Roland Barbe

8 posts

Roland Barbe banner
Roland Barbe

Roland Barbe

@RolandBarbe

"Werde, der du bist."

Brest, France Katılım Ocak 2023
174 Takip Edilen45 Takipçiler
Roland Barbe retweetledi
Elon Musk
Elon Musk@elonmusk·
Congrats to the @Tesla_AI chip design team on taping out AI5! AI6, Dojo3 & other exciting chips in work.
Elon Musk tweet media
English
6.8K
12.4K
119.6K
18.4M
Roland Barbe retweetledi
Reid Wiseman
Reid Wiseman@astro_reid·
Jesse, Steve, Laddy, and Vlad….such an incredible feeling to welcome you aboard Integrity after a nearly 700,000 mile journey. Forever thankful for your service to our crew and the nation.
English
1.5K
18.6K
141.9K
8.7M
Roland Barbe retweetledi
Roland Barbe retweetledi
Tom's Hardware
Tom's Hardware@tomshardware·
Anthropic's Claude Mythos isn't a sentient super-hacker, it's a sales pitch — claims of 'thousands' of severe zero-days rely on just 198 manual reviews tomshardware.com/tech-industry/…
English
102
402
2.5K
417.4K
Roland Barbe retweetledi
NASA
NASA@NASA·
Artemis II may have splashed down, but our photos and videos from the mission are still rolling in! Keep an eye on the latest: nasa.gov/artemis-ii-mul…
NASA tweet mediaNASA tweet media
English
3.1K
45.7K
323.9K
10.9M
Roland Barbe retweetledi
BuBBliK
BuBBliK@k1rallik·
🚨 do you understand what just happened to your passwords cpuid one of the most trusted sites in PC hardware. hacked. April 10th, 2026. CPU-Z and HWMonitor. both compromised. > fake CRYPTBASE.dll ships inside the installer > connects to C2, downloads a C# file > compiles it silently using YOUR own Windows tools > injects into memory. never touches disk. AV sees nothing. > opens Chrome's password vault. dumps everything. the chain: cpuid → HWMonitor installer → DLL hijack → supp0v3[.]com → silent .NET compile → in-memory injection → Chrome credentials stolen same group. same C2 domain. hit FileZilla in March 2026. they got lazy. that's the only reason we caught it.
vx-underground@vxunderground

Mr. Titus Tech is correct. cpuid-dot-com is indeed delivering malware right now. As I began poking this with I stick I discovered this is not your typical run-of-the-mill malware. This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs file masquerading, is multi-staged, operates (almost) entirely in-memory, and uses some interesting methods to evade EDRs and/or AVs such as proxying NTDLL functionality from a .NET assembly. The C2 domain present in one of the binaries is a clear IoC. This is the same Threat Group who was masquerading FileZilla in early March, 2026. They've been busy.

English
188
834
6.5K
1.1M
Roland Barbe retweetledi
rwlk
rwlk@sherlock_hodles·
Trump every time the S&P 500 drops more than a percent
English
233
6.9K
73.4K
6.8M
Roland Barbe retweetledi
Nutella
Nutella@NutellaUSA·
Honored to have traveled further than any spread in history 🚀 Taking spreading smiles to new heights ❤️
English
1K
7.8K
48.6K
1.5M