CoolCatGee

14.3K posts

CoolCatGee

CoolCatGee

@CoolCatGee

Katılım Ocak 2008
1.1K Takip Edilen668 Takipçiler
Sabitlenmiş Tweet
CoolCatGee
CoolCatGee@CoolCatGee·
Pirates once fished with hooks of greed, Now they build with faith as their seed. Three-in-One waits with treasures untold, Tithes compound like e, turning brass into gold. Raids become revivals, code becomes praise — What must the salty soul do to enter My gates?
English
0
2
5
11.9K
CoolCatGee retweetledi
WLFI
WLFI@worldlibertyfi·
Here are the facts: In Nov. 2024, Sun's entity, Blue Anthem, purchased $WLFI tokens. Sun's entities later engaged in prohibited transactions, including transfers of $WLFI tokens to Binance.
English
24
29
241
46.2K
CoolCatGee retweetledi
WLFI
WLFI@worldlibertyfi·
Today, we are filing a lawsuit against Justin Sun for defamation. Sun has launched a coordinated media smear campaign against World Liberty Financial and refused to stop even when confronted with the truth. Here's the story.🧵
English
1.4K
463
3K
961.7K
CoolCatGee retweetledi
OnlyBangers
OnlyBangers@OnlyBangersEth·
woman found a rat in her house and trew a street cat at it like it was a pokemon 🤣
English
384
2.8K
47.7K
1.2M
CoolCatGee retweetledi
Matt Wallace Tech
Matt Wallace Tech@MattWallaceTech·
A Cybertruck pulling a Cybercab in Miami was not on my 2026 bingo card haha
English
38
108
1.3K
50K
Sokol
Sokol@sokol_cc·
ZXX
3
1
18
880
Sokol
Sokol@sokol_cc·
Sunday fun with laser. I made custom watch dial using Quantum Effect Devices QED53x1 CPU wafer
Sokol tweet mediaSokol tweet media
English
17
11
332
15.9K
CoolCatGee retweetledi
Sebastián
Sebastián@gvtcontractor·
Every time I play chess with someone from India I ask them if they poop on the street. About 70% of the time I get a response like this.
Sebastián tweet media
English
246
1.8K
64.6K
1.8M
CoolCatGee retweetledi
Reddit Lies
Reddit Lies@reddit_lies·
Reddit Lies tweet media
ZXX
128
1K
22.8K
344.8K
CoolCatGee retweetledi
BleepingComputer
BleepingComputer@BleepinComputer·
🚨 BREAKING: Hackers are now exploiting the cPanel authentication bypass flaw (CVE-2026-41940) to deploy "Sorry" ransomware on compromised websites. Numerous sources say attacks began Thursday, with threat actors breaching servers and deploying a Go-based Linux encryptor that appends the .sorry extension to files. What the ransomware does: 🔴 Encrypts files and appends the ".sorry" extension. 🔴 Protects the encryption key with an embedded RSA-2048 public key 🔴 Drops a README.md ransom note in every folder 🔴 Uses a fixed Tox ID for ransom negotiations Victims are being instructed to contact the attacker via Tox to pay for decryption. This is not related to the older 2018 HiddenTear ".sorry" ransomware. This is a new, Linux-targeting encryptor tied directly to active cPanel exploitation. If you're running cPanel or WHM, patch immediately.
BleepingComputer tweet mediaBleepingComputer tweet media
English
15
229
807
99.1K
CoolCatGee retweetledi
Olsen
Olsen@olsenbdnr·
For those who are trying to scam X Ads, use fraudulent credit cards etc. Better make sure your opsec is flawless because we are coming for you. I already got a few IPs, and we are drafting up subpoenas to your ISPs/email providers and more!
English
384
651
5K
635.8K
CoolCatGee retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ cPanelSniper: CVE-2026-41940 - cPanel & WHM Authentication Bypass via Session-File CRLF Injection GitHub: github.com/ynsmroztas/cPa… CVE-2026-41940 - cPanel & WHM Authentication Bypass via Session-File CRLF Injection 4-stage exploit chain · Interactive WHM Shell · Bulk scanner · Pipeline ready · stdlib only
Dark Web Informer tweet media
English
5
91
527
29.7K
CoolCatGee retweetledi
Liz Churchill
Liz Churchill@liz_churchill10·
Ghislaine Maxwell was found guilty of child trafficking 1,586 days ago. None of her clients have been arrested...
Liz Churchill tweet media
English
1.1K
35.2K
123.9K
1.1M
CoolCatGee retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Florian Roth ⚡️ tweet media
Florian Roth ⚡️@cyb3rops

