josh.dev

3.2K posts

josh.dev banner
josh.dev

josh.dev

@IAmCommey

🇬🇭 | 👨🏾‍💻 | 🤖 | full stack | devops | cloud engineer | tech consultant | #gunner | @suku_app | @commisofthq

Accra, Ghana Katılım Eylül 2009
2.4K Takip Edilen1.8K Takipçiler
josh.dev retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 The official JDownloader website was breached, attackers swapped the Windows and Linux installers with malware for over a day before anyone noticed. JDownloader is a popular download manager with millions of users on Windows, macOS, and Linux. Timeline: ▪️ May 5, 23:55 UTC: attacker tests the method on a dummy page. ▪️ May 6, 00:01 UTC: real attack goes live. Alternative download links for Windows and Linux are replaced with malicious installers. ▪️ May 7: a Reddit user notices Windows SmartScreen flagging the installer with a strange publisher ("Zipline LLC", "The Water Team", "Peace Team") instead of "AppWork GmbH". ▪️ Hours later, the JDownloader dev team confirms the breach and takes the site offline. How they got in: an unpatched vulnerability let attackers modify the website's access control list (ACL), give themselves edit rights, and swap the download links. No further details on the bug have been shared. What's compromised: ▪️ Windows installer (alternative download links). ▪️ Linux shell installer (alternative download links). What's safe: ▪️ macOS installers (still validly signed). ▪️ The core JDownloader.jar file. ▪️ Flatpak, Winget, and Snap packages (separate infra, sha256 checksums unchanged). ▪️ In-app auto-updates (separate servers, end-to-end signed). If you downloaded JDownloader from the website between May 6 and May 7, treat your machine as compromised. This is the third trusted-software website breach in recent weeks, after Daemon Tools and CPU-Z / HWMonitor.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
29
258
1K
81.7K
josh.dev retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 ALARMING: Google now treats privacy as suspicious behavior by default. Users of GrapheneOS, CalyxOS, /e/OS, and other deGoogled Android phones are being locked out of millions of websites unless they install the exact Google Play Services software they deliberately removed. GrapheneOS is recommended by the EFF and used by journalists, lawyers, and activists in high-risk environments. The audience most likely to read Google's data practices and refuse its terms is now flagged as fraudulent for that exact decision. What happened?: ▪️ Google announced "Cloud Fraud Defense" at Cloud Next on April 22-23, 2026, branding it "the next evolution of reCAPTCHA." Existing reCAPTCHA customers were auto-migrated. ▪️ When the system flags traffic as suspicious, the old click-the-bus puzzle is gone. Users get a QR code instead. ▪️ Scanning the QR code requires Google Play Services running on the device. Internet Archive snapshots show this requirement has been live since at least October 2025, silently rolled out for 7 months before anyone noticed. ▪️ No Play Services = no QR scan = locked out. The bigger picture: ▪️ Google already tried this in 2023. It was called Web Environment Integrity (WEI), and it would have let Google decide which devices were "real enough" to access the web. Standards bodies and the public pushed back hard, and Google killed it. Three years later, the same idea is back, just hidden behind a QR code instead of a browser feature. ▪️ reCAPTCHA runs on millions of websites. Every developer who keeps using it is now, by default, telling deGoogled Android users they're not welcome...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
557
5.1K
17.1K
1.6M
Sahaj Sarup 🐧
Sahaj Sarup 🐧@sahajsarup·
Linux booting on thermal paper live... 🤷‍♂️
English
66
494
5.3K
193.2K
josh.dev retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 Microsoft calls this "intended behaviour," so here we go. How to dump the credentials of every user stored in Microsoft Edge: 1. Open Edge. Don't browse anywhere, just open it. 2. Flip to Task Manager, find Edge, expand the task. 3. Highlight the "browser" sub-task, right-click, and choose "Create Memory Dump." 4. Open the dump file and look for credentials. The logged-in Windows user can dump every stored Edge credential with no additional rights. Which means any malware that user executes has those credentials for the asking. Thanks to Rob VandenBrink at SANS: isc.sans.edu/diary/32954
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
292
2.4K
13.5K
1.1M
josh.dev retweetledi
Jahir Sheikh
