Cybersecurity Is About To Get Weird
In early 2026, Anthropic’s AI model Claude Opus 4.6 demonstrated a breakthrough in automated vulnerability discovery by identifying over 500 high-severity zero-day vulnerabilities in widely used open-source software, including Firefox, FreeBSD, Vim, and Emacs. The model operated with minimal prompting and no specialized tools, relying on its ability to read, reason about, and analyze code like a human researcher. This marks a pivotal shift in cybersecurity, where AI can now independently find exploitable bugs at scale—some of which had remained undetected for decades despite rigorous human review.
One of the most alarming findings was a working remote kernel exploit for FreeBSD (CVE-2026-4747), delivered within just eight hours of analysis. Similarly, critical vulnerabilities were confirmed in Firefox (CVE-2026-2796) and Vim (CVE-2026-34714), both of which have since been patched. Notably, the GNU Emacs maintainers declined to fix their reported flaw, leaving users exposed and highlighting a growing bottleneck: the pace of AI-driven discovery now exceeds human capacity for patching.
AI-Generated Malware and Autonomous Exploitation
The same AI capabilities that empower defenders are being weaponized by attackers. In March 2026, researchers confirmed that Russian-linked APT group APT36 is using AI-generated or “vibecoded” malware, capable of producing hundreds of unique variants on demand. These polymorphic payloads evade signature-based detection by dynamically rewriting their code, changing programming languages (e.g., Go, Rust, Nim), and altering injection techniques—all at minimal cost.
Even more concerning is the emergence of Mythos Preview, a newer, unreleased model from Anthropic that achieves a 72.4% success rate in generating working exploits, compared to Opus 4.6’s near-zero exploit success. Mythos operates autonomously within isolated containers, finding vulnerabilities and crafting functional exploits without human intervention. This capability signals a future where AI predator swarms could launch thousands of personalized phishing emails per second or deploy ransomware across networks in under a minute.
AI-Powered Phishing and Deepfake Fraud Surge
AI has dramatically lowered the cost and increased the realism of social engineering attacks. In 2026, AI-generated phishing campaigns use large language models to harvest public data and craft hyper-personalized emails that mimic executive writing styles, bypassing traditional spam filters. Voice and video deepfakes have become routine, with documented cases of AI-synthesized calls impersonating U.S. officials to extract credentials.
Organizations are responding by adopting phishing-resistant MFA, out-of-band verification, and AI-powered detection tools that analyze email anomalies and behavioral patterns. However, the speed and scale of AI-driven attacks are outpacing legacy defenses. As one expert noted, “the cost of creating a sophisticated phishing scam has gone down significantly from the attacker’s perspective.”
Critical Infrastructure Under AI-Enhanced Attack
On April 7, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory warning that Iranian hackers are exploiting vulnerabilities in programmable logic controllers (PLCs) to target U.S. energy, water, and government services. These attacks follow a broader trend of nation-state actors using AI to automate reconnaissance, identify unpatched systems, and generate tailored exploits within hours.
Recent incidents include a ransomware attack on a North Dakota water plant and disruptions to The Invisible Internet Project (I2P) by the IoT botnet Kimwolf, which used I2P’s encrypted network to hide command-and-control traffic. Meanwhile, China-nexus actors have gained long-term access to critical infrastructure providers, using AI to maintain persistence and evade detection.
What Does The KJV Bible Say?
Cybersecurity is entering a “weird” phase where AI acts as both the ultimate defender and the ultimate threat, blurring the lines between truth and deception, often aligning with prophetic warnings in the King James Version (KJV) regarding the last days.
According to KJV interpretations, the “plan” for AI in security is to create perfect, untiring guardians. The “reality” is that these tools often become tools of deception, surveillance, and false confidence.
