
[ad_1]
Federal employees at the Department of Housing and Urban Development (HUD) were greeted this morning by television sets at the agency’s Washington, DC, headquarters playing what appears to be an AI-generated video of President Donald Trump kissing the feet of Elon Musk, accompanied by the words “LONG LIVE THE REAL KING.”
Build a website that pays you back with real revenue.
A person at HUD headquarters on Monday morning shared a video with WIRED showing the scene playing out on a loop on a TV screen inside the Robert C. Weaver Federal Building. The source, who was granted anonymity over fears of repercussions, says that workers at the building had to manually turn off each TV in order to stop the video playing.
It is currently unclear who was behind the prank. Similar AI-generated videos and still images of Trump kissing Musk’s feet have been shared on social media platforms since last year.
“Another waste of taxpayer dollars and resources,” Kasey Lovett, a HUD spokesperson tells WIRED. “Appropriate action will be taken for all involved.”
The White House did not immediately respond to a request for comment.
The incident came just days after leaked documents showed that Elon Musk’s so-called Department of Government Efficiency (DOGE) project was planning to eradicate 4,000 employees at the agency, which is in the midst of dealing with a US housing crisis.
NPR reported this weekend that HUD’s Office of Community Planning and Development is slated to lose 84 percent of its staff according to leaked documents.
“We’ve decided internally to start notifying our grantees—every mayor, county head, governor, nonprofit CEO, and congressional earmark recipient—that they should anticipate a loss or significant unpredictable delay in funding,” a current HUD employee tells WIRED.
Over the weekend, employees at HUD, like many other federal workers, received an email from the Office of Personnel Management demanding a reply with “approx. 5 bullets of what you accomplished last week.”
Leadership at many of the agencies, as well as federal workers’ union leaders, told their members not to respond to the emails, while HUD leadership told employees to wait until at least noon on Monday before taking any action, a HUD source tells WIRED.
[ad_2]
Source link
Related posts:
Stay Safe Online: Essential Tips for Safer Internet Day
Is Your Phone Your Best Friend or a Silent Spy?
Wipe Your Digital Footprints with Data Wipe Software
No, you’re not fired – but beware of job termination scams
DeceptiveDevelopment targets freelance developers
Fake job offers target coders with infostealers
Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware
LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation
Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads
CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
Three Password Cracking Techniques and How to Defend Against Them
New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent
Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles
Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts
AI-Powered Social Engineering: Ancillary Tools and Techniques
Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls
New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
CISO's Expert Guide To CTEM And Why It Matters
South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics
Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers
New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials
Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication
Debunking the AI Hype: Inside Real Hacker Tactics
Build a website that pays you back with real revenue.



















