Dimitris Moutsatsos

24.1K posts

Dimitris Moutsatsos banner
Dimitris Moutsatsos

Dimitris Moutsatsos

@ugh82

Geek. CTO @fintechins1ghts - Founder @tyche_tech - ex @madtv IT Director | developer, weirdo, geek | opinions expressed here are my own

Dubai | Nicosia | Athens Katılım Ağustos 2007
1.3K Takip Edilen2.3K Takipçiler
Dimitris Moutsatsos retweetledi
Ed Blake
Ed Blake@Therealedblake·
Imagine leaving for a 10 day trip around the moon and humanity starts a nuclear war while you’re gone
English
388
4.8K
99.1K
1.2M
Dimitris Moutsatsos retweetledi
Craig Weiss
Craig Weiss@craigzLiszt·
i'm going to name my children yaml and json
English
232
320
4K
107K
Dimitris Moutsatsos retweetledi
Ivan Burazin
Ivan Burazin@ivanburazin·
The founder of Postman says you have to kill your existing org chart, especially if you're still operating with a pre ai hierarchy arrangement. The modern org chart, according to @a85: - wide span of control (even within exec team) - work directly with ICs, not through layers - either you're building, or you're selling Projects are led by staff/principal engineers with high agency. They see across the board as well as deep in the stack. Product managers are building APIs and prototyping in Claude instead of writing PRDs. Designers are shipping PRs through Cursor directly instead of relying solely on Figma. Everyone is building. And the management's job is to develop better judgment.
English
108
247
2.3K
643.4K
Dimitris Moutsatsos
Να δεις θα πανε απο 💩
R A W S A L E R T S@rawsalerts

🚨#BREAKING: The Artemis II spacecraft’s toilet has malfunctioned once again, forcing astronauts to rely on emergency diaper-like backup systems while engineers work to resolve the issue.

Ελληνικά
0
0
0
31
Dimitris Moutsatsos retweetledi
Kalshi Culture
Kalshi Culture@Kalshi_Culture·
Even after 33 years, this intro hasn’t aged a day.
English
78
981
6.2K
239.8K
Dimitris Moutsatsos retweetledi
The Dark Side
The Dark Side@FantasyGalaxies·
27 years later… this might still be the greatest lightsaber duel ever!⚔️
English
81
359
3.2K
78.1K
Dimitris Moutsatsos
Tom Cruise new movie story plot
OSINTdefender@sentdefender

Tonight’s operation in Southern Iran which resulted in the successful rescue of a Weapons System Officer (WSO) onboard an American F-15E Strike Eagle downed Friday over Iran, involved hundreds of special forces troops and other military personnel, including members of the U.S. Navy’s SEAL Team Six, dozens of fighter and strike aircraft, helicopters, and cyber, space and other intelligence capabilities, officials tell The New York Times. Senior military officials described the mission to rescue the airman as “one of the most challenging and complex in the history of U.S. Special Operations” given the mountainous terrain, the airman’s injuries and Iranian forces rushing to the location in the mountains of Southern Iran. The WSO evaded Iranian forces for more than 24 hours, at one point hiking up a 7,000ft ridgeline, a senior U.S. military official said. U.S. attack aircraft dropped bombs and opened fire on Iranian convoys to keep them away from the area where the airman was hiding. As U.S. Special Forces converged on the downed airman, they fired their weapons to keep Iranian forces away from the rescue site, but did not engage in a firefight with the Iranians. In a final twist after the officer was rescued, two transport planes that would carry the commandos and the airmen to safety got stuck at a remote base in Iran. Commanders decided to fly in three new planes to extract all the U.S. military personnel and the airman, and they blew up the two disabled planes rather than have them fall into the hands of Iran’s Islamic Revolutionary Guard Corps (IRGC).

English
0
0
0
53
Dimitris Moutsatsos retweetledi
Vekay
Vekay@rajuvamsi007·
@Polymarket The hero we never deserved!!
Vekay tweet media
English
1
12
209
24.3K
Dimitris Moutsatsos retweetledi
Mike Muad'Dib
Mike Muad'Dib@Zepp1978·
Before the dark times. Before the Empire (Disney).
English
703
779
10K
1.9M
Dimitris Moutsatsos
Dimitris Moutsatsos@ugh82·
wow
Aakash Gupta@aakashgupta

North Korean intelligence agents built an entire fake company to compromise one JavaScript developer. And it worked. UNC1069 didn't hack Axios. They befriended its maintainer. They cloned a real company founder's identity, built a branded Slack workspace with fake employee profiles and LinkedIn post channels, then scheduled a Microsoft Teams call with what appeared to be a full team. During the call, a fake error message said his system needed an update. He installed it. That update was the RAT. From one developer's laptop, they had everything: npm credentials, publishing access, the keys to a package installed in 80% of cloud environments. Axios gets 100 million downloads per week. The attackers published two poisoned versions at 12:21 AM UTC on a Sunday night, tagging both the latest and legacy branches within 39 minutes. The malicious dependency had been pre-staged 18 hours earlier with a clean decoy version to build registry history. Three separate RAT payloads were pre-built for macOS, Windows, and Linux. The malware self-deleted after execution to erase forensic evidence. The poisoned versions were live for about three hours before npm pulled them. Huntress observed 135 endpoints across all operating systems calling the attacker's command-and-control server during that window. Wiz found the malicious versions in roughly 3% of environments scanned. Every affected machine needs full credential rotation: npm tokens, AWS keys, SSH keys, CI/CD secrets, everything in .env files. The part that keeps getting worse: this isn't isolated. The same threat cluster compromised Trivy (a security scanner), KICS, LiteLLM, and multiple GitHub Actions in the two weeks before Axios. Google estimates hundreds of thousands of stolen secrets are now circulating from these combined attacks. The maintainer had 2FA enabled. He said himself: "I have 2FA/MFA on practically everything." The exact method of token compromise is still undetermined. One person. One fake Teams call. 100 million weekly downloads weaponized in under three hours. The npm ecosystem runs on mass trust in individual maintainers who volunteer their time, and North Korean intelligence now has a repeatable playbook for turning that trust into a delivery mechanism.

QST
0
0
0
44