GitHub MCP Exploited: Accessing private repositories via MCP

We showcase a critical vulnerability with the official GitHub MCP server, allowing attackers to access private repository data. The vulnerability is among the first discovered by Invariant's security analyzer for detecting toxic agent flows.

Massacre of Innocents

YouTube

Sunday, May 4, 2025

Ukrainian sea drone downs Russian fighter jet in world-first strike — Russia used thermobaric weapons in drone strike on Kharkiv, Ukrainian prosecutors say — Russian drone attack on Kyiv injures 11 people, including 2 children, damages shopping mall — France to ramp up AASM Hammer smart bomb production for Ukraine … and more

https://activitypub.writeworks.uk/2025/05/sunday-may-4-2025/

Sunday, May 4, 2025 – Writeworks.UK

@skittles

Ja, ich kenne mich ein bisschen aus. #BlagFlag kenne ich aus eigener Ansicht. Stand sogar mit denen auf der Bühne. =:-)

Hier kannste mal ein paar meiner alten Bilder angucken:

https://www.flickr.com/photos/stefan-mueller-net/albums/with/72157709493017581

Und selbst #Exploited waren/sind ja irgendwie echt.

Stefan Müller’s albums | Flickr

Flickr

Employee #monitoring app exposes 21M work screens​ | Cybernews

The #leaked data is extremely sensitive, as millions of screenshots from employees' devices could not only expose full-screen captures of emails, internal chats, and confidential business documents, but also contain #login pages, credentials, #APIkeys , and other sensitive info that could be #exploited to attack businesses worldwide.

Cybernews contacted the company, and access has now been secured.
#privacy

https://cybernews.com/security/employee-monitoring-app-leaks-millions-screenshots/

Three of the four most exploited vulnerabilities in 2024 were zero-day flaws, found in security products Mandiant M-Trends 2025 Report

The 2025 edition of Mandiant’s M-Trends report offers a deeply researched and data-driven overview of global cybersecurity incidents observed in 2024, drawing from over 450,000 hours of frontline…

Medium

In many Parts, #PavelDurov is right.
It's a #Danger, to weaken #Encryption
and build in #Backdoors for #LEA, which also will be #exploited by #blackhat #Hackers and other #malvolent #Individuals.

https://t.me/durov/410

Du Rove's Channel

😲 Last month, France nearly banned encryption. A law requiring messaging apps to implement a backdoor for police access to private messages was passed by the Senate. Luckily, it was shot down by the National Assembly. Yet 3 days ago the Paris Police Prefect advocated for it again. 🤦‍♂️ The members of the National Assembly were wise to reject a law that would have made France the first country in the world to strip its citizens of their right to privacy. Even countries that many Europeans view as lacking in freedoms have never banned encryption. Why? Because it’s technically impossible to guarantee that only the police can access a backdoor. Once introduced, a backdoor can be exploited by other parties — from foreign agents to hackers. As a result, the private messages of all law abiding citizens can get compromised. Aimed at preventing drug trafficking, the law wouldn’t have helped fight crime anyway. Even if mainstream encrypted apps had been weakened by a backdoor, criminals could still communicate securely…

Telegram

This is what #tRump the #republicans and the #wealthy want for you #america

THIS is what a recession to depression looks like in modern times.

The wealthy want you living in #poverty so you have no choice but to work for them for next to nothing and be #exploited

We're going back to the days of lords and chattel.

You're not going to be the next #Billionaire That dream was always a lie.

It's time to punch UPWARDS in number and with force.

#capitalism #poverty #tax

https://www.youtube.com/watch?v=QzlViCjdSRU

China’s Fake Rich: 1.3B People Hold 5% of Wealth, 500M Never Had Coffee, 900M Never Flew

YouTube

#KRITIS Sektor #IT und #TK

Huge #ransomware campaign targets #AWS S3 storage: attackers have thousands of keys

"A massive database of over 1,200 unique #Amazon Web Services (AWS) access keys has been amassed and #exploited in a ransomware campaign. Administrators of exposed AWS S3 buckets are finding their files encrypted except for a ransom note demanding payment in bitcoin."
https://cybernews.com/security/aws-cloud-storage-bucket-ransomware-attacks/

...speaking of #ww2, remember these guys? #Navajo #code talkers

https://www.nationalww2museum.org/war/articles/american-indian-code-talkers

...crazy how who we are and what we know is only valued when it can be #exploited for their purposes... which is mostly #war mongering and tricking us into exploiting each other so they can forget us a11 when its done, and then wipe our names from the registry of existence they lie about and mislabel #history ...😮‍💨

American Indian Code Talkers | The National WWII Museum | New Orleans

The idea of using American Indians who were fluent in both their traditional tribal language and in English to send secret messages in battle was first put to the test in World War I with the Choctaw Telephone Squad and other Native communications experts and messengers. However, it wasn’t until World War II that the US military developed a specific policy to recruit and train American Indian speakers to become code talkers.

The National WWII Museum | New Orleans