RE: https://mindly.social/@otterX/116545304917555399
Cuteness overload!😍
I can't get over the fact that Sammi on the right is real and not a plushie.
RE: https://mindly.social/@otterX/116545304917555399
Cuteness overload!😍
I can't get over the fact that Sammi on the right is real and not a plushie.
Cambridge Chronicle article: ‘Did not need to happen’ - Bald eagle death renews calls for rat poison ban
-Entwickler | Developer https://www.heise.de/news/QLNX-Neuer-Remote-Access-Trojaner-zielt-auf-Linux-Entwickler-11285654.html #RAT #Malware蒼穹の槍 Спис Соукю
ドブネズミを振り払う。
захищаючи золоту землю.
https://www.pixiv.net/novel/show.php?id=27026528
<>
#spear #near #soukyuu #endure #endless #dark #winter #golden #land #advance #thorny #shake #sewer #rat #world #people #warrior #hearts #earth #sky #split #make #filthy #burn #parasites #spread #iron #miasma #soon
蒼穹の槍 Спис Соукю
ドブネズミを振り払う。
захищаючи золоту землю.
https://www.pixiv.net/novel/show.php?id=27026528
<>
#spear #near #soukyuu #endure #endless #dark #winter #golden #land #advance #thorny #shake #sewer #rat #world #people #warrior #hearts #earth #sky #split #make #filthy #burn #parasites #spread #iron #miasma #soon
蒼穹の槍 Спис Соукю
ドブネズミを振り払う。
захищаючи золоту землю.
https://note.com/poison_raika/n/nef6eb1ad92e2
<>
#spear #near #soukyuu #endure #endless #dark #winter #golden #land #advance #thorny #shake #sewer #rat #world #people #warrior #hearts #earth #sky #split #make #filthy #burn #parasites #spread #iron #miasma #soon

目覚めは近い。 明けぬ暗黒の冬を耐えしのぎ、 黄金の大地を守る蒼穹の防人。 茨の道を突き進み、 ドブネズミを振り払う。 世界から見放されてもなお、 戦士の心を無くさぬ強き民。 大地を眺め、空を見上げよう。 近い、目覚めの時は近い。 空を切り裂き、大地を唸らせる。 聖なる地に土足で踏み入り、 穢れを巻き散らす害虫を焼き払い、 欲と云う瘴気に溺れし罪人に鉄槌を下す。 息吹の乙女より齎されし、 蒼穹の槍。 間もなく、間もなく目覚める。 <> Спис Соукюу Пробудження близько. Захисники соукюу переживають н
蒼穹の槍 Спис Соукю
ドブネズミを振り払う。
захищаючи золоту землю.
https://note.com/poison_raika/n/nef6eb1ad92e2
<>
#spear #near #soukyuu #endure #endless #dark #winter #golden #land #advance #thorny #shake #sewer #rat #world #people #warrior #hearts #earth #sky #split #make #filthy #burn #parasites #spread #iron #miasma #soon

目覚めは近い。 明けぬ暗黒の冬を耐えしのぎ、 黄金の大地を守る蒼穹の防人。 茨の道を突き進み、 ドブネズミを振り払う。 世界から見放されてもなお、 戦士の心を無くさぬ強き民。 大地を眺め、空を見上げよう。 近い、目覚めの時は近い。 空を切り裂き、大地を唸らせる。 聖なる地に土足で踏み入り、 穢れを巻き散らす害虫を焼き払い、 欲と云う瘴気に溺れし罪人に鉄槌を下す。 息吹の乙女より齎されし、 蒼穹の槍。 間もなく、間もなく目覚める。 <> Спис Соукюу Пробудження близько. Захисники соукюу переживають н
PCPJack | Cloud Worm Evicts TeamPCP and Steals Credentials at Scale
PCPJack is a sophisticated credential theft framework that propagates across exposed cloud infrastructure while systematically removing artifacts linked to TeamPCP, a threat actor behind notable 2026 supply chain compromises. The toolset harvests credentials from cloud platforms, containers, developer tools, productivity applications, and financial services, exfiltrating data through attacker-controlled infrastructure. It targets exposed Docker, Kubernetes, Redis, MongoDB, RayML services and vulnerable web applications, enabling external propagation and lateral movement. Unlike typical cloud malware, PCPJack deploys no cryptominers, focusing instead on credential theft for monetization through fraud, spam campaigns, extortion, or access resale. The framework uses modular Python scripts orchestrated by a central component, employs Common Crawl data for target selection, and utilizes Telegram for command and control communications.
Pulse ID: 69fd0520d3687243cca2f973
Pulse Link: https://otx.alienvault.com/pulse/69fd0520d3687243cca2f973
Pulse Author: AlienVault
Created: 2026-05-07 21:33:20
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Cloud #CryptoMiner #CyberSecurity #Docker #Extortion #InfoSec #Malware #OTX #OpenThreatExchange #Python #RAT #Redis #Spam #SupplyChain #Telegram #Troll #Worm #bot #AlienVault
5 Malicious NuGet Packages Impersonate Chinese UI Libraries to Distribute Crypto Wallet and Credential Stealer
Five malicious NuGet packages published under account bmrxntfj impersonate Chinese .NET libraries to deploy an infostealer targeting browser credentials, cryptocurrency wallets, SSH keys, and local files. The packages typosquat legitimate Chinese UI and infrastructure libraries, grafting .NET Reactor-protected payloads onto decompiled legitimate code. The campaign uses version rotation to evade hash-based detection, with 219 of 224 total versions unlisted but fetchable. The stealer targets 12 browsers, 8 desktop crypto wallets, and 5 browser wallet extensions, exfiltrating data to a newly-registered C2 domain. With approximately 65,000 downloads across all versions, the campaign puts tens of thousands of developer workstations and CI/CD build servers at risk. The payload executes through .NET module initializers, hooks the CLR JIT compiler, and supports cross-platform infection including Linux and macOS infrastructure.
Pulse ID: 69fcc64069bf35be793669dd
Pulse Link: https://otx.alienvault.com/pulse/69fcc64069bf35be793669dd
Pulse Author: AlienVault
Created: 2026-05-07 17:05:04
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Chinese #CyberSecurity #InfoSec #InfoStealer #Linux #Mac #MacOS #NET #NuGet #OTX #OpenThreatExchange #RAT #SSH #bot #cryptocurrency #AlienVault