We Went to Viareggio to Talk Bitcoin. The Real Subject Was Something Else.
Cybersecurity Insights Decoded

DECODED – Why $1.46B walked out of Bybit & the phishing lesson from Tuscany Lightning Summit in Viareggio

At the Tuscany Lightning Summit 2026 in Viareggio, our CTO Francesco Baccaro stood in front of some of the most paranoid engineers in the Bitcoin ecosystem and told them their cryptography wasn’t the problem. The $1.46B Bybit heist, the rise of Permit and EIP-7702 phishing, and a hard truth the crypto industry keeps ignoring.

40 minutes. From model resistance to live RCE on federal infrastructure."
Cybersecurity Insights PacketHunters

๐ŸŽฃ #PacketHunters – One operator. Nine Gov agencies. 195 million records. Claude Code did the recon ๐Ÿ’ฅ

Between December 2025 and February 2026, one attacker breached nine Mexican government organizations using a dual-AI workflow: Claude Code for live exploitation, GPT-4.1 for post-exploitation reconnaissance at scale. 75% of remote command execution was AI-generated. RCE on a federal server in 40 minutes. This is the PacketHunters breakdown, including defensive scripts and what the forgery system built afterward means for your incident response assumptions.

How crypto companies get owned? Three anonymized breach patterns and the OSINT surface they left behind
Customer Stories / Case Studies Cybersecurity Insights PacketHunters

๐ŸŽฃ #PacketHunters – How crypto companies get owned? Three anonymized breach patterns and the OSINT surface they left behind

Smart contract exploits are declining. Human-layer attacks are not. In 2025, phishing led all crypto attack categories by incident count. We reconstructed three anonymized breach patterns (an exchange, a DeFi protocol, a Web3 startup) and built detection scripts around the OSINT surface each one exposed before the attack landed.

Before a phishing email hits your inbox, your company has already been profiled.
Cybersecurity Insights PacketHunters

๐ŸŽฃ #PacketHunters – Exposure surface mapping: how much of your company is visible in 20 minutes?

Before a phishing email is written, your company has already been profiled. Names, roles, email patterns, VPN portals, cloud providers โ€” all gathered through open sources in under 20 minutes. In this PacketHunters breakdown, we map real organizational exposure using OSINT and Python, and show why phishing defense starts long before the first malicious link is sent.

Scroll to Top