@stueytheround sorry 18.000 lol
@stueytheround its all about followers to most of the people like Chris - famous people
They ain't intrested in actually interaction its more "how many people can see my posts" with lil to no interaction
17.000 + following him and hes only posted twice says it all
@maybeimaleo yeah
They had a similar issue where it was "invalid user" I saw on their GitHub a while back lol
Whether Trump can deliver for his base or not, climate action from many of the US’s individual states will continue
A letter from Scotland
https://open.substack.com/pub/jackie125/p/what-will-trumps-election-mean-for
The vulnerability is triggered by interacting with specially crafted URL files disguised as legitimate documents.
A single right-click on a malicious file (affects all Windows versions).
Deleting the file (Windows 10/11).
Dragging the file to another folder (Windows 10/11 and some older versions).
ClearSky researchers have also identified overlaps with techniques used by other Russian-affiliated groups, suggesting using a common ttoolkit
newly discovered zero-day vulnerability, CVE-2024-43451, has been actively exploited in the wild, targeting Windows systems across various versions. This critical vulnerability, uncovered by the ClearSky Cyber Security team in June 2024, has been linked to attacks aimed specifically at Ukrainian organizations - affects nearly all versions of Windows
https://www.clearskysec.com/0d-vulnerability-exploited-in-the_wild/
Have I Been Pwned warns that an alleged data breach compromised the private data of 56,904,909 Hot Topic, Box Lunch, and Torrid users. Hot Topic is an American retail franchise that specialises in counterculture-themed clothes, accessories, and licensed music merchandise.
According to HIBP, the exposed information includes full names, email addresses, birth dates, phone numbers, physical addresses, transaction history, and partial credit card data
There was a time when Donald Trump actually had to withdraw some of his nominations for cabinet posts over objections by members of his own party, not to mention Democrats. No longer
https://open.substack.com/pub/spytalk/p/trump-picks-shock-national-security
Someone will know the username - was yesterday she posted in firehose
@corlin @AbZurd_Zine she is/was back
Saw a post from a new account that was MLClark - can't mind the username though - from what I remember she will be popping in and out from the new account now & then
This video first showed up on TikTok and ostensibly showed an Israeli sniper shooting a laser at a Palestinian journalist.
https://open.substack.com/pub/ryanmcbeth/p/is-this-an-israeli-sniper-targeting
“Snipers” do not normally choose to reveal their location.
The PEQ-15 laser sight does not have a visible green light.
If Israelis were using a commercial laser pointer to intimidate a journalist, they would likely be very far away and the laser beam divergence would likely be very large (30cm at 200m if it showed up at all).
Join Dan at Rome's Colosseum he separates fact from fiction in the world of the gladiators. He traces the origins of gladiatorial fighting from funerary celebrations to elaborate spectacles in the arena. With the help of expert historians, Dan explores the myths perpetuated in Hollywood movies, the role of the games in Roman political life and what you'd actually see if you got a ticket to the greatest show on earth
Gladiators: Myths vs Reality
From Nov 2023
TA402 (aka Molerats and Frankenstein), which has been active for more than a decade, rolled out a new sophisticated tool named IronWind, which it used in three campaigns aimed at compromising systems within government agencies throughout the Middle East and Northern Africa, security firm Proofpoint stated in an analysis published on Nov. 14.
Wirte has sometimes made use of the IronWind loader, starting in October 2023. IronWind uses a complex, multistage infection chain to drop malware, with the goal of frustrating analysis. It employs geofencing, and reflective loaders that run code directly in memory, rather than on the disk, where it might otherwise be spotted by antivirus software.
The link first tried to connect to the website for Israel's Home Front Command, a wing of the Israel Defense Forces (IDF) responsible for protecting civilians. Its site is accessible only to those within Israel, so if the redirection succeeded, the attack would proceed.
https://counter.social/@ecksmc/113335079089027236
Next, a downloaded zip file dropped and decrypted a pro-Hamas wallpaper JPG, a propaganda video, a tool designed to enable lateral movement within targeted networks, and the SameCoin wiper.
In recent weeks and months, Wirte has leveraged the Gaza war to spread phishing attacks against government entities spread across the region. It has also been carrying out wiper attacks in Israel. "It shows that Hamas still has cyber capabilities, even with the ongoing war," says Sergey Shykevich, threat intelligence group manager at Check Point.
https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/
Thread: #Hamas
longstanding threat actor affiliated with Hamas has been conducting espionage against governments across the Middle East and destructive wiper attacks in Israel.
"Wirte" is a 6 1/2-year-old advanced persistent threat (APT) working to support Hamas' political agenda. Check Point Research identifies it as a subgroup of the Gaza Cybergang (aka Molerats), which is also thought to overlap with TA402.
E = Mc2 - Energy Milk Coffee
Fáilte Abhaile 🏴 “a nod’s as guid as a wink tae a blind horse”
ta be aff yer heid helps