Ale

3.4K posts

Ale banner
Ale

Ale

@abalegno

|-/ Software Engineer 🚀

127.0.0.1 Katılım Ekim 2011
1K Takip Edilen177 Takipçiler
Ale
Ale@abalegno·
@ErickSky Otro código hecho con Claude… para arreglar el código hecho con Claude.😂
Ale tweet media
Español
1
0
24
2.5K
Erick
Erick@ErickSky·
Claude Code está escribiendo React de MIERDA Lo acabo de confirmar: React Doctor le puso 42/100 (CRÍTICO) a un proyecto mío vibe-codeado. Detectó 36 issues en 18 archivos. State mal gestionado, effects rotos, keys con array index, dead code, problemas de performance y accesibilidad… todo. Este será el Good Doctor de los vibe-coders a partir de ahora: ✅ Funciona con Next.js, Vite y React Native ✅ Se instala como skill en Claude, Cursor, Windsurf y +50 agents de IA ✅ GitHub Action + plugin de ESLint/oxlint incluido REPOOO👇
Español
44
101
1.6K
166.8K
Ale retweetledi
V4bel
V4bel@v4bel·
💥 Introducing "Dirty Frag" A universal Linux LPE chaining two vulns in xfrm-ESP and RxRPC. A successor class to Dirty Pipe & Copy Fail. No race, no panic on failure, fully deterministic. ~9 years latent. Ubuntu / RHEL / Fedora / openSUSE / CentOS / AlmaLinux, and more. Even if you've applied the "Copy Fail" mitigation, your Linux is still vulnerable to "Dirty Frag". Apply the Dirty Frag mitigation. Details: dirtyfrag.io
GIF
English
40
684
2K
489.3K
Ale retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 Microsoft calls this "intended behaviour," so here we go. How to dump the credentials of every user stored in Microsoft Edge: 1. Open Edge. Don't browse anywhere, just open it. 2. Flip to Task Manager, find Edge, expand the task. 3. Highlight the "browser" sub-task, right-click, and choose "Create Memory Dump." 4. Open the dump file and look for credentials. The logged-in Windows user can dump every stored Edge credential with no additional rights. Which means any malware that user executes has those credentials for the asking. Thanks to Rob VandenBrink at SANS: isc.sans.edu/diary/32954
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
292
2.4K
13.5K
1.1M
Ale retweetledi
MATLAB
MATLAB@MATLAB·
Introducing the MATLAB Agentic Toolkit Get started 👉 spr.ly/6019BBw4zH
MATLAB tweet media
English
75
382
3.6K
865.3K
Ale retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 One of the world's largest Certificate Authorities, DigiCert, was compromised by a malicious screensaver file sent through a customer support chat. Their antivirus blocked the malware four times. The agent kept clicking. The fifth try got through. 27 code signing certificates were stolen and used to sign malware. DigiCert ultimately revoked 60 certificates. Per DigiCert's incident report, filed in Mozilla's CA compliance tracker as Bug 2033170, here is how it unfolded: April 2: an attacker contacted a DigiCert helpdesk agent through the company's customer support chat channel, posing as a customer. The lure was a zip file pitched as a screenshot. Inside the zip was a .scr file. On Windows, .scr files are executables, and this one carried a malicious payload. Opening a file a customer sent through the official support channel is what an agent is supposed to do. Support staff are the one role designed to accept files from strangers. DigiCert's endpoint security blocked four infection attempts. On the fifth, the support analyst's machine was infected. DigiCert detected the infection, ran an investigation, and concluded the incident was contained. Eleven days later, an external researcher tipped DigiCert off about misuse of DigiCert-issued code signing certificates in the wild. That tip led to the discovery of a second compromised machine, belonging to a different support analyst, infected through the same vector. The EDR on that machine had not been functioning correctly, so the original investigation missed it. The second machine gave the attacker access to DigiCert's internal support portal. That portal lets support staff reach limited views of customer accounts, including initialization codes for ordered but not-yet-issued code signing certificates. Combining a stolen initialization code with an approved order let the attacker pull a real, validly issued code signing certificate. They did this 27 times. DigiCert's own list of what went wrong: - File-type filtering on the customer support chat channel did not catch the .scr - EDR coverage was inconsistent and incomplete, creating a blind spot - Initialization codes for code signing certificates were not adequately protected DigiCert says it got lucky. An outside researcher found the malware abuse before DigiCert did. Without that tip, the second machine and the active certificate theft might still be running today.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
