RE: https://social.tchncs.de/@thehackernews/116329690028637636
@dragonwolfsp and they want you to get WhatsApp
RE: https://social.tchncs.de/@thehackernews/116329690028637636
@dragonwolfsp and they want you to get WhatsApp
Microsoft posted this yesterday:
Microsoft Security: WhatsApp malware campaign delivers VBScript and MSI backdoors https://www.microsoft.com/en-us/security/blog/2026/03/31/whatsapp-malware-campaign-delivers-vbs-payloads-msi-backdoors/
More:
The Hacker News: https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html @thehackernews #infosec #