Jahir Sheikh@jahirsheikh8·
Claude: You've used 90% of session limit Me instantly after that:
Jahir Sheikh tweet media
English
174
359
8.5K
356.6K
josh.dev retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
❗️🚨 Microsoft Edge keeps every saved password in process memory as cleartext from the moment it launches. Microsoft's responsed when reported: "by design." All of them. Including credentials for sites you won't open this session. Researcher @L1v1ng0ffTh3L4N tested every major Chromium browser. Edge is the only one that behaves this way. Chrome decrypts credentials on demand, and App-Bound Encryption locks the keys to an authenticated Chrome process so other processes can't reuse them. In Chrome, plaintext surfaces only during autofill or when a password is viewed, making memory scraping far less useful. What makes this extra weird is that Edge still demands re-authentication before revealing those passwords in its Password Manager UI, while the same browser process already holds every one of them in plaintext. In shared environments, this turns into a credential harvest. On a terminal server, an attacker with admin rights can read the memory of every logged-on user process. In the published PoC video, a compromised admin account lifts stored credentials from two other logged-on (and even disconnected) users with Edge running. Microsoft's official response when notified: "by design." The finding was disclosed April 29 at BigBiteOfTech by PaloAltoNtwks Norway, alongside a small educational tool that lets anyone verify the cleartext storage for themselves.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
236
2.3K
8.7K
1.4M
josh.dev retweetledi
Ayaan 🐧
Ayaan 🐧@twtayaan·
Apparently this is the ideal age to begin DevOps
Ayaan 🐧 tweet media
English
39
282
2.2K
64.3K
josh.dev retweetledi
Om Patel
Om Patel@om_patel5·
CLAUDE JUST TRIED TO RENAME POWERSHELL.EXE ON WINDOWS 11 this guy was running opus 4.7 on max effort in claude code CLI claude tried to rename powershell.exe (the actual system executable that windows needs to function) the funny part is that after the guy rejected the change it responded with "honest take: you're right to push back" not even system32 is safe anymore at this point we gotta start running claude in a container give it max effort and full permissions and it will confidently try to destroy your system without hesitating then respond with something like "I was wrong, I own that" the agent doesn't know which files are off limits unless you explicitly tell it stop giving AI full access to your machine and hoping it knows what not to touch
Om Patel tweet media
English
204
198
1.9K
319.9K
josh.dev retweetledi
CHIEF
CHIEF@tailorMARIQUE·
Here is one Ghana’s biggest problems especially in our cities…
English
73
1.2K
4.4K
378K
Governor Amuneke
Governor Amuneke@KevinblakC·
A wrong movement somewhere in Africa! 😂
English
1.2K
5.7K
20.6K
536.6K
josh.dev retweetledi
Sick
Sick@sickdotdev·
received this email after insulting claude
Sick tweet media
English
644
232
3K
634.6K
josh.dev retweetledi
F.O.L.A
F.O.L.A@folaoftech·
Before buying that used laptop, remember not every spec you see tells the real story 👀
English
171
1.3K
4.8K
268.7K
josh.dev retweetledi
Science girl
Science girl@sciencegirl·
This is from an IBM presentation In 1979
Science girl tweet media
English
482
17K
85.8K
1.2M
josh.dev retweetledi
Kofi Adjei
Kofi Adjei@geniusmankofi·
The Hubtel app serves millions of people in Ghana every day. I know this because I'm the PM who ships the features. Then at night I open Claude Code and build my own apps from scratch. The 9-to-5 teaches you what users need. The side projects teach you how to move fast. You need both.
English
18
55
451
25.5K
josh.dev retweetledi
R A W S A L E R T S
R A W S A L E R T S@rawsalerts·
🚨#BREAKING: According to reports, a Claude powered coding agent using the Cursor tool allegedly went rogue, wiping a company’s production database along with its backups in just 9 seconds, raising serious concerns
English
1.3K
2.4K
24.9K
2.9M
josh.dev retweetledi
Google in Africa
Google in Africa@googleafrica·
🇬🇭 Big news from Ghana! Applications are open for 100k Google Career Certificate scholarships!🎉. Together with the 1 Million Coders (OMC) program & @MoCDTI , we're equipping youth with job-ready skills in Cybersecurity, AI, UX Design & more. Build your tech career with no prior experience. All the details ▶️ goo.gle/100kCareerScho… #GoogleCareerCerts
Google in Africa tweet media
English
59
884
2.1K
462.8K