Rajnish

5.5K posts

Rajnish

Rajnish

@Digits3c

Mostly Cyber and i forgot what else.. #ADHD

London, England Bergabung Aralık 2012
2.4K Mengikuti389 Pengikut
Rajnish me-retweet
Harry Spoelstra
Harry Spoelstra@HarrySpoelstra·
Acute SARS-CoV-2 viral load and systemic inflammation are associated with neuropsychiatric and musculoskeletal symptoms in long COVID 🚨Your “mild/asymptomatic” COVID wasn’t mild/asymptomatic. Study finds that a high viral load can silently seed you with long-term brain + body damage(LC)! ➡️A retrospective case-control study of 300 middle-aged Pakistani adults (30-60 years) with prior mild/asymptomatic COVID-19, assessed ~10 months post-infection at Dow University Hospital, Karachi, ➡️Long COVID (symptoms persisting >3 months) affected 59% (177 participants), ➡️Dominant Symptoms: Neuropsychiatric (e.g, headache, brain fog: 35%) and musculoskeletal (e.g, myalgia, fatigue: 32.2%) were most common, ➡️Biomarker Differences: Long COVID group showed lower haemoglobin, RBC, MCHC, higher WBC and lymphocytes, and elevated inflammatory markers (IL-6, ferritin) with deficiencies in vitamin D3 and B12 compared to controls (all p<0.05), ➡️Acute Viral Load Link: - Higher acute SARS-CoV-2 viral load (low Ct values ≤20) strongly associated with neuropsychiatric (75.8%, p<0.001) and musculoskeletal symptoms (57.9%, p=0.001), - Inverse correlations with IL-6 and ferritin, ➡️Adjusted Associations: Multivariable regression linked neuropsychiatric symptoms to higher lymphocytes, IL-6, ferritin, and vitamin D deficiency, musculoskeletal symptoms to vitamin D deficiency and ferritin levels, ➡️Implications & Limitations: - Persistent inflammation and micronutrient issues post-mild infection may drive specific Long COVID phenotypes, - Single-center design, self-reported symptoms, and lack of pre-infection baselines limit generalizability, - The study explicitly excluded anyone with more than one COVID-19 infection and vaccination status was not explored, By excluding reinfections and ignoring vaccination entirely, the study isolates the effect of a single mild infection yet still finds high rates of persistent symptoms and measurable biological changes, reinforcing that even one “mild/asymptomatic” encounter with the virus can leave a lasting mark. ‼️So, Important conclusions: 1. AGAIN, even mild/asymptomatic COVID-19 can leave a lasting biological footprint detectable in routine labs and tied to acute viral burden, underscoring that “mild” infection is no guarantee of full recovery, especially in populations with prevalent micronutrient gaps(Parkistan). 2. Erectile dysfunction briefly discussed but has been the focus of other studies. A reminder: Even “mild” COVID can silently damage the vascular and hormonal systems that power erections, leaving maybe up to 1 in 5 men with lasting ED years later, a stark reminder that Long COVID doesn’t spare intimate health but seems to carry, as usually, a taboo! 3. Higher acute viral burden and sustained inflammation during mild/asymptomatic COVID-19 can seed debilitating long-term neuropsychiatric and musculoskeletal symptoms in nearly 6 out of 10 survivors. #AvoidSars2 #AvoidReinfections #IntimateHealth journals.plos.org/plosone/articl…
Harry Spoelstra tweet media
English
1
135
312
8.2K
Rajnish me-retweet
Threat Hunting Labs
Threat Hunting Labs@ThruntingLabs·
Launching today: Threat Hunting Labs private threat intelligence feed THL enterprise customers now get access to a dedicated intel feed built around high-fidelity IOCs curated by our team, structured in STIX 2.1 and delivered over TAXII 2.1. It integrates directly with your SIEM or security tooling. Signed webhooks if you want push delivery. No noise layers on top. Included free for enterprise customers in year one. If you're already a THL customer, reach out and we'll get you set up. If you're not, this is a good time to ask what that looks like. 👉 intel.threathuntinglabs.com