Anyone else seeing Microsoft #Defender flagging #DigiCert root certificate registry keys as malware? We’ve seen reports that Defender signature update from April 30 added a detection called: Trojan:Win32/Cerdigent.A!dha In some environments, Defender apparently detected DigiCert Root CA certificate registry entries and removed them from the trust store. The affected cert hashes mentioned so far: 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 Example path: HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 There’s also a Reddit comment suggesting Microsoft has started restoring the certs and that admins can check this via Advanced Hunting in Defender: DeviceRegistryEvents | where RegistryKey contains "0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43" or RegistryKey contains "DDFB16CD4931C973A2037D3FC83A4D7D775D05E4" | where ActionType == "RegistryKeyCreated" | where Timestamp > datetime(2026-05-03T04:00:00) | project Timestamp, DeviceName, ActionType, InitiatingProcessFileName | order by Timestamp desc On an affected device, this can also be checked with: certutil -store AuthRoot | findstr -i "digicert" Could become an annoying day for admins if this spreads reddit.com/r/cybersecurit…

English
15
143
922
152K
CoolCatGee retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
🚨 The cPanel Situation Is Spiraling Fast On April 29, CVE-2026-41940 was disclosed: a critical pre-authentication bypass in cPanel/WHM that lets remote attackers skip the login flow entirely and gain elevated access. Within 24 hours, it was already being weaponized. Censys watched the fallout in real time. The 6-day timeline (cPanel hosts flagged malicious): Apr 26: 117 Apr 27: 47 Apr 28: 106 Apr 29: 70 Apr 30: 146 May 1: 15,448 On May 1 alone, total malicious hosts jumped by +19,131, and 15,302 of those (roughly 80%) were cPanel/WHM systems. Compare that to the prior days where cPanel made up well under 1.2% of daily changes. This was not background noise. It was a coordinated spike. Top affected providers: DigitalOcean: 1,043 Contabo: 716 OVH: 501 Vultr: 391 Oracle: 321 Unified Layer: 280 Hetzner: 277 Akamai/Linode: 275 GoDaddy: 209 Microsoft: 169 With 1,052,657 cPanel/WHM hosts exposed on the public internet and only 9,595 currently flagged as malicious, the attack surface is enormous and growing. At least two campaigns are running in parallel: a Mirai botnet variant (nuclear.x86) deployed post-compromise, and a ransomware campaign tied to the Sorry/Hidden-Tear family. Ransomware footprint: ~7,000 cPanel servers with ".sorry" encrypted files 6,465 hosts: index.html.sorry 1,637 hosts: index.php.sorry 795 hosts: wp-config.php.sorry Victims directed to attackers via qTox If you run cPanel/WHM, patch immediately. Source: censys.com/blog/the-cpane…
Dark Web Informer tweet media
English
14
124
511
60.8K
CoolCatGee retweetledi
Abogadodijo
Abogadodijo@AbogadoDijo·
Las cuotas de género impuestas por el feminismo durante el atentado a Trump
Español
877
8.1K
45.2K
1.4M
CoolCatGee retweetledi
Elon Musk
Elon Musk@elonmusk·
Banger 😂
Indonesia
6.8K
35.8K
210.8K
63.5M
CoolCatGee retweetledi
CoolCatGee retweetledi
Jack Duval🌊
Jack Duval🌊@jackduval·
@cryptodotnews always thought that guy gave off a weird vibe glad to know my intuition was right and i avoided him early on🙏 #jail4shaams
English
7
1
37
3.1K
CoolCatGee retweetledi
Nick Sortor
Nick Sortor@nicksortor·
🚨 WOW! Assistant AG for Fraud Colin McDonald just revealed Tim Walz is using TAXPAYER DOLLARS to SUE the federal government to BLOCK investigations into fraud Yet ANOTHER reason federal funds should be FULLY FROZEN in MN Walz is using OUR money to cover up THEFT of our money h/t @GuntherEagleman
English
1.7K
29.7K
80.3K
671.1K