ᑕᗷ

5.3K posts

ᑕᗷ banner
ᑕᗷ

ᑕᗷ

@CryptoBoyPH

GAMER🎮 Hunter🏹 Crypto📈

🇵🇭 Katılım Haziran 2019
875 Takip Edilen148 Takipçiler
ᑕᗷ
ᑕᗷ@CryptoBoyPH·
@DuelbitsAce 358dc76a-d237-46de-931b-12f869f99cd3
Français
0
0
0
1
ᑕᗷ retweetledi
DuelbitsAce
DuelbitsAce@DuelbitsAce·
$1,000 IN FREE SPINS GIVEAWAY ⛏️ It's Le Digger: Hacksaw Gaming 🦝 👉 25 x $1 FREE SPINS up for grabs 🎁 40 winners selected at random! How to enter: 🎩 Follow @DuelbitsAce ❤️ Like & Repost 💬 Drop your UID below Best of luck!
DuelbitsAce tweet media
English
604
668
708
17.3K
ᑕᗷ retweetledi
Brice 🪐
Brice 🪐@CryptBrice·
$30 ~ 6 Hours 🐼🪐 - RP & F @wasabicard -AD-NFA-DYOR
Indonesia
677
3.9K
555
27K
ᑕᗷ retweetledi
Brice 🪐
Brice 🪐@CryptBrice·
$30 ~ 6 Hours 🐼🪐 - RP & F @MAKACHAIN_ -AD-NFA-DYOR-
Indonesia
722
4K
581
31.4K
ᑕᗷ retweetledi
Brice 🪐
Brice 🪐@CryptBrice·
$30 ~ 6 Hours 🐼🪐 - RP & F @eclips3_co -AD-NFA-DYOR
Indonesia
710
3.9K
565
29.4K
ᑕᗷ retweetledi
Gayri
Gayri@itsgayri·
20 USD ~ 6 Hours 🩵 -RT + Follow @theyfwstoner
English
856
6.7K
804
46K
ᑕᗷ retweetledi
Gayri
Gayri@itsgayri·
500 USD ~ 24 Hours 🩵 -RT + Follow @Paimon_Finance
English
4.2K
13.1K
3.2K
217.2K
ᑕᗷ
ᑕᗷ@CryptoBoyPH·
tangina sobrang init 🥵🥵🥵
Filipino
0
0
4
19
ᑕᗷ
ᑕᗷ@CryptoBoyPH·
Hello
English
0
0
3
24
ᑕᗷ retweetledi
Gayri
Gayri@itsgayri·
500 USD ~ 7 Days 🩵 -RT + Follow @Paimon_Finance
English
5.7K
15.3K
3.4K
352.6K
ᑕᗷ retweetledi
Gayri
Gayri@itsgayri·
50 USD ~ 24 Hours 🩵 -RT + Follow x.com/thatapp
English
1.2K
6.8K
790
46.6K
ᑕᗷ retweetledi
Gayri
Gayri@itsgayri·
50 USD ~ 24 Hours 🩵 -RT + Follow @solarious_us
English
1.3K
9.1K
1K
62.6K
Mr Blossom 👑
Mr Blossom 👑@iammrblossom·
3 WINNERS The 3 people that has 0 likes in the comments wins the phones Will pick tmr 😇
Mr Blossom 👑 tweet media
English
25.2K
1.4K
14.8K
1.8M
ᑕᗷ retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
231
2.7K
11.7K
2.4M
fern
fern@writingfernn·
Oh you hate Ubuntu? I’m gonna use it even harder now.
fern tweet media
English
31
10
201
5.3K
ᑕᗷ retweetledi
Nervous
Nervous@NervouusCS·
$50 Giveaway sponsored by @jomba_yt 🔥 To enter: ✅ Follow me & @jomba_yt ✅ Repost ✅ Tag 2 friends ⏳ Winner will be drawn in 5 days, GLHF!
English
754
793
622
15K
ᑕᗷ retweetledi
The Hacker News
The Hacker News@TheHackersNews·
⚠️ WARNING - Fake CAPTCHA pages are now triggering up to 60 hidden SMS charges per victim. Users are tricked into texting premium international numbers, quietly adding charges to their phone bills. 🔗 See how the scam runs → thehackernews.com/2026/04/fake-c…
English
1
47
93
12.8K
Techjunkie Aman
Techjunkie Aman@Techjunkie_Aman·
Brave just added a feature people have wanted for YEARS. Containers. And most users don’t realize how powerful this is. Here’s why it changes how you browse 👇
Techjunkie Aman tweet media
English
76
208
2.2K
162.7K