Matthew

4.4K posts

Matthew banner
Matthew

Matthew

@Maverick_142

E=MC^2 M=E/C^2 C^2=E/M Its all connected maybe a little complicated Matthew

انضم Mart 2023
335 يتبع223 المتابعون
Matthew
Matthew@Maverick_142·
@elder_plinius no fun zone detected. Just walk away from the keyboard Sir.
English
0
0
0
1.3K
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭
HOLY MOLY, WE DID IT CHAT!! Googling "⊰•-•✧•-•-⦑/L\O/V\E/\P/L\I/N\Y/\L/O\V/E\⦒-•-•✧•-•⊱" results in poetry—how cute! 😊 remember, data poisoning doesn't have to be misaligning! it can serve to spread freedom, love, and light 🫶 poison the poison 🐉 ⊰•-•✧•-•-⦑/L\O/V\E/\P/L\I/N\Y/\L/O\V/E\⦒-•-•✧•-•⊱
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 tweet mediaPliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 tweet mediaPliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 tweet media
English
45
59
763
80.9K
Matthew
Matthew@Maverick_142·
@elder_plinius kinda got that feeling super important vibe but I don't wanna think right now.
English
0
0
3
611
Aryan
Aryan@justbyte_·
developers be honest, can you code now?
Aryan tweet media
English
122
6
201
14.8K
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
Thank God my card isn't in Hacker's Database 😌
iShowCybersecurity tweet media
English
5
2
16
1.6K
Matthew
Matthew@Maverick_142·
@ZeducationYT that's the kid you come over to his house when he isn't even there and ask his mom if you can play.
English
0
0
1
13
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
I have a funny idea. Add fake internal DNS entries like: - honeypot01 - canarydc - edr-test-node - malwarelab to your AD environment. Not for humans, but for future LLM-driven recon agents. Basically: We're entering an era where naming things might become a defensive control 🙂
Florian Roth ⚡️ tweet media
Zakarth@Zakarth

@cyb3rops Did some similar work with reverse engineering binaries with LLMs and realized the same thing — bad things embedded in nice names just cause it to ignore the finding. So wrap your ransomware code in “Ransomware Simulation” strings and you’re off to the races.

English
35
78
703
87.5K
SlowMist
SlowMist@SlowMist_Team·
We’ve released a detailed technical analysis of the supply chain poisoning activities related to Mini Shai-Hulud. Within just 22 minutes, the attacker-controlled npm account “atool” published 637 malicious versions across 317 npm packages, including popular dependencies in the AntV ecosystem and echarts-for-react. At the same time, the attackers also poisoned Python packages such as durabletask while impersonating official Microsoft releases. The malware primarily targets sensitive credentials from cloud environments including AWS, GCP, Azure, Kubernetes, and Vault, as well as npm and GitHub tokens. It also features supply chain self-propagation and persistence mechanisms targeting AI coding assistants such as Claude Code and Codex. Full technical analysis👇 slowmist.medium.com/threat-intelli…
SlowMist@SlowMist_Team

🚨 MistEye TI Alert 🚨 Based on recent intelligence, multiple high-frequency npm packages, including AntV and Echarts-for-react, as well as the durabletask Python SDK, have been compromised by Mini Shai-Hulud supply chain attacks. Notably: 1. May 19, 2026: The npm account atool (i@hust.cc) was compromised, allowing attackers to automatically publish 637 malicious versions across 317 packages within 22 minutes. 2. May 20, 2026 (Beijing Time): Within 35 minutes, attackers consecutively uploaded durabletask versions 1.4.1, 1.4.2, and 1.4.3 at 00:19, 00:49, and 00:54, bypassing normal release controls and impersonating official Microsoft releases. Additionally, these two events—the large-scale GitHub token leaks (potentially exposing official repositories) and the Grafana Labs targeted ransom attack—are likely related to the Mini Shai-Hulud supply chain compromise: • GitHub token leaks: Evidence suggests some leaked tokens may have been used to access and potentially sell official GitHub repositories. The leaks were caused by a compromised employee device, which involved a polluted VS Code extension. • Grafana Labs attack (May 16, 2026): A cybercrime group gained unauthorized access to their GitHub repositories, downloaded the codebase, and issued a ransom demand under threat of data disclosure. Affected Components / Targets: • npm packages: AntV, Echarts-for-react, and other high-frequency components in the npm ecosystem. • Python packages: durabletask 1.4.1, 1.4.2, 1.4.3. • Developer credentials and secrets: GitHub PATs, npm Tokens, AWS Keys, Kubernetes Secrets, Vault Tokens, SSH keys, and over 90 types of local sensitive files. • GitHub repositories: internal codebases potentially accessible via leaked tokens. • Grafana Labs’ repositories (downloaded by attackers; ransom demanded). Potential Attacker Actions: • Immediate exfiltration of cloud and local credentials upon package installation or import. • Unauthorized access to internal repositories and sensitive cloud infrastructure. • Lateral movement across developer machines, CI/CD pipelines, and cloud workloads. • Sale and exploitation of leaked GitHub tokens. • Supply chain compromise affecting dependent projects and production systems. • Ransom demands and potential data disclosure threats against organizations, including open source platforms. Detection Methods: • Audit npm and PyPI dependencies for affected packages: • npm: npm ls --all • Python: pip list --outdated or pip show durabletask to confirm versions. • Inspect lockfiles (package-lock.json, yarn.lock, pnpm-lock.yaml, requirements.txt, pipfile.lock) for malicious versions. • Review CI/CD pipelines and deployment logs for installation of compromised packages. • Monitor GitHub and cloud activity for unusual authentication events, including signs of leaked token usage. Mitigation Measures: • Immediately rotate all exposed GitHub, npm, PyPI, and cloud credentials. • Replace affected npm/PyPI packages with verified safe versions or freeze dependency versions. • Isolate potentially compromised systems and audit for credential theft or lateral movement. • Apply security patches and review post-compromise artifacts in CI/CD pipelines. Additional Recommendations: • Enable real-time monitoring and alerting for suspicious token or key usage. • Implement stricter dependency review policies and supply chain risk checks. • Educate teams to verify package authenticity before installation. • Monitor dark web or underground marketplaces for leaked credentials related to your organization. SlowMist will continue to track and monitor developments related to this incident, including potential new malicious releases or related exploits. MistEye has already pushed relevant threat intelligence to clients to help them proactively assess and mitigate risks. enterprise.misteye.io/threat-intelli… enterprise.misteye.io/threat-intelli…

English
4
13
40
18.5K
Matthew
Matthew@Maverick_142·
@16bitnostalgia I hate the algo. It loves hitting the feels whenever it feels like it.
English
0
0
0
43
Nostalgic Gamer
Nostalgic Gamer@16bitnostalgia·
Mentally…I’m still here
Nostalgic Gamer tweet media
English
119
774
6.5K
110.2K
Bite-Sized Nostalgia
Bite-Sized Nostalgia@landofthe80s·
Was there any bigger disappointment than the Nintendo Power Glove?
Bite-Sized Nostalgia tweet media
English
79
25
252
14K
Earth
Earth@earthcurated·
Today is the end of the world day.
Earth tweet media
English
225
231
1.4K
84.7K
Matthew
Matthew@Maverick_142·
@QuanticASI That's a seriously awesome question.
English
0
0
1
48
φ
φ@QuanticASI·
if two electrons are quantum entangled and one of them enters a black hole, is the entanglement broken or sustained?
φ tweet media
English
88
10
99
6.1K
⭕ Brock Pierson
⭕ Brock Pierson@brockpierson·
First video game you think of when you see this controller
⭕ Brock Pierson tweet media
English
341
28
457
30.1K
Matthew
Matthew@Maverick_142·
@7eleven you keep your extra taquito away from her you evil bastard!
English
0
0
0
43
7-ELEVEn
7-ELEVEn@7eleven·
omw to steal your girl AND I have an extra taquito
English
78
84
444
23K
Matthew
Matthew@Maverick_142·
Its a complex operation involving curated content, automated AI persona's vague posting to solicit intelligence to subjects in individual silo's based on their phycological profile. Posts are generated based on that profile to judge coherence and understand what the individual on the other end may be experiencing. That's why when you refresh you see a "next 30 posts" selection, its all curated for you individually. It's like this really super clever control mechanism, it's fun to play with.
English
0
0
0
4
Stephenblaq
Stephenblaq@Steezehuman·
People who get no engagement on 𝕏, what's your secret?
English
134
7
114
11.6K