Et voici le Guide trollesque et (auto)critique des oiseaux et de leurs équivalents politiques de gauche.

Une version augmentée et améliorée d'un précédent travail pour se moquer (presque) gentiment de nos travers à gauche.

Dispo gratuitement sur https://ko-fi.com/s/d9a2c8bb7d mais les dons sont les bienvenus.

Je vous laisse découvrir toutes les planches ci-dessous

1/X

#FediArt #Art #OIseaux #Politique #Gauche #Troll Humour
tu portes très mal ton nom @[email protected] #troll Je pense que tu est un compte de désinformation professionnel Et sérieusement, je me demande à quoi ça ressemble dans ton ciboulot... à répéter les mêmes recettes que Trump... Faut aimer être /@$*#$é! à ce point là

Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets

A new supply chain attack targeting Trivy has compromised 75 out of 76 version tags in the aquasecurity/trivy-action GitHub repository. The attacker force-pushed these tags to serve malicious payloads, effectively turning trusted version references into a distribution mechanism for an infostealer. The malicious code executes within GitHub Actions runners, targeting sensitive data in CI/CD environments. It harvests secrets from runner process memory and the filesystem, encrypts the collected data, and exfiltrates it to an attacker-controlled endpoint or a fallback GitHub-based channel. The attack's scope is significant, potentially affecting over 10,000 workflow files on GitHub referencing this action.

Pulse ID: 69bd18a7cc27dfdfaf6f56a4
Pulse Link: https://otx.alienvault.com/pulse/69bd18a7cc27dfdfaf6f56a4
Pulse Author: AlienVault
Created: 2026-03-20 09:51:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#ASEC #CyberSecurity #Endpoint #GitHub #InfoSec #InfoStealer #OTX #OpenThreatExchange #RAT #RCE #Rust #SupplyChain #Troll #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
I'm just gonna shake #haters #dohardthings #troll

Killed my first troll! (this run)

#Valheim #Troll

@TLB73

the political echelons of the #USA are dead and rotten

but the people can still get it right on smaller scale issues

now the question is if in the future the rot continues to extend further down, if MAGA grows

or if the people overturn the rot, if MAGA dies

#protest

#resist

#strike

and #vote!

you not voting is part of the rot, just as much as MAGA

all your reasons not to vote are fakery, some of it fed to you as a #troll #psyop on #socialMedia. don't buy the lying #cosplay shit

When you're carrying a message it takes ears. Who calls #politicians #farmers? Nobody. Someone calling me a farmer is a #troll. Even not being an elected doesn't mean that I'm a troll when I'm carrying a #message #for #everybody. The rich people don't know what a good life is. They have no clue.

Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

A credential theft campaign by Storm-2561 exploits SEO poisoning to distribute fake VPN clients. Users searching for legitimate VPN software are redirected to malicious websites hosting ZIP files containing trojans masquerading as trusted VPN clients. These digitally signed trojans harvest VPN credentials and exfiltrate data to attacker-controlled infrastructure. The campaign uses GitHub repositories, legitimate code-signing certificates, and sophisticated post-theft redirection strategies to avoid detection. The attack chain involves initial access through SEO manipulation, execution of malicious MSI files, credential theft via fake VPN interfaces, and data exfiltration. Defensive recommendations include enabling cloud-delivered protection, using EDR in block mode, and enforcing multi-factor authentication.

Pulse ID: 69b7da9f7950cc3e720bfb13
Pulse Link: https://otx.alienvault.com/pulse/69b7da9f7950cc3e720bfb13
Pulse Author: AlienVault
Created: 2026-03-16 10:25:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Cloud #CyberSecurity #EDR #GitHub #InfoSec #OTX #OpenThreatExchange #RAT #Rust #SEOPoisoning #Trojan #Troll #VPN #ZIP #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Wide-scale, opportunistic SMS pumping attacks target customer sign-up pages

A widespread SMS pumping campaign has been identified, targeting customer sign-up pages. The attackers, designated as O-UNC-036, use disposable email infrastructure and proxy services to launch high-volume, automated attacks against public API endpoints. Their objective is to create numerous accounts and trigger SMS messages to actor-controlled phone numbers, generating significant financial costs for target organizations. The attack pattern involves reconnaissance, infrastructure setup, and high-volume requests using known high-cost phone country codes. The campaign has been active since at least March 2024, affecting multiple tenants and organizations. Recommended protective measures include implementing FIDO Authentication, blocking suspicious domains and ASNs, and enhancing monitoring and response capabilities.

Pulse ID: 69b4567b03ea40d6ffd8a0f7
Pulse Link: https://otx.alienvault.com/pulse/69b4567b03ea40d6ffd8a0f7
Pulse Author: AlienVault
Created: 2026-03-13 18:24:59

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Email #Endpoint #InfoSec #OTX #OpenThreatExchange #Proxy #RAT #SMS #Troll #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange