toasts

43 posts

toasts banner
toasts

toasts

@t0asts

security fellow, malware enjoyer

Katılım Nisan 2026
508 Takip Edilen30 Takipçiler
John Hammond
John Hammond@_JohnHammond·
it is undeniably pizza friday
English
10
0
50
3.2K
winterknife 🌻
winterknife 🌻@_winterknife_·
Okay, I was wrong. Apparently, a PIN protector ain't gonna help against YellowKey v2. New cope: BIOS Power-On Password It could be bypassed but not without opening the laptop chassis. If you leave your device out of sight for more than a few hours, it ain't your device anymore.
winterknife 🌻@_winterknife_

Is it just me, or does anyone else think that the BitLocker bypass dubbed "YellowKey" is mostly a nothingburger? I mean if you are really serious about data encryption at rest, why wouldn't you use BitLocker with a TPM + PIN to unlock, like Microsoft recommends you do?

English
1
0
4
1.5K
toasts retweetledi
Adnan Khan
Adnan Khan@adnanthekhan·
Holy shit, this probably means TeamPCP had enough access to backdoor OpenAI releases but rapid incident response prevented it. openai.com/index/our-resp…
English
0
6
32
3.2K
toasts retweetledi
z☆ck
z☆ck@z4ckfr·
reasons to be kind to me: 1. please
English
26
10.7K
41.5K
392.1K
toasts retweetledi
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Cyber Right now! Everything is on fire! we have CVEs, we have zero days! we even have a WIFI RCE! (that obviously made me LOL)
mRr3b00t tweet media
English
26
60
399
27.4K
toasts retweetledi
Theo - t3.gg
Theo - t3.gg@theo·
Security things from the last few days: - CopyFail (linux pwn'd) - CopyFail 2/Dirty Frag - 13 advisories in Next.js - Over 70 CVEs addressed in MacOS 26.5 - ~50 CVEs addressed in iOS 26.5 - YellowKey (Windows Bitlocker pwn'd entirely) - GreenPlasma (Windows privilege escalation) - CVE-2026-21510 and CVE-2026-21513 confirmed to be used by Russia for Windows RCE - CVE-2026-32202 separately confirmed to be used by Russia for sensitive document access - Mini-Shai Hulud (over 300 JS and Python packages compromised via GitHub Action cache poisoning) - Google confirms they have identified AI-powered exploitation of zero days in an unidentified "open-source, web-based system administration too" - Canvas (popular LMS used in most schools) pwn'd entirely - PAN-OS (palo alto networks) pwn'd with a 9.3 severity CVE-2026-0300 Are you scared yet?
English
351
1K
6.9K
762K
toasts retweetledi
vx-underground
vx-underground@vxunderground·
TanStack was hit by a supply chain attack. MistralAI was hit by a supply chain attack. The Mayor of Arcadia, California, was a Chinese spy. Forza Horizon 6 leaked. Canvas bamboozled. Shai-Hulud open-sourced. Nightmare-Eclipse teases two new Windows 0days. It is Tuesday. What will happen on Wednesday? Find out on the next action packed episode of Dragon Ball Z
vx-underground tweet media
English
42
213
2.1K
59.6K
Wccftech
Wccftech@wccftech·
Microsoft drops the hammer on Forza Horizon 6 leakers with hardware bans lasting nearly 8,000 years. 🔗 wccf.tech/1kekk
Wccftech tweet mediaWccftech tweet media
English
76
107
2.2K
263.5K
Tony/Humpty
Tony/Humpty@cyb3rjerry·
The NPM tanstack router ecosystem got popped chat
Tony/Humpty tweet media
English
1
0
9
630
toasts
toasts@t0asts·
the author of the TanStack router commit posted by @adnanthekhan (github.com/TanStack/route…) has an interesting fork of the repo with this commit 👀 github.com/zblgg/configur…
toasts tweet media
TANSTACK@tan_stack

SECURITY ADVISORY — TanStack npm packages A supply-chain compromise affecting 42 @tanstack/* packages (84 versions total) was published to npm earlier today at approximately 19:20 and 19:26 UTC. Two malicious versions per package. Status: ACTIVE — packages are deprecated, npm security engaged, publish path being shut down. Severity: HIGH — payload exfiltrates AWS, GCP, Kubernetes, and Vault credentials, GitHub tokens, .npmrc contents, and SSH keys. If you installed any @tanstack/* package between 19:20 and 19:30 UTC today, treat the host as potentially compromised: • Rotate cloud, GitHub, and SSH credentials immediately • Audit cloud audit logs for the last several hours • Pin to a prior known-good version and reinstall from a clean lockfile Detection — the malicious manifest contains: "optionalDependencies": { "@tanstack/setup": "github:tanstack/router#79ac49ee..." } Any version with this entry is compromised. The payload is delivered via a git-resolved optionalDependency whose prepare script runs router_init.js (~2.3 MB, smuggled into each tarball at the package root). Unpublish is blocked by npm policy for most affected packages due to existing third-party dependents. All 84 versions are being deprecated with a SECURITY warning, and npm security has been engaged to pull tarballs at the registry level. Full technical breakdown, complete package and version list, and rolling status updates: github.com/TanStack/route… Credit to the security researcher for responsible disclosure.

English
1
0
1
202