AI Cybersecurity Plan vs. Reality (KJV Perspective)
| # | Topic | AI Plan (Industry View) | Reality (The Weirding) | KJV Perspective / Verse |
|---|---|---|---|---|
| 1 | Truth/Deception | AI distinguishes truth from lies. | Deepfakes & AI disinformation destroy trust. | 2 Thess 2:11 – Send strong delusion, that they should believe a lie. |
| 2 | Threat Detection | AI sees all threats (all-knowing). | AI makes false positives & misses novel attacks. | 1 Cor 13:12 – For now we see through a glass, darkly… |
| 3 | Decision Making | Autonomous AI agents secure networks. | AI hallucinating, making autonomous bad decisions. | Proverbs 3:5 – Trust in the LORD… lean not unto thine own understanding. |
| 4 | Identity/Voice | Biometrics securely identify users. | AI voice cloning bypasses security. | Genesis 27:22 – …but the voice is Jacob’s voice. |
| 5 | Surveillance | AI prevents crime by monitoring behavior. | AI surveillance creates dystopian control/shadow banning. | Revelation 13:17 – …no man might buy or sell, save he that had the mark. |
| 6 | Speed/Defense | AI defends at machine speed. | Attackers use AI to attack at machine speed. | Proverbs 11:3 – The integrity… shall guide them: but the perverseness of transgressors shall destroy them. |
| 7 | Knowledge | Data analytics brings perfect understanding. | Overload of false information (misinformation). | Daniel 12:4 – …many shall run to and fro, and knowledge shall be increased. |
| 8 | The “Beast” System | Centralized, secure cloud AI defenses. | A single point of failure that controls all access. | Revelation 13:15 – …the image of the beast should both speak, and cause… |
| 9 | Human Role | AI makes humans superhuman defenders. | Humans become subservient to AI alerts (alert fatigue). | 1 Timothy 6:20 – …avoiding profane and vain babblings, and oppositions of science falsely so called. |
| 10 | Data Security | Perfect encryption, no data leaks. | AI-powered data poisoning steals everything. | Jeremiah 12:13 – They have sown wheat, but shall reap thorns… |
10 Examples of “Weird” AI Cybersecurity Reality
- Deepfake Ransomware: Scammers use AI to clone a CEO’s voice to authorize a 25-million-dollar transfer.
- Autonomous Malware (Polymorphic): Malware uses AI to rewrite its own code to evade signature-based detection in real-time.
- AI Hallucination Exploits: AI security tools confidently identify a “vulnerability” that does not exist, causing teams to break working systems.
- Shadow AI Data Leakage: Employees use public ChatGPT to summarize confidential security reports, leaking company secrets.
- Prompt Injection Phishing: Attackers embed hidden commands in emails that force an organization’s AI assistant to delete security logs.
- AI-Driven Honeypots: Defenders use AI to create adaptive, fake servers that “learn” how attackers work, but the AI starts chatting with hackers.
- Data Poisoning (AI Sabotage): Hackers feed false, tainted data into a company’s training set to make their AI “blind” to certain types of attacks.
- Automated Social Engineering: GenAI analyzes thousands of LinkedIn profiles to create perfectly tailored phishing campaigns automatically.
- AI Censorship/Shadow Banning: AI moderation bots disproportionately remove religious or conservative content, defining what is allowed in the digital space.
- The “Image” that Speaks: AI chatbots acting as a central control system for buying/selling, aligning with prophetic interpretations of surveillance.
Disclaimer: Interpretations of KJV prophecy regarding modern technology are based on theological commentary and speculation within Christian cybersecurity circles, as noted in the search results.
As You seek understanding and clarity in your life you should always turn to your Heavenly Father for Guidance
Table of Contents
- Youtube Video (Todays Message)
- Are You Your Own Worst Enemy?
- Women are looking for a fathers love
- Spiritual Order – In The Family and Church
- How God Commands Us To Forgive Those Who We Have Resentment Toward
- Join Our Newsletter
- Top Seven Articles
- Our Mission Statement
- Our Vision
- Tithing And Giving!
When Tithing please give what you feel is good to the amount we are helping you in your spiritual life.