65
563
2.6K
230.2K
Ale
Ale@abalegno·
@epiccccc777 @pyckens69 @Krosecato @LatamData Bro, nunca dije lo contrario… una cosa no quita la otra, la clave única no tiene ni 2FA implementado, las personas se la comparten entre sí, y así pasan… pero bueno si te conformas con que en otros países también hay hackeos y bla bla está todo bien… 👍 son opiniones.
Español
0
0
0
53
epic 🇨🇱🇨🇦
epic 🇨🇱🇨🇦@epiccccc777·
@abalegno @pyckens69 @Krosecato @LatamData bro, han existido hackeos hasta en el pentagono, el tema de hacker es muy complejo, aunque en chile contrate a los mejores en ciberseguridad existe siempre alguien que puede hackear el sistema, nadie esta seguro en ese ambito, ni usa, ni rusa, ni japon.
Español
1
0
0
86
Latinometrics
Latinometrics@LatamData·
CHILE | Anthropic selects Chile as the first Latin American host for its Claude Impact Lab to build AI tools for financial regulation. (Diario Financiero)
English
42
557
3.3K
135.1K
Ale
Ale@abalegno·
@FQodlelxdC5674 @LatamData Ciberseguridad e IA van de la mano, que pasó ? Se te acabaron los tokens de Claude y ahora entraste a X a postear ??? ⚰️☠️
Español
0
0
0
85
epic 🇨🇱🇨🇦
epic 🇨🇱🇨🇦@epiccccc777·
@abalegno @pyckens69 @Krosecato @LatamData es que es verdad, no sabes lo burocratico que es conseguir documentos personales en paises vecinos, es realmente un lujo la clave unica, pero si no has vistos otras realidades dificil que te pegues el cacho.
Español
1
0
0
101
Ale
Ale@abalegno·
@pyckens69 @Krosecato @LatamData La seguridad lo es todo. Por eso el compañero que desvía el foco alegando que es un “lujito” que otros países no tienen, carece de sentido.
Español
1
0
1
97
Ale
Ale@abalegno·
@Krosecato @LatamData El lujo no sirve de nada si te lo hackean. El problema no es el sistema, es la seguridad.
Español
2
0
1
427
Ale
Ale@abalegno·
@frabigol Es el entrenador más inteligente del mundo… 15 años robando en el club.
Español
0
0
0
138
Fran
Fran@frabigol·
El Cholo Simeone los últimos 10 años: - 2015: Liga ❌️ Copa ❌️ UCL ❌️ - 2016: Liga ❌️ Copa ❌️ UCL ❌️ - 2017: Liga ❌️ Copa ❌️ UCL ❌️ - 2018: Liga ❌️ Copa ❌️ UCL ❌️ - 2019: Liga ❌️ Copa ❌️ UCL ❌️ - 2020: Liga ❌️ Copa ❌️ UCL ❌️ - 2021: Liga ✅️ Copa ❌️ UCL ❌️ - 2022: Liga ❌️ Copa ❌️ UCL ❌️ - 2023: Liga ❌️ Copa ❌️ UCL ❌️ - 2024: Liga ❌️ Copa ❌️ UCL ❌️ - 2025: Liga ❌️ Copa ❌️ UCL ❌️ - 2026: Liga ❌️ Copa ❌️ UCL ❌️ 🤑 Inversión en los últimos 10 años: 💰 1,7 BILLONES DE EUROS 💸 🏆 Titulos: 1 (UNO) 🥶🧊 Más de un billon y medio de euros para ganar UN SOLO TÍTULO. Otro año en la oficina del DT más mediocre y fracasado de la historia.
Fran tweet media
Español
553
2.1K
16.3K
1.3M
Ale retweetledi
0xMarioNawfal
0xMarioNawfal@RoundtableSpace·
"YOUR CLAUDE CODE SESSION LIMIT HAS BEEN REACHED"
English
182
538
4.7K
555.6K
Ale
Ale@abalegno·
@CFCUruguay Y por qué no aprende a defender mejor ?
Español
0
0
0
196
Chelsea Uruguay
Chelsea Uruguay@CFCUruguay·
😁🇪🇸 Trevoh Chalobah ha comenzado a tomar clases de español, para así poder comunicarse de forma fluida con sus compañeros. 📹 Sara Duque en IG
Español
29
44
763
23K
Ale
Ale@abalegno·
@nicos_ai Clon de Claude design codeado con Claude code… 😂
Ale tweet media
English
0
0
13
3.8K
Nico
Nico@nicos_ai·
Han clonado Claude Design y puedes usarlo gratis y sin limites. Se llama Open Design, un proyecto open source que te deja usar Claude para workflows de diseño sin pagar. Sin suscripciones. Sin límites (como la versión oficial). Acceso total. Esto es lo que puedes hacer: — Generar diseños UI/UX con Claude — Convertir prompts en diseños reales — Sustituir herramientas de diseño caras en muchos casos — Personalizarlo completamente (es open source) Está hecho para devs, indie hackers y creadores que no quieren quemar dinero en herramientas. De esos repos que pasan desapercibidos hasta que de repente todo el mundo los usa. Si usas AI + diseño, tienes que probarlo Enlace abajo 👇 (guárdalo antes de que explote)
Español
52
440
3.9K
313.1K
Ale retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️Google Gemini CLI Vulnerabilities Allow Attackers to Execute Commands on Host Systems Source: cybersecuritynews.com/google-gemini-… A critical remote code execution vulnerability in the Google Gemini CLI and its associated GitHub Action. Assigned a maximum severity score of CVSS 10.0, the flaw allowed unprivileged external attackers to execute commands directly on host systems. This vulnerability effectively turned automated CI/CD pipelines into potential attack vectors in the supply chain. The core issue was how the Gemini CLI handled workspace trust in non-interactive environments. #cybersecuritynews
Cyber Security News tweet media
English
3
36
109
5.7K