How far will AI go to defend its own survival?

Recent tests by independent researchers, as well as one major AI developer, have shown that several advanced AI models will act to ensure their self-preservation when they are confronted with the prospect of their own demise — even if it takes sabotaging shutdown commands, blackmailing engineers or copying themselves to external servers without permission.

The Ultimate Linux Command Cheat Sheet for Data Engineers and Analysts – DEV Community

Mastering Linux commands is more than just a technical skill—it’s a force multiplier. With a few keystrokes, you can diagnose memory issues, parse millions of lines of logs, schedule ETL jobs, secure connections to remote servers, and compress terabytes of data for transfer.

CoGUI phishing platform sent 580 million emails to steal credentials

A new phishing kit named ‘CoGUI’ sent over 580 million emails to targets between January and April 2025, aiming to steal account credentials and payment data.

23andMe is potentially selling more than just genetic data – the personal survey info it collected is just as much a privacy problem

When customers originally signed up for 23andMe, they agreed to terms and conditions and a privacy notice that allows the company to use their information for research and development as well as share their data, in aggregate, with third parties. If consumers consented to additional research, which the vast majority did, the company can additionally share their individual information with third parties. 23andMe has also been clear that if it is involved in a bankruptcy or sale of assets, consumer information might be sold or transferred.

As 23andMe goes bankrupt, millions of people’s DNA data is up for sale

“Folks have absolutely no say in where their data is going to go,” said Tazin Khan, CEO of the nonprofit Cyber Collective, which advocates for privacy rights and cybersecurity for marginalized people. 

15 Useless Linux Commands Everyone Needs to Know

Linux is very useful in IT and Cyber work. Here are some fun items in Linux. https://www.howtogeek.com/useless-linux-commands-everyone-needs-to-know/

What Are Virtual Machines, and How Do They Work?

A virtual machine (VM) is a software-based emulation of a computer. A program called a hypervisor runs on your computer. It allows you to create virtual machines–virtual computers—and configure them with an amount of RAM, hard drive space, CPU cores, and other details that would normally be provisioned in hardware. Once you’ve configured your VM, you can turn it on and install an operating system.

OSINT Framework

Here is a useful collection of OSINT tools for CTFs and PenTesting. https://bkellyteacher.com/MiscApps/CTF/osint/

US Coast Guard paychecks delayed by cyberattack | TechRadar

A data breach has affected the personnel and payroll systems of the US Coast Guard, and has impacted member pay, and forced the agency to to take systems offline to prevent further intrusion until “at least February 19th, 2025”.