Here is a YouTube video to help theses who need to understand someone explaining the important message, the YouTube video is called, “cybersecurity is about to get weird”, This video is with Low Level
YouTube Channel:
Note: MadeManMinistries.com has no relations with Low Level YouTube Channel, but MadeManMinistries.com enjoys sharing the word.
Note: We do use YouTube Video’s under the “Fair Use” Act under the Copyright Law:
“Fair use is a doctrine in the United States copyright law codified in Section 107 of the Copyright Act of 1976.1 It provides for the legal, non-licensed citation or incorporation of copyrighted material in another author’s work without requiring permission from the rights holders, such as for commentary, criticism, news reporting, research, teaching or scholarship.01 The U.S. Copyright Office Fair Use Index should prove helpful in understanding what courts have to date considered to be fair or not fair but it is not a substitute for legal advice.2“

This is a major important point about forgiveness
Leave there thy gift before the altar, and go thy way; first be reconciled to thy brother, and then come and offer thy gift. -MATTHEW 5:24 KJV
Are You Your Own Worst Enemy?
I would start out by saying what Jesus Christ would want us to do? Pray and how should we pray? The Lord’s Prayer, and how often should we pray? Continually. Why do we use the Lord’s Prayer and not some other? The Lord’s Prayer covers all the areas that is important for our spiritual being.
When we pray the Lords prayer we ask to forgive our enemies, let God’s will be done, the kingdom to come. By praying the Lord’s prayer we let go of many thoughts we have in our head and give them back to God so we can have things revealed to us.
We must overcome resentment in our heart, and in a past video I shared about Dr. Jordan Peterson talks about how resentment can destroy us and we become our own very worst enemy and Jordan goes on to say that we must talk to people what we have resentment toward to overcome that resentment. Other people who lived in the past who talked about this is Jesus Christ and someone who is living now who talks about this daily is Brother Augustine, Dr. John MacArthur, Dr. Charles Stanley, Rev. John Piper and Pastor Paul Washer.
Women are looking for a fathers love
Women are looking for a fathers love. Its important that men understand women are looking for a fathers love and not get screwed. Woman more than anything are looking for a strong spiritual man to lead the future (the family). I think in many YouTube videos on biblical teachings, how young women are being hurt by men that are just looking to get laid instead of doing right and being in Christ and setting a good example of a strong man. We must be in Christ, hate no one, love all, forgave theses we resent, love what is right and support people who are walking with God.
Women need their fathers in their lives to be strong man to be good examples and not BETA men or weak examples of what a man should be. Its important that a man leads the way as Christ leads men, we as man need to fellow Jesus Christ to keep society from going to HELL.
Every day you can see or people watch how some men and women our living in hell without the right spiritual order then you will continue your hellish way according to 2 Peter. You can also find it in Romans. God will give you over to a reprobate mind.
And even as they did not like to retain God in their knowledge, God gave them over to a reprobate mind, to do those things which are not convenient. – Romans 1:28 (KJV)
In Romans 1, Paul refers to something known as a reprobate mind. If you’re not familiar with the term reprobate, the literal definition in the Greek is failing to pass the test, unapproved, counterfeit.

Spiritual Order – In The Family and Church
God the father
Jesus Christ
Father (Men over women)
Mother (Women over children)
Here is Book, Chapter and Verse from the Kings James Version 1 Corinthian 11:2-16, But the main message is in 1 Corinthian 11:3: “3 But I would have you know, that the head of every man is Christ; and the head of the woman is the man; and the head of Christ is God.”
A Woman Conferring The Spiritual Order According to Saint Paul And How The War On The Family Is Being Wage:
How You Treat People Is Who You Are! On Judgement Day You Will Be Judged How You Treated The Less Fortunate (Open Letter
New Social Contract To Save The West!
Should America And The Western World Have A New Social Contract? (Open Letter)
Father’s Rights
GARBAGE GENERATION

GARBAGE GENERATION By Daniel Amneus
$15.95 Price Check Ebay.com
Daniel Amneus – The Garbage Generation.pdf Link
Back to Patriarchy!

