david

8.8K posts

david banner
david

david

@pnyet

UT: -6.28355,106.8191 Katılım Ekim 2009
189 Takip Edilen87 Takipçiler
david retweetledi
Thomas King
Thomas King@thking·
Copy-Fail? More like Copy-Fixed. 🛑 At @DECIX , our customers depend on our availability and integrity. So when the Linux "Copy-Fail" vulnerability popped up, we took it super seriously and patched things up immediately. But our engineers don't just patch; they innovate. 🧠 During the mitigation process, one of our brilliant system engineers identified a completely alternative way to block the vulnerability using ftrace. Because it’s been supported in the kernel since 2013, it’s an incredibly accessible solution for the broader community. We love a clever fix. Check out the GitHub repo below, try it yourself, and hit us with your feedback! 👉 github.com/philfry/cve-20…
English
3
14
72
6.3K
Gogo | Dota for Toxicity
Gogo | Dota for Toxicity@lwastuargo·
Akun kelima aing barusan ngisi kemaren 😭😭 Ini Claude kenapa sih kok rasanya cepet banget abisnya
Gogo | Dota for Toxicity tweet media
Indonesia
28
2
145
19K
Affan Basalamah
Affan Basalamah@affanzbasalamah·
@lwastuargo Mas Gogo dgn akun Claude sultan sekian banyak aja mengeluh habis, bagaimana dengan kami yg cuma pakai Claude UMKM gini? Sampai prei kerja dulu nunggu limit reset besok jam 3 pagi.
Indonesia
1
0
6
990
david retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ cPanelSniper: CVE-2026-41940 - cPanel & WHM Authentication Bypass via Session-File CRLF Injection GitHub: github.com/ynsmroztas/cPa… CVE-2026-41940 - cPanel & WHM Authentication Bypass via Session-File CRLF Injection 4-stage exploit chain · Interactive WHM Shell · Bulk scanner · Pipeline ready · stdlib only
Dark Web Informer tweet media
English
5
95
551
32.5K
david retweetledi
AlmaLinux
AlmaLinux@AlmaLinux·
Copy Fail (CVE-2026-31431) is severe enough that we wanted to create a patch ASAP. If you run AlmaLinux on a multi-tenant host, container build farm, CI runner, or any system where untrusted users can get a shell, please read this blog post! almalinux.org/blog/2026-05-0…
English
0
15
68
4.5K
david retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️Copy Fail (CVE-2026-31431) is a Linux privilege escalation bug that lets any local user get root using a 732-byte Python script, and itworks on basically every major Linux distro shipped since 2017. Website: copy.fail Write-up: xint.io/blog/copy-fail… GitHub: github.com/theori-io/copy… It's a logic flaw in the kernel's crypto code (authencesn via AF_ALG and splice()) that allows a small write into the page cache, which can be used to tamper with a setuid binary like /usr/bin/su. Think how bad this is going to be for shared environments like Kubernetes, CI runners, and cloud sandboxes, where it enables container escape and tenant-to-host compromise. Found by Theori's Xint Code scanner, patched in the mainline kernel, and publicly disclosed on April 29, 2026; if you can't patch right away, the recommended workaround is to disable the algif_aead module.
English
60
827
3.3K
399K
david
david@pnyet·
@ridwanhr Shutter count pak gub? Check karet2nya jg pak gub.
Indonesia
0
0
0
311
Ridwan Hanif
Ridwan Hanif@ridwanhr·
Canon 5D seken udah murah ya, kalau beli seken, selain body count apa aja yang mesti dicek ya?
Indonesia
33
5
160
32.5K
david retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️🇮🇩 A threat actor has allegedly leaked 53,993 records from SIMOJANG (Sistem Informasi Monitoring Jabar Caang), an Indonesian provincial government monitoring system. The data reportedly includes monitoring statuses, names, NIK numbers, addresses, property ownership details, GPS coordinates, photos, electrical status, and other residential infrastructure data. The data is being distributed for free.
Dark Web Informer tweet media
English
4
34
120
12.9K
david retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability Severity: Critical CVSS: 9.8 Zero Day: Yes CVE Published: January 27th, 2026 Advisory: github.com/advisories/GHS… An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
Dark Web Informer tweet media
English
8
92
425
47K
david retweetledi
Salim A. Fillah
Salim A. Fillah@salimafillah·
Patah hati terbesar kami ketika mendengar cerita Pak Reje (kepala desa) di Aceh Tengah yang akses desanya tertutup akibat jembatan putus dan jalan longsor. Inilah yang menyebabkan kami fokus perbaikan akses. Tanpa akses, ekonomi tidak berputar. Masyarakat tidak bisa jual beli.
Indonesia
52
3.4K
7.4K
118.9K
david retweetledi
Salim A. Fillah
Salim A. Fillah@salimafillah·
Tolong jangan tinggalkan mereka, jangan teralih fokus. Bencana ini belum selesai. Mari berjuang bersama..
Indonesia
51
3K
5.1K
68.5K
david retweetledi
Dr. Umar Khan
Dr. Umar Khan@ahl_e_uloom·
Jackie Chan speaking about the children of Gaza 💔
English
309
31.8K
115.9K
3.3M
david retweetledi
AlmaLinux
AlmaLinux@AlmaLinux·
Gather 'round, friends, because we're dropping knowledge with a little something we call #AlmaTips. Today's tip is how to install Nvidia drivers on AlmaLinux. Take it away, Eric! 👇
English
0
3
23
835
david
david@pnyet·
sejauh ini masih omon2.
Indonesia
0
0
0
5