Sansquer
158.7K posts

Sansquer
@sansquer
A prática leva a perfeição, menos na roleta russa

Estudantes e trabalhadores colocam fogo em uma efígie da cabeça em decomposição do governador de São Paulo, Tarcísio de Freitas 🔥🙃



‘Me consideraram branca’, diz servidora do Itamaraty exonerada após ser barrada em banca racial 📲 Entenda -> x.gd/jROSk Flávia Medeiros ficou cerca de dois meses no cargo de oficial de Chancelaria após uma derrota judicial; Procurados, Ministério das Relações Exteriores e Advocacia-Geral da União não responderam

🚨URGENTE - Lula admite que foi seu governo que taxou as blusinhas, diz que sabe que errou e coloca toda a culpa no Haddad “O Haddad acreditava realmente que era uma coisa boa. Ele falou comigo com convicção que era uma coisa boa”


🚨 Governo Lula anuncia destinação de R$ 30 BILHÕES para financiamento de carros novos pelo programa Move Brasil, a medida ajudará motoristas de aplicativo que usam carros alugados ou têm dificuldades para trocar o automóvel.


Microsoft is investigating a new, emerging Mini Shai-Hulud npm supply chain attack targeting antv packages. Attackers compromised an antv maintainer account and published malicious versions of multiple widely used packages (for example, antv/g2). As these packages are widely used as dependencies, the compromise propagated into downstream libraries like echarts-for-react, impacting a much broader set of applications and continuous integration (CI) environments. All compromised packages contain a byte-identical, obfuscated credential-stealing payload delivered via a preinstall hook (Bun). The malware targets high-value secrets including: - GitHub personal access tokens (PATs) and OpenID Connect (OIDC) tokens - npm / Amazon Web Service (AWS) credentials and Security Token Service (STS) sessions - Secure Shell (SSH) keys, kubeconfigs, and .env / .npmrc files - Software-as-a-service (SaaS) tokens (Slack, Stripe, Vault) Exfiltration occurs over HTTPS with Transport Layer Security (TLS) validation disabled. The payload also abuses stolen OIDC tokens to forge Supply-chain Levels for Software Artifacts (SLSA) provenance and propagate malicious releases, exhibiting worm-like behavior across repositories. Malicious files distributed through npm packages are detected by Microsoft Defender as Trojan:AIGen/NPMStealer , "Suspicious Node.js process behavior", or “Credential access attempt”, preventing credential theft and malicious post-install execution. Mitigation: - Audit dependencies for affected antv and related packages; pin or downgrade to known-good versions (pre-2025-05-18). - Revoke and rotate exposed credentials (GitHub, npm, cloud tokens, SSH keys). - Validate integrity of CI pipelines and recent build artifacts. - Network IOC: Stolen credentials are exfiltrated over HTTPS to t.m-kosche[.]com:443. Block at egress and review network logs for outbound connections.