Back to Patriarchy! by Daniel Amneus
$29.95 Price Check Ebay.com


Check out our newest website CIPADS.com place ads for business, jobs, real estate or another site like craigslist
How God Commands Us To Forgive Those Who We Have Resentment Toward.
All of us are tested everyday by our personal internal struggle coming from resentment of what happened earlier in our lives as children typically what our mother did to us, telling how our fathers were not good enough or driving us away from our fathers when we were children. We most go to the people that we have resentment against and forgive them. By forgiving our mothers or whoever we have resentment against, God will forgive us and we can return to the heavenly Father through our Lord and Savior Jesus Christ.
It was said if you don’t love everyone then you love no one. People today live like the Old Testament people did. We must forgive and love everyone as God Commanded us to do according to Matthew 22:34-40.
After Reading The Passage I would Recommend Doing A Silent Prayer
Its is said: Be still, and know that I am God: I will be exalted among the heathen, I will be exalted in the earth. Psalm 46:10 King James Version (KJV)

Jesus is an example of a Fathers loves
Join Our Newsletter
Top Seven Articles
- The Problem With Older Women Liking/Dating Younger Men
- I Dream A Dream That All Men Would Have Love For One Another
- IF by Rudyard Kipling (A Life Changing Poem)
- HOW to be PERFECT… According to Jesus Matthew 5:43-48
- Let Women Come To You
- The Willful Submission of a Christian Wife (Ephesians 5:22-24)
- The Greatest Mistake Man Has Ever Made?
The List Children Of The Lie!!
The List Children Of The Lie!!
People of the Lie : The Hope for Healing Human Evil
Average Rating: (3.6) stars out of 5 stars
$17.93 Buy now price check at Walmart
Special Articles:
Who Was Jezabelle In The Bible?
Is Malachi An Indictment Against Mankind?
What does the Bible say about breaking generational curses?
Its Time To Repeal Women’s Rights To Contact Your Elected Official
Is It Time To Establish Israel/The New Jerusalem As Head Of The World
The Terrifying Truth About The Antichrist
Sexual Revolution, Perverted Revolution, Then Reprobates
Are The Black Hebrew Israelites The Synagogue of Satan Accusation in Revelation 2:9?
A Wife Should Be “A Mirror” To Her Husband?
Ethoipian Bible Was Never Translated In To English
Heretic Series/Beware Of The Wolf In Sheeps Clothing
Is The Mormon Church Heretics? Of Arianism Heresy
Is Rev. Robert W. Lee A Heretic?
Does Gino Jennings Know Hes a Heretic? Of The Arianism Heresy Part Two
Is Islam And All Muslims Heretics? Of Arianism Heresy
Is Gino Jennings A Heretic? Of Arianism Heresy
Is Jesse Lee Peterson A Heretic? Of Arianism Heresy
Who Are the 5 percenter or 5%? Are They Heretics
Who Is Billy Carson? Why Does Billy Teach A Different Gospel Of Our Lord Jesus Christ?
In a world where it is so easy to forget the importance of God, we must remember that He is holy and will not share His glory. America has forgotten this truth and it is time for us to re-examine our relationship with God and recognize that He is the one true God who deserves our full devotion and reverence. We must remember that He will not be taken lightly or ignored, but rather should be honored as the Creator of all things. Only then can we truly experience His love and grace in our lives.
America Has Forgotten! That God The Father Is Holy And He Will Not Share His Glory!
God Reveals Himself
Click the link about a PDF how God reveals himself to you: God Reveals and Satan Speaks to you!
Our Mission Statement
Uniting men of good character who, though of different ethnic or social backgrounds, share a belief in the fatherhood of God and the brotherhood of mankind. Bring Men back to the Father and sharing the biblical view of the Heavenly Father.
Our Vision
By returning to our heavenly father God thru the Lord and Savior Jesus Christ we can rebuilt the family, once the man is recognized as the head of the family and household. Partner with us as we develop a community, mission, and leadership support for the men of today.
Now is the time for a new movement of men. As brothers, fathers let’s become who we’re created to be, knowing our identity, purpose, and destiny in Christ. Then let’s do, linking arms to change the world for good … and for God. Help bring transformation and revival to our families, churches, and communities.

Tithing And Giving!
When Tithing please give what you feel is good to the amount we are helping you in your spiritual life. We are a for profit Ministry meaning we take all profits or donations and give it back to the community we service. Please visit our sponsors down below or along the side of the website, Thanks.

Save Up To 60% Off Hotels, Flights, Cruises, Rental Cars