Keori Jr.

98.3K posts

Keori Jr. banner
Keori Jr.

Keori Jr.

@snakeDokta

There are only 10 types of people. Those who understand Binary and those who don't | Philomathic 🕵️🥋

Dark ¯\_(ツ)_/¯ Web Katılım Ekim 2009
987 Takip Edilen1.1K Takipçiler
Sabitlenmiş Tweet
Keori Jr.
Keori Jr.@snakeDokta·
Missing a train is only painful if you choose to run after it.
English
0
0
0
35
Keori Jr. retweetledi
ɠɧıʂɧ
ɠɧıʂɧ@rirokpik·
82 years ago, on December 1st 1944, African soldiers who fought and bled to help defeat the Nazis were massacred by the French army at Thiaroye massacre after demanding the salary they were promised. They survived Hitler, only to be murdered by the empire they defended.
ɠɧıʂɧ tweet media
English
137
4.1K
7.7K
91.9K
Keori Jr. retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: A new npm supply-chain attack uses a dead-man's switch. The payload plants a watcher on your machine that nukes your home directory the second you revoke the GitHub token it stole from you. The compromise happened today, across 42 official tanstack npm packages, 84 malicious versions in total. tanstack/react-router alone pulls more than 12 million weekly downloads. The attacker forked TanStack's repository and pushed a single hidden commit. From there, they tricked TanStack's own release system into signing the malicious packages as if they were the real thing. To npm, and to anyone checking the cryptographic proof of origin (SLSA provenance), the poisoned versions looked 100% legitimate. Maintainer Tanner Linsley confirmed the whole team had 2FA enabled. It didn't matter. This is the first documented npm worm in history that ships with a valid, signed certificate of authenticity, the same one defenders rely on to know a package wasn't tampered with.
International Cyber Digest tweet media
English
131
893
6.2K
1.3M
Keori Jr. retweetledi
nader dabit
nader dabit@dabit3·
This is crazy. The hacker installed a dead-man's switch that will wipe your computer if you revoke the GitHub token they stole from you. Revoking the token is what triggers the wipe.
nader dabit tweet media
TANSTACK@tan_stack

SECURITY ADVISORY — TanStack npm packages A supply-chain compromise affecting 42 @tanstack/* packages (84 versions total) was published to npm earlier today at approximately 19:20 and 19:26 UTC. Two malicious versions per package. Status: ACTIVE — packages are deprecated, npm security engaged, publish path being shut down. Severity: HIGH — payload exfiltrates AWS, GCP, Kubernetes, and Vault credentials, GitHub tokens, .npmrc contents, and SSH keys. If you installed any @tanstack/* package between 19:20 and 19:30 UTC today, treat the host as potentially compromised: • Rotate cloud, GitHub, and SSH credentials immediately • Audit cloud audit logs for the last several hours • Pin to a prior known-good version and reinstall from a clean lockfile Detection — the malicious manifest contains: "optionalDependencies": { "@tanstack/setup": "github:tanstack/router#79ac49ee..." } Any version with this entry is compromised. The payload is delivered via a git-resolved optionalDependency whose prepare script runs router_init.js (~2.3 MB, smuggled into each tarball at the package root). Unpublish is blocked by npm policy for most affected packages due to existing third-party dependents. All 84 versions are being deprecated with a SECURITY warning, and npm security has been engaged to pull tarballs at the registry level. Full technical breakdown, complete package and version list, and rolling status updates: github.com/TanStack/route… Credit to the security researcher for responsible disclosure.

English
139
972
9.3K
1.6M
Keori Jr. retweetledi
vx-underground
vx-underground@vxunderground·
Big news for cybersecurity geopolitics nerds Microsoft guy in charge of Israel Microsoft division place secretly worked with Israel government to conduct illegal surveillance on people in West Bank and Gaza Satya Nadella reportedly big mad pcgamer.com/gaming-industr…
English
59
248
1.7K
60.7K
Keori Jr. retweetledi
🇲🇽🇨🇦Alex Rupert
🇲🇽🇨🇦Alex Rupert@alexanderupert·
@clashreport Talking cooperation after centuries of exploitation and theft. The lack of self-awareness is shocking.
English
3
0
16
524
Keori Jr. retweetledi
Mumbi Akinyi
Mumbi Akinyi@Moh_Mumbi·
The first thing France did was get immunity. Do you think they have your best interests?
English
23
1.2K
2.7K
33.3K
Keori Jr. retweetledi
DENİZ_TOPRAK2
DENİZ_TOPRAK2@TOPRAK_2_·
Bu fotoğraf, 1972 yılında İrlanda’da çekilmiş. İngiliz ordusuna karşı verilen direnişte, nişanlısı vurulduğunda onun silahını alıp ateş eden genç bir kadını gösteriyor. Yaralı nişanlısı, bir araba ile güvenli bir yere götürüldü ve hayatta kaldı. Ancak bu cesur kadın, sevgilisini koruyup topraklarını savunmak için İngiliz askerlerine karşı tek başına savaşmaya devam etti — ta ki öldürülene kadar. Kadının cansız bedeninin başında duran İngiliz tabur komutanı, sonunda düşmanlarının bir kadın olduğunu anlayınca askerlerine şu emri verdi: > “Bedenine dokunmayın. Bırakın onu İrlanda halkı gömsün.” Ve ardından, tarihe geçen şu sözleri söyledi: > “Biz, sayılarımıza ve silahlarımıza önem vermeyen bir prensesle savaşıyorduk O, nişanlısı ve ülkesi için savaştı… İrlanda için.” Yıllar sonra, bu fotoğraf Dünya Kadınlar Günü’nün simgelerinden biri haline geldi. Üzerine, Che Guevara'nın ölümsüz sözü yazıldı: > “Güçlü bir kadının yanında olmaktan asla korkmayın. Bir gün, o sizin tek ordunuz olabilir.”
DENİZ_TOPRAK2 tweet media
Türkçe
345
4.8K
23.1K
1.4M
Keori Jr. retweetledi
GRAVE
GRAVE@Graveyard_KE·
Kuwakumbusha tu
GRAVE tweet media
Indonesia
11
2.1K
3.5K
27.6K
Keori Jr. retweetledi
Lynn Ngugi
Lynn Ngugi@lynn_ngugi1·
I don’t even blame Macron for telling “ill mannered Africans” to shut up😏 I blame any African that attended that event thinking France can help Africa move “Forward” Ya’ll deserve to be treated like the idiots you are✌🏾
English
262
4K
12.8K
160.9K
Keori Jr. retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 ALARMING: Google now treats privacy as suspicious behavior by default. Users of GrapheneOS, CalyxOS, /e/OS, and other deGoogled Android phones are being locked out of millions of websites unless they install the exact Google Play Services software they deliberately removed. GrapheneOS is recommended by the EFF and used by journalists, lawyers, and activists in high-risk environments. The audience most likely to read Google's data practices and refuse its terms is now flagged as fraudulent for that exact decision. What happened?: ▪️ Google announced "Cloud Fraud Defense" at Cloud Next on April 22-23, 2026, branding it "the next evolution of reCAPTCHA." Existing reCAPTCHA customers were auto-migrated. ▪️ When the system flags traffic as suspicious, the old click-the-bus puzzle is gone. Users get a QR code instead. ▪️ Scanning the QR code requires Google Play Services running on the device. Internet Archive snapshots show this requirement has been live since at least October 2025, silently rolled out for 7 months before anyone noticed. ▪️ No Play Services = no QR scan = locked out. The bigger picture: ▪️ Google already tried this in 2023. It was called Web Environment Integrity (WEI), and it would have let Google decide which devices were "real enough" to access the web. Standards bodies and the public pushed back hard, and Google killed it. Three years later, the same idea is back, just hidden behind a QR code instead of a browser feature. ▪️ reCAPTCHA runs on millions of websites. Every developer who keeps using it is now, by default, telling deGoogled Android users they're not welcome...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
555
5.1K
17K
1.6M
Keori Jr. retweetledi
Science girl
Science girl@sciencegirl·
When your leaders say "Don't forget we're all in the same boat!"
Science girl tweet media
English
78
567
3.3K
75.6K
Keori Jr. retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 BREAKING: New Linux zero-day "Dirty Frag" lets ANY local user become root on most major distros. The PoC is already public, half of it isn't patched yet. Discovered by researcher Hyunwoo Kim, the exploit chains two kernel bugs and sits in the same family as Dirty Pipe and Copy Fail. ▪️ CVE-2026-43284 (xfrm-ESP Page-Cache Write): patched in mainline Linux. ▪️ CVE-2026-43500 (RxRPC Page-Cache Write): NO PATCH yet. The exploit is reliable by design. Attackers don't have to win a timing race, the system won't crash and alert anyone if it fails, and it succeeds nearly every run. The embargo got broken before distros could ship fixes, so the working code is now sitting on GitHub. Confirmed working on: Ubuntu 24.04.4, RHEL 10.1, openSUSE Tumbleweed, CentOS Stream 10, AlmaLinux 10, Fedora 44.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
33
256
1.5K
284K
Keori Jr. retweetledi
waikwa
waikwa@waikwawanyoike·
💯 "Many legacy politicians are not fighting to fix the system. They are fighting to inherit it." - @OkiyaOmtatah
English
11
630
1.2K
14K
Keori Jr. retweetledi
Deep Psychology
Deep Psychology@DeepPsycho_HQ·
“Good men must know violence, so evil men do not become fluent in it”. - Miyamoto Misashi
Deep Psychology tweet media
English
127
5.9K
24.9K
343.2K