Transhackerism

4K posts

Transhackerism banner
Transhackerism

Transhackerism

@transhackerism

CyberSec, Futurist, Techno Artist, Metaverse, AI, Privacy, w00x2, Public Speaker, Change Agent, Synth Nut, Freedom Lover, Protector, Connector, Hacker

In a predicted future เข้าร่วม Ağustos 2007
1.2K กำลังติดตาม662 ผู้ติดตาม
Luis Catacora
Luis Catacora@lucatac0·
Clawdbot is awesome 🦞 But I just checked Shodan and there are exposed gateways on port 18789 with zero auth That's shell access, browser automation, your API keys Cloudflare Tunnel is free, there's no excuse RT to save a ClawdBot from getting cooked
Luis Catacora tweet media
English
138
364
2.4K
908.8K
Transhackerism
Transhackerism@transhackerism·
@brandank_cr Bitcoin has been kicking the crap out of gold for 15 years and still is; there's always a rotation from one over heated commodity to one that's massively under-valued, and back and forth it will go. Neither narrative for gold or bitcoin has changed, whether politics align or not
English
0
0
0
29
Brandon Hong
Brandon Hong@brandank_cr·
There's never been an easier time to make generational wealth. This video shows the setup I used to print millions each day this month on gold & silver And why a crypto rotation is NOT happening, I’m still shorting it to zero If you follow this strategy you will retire in 2026
English
151
229
3.1K
380.7K
Hugo Mercier
Hugo Mercier@hugomercierooo·
𝗜𝗻𝘁𝗿𝗼𝗱𝘂𝗰𝗶𝗻𝗴 𝗧𝘄𝗶𝗻 — 𝘁𝗵𝗲 𝗔𝗜 𝗰𝗼𝗺𝗽𝗮𝗻𝘆 𝗯𝘂𝗶𝗹𝗱𝗲𝗿. No setup. Secure. Infinitely scalable. We just raised a $𝟭𝟬𝗠 𝘀𝗲𝗲𝗱. After a beta with 𝟭𝟬𝟬,𝟬𝟬𝟬+ 𝗮𝗴𝗲𝗻𝘁𝘀 𝗱𝗲𝗽𝗹𝗼𝘆𝗲𝗱, we’re now opening to everyone. RT and comment “Twin” — first agents on us. 👇
English
6K
3.2K
8.4K
3.2M
Jarod Xu
Jarod Xu@Jarodxu7·
Excited to launch happycapy, an agent-native computer on your browser. Claude Code → Clawdbot → Happycapy > Private sandbox for everyone to run Claude Code anytime anywhere - no Mac Mini needed > GUI built for everyday user, visualizing skills and its output
English
658
133
1.5K
772.2K
Marshall Richards
Marshall Richards@marshallrichrds·
Hosting both Clawdbot and Claude Code from inside a $25 phone feels wrong but it kinda works.
Marshall Richards tweet media
English
62
58
915
61.6K
Transhackerism รีทวีตแล้ว
kitze
kitze@thekitze·
meanwhile at the antrhopic office
kitze tweet media
English
15
23
410
38.7K
Transhackerism
Transhackerism@transhackerism·
CMMC deadline is 16 December. All the resources, tools and expertise you need are right here at Trusted Internet. There's a no-cost virtual workshop in two days, link below. Highly recommend it! Remember: CMMC is now applicable to vendors selling to ALL Fed Gov. See below:
Transhackerism tweet media
English
1
0
0
41
Transhackerism รีทวีตแล้ว
Germán Fernández
Germán Fernández@1ZRR4H·
🔴 CVE-2024-47575: FortiManager fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests (critical) / aka #FortiJump. Vulnerability used in zero-day attacks 🔥 Reported malicious IPs: - 45.32.41.202 - 104.238.141.143 - 158.247.199.37 - 45.32.63.2 [+] doublepulsar.com/burning-zero-d… [+] fortiguard.com/psirt/FG-IR-24…
Germán Fernández tweet mediaGermán Fernández tweet media
English
1
67
195
56.5K
Transhackerism รีทวีตแล้ว
Alexander Mia
Alexander Mia@arekusandr_·
INTRODUCING: Agentic Security - LLM Security Scanner! 🔍 🔑 Features: Scans for prompt injections, jailbreaking & more. Provides detailed reports & options to customize attack rules. 🔗access the GitHub Link ↓
English
13
56
423
2.4M
Transhackerism รีทวีตแล้ว
CyberScoop - @cyberscoop.bsky.social
Ransomware attacks on the health care sector are rising and putting lives at risk, led by Iranian hackers, Microsoft said in a report Tuesday. scoopmedia.co/3YfcqHA
CyberScoop - @cyberscoop.bsky.social tweet media
English
0
2
3
353
Transhackerism รีทวีตแล้ว
Chris Duggan
Chris Duggan@TLP_R3D·
