Varys

15.3K posts

Varys banner
Varys

Varys

@_ChezDaniela

Somewhere in between foodie, wine lover and security geek Python 💙|Personal tweets|GSNA/GPEN/GCFR | cancer survivor

APD Katılım Aralık 2014
6K Takip Edilen2.5K Takipçiler
Varys retweetledi
Brandon ッ
Brandon ッ@notbrvnd0n·
@rekdt Ouroboros via Copilot
Brandon ッ tweet media
Português
0
1
4
63
Varys
Varys@_ChezDaniela·
@InsiderPhD $give.snacc-cookie-to-claude=true
English
0
0
0
4
Katie Paxton-Fear
Katie Paxton-Fear@InsiderPhD·
If you find a bug with Claude do you have to tip your agent? They did all the hard work 😂
English
4
0
25
3K
Varys retweetledi
Dr. Wesley McGrew
Dr. Wesley McGrew@McGrewSecurity·
🚨 BREAKING: It took a leak for someone actually took a look at a compliance report
Ryan@ohryansbelt

Delve, a YC-backed compliance startup that raised $32 million, has been accused of systematically faking SOC 2, ISO 27001, HIPAA, and GDPR compliance reports for hundreds of clients. According to a detailed Substack investigation by DeepDelver, a leaked Google spreadsheet containing links to hundreds of confidential draft audit reports revealed that Delve generates auditor conclusions before any auditor reviews evidence, uses the same template across 99.8% of reports, and relies on Indian certification mills operating through empty US shells instead of the "US-based CPA firms" they advertise. Here's the breakdown: > 493 out of 494 leaked SOC 2 reports allegedly contain identical boilerplate text, including the same grammatical errors and nonsensical sentences, with only a company name, logo, org chart, and signature swapped in > Auditor conclusions and test procedures are reportedly pre-written in draft reports before clients even provide their company description, which would violate AICPA independence rules requiring auditors to independently design tests and form conclusions > All 259 Type II reports claim zero security incidents, zero personnel changes, zero customer terminations, and zero cyber incidents during the observation period, with identical "unable to test" conclusions across every client > Delve's "US-based auditors" are actually Accorp and Gradient, described as Indian certification mills operating through US shell entities. 99%+ of clients reportedly went through one of these two firms over the past 6 months > The platform allegedly publishes fully populated trust pages claiming vulnerability scanning, pentesting, and data recovery simulations before any compliance work has been done > Delve pre-fabricates board meeting minutes, risk assessments, security incident simulations, and employee evidence that clients can adopt with a single click, according to the author > Most "integrations" are just containers for manual screenshots with no actual API connections. The author describes the platform as a "SOC 2 template pack with a thin SaaS wrapper" > When the leak was exposed, CEO Karun Kaushik emailed clients calling the allegations "falsified claims" from an "AI-generated email" and stated no sensitive data was accessed, while the reports themselves contained private signatures and confidential architecture diagrams > Companies relying on these reports could face criminal liability under HIPAA and fines up to 4% of global revenue under GDPR for compliance violations they believed were resolved > When clients threaten to leave, Delve reportedly pairs them with an external vCISO for manual off-platform work, which the author argues proves their own platform can't deliver real compliance > Delve's sales price dropped from $15,000 to $6,000 with ISO 27001 and a penetration test thrown in when a client mentioned considering a competitor

English
1
1
17
1.1K
Varys retweetledi
tuckner
tuckner@tuckner·
Just tagged ~150 newly published extensions to Open VSX as part of a likely large scale attack campaign. Most are published by a GitHub account created in the past week with a generated empty repo as they're only activity. The attacks have switched from subtle to overwhelm.
tuckner tweet mediatuckner tweet mediatuckner tweet media
English
0
5
21
2.1K
Varys
Varys@_ChezDaniela·
@JJLiebig same, 100% recommend 🥸
English
0
0
0
768
Varys retweetledi
Polymarket
Polymarket@Polymarket·
BREAKING: Cyberattack against American breathalyzer test company locks out drivers across 45 states.
English
865
2.5K
22.4K
4.6M
Simon Lee
Simon Lee@smoon_lee·
@TheHackersNews This is old news right? Or has it been hacked again?
Skelwith Bridge, England 🇬🇧 English
1
0
1
1.6K
Varys retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🛑 ALERT - Trivy, a popular open-source vulnerability scanner, was compromised after attackers hijacked 75 version tags in #GitHub Actions to deliver an infostealer. It ran in CI pipelines, stealing creds and tokens, then exfiltrating data or staging it via stolen GitHub PATs. 🔗 Attack flow, impacted versions, fixes → thehackernews.com/2026/03/trivy-…
The Hacker News tweet media
English
6
113
349
74.4K
Varys retweetledi
The Hacker News
The Hacker News@TheHackersNews·
CursorJack abuses cursor:// links to trigger arbitrary command execution via MCP installs with executable configs. One click plus user approval can run local commands or link to a malicious server. 🔗 Deep link abuse flow, MCP risk, and PoC details → #deep-link-abuse-enables-command-execution" target="_blank" rel="nofollow noopener">thehackernews.com/2026/03/threat…
The Hacker News tweet media
English
2
15
38
6.9K
Varys retweetledi
Feross
Feross@feross·
🚨 Breaking: Trivy GitHub Actions supply chain attack – 75 out of 76 version tags compromised. If your CI/CD pipelines reference “aquasecurity/trivy-action” by version tag, you’re likely running malware right now. At Socket, we identified that an attacker force-pushed nearly every version tag in the official aquasecurity/trivy-action repository. That’s @​0.0.1 all the way through @​0.34.2. Over 10,000 GitHub workflow files reference this action. The malicious payload runs silently before the legitimate Trivy scan, so nothing looks broken. Meanwhile it’s: - Dumping runner process memory to extract secrets - Harvesting SSH keys - Exfiltrating AWS, GCP, and Azure credentials - Stealing Kubernetes service account tokens The only unaffected tag right now appears to be @​0.35.0. Socket independently detected this at 19:15 UTC and generated 182 threat feed entries tied to this campaign – all correctly classified as Backdoor, Infostealer, or Reconnaissance malware. This is the second Trivy compromise this month. Earlier in March, attackers injected code into the Aqua Trivy VS Code extension on OpenVSX to abuse local AI coding agents. The compromised tags are still active. Pin to @​0.35.0 or use a SHA reference until this is fully remediated. Full write-up: socket.dev/blog/trivy-und…
English
10
90
278
74.6K
Varys
Varys@_ChezDaniela·
@Lost_Signal hard to tell - everyone has compliance certifications… 🤷🏻‍♀️🤷🏻‍♀️🤷🏻‍♀️
English
0
0
0
11
⍼ John Nicholson ⍼
⍼ John Nicholson ⍼@Lost_Signal·
@_ChezDaniela I feel like if I was a ransom operator, I would use compliance certificates as a justification for increasing my demands.
English
1
0
1
30
Varys retweetledi