Threat Hunting Labs tweet media
English
1
7
28
18.7K
Shiv Aroor
Shiv Aroor@ShivAroor·
Ouch. Spicejet winglet snaps off gets stuck in the an Akasa Air aircraft's tailplane. at Delhi Airport.
Shiv Aroor tweet mediaShiv Aroor tweet media
English
104
140
2.5K
367K
Rajnish me-retweet
Nicolas Krassas
Nicolas Krassas@Dinosn·
Production-grade MCP server giving Claude 27 security intelligence tools across 21 APIs — CVE lookup, EPSS scoring, CISA KEV, MITRE ATT&CK, Shodan, VirusTotal, and more. github.com/mukul975/cve-m…
English
4
99
437
23.9K
Rajnish me-retweet
internet archiva
internet archiva@internetarchiva·
After all these years, I finally found the original one 😭😭
English
307
16.4K
76.2K
1.9M
Rajnish me-retweet
Varshini
Varshini@iamvarrshini·
made a list of places around bengaluru… weekend getaways, random drives, peaceful spots…all in one place most of them i’ve already been to few are still left...👀 sharing it here in case you need an escape☺️ docs.google.com/spreadsheets/d…
English
15
80
788
56.5K
Rajnish me-retweet
Saurabh Bharadwaj
Saurabh Bharadwaj@Saurabh_MLAgk·
Big Breaking In the court of Hon’ble Justice Swarn Kanta Sharma, Mr. Arvind Kejriwal has filed another affidavit. In it, he has stated that both the children of the Hon’ble Judge are working on Central Govt Panels ie under Sr Adv Tushar Mehta. Mr. Tushar Mehta assigns cases to them. In such a situation, it would be difficult for the Hon’ble Judge to pass any order against Mr. Tushar Mehta. Therefore, along with other reasons, the Hon’ble Judge should recuse herself from the case.
Saurabh Bharadwaj tweet mediaSaurabh Bharadwaj tweet mediaSaurabh Bharadwaj tweet mediaSaurabh Bharadwaj tweet media
English
176
1.9K
5.9K
270.3K
Rajnish me-retweet
Nav Toor
Nav Toor@heynavtoor·
You have an old Android phone in a drawer right now. Collecting dust. Worth nothing. Someone built a script that turns it into a full Linux desktop. Or a smart home server. Or a development machine. For free. It's called linux-android. One script. No root required. No flashing. No risk of bricking your device. Run it in Termux and your old phone becomes a Linux computer. Here's what it installs: → Full Linux desktop. XFCE4, LXQt, or MATE. Real windowed desktop on your phone. Connect a monitor and keyboard via USB and it looks like a PC. → Smart home server. Home Assistant runs on your phone. Control your WiFi lights, plugs, and smart devices from any browser on your network. No cloud needed. → GPU acceleration. Snapdragon phones get near-native GPU performance through Turnip Vulkan drivers. Mali GPUs use software fallback. → SSH server. Access your phone from any computer on your WiFi. Full terminal. Transfer files. Write code. All from your laptop keyboard. → Wine support. Run basic Windows applications on your Android phone through Box64 translation. → Audio support. PulseAudio configured automatically. → Works on any Android phone with Termux support. Here's the wildest part: A Raspberry Pi 4 costs $35 to $75. A used mini PC costs $100+. A VPS costs $5/month forever. That old phone in your drawer? It has a faster processor, more RAM, a built-in battery backup, WiFi, and a touchscreen. All for $0. You already own it. A Snapdragon 855 from a 2019 phone still outperforms most entry-level server chips. You're throwing away a computer every time you upgrade your phone. Not anymore. One command. One old phone. A full Linux machine. 100% Open Source. MIT License.
Nav Toor tweet media
English
73
1.2K
6.1K
248.3K
Rajnish me-retweet
Avid
Avid@Av1dlive·
This 24-minute prompting workshop by Anthropic's own applied AI team will teach you more about getting real results from Claude than the last year you spent guessing at prompts. Watch this, no matter what. Then read the 25 prompts below by @eng_khairallah1 that save you 15 hours every week.
Khairallah AL-Awady@eng_khairallah1

