epstein-Files-%E2%80%94-Real-Leaks-or-Just-Another-Psyop</guid>
			<description><![CDATA[Hi everyone, <br />
<br />
Lately there’s been a wave of so-called “new” Epstein files popping up everywhere. Some people say these are legit leaks, others say it’s the same old material repackaged with a bit of noise.<br />
What’s your take?<br />
Are these documents actually credible and backed by solid sources, or is this just another controlled narrative to steer attention elsewhere?<br />
Interested to hear thoughts from people who’ve actually looked deeper than mainstream coverage.]]></description>
			<content:encoded><![CDATA[Hi everyone, <br />
<br />
Lately there’s been a wave of so-called “new” Epstein files popping up everywhere. Some people say these are legit leaks, others say it’s the same old material repackaged with a bit of noise.<br />
What’s your take?<br />
Are these documents actually credible and backed by solid sources, or is this just another controlled narrative to steer attention elsewhere?<br />
Interested to hear thoughts from people who’ve actually looked deeper than mainstream coverage.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Trade Wars vs. Strategic Deals (US-India)]]></title>
			<link>https://pwnforums.st/Thread-Trade-Wars-vs-Strategic-Deals-US-India</link>
			<pubDate>Thu, 05 Feb 2026 07:35:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=708688">rfnuis</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Trade-Wars-vs-Strategic-Deals-US-India</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Headline: The &#36;500 Billion Pivot: India Chooses Washington over Moscow</span> The White House just announced that India has committed to halting Russian oil purchases in exchange for a massive &#36;500 billion investment package and reduced tariffs on Indian goods. This is a massive shift in the "non-aligned" movement.<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">The Big Question:</span> Can India truly decouple from Russian military hardware, or is this "trade deal" just a temporary maneuver to avoid U.S. secondary sanctions?<br />
</li>
</ul>
]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Headline: The &#36;500 Billion Pivot: India Chooses Washington over Moscow</span> The White House just announced that India has committed to halting Russian oil purchases in exchange for a massive &#36;500 billion investment package and reduced tariffs on Indian goods. This is a massive shift in the "non-aligned" movement.<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">The Big Question:</span> Can India truly decouple from Russian military hardware, or is this "trade deal" just a temporary maneuver to avoid U.S. secondary sanctions?<br />
</li>
</ul>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Japan’s Political Gamble (Elections)]]></title>
			<link>https://pwnforums.st/Thread-Japan%E2%80%99s-Political-Gamble-Elections</link>
			<pubDate>Thu, 05 Feb 2026 07:35:01 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=708688">rfnuis</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Japan%E2%80%99s-Political-Gamble-Elections</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Headline: Sunday’s "Snowy Election" in Japan</span> Prime Minister Sanae Takaichi’s decision to hold a general election this Sunday is being called a "logistical nightmare" by the opposition. With heavy snow forecast for the north and university entrance exams in full swing, turnout could be at historic lows.<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">The Big Question:</span> Is this a strategic move by the LDP to secure power while the opposition is fragmented, or will the "remilitarization" debate drive voters to the polls regardless of the weather?<br />
</li>
</ul>
]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Headline: Sunday’s "Snowy Election" in Japan</span> Prime Minister Sanae Takaichi’s decision to hold a general election this Sunday is being called a "logistical nightmare" by the opposition. With heavy snow forecast for the north and university entrance exams in full swing, turnout could be at historic lows.<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">The Big Question:</span> Is this a strategic move by the LDP to secure power while the opposition is fragmented, or will the "remilitarization" debate drive voters to the polls regardless of the weather?<br />
</li>
</ul>
]]></content:encoded>
		</item>
	</channel>
</rss>