Raphael Silva

38 posts

Raphael Silva

Raphael Silva

@0x_rcss

Security Researcher @ Aikido Security

Katılım Mart 2014
138 Takip Edilen214 Takipçiler
Raphael Silva
Raphael Silva@0x_rcss·
@kaisec42 @MosheTov Maybe 😂 It's in my profile. Is that amount normal for them? I did notice their average was really low lol
English
3
0
2
49
Jakub Sajniak
Jakub Sajniak@kubolos231·
@Magn4_ @goldenape36 "Just a security researcher who likes web and supply-chain stuff :)" -> Supply chain seems like valid scenario here
English
1
0
2
305
Raphael Silva
Raphael Silva@0x_rcss·
@Magn4_ Just submitted a talk to DEF CON a few days ago about this finding, guess we'll have to wait and see 😉
English
1
0
27
1.2K
Magn4
Magn4@Magn4_·
@0x_rcss Could it really destroy the internet ?
English
1
0
3
3.4K
Raphael Silva retweetledi
Aikido Security
Aikido Security@AikidoSecurity·
A new npm supply-chain compromise is targeting SAP developer workflows. Mini Shai-Hulud follows a familiar pattern, but with a smaller package set and a serious secret-stealing payload built to hit developer machines and CI/CD environments. Affected packages we’re tracking: - cap-js/sqlite v2.2.2 - cap-js/postgres v2.2.2 - cap-js/db-service v2.10.1 - mbt v1.2.48 If any of these touched your environment, rotate secrets and review GitHub, npm, cloud, and CI activity.
Aikido Security tweet media
English
2
11
29
5.1K
Raphael Silva retweetledi
Raphael Silva retweetledi
Charlie Eriksen
Charlie Eriksen@CharlieEriksen·
We are actively seeing TeamPCP modify the CanisterWorm payload, seemingly debugging in production. Classic tactic. But it doesn't change the fact that this is a very bad situation, given all the data the threat actor likely stole through the Trivy breach. aikido.dev/blog/teampcp-d…
English
0
3
16
1.8K
Raphael Silva retweetledi
Charlie Eriksen
Charlie Eriksen@CharlieEriksen·
The guy writing the TeamPCP/CanisterWorm malware knows me by first name and is leaving little notes in his source code asking me to be nice💀 Somehow, he's finding time to read my ramblings between pushing new versions🙃
Charlie Eriksen tweet media
English
8
27
444
32.5K
Raphael Silva retweetledi
Charlie Eriksen
Charlie Eriksen@CharlieEriksen·
There appears to be a new worm on NPM that has active community spread. All packages by `@EmilGroup` on NPM were replaced with this self-spreading payload: @emilgroup/customer-sdk?activeTab=code" target="_blank" rel="nofollow noopener">npmjs.com/package/@emilg
Charlie Eriksen tweet media
English
0
6
10
3.8K
Raphael Silva
Raphael Silva@0x_rcss·
@BrighterCommand Hi! I'm a security researcher, do you know where/how is the best way to report a security issue to the project? Thanks!
English
0
0
0
25
Raphael Silva retweetledi
Checkmarx Zero
Checkmarx Zero@CheckmarxZero·
Yes, we've heard a little noise about the semi-popular #ChatMoss #VSCode extension that appears to be malicious. We reported it on 31. Oct 2025, in fact; shortly after we began our ongoing campaign to monitor the VSCode and OpenVSX marketplaces. The extension ID is WhenSunset[.]chatgpt-china ; for whatever reason, in this case the marketplace folks decided to take no action. It's not new, it's not news, but it is a good reminder to be cautious; marketplace maintainers can be reluctant to remove things without "smoking gun" evidence of malice. #WhenSunset #VSCodeExtension #Malware #SupplyChainSecurity #OpenSourceSecurity
Checkmarx Zero tweet media
English
0
3
5
459
Raphael Silva retweetledi
BlackAlps
BlackAlps@BlackAlpsConf·
🗣️ SPEAKER Announcement #BlackAlps25 is glad to propose you a talk from Raphael Silva @0x_rcss, Security Researcher at @Checkmarx specializing in security research, SAST methodologies, and Supply Chain Security. 📅 Friday, November 21st 🕞 11h15-11h45 📗 lnkd.in/ex7X8BQe
BlackAlps tweet media
English
0
2
4
372