x.com/i/article/2043…

English
39
336
2.3K
487.8K
Rajnish me-retweet
BlackRoomSec
BlackRoomSec@blackroomsec·
Malwaretech with the best take imaginable. Why haven't we fixed what is already broken? I think everyone should listen to this and put all of the AI stuff into proper perspective. The organizations you work for and the cultures that exist there aren't going to change simply because there are robots now. I know it may seem like things are changing but they really aren't. The same people are managing these orgs and along with that comes the same mismanagement that is present today, in them. None of these managers are going to wake up the moment the singularity occurs and suddenly have all this clarity on how to proceed. And, exactly none of them are going to be spending thousands of dollars on vulnerabilities which are not exploitable. That's part of our job right? Advising on what actually is a threat or a risk in the context of where that particular vulnerability lives. Allow me to explain. Remember the Yubikey vuln present in version 5.5? Yeah, on paper it looks really scary, but the chances of its exploitation in actual practice are pretty much close to zero. The reasons for this are as follows: First, you need a rework station, specific acids and chemicals, a steady hand, hardware tools such as a logic analyzer, oscilloscope, micro probe test pins (which have to be purchased separately and can get expensive, basically the PCBite tool), I haven't looked at the white paper recently but probably some sort of near field probe kit as well, and the requisite skill set to properly understand a PCB layout, the knowledge on how to work a multimeter to test for VCC, Ground, TX,RX, and a whole lot more. If you do not have these things in your environment and someone just waltzes in and sits down to perform the specific attack on the Yubikey, they can't even get started because they don't have the tools necessary. Even if they brought all of these things they still can't do it. They also need 6 and 1/2 hours to do the attack uninterrupted. And they need to have the skill set of someone like hacker MG, Bunnie or Ken Ng. We are not talking about someone who read a book on hardware reversing in an afternoon and suddenly knows Kung Fu. 🙄 This takes years of practice and the minimum is going to be around 8 to 9 years. Because while you're doing this attack you can't be googling anything you need to know how to do it by rote and have a deep understanding and comprehension of the entire attack chain on that circuit board. You also need a microscope because you're looking at pins which are smaller than a pinhead. So you could have 10,000 of these things and they could be vulnerable all the live long day but the risk to you is zero. Now if you walk into MY HOUSE, the risk is enormous to me because I possess such a Yubikey that is vulnerable and I also possess all of the tools I just mentioned including hundreds more which if one of them breaks you have about 25 different substitutes you can use to perform the attack. I like to be prepared. And because I have a small library of pretty much any hacking or cyber security topic you could possibly want to read (hard copy, ALL MY 25 YEARS OF NOTES, digital) you don't need to Google, you have every hardware reversing book known to man on the shelf and can just refer to them. I need to worry about that risk, but not you and that's my point. And that's also Marcus's point. It's great that we're having a discussion on all of this AI stuff but those of us who appear negative to you reading this like myself aren't so much negative to be negative but we have a lot of experience in this industry and understand what is actually possible versus what you are being told by tech companies who are out to make a profit. We already made our profit because these same tech companies hired us for our expertise. I'm still not concerned about Mythos and I'm not going to be. I have faith in each and every one of you. Not the AI.
Ananay@ananayarora

Marcus Hutchins, the guy famous for stopping the WannaCry Ransomware, probably has the best take on Mythos doing vulnerability research

English
7
26
178
18K
Rajnish me-retweet
Hugging Models
Hugging Models@HuggingModels·
Meet Ambuj-Tripathi-Indian-Legal-Llama-GGUF: a specialized AI model fine-tuned for Indian law. This isn't just another chatbot. It's a legal assistant trained to understand the nuances of Indian statutes, case law, and legal language. A game-changer for legal tech in India.
Hugging Models tweet media
English
52
296
3K
154.3K
Rajnish me-retweet
BlackRoomSec
BlackRoomSec@blackroomsec·
And, this is part of the problem I have with all of this. The named orgs plus the 40 other non-named orgs who have current access to Mythos cannot legally use Mythos to attack any other org, in order to help them secure their environments. I'm specifically referring to organizations like mine which are government entities and don't have vulnerability disclosure in place. Nor should they. Do they want gruesome pictures of murder victims and serial killers released to the public? Because that's the data I guard. People's worst nightmares and the worst day of their lives when their entire world came crumbling down and that's if they survived the crime perpetrated against them. No, they don't, so they can't try and attack us with this stupidity. And, if they do we will sue the shit out of them. Anthropic has publicly stated they are in the preview stage right now and it's being beta tested so unless they plan to release this thing to the general public who exactly is Goldman Sachs protecting their environment against? Apple? 😳 And, if they're not doing it to protect against the beta testers who cannot legally attack them and are doing it because they think that Anthropic is going to release Mythos to the general public (which would represent yet another contradictory statement Anthropic has made of late) and their environment is insecure, then how the hell are they compliant in any of the hundred plus frameworks as a financial institution they need to be? 🤪 No, I'm being really serious here. Goldman Sachs is not your corner deli. It's one of the largest financial institutions in the world and my former boss was their head of Legal. The lady that just resigned who was the head of legal due to the Epstein case? Yeah she took over his job. Do I call him right now and say oh by the way it's great that you left them but they were lying to you, your entire staff, telling you they were more secure than they actually were because right now they're panicking and shoring up their environment against a supposedly non-existent enemy, in an environment which was supposedly at a secure state when you left. So I'd really like to know what's going on here because if I make that call, he's going to be furious. And, I don't blame him. Neither of us like being lied to.
Polymarket@Polymarket

JUST IN: Goldman Sachs is reportedly ramping up its cyber defenses in preparation for Claude Mythos.

English
7
8
48
7.3K
Rajnish me-retweet
BlackRoomSec
BlackRoomSec@blackroomsec·
You all had many of the brightest minds in the security community in one room, over several days, and instead of discussing how the rest of us should plan to combat all of this AI junk, you draft this? Gadi, I know we don't know one another and I know you have a job to do so I'm not trying to be critical of you and everyone else that participated in this to be unfair in any way, but as a former CISO myself we're not implementing AI at scale or probably ever to a point where it's going to replace our staff. Because what I have seen of it so far and so have you and everyone else in that room, is that it introduces more risk and security vulnerabilities. And, my job is to make sure that doesn't happen. It's also your job and the job of everybody else that was in that room, to make sure that doesn't happen. I have to be honest here in asking have you all lost your minds? I also have to be honest here in saying that this weekend warrior project and the fact that the EFF has left X, are two of the most disappointing events in recent cybersecurity industry history. These feel like cop outs to me. I will read the paper out of respect but I don't want to.
Gadi Evron@gadievron

An Expedited Strategy Briefing on Mythos, Glasswing, and building a security program for what comes next, by 250 CISOs, and the wider community. It is still a draft, with some design incomplete, but we felt it was imperative to release. Link: labs.cloudsecurityalliance.org/mythos-ciso/

English
7
8
88
14K
Rajnish me-retweet
Vaishnavi
Vaishnavi@_vmlops·
GOOGLE BUILT A SECRET WEAPON FOR FILE DETECTION they ran it internally for years, gmail, drive, safe browsing, hundreds of billions of files every week then they open sourced it it's called magika and it exposes what files really are, not what they pretend to be rename malware to "resume.pdf"? magika sees through it disguise a script as an image? magika sees through it any trick attackers use with file extensions? magika sees through all of it ai trained on 100 million files. 200+ content types. 99% accuracy. 5ms per file one command `pip install magika` the same tool protecting google's billion users is now protecting yours github.com/google/magika
English
119
847
7K
475.5K
Rajnish me-retweet
SilencedSirs◼️
SilencedSirs◼️@SilentlySirs·
🚨 Budapest now: 17 years of Orbán's rule ended tonight — in the streets. The man who shielded Netanyahu, blocked every EU resolution against the genocide in Gaza, opened his skies to an ICC-wanted fugitive… was brought down by his own people at the ballot box. A lesson to every tyrant: the chair is temporary. The people remain.
English
318
5.7K
21.1K
585.7K
Rajnish me-retweet
sydni | what in the ADHD?
Taught my son what "intentional" means and why it can help ADHD brains. 10: Why? Me: b/c most brains can keep track of what you MEANT to do. ADHD brains? Intentions don't stick as well, so we have to manually do what other brains do on their own. 🙃 10: WHAT?! That's not fair!
English
3
20
306
17.2K
Rajnish me-retweet
Camus
Camus@newstart_2024·
“ADHD is not a disorder of not knowing what to do. It’s a disorder of not doing what you already know.” Dr. Russell Barkley just delivered one of the clearest explanations of ADHD I’ve ever heard. He says the brain can be split in two: the back part acquires knowledge, the front part (the executive system) uses it. ADHD acts like a meat cleaver that severs the two. You already have the skills and information other people your age have. You just can’t apply them when it counts. That’s why life becomes an endless series of last-minute crises. You’re time-blind — you can only deal with what’s right in front of you. The further away a goal or deadline is, the less real it feels. The solution isn’t teaching more skills. It’s changing the environment at the exact point where the problem occurs — the “point of performance.” It’s a game-changing way to understand why traditional approaches often fail.
English
203
2.6K
15.5K
1.5M
Rajnish me-retweet