ほびわん✨🐶

18.2K posts

ほびわん✨🐶 banner
ほびわん✨🐶

ほびわん✨🐶

@hobi_ik

VRの住人 VRC:ほびわん/cluster:hobione

VR Katılım Şubat 2018
1.7K Takip Edilen1.3K Takipçiler
ほびわん✨🐶 retweetledi
あさくらあかり
あさくらあかり@thereaakari·
THE FIRST TAKE #超かぐや姫
あさくらあかり tweet mediaあさくらあかり tweet mediaあさくらあかり tweet mediaあさくらあかり tweet media
English
8
875
6.1K
58.1K
ほびわん✨🐶
ほびわん✨🐶@hobi_ik·
@DenSunRoom 回数重ねるごとにあまり泣かなくなるけど、20回を超えると涙が止まらなくなった
日本語
1
0
0
35
ほびわん✨🐶
ほびわん✨🐶@hobi_ik·
超かぐや姫!20回目からが本番かもしれない (21回目視聴後)
日本語
1
0
1
124
ほびわん✨🐶 retweetledi
『超かぐや姫!』公式
『超かぐや姫!』公式@Cho_KaguyaHime·
───✩₊⁺⋆🌕⋆⁺₊✧───  本編オリジナル曲 「OnyXXX」MV公開 ─────────── 作詞・作曲・編曲:コーニッシュ 歌唱:Black onyX    [帝アキラ(cv.入野自由)     駒沢雷(cv.内田雄馬)     駒沢乃依(cv.松岡禎丞)]  #超かぐや姫 #GWは超かぐや姫
日本語
438
20.5K
63.7K
2.2M
ほびわん✨🐶 retweetledi
ʚCocoaɞ
ʚCocoaɞ@usj_MC·
そんならかぐや、もう一回!
日本語
28
1.5K
11.4K
384.6K
ほびわん✨🐶 retweetledi
『超かぐや姫!』公式
────✩₊⁺⋆🌙⋆⁺₊✧──── ✧⁺₊2026.05.04 (Mon) 21:00⁺₊✧ ───────────── 待たせたな、子ウサギども! #超かぐや姫 #GWは超かぐや姫
『超かぐや姫!』公式 tweet media
日本語
787
23.1K
95.9K
4.3M
ほびわん✨🐶 retweetledi
さとりえ skeb募集中
どぅるるルーレット作りました‼️ タップしてとめてね #超かぐや姫
GIF
日本語
145
6.1K
34.8K
1.4M
ほびわん✨🐶 retweetledi
Zitkkae
Zitkkae@Zitkkae·
해볼만 했다
한국어
7
190
1.2K
36.3K
ほびわん✨🐶 retweetledi
『超かぐや姫!』公式
『ray 超かぐや姫!Version』 かぐやとヤチヨが歌ってみた🎤 #GWは超かぐや姫
日本語
209
9K
43.5K
984.3K
ほびわん✨🐶 retweetledi
ぶいあーる!~VTuberの音楽Radio~
📣BIGなお知らせ📣    /   #ぶいあーる × #超かぐや姫 コラボ放送決定✨  \    放送は👉5/16(土)21:05~    アニメ映画『超かぐや姫!』から かぐやがスタジオゲストとして登場‼ MC #星街すいせい とのSP対談をお届け☄🌕 放送はらじる★らじるで👇 nhk.or.jp/radio/
ぶいあーる!~VTuberの音楽Radio~ tweet media
日本語
191
5.6K
18.8K
1.5M
ほびわん✨🐶
超かぐや姫!視聴20回目だけど不思議と初見の頃の気持ちが湧いてきてむちゃくちゃ泣いちゃった
ほびわん✨🐶 tweet media
日本語
0
0
12
250
ほびわん✨🐶 retweetledi
THE FIRST TAKE
THE FIRST TAKE@The_FirstTake·
#THEFIRSTTAKE】 ー No.661 かぐや (cv. 夏吉ゆうこ) & 月見ヤチヨ (cv. 早見沙織) / ray 超かぐや姫!Version ー 白いスタジオに置かれた、一本のマイク。 ここでのルールは、ただ一つ。 一発撮りのパフォーマンスをすること。 ・ @Cho_KaguyaHime ▼Full show on YouTube
日本語
172
10.5K
23.6K
4.8M
ほびわん✨🐶 retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
230
2.7K
11.7K
2.4M