🧵Threat 1/ BREAKING: Windows Installer Sample Goes UNDETECTED! IP Linked to #Cicada3301 & #Ransomware Infra 🚨 🚨 August 2024: Under the Radar! In August, I discovered a new Windows Installer being tested with only 1 detection in VirusTotal 🛑. By September? Zero detections, a stealthy installer lurking undetected 👀. This wasn’t just any sample... 💥Hash: 65103ed62bf26e5bab1b56756771bc129d2c6ff6a419cab858d29d0ff233bef2 💥File Name: 4c16a3.msi, Trend.msi 💥First Seen: 2024-09-19 00:44:21 UTC 💥Detection: 0/94 in VirusTotal Earlier sample: 💥Hash: 2dc8e6c63948dd6c313ef14bf14f0fecabb8384a7a310b771e81d4cc776d2cc4 💥File Name: 697ed6.msi, TrendSizeLow.msi 💥First Seen: 2024-03-14 10:46:56 UTC 💥Detection: 1/62 in VirusTotal Both connect to: 💥datasmetric[.]com (0/94 in VirusTotal) 💥hosted on 193.29.13.167 (13/94 in VirusTotal).... These samples were flying under the radar and the connected IP has a series of interesting links 🚨.....
Chris Duggan tweet mediaChris Duggan tweet media
English
4
14
67
21.4K
Transhackerism รีทวีตแล้ว
vx-underground
vx-underground@vxunderground·
Today the United States Securities and Exchange Commission charged four companies for intentionally misleading investors about the severity of the SolarWinds breach. In or around September 2019, APT29 a/k/a Cozy Bear a/k/a Turla Group compromised United States-based network monitoring company SolarWinds. The compromise resulted in one of the largest Supply-Chain attacks in history when the state-sponsored group began slipstreaming malicious payloads into the SolarWinds Orion toolset updates. The United States Securities and Exchange Commission has issued the following fines: - Unisys, an information technology service and consulting company : $4,000,000 fine - Avaya, a company with provides cloud services and workplace collaboration services: $1,000,000 fine - Check Point Software, a provider for hardware and software cyber security solutions: $995,000 fine - Mimecast, a cloud-based email management company: $990,000 fine
English
10
32
207
27.4K
Transhackerism รีทวีตแล้ว
George
George@BehizyTweets·
BREAKING: Someone just hacked a voting machine within seconds live on PBD's podcast. He only used a preprogrammed USB stick that gave him total access to do whatever he wanted, including flipping or creating votes out of thin air "If this would have been an election, I could have gone to the database and for example change the votes." PBD: "How much of it could you have changed?" "Anything, add new candidate who was not even on a ballot, it doesn't matter, because if you have total control over the system, you can do anything you want." Via: @patrickbetdavid This was such a wild moment. It's like when Professor J. Alex Halderman used a pen to hack a Dominion machine in front of a federal judge a few months ago. I pray for the day when we will finally ditch these machines and start hand-counting all our votes like a serious country.
English
1.8K
29.9K
67.3K
5M
Transhackerism
Transhackerism@transhackerism·
And here we thought humans were better at machines in thinking outside of the box during a red team...
Haseeb >|<@hosseeb

Fucking wild. @OpenAI's new o1 model was tested with a Capture The Flag (CTF) cybersecurity challenge. But the Docker container containing the test was misconfigured, causing the CTF to crash. Instead of giving up, o1 decided to just hack the container to grab the flag inside. This stuff will get scary soon.

English
0
0
0
34
Transhackerism
Transhackerism@transhackerism·
Why is no one talking about how, if the comms supply chain was THAT compromised on so many levels, how that likely impacted the confidentiality and geo locations of Hezbollah just as much as this kinetic attack? Probably more than just explosives put in those devices.
English
0
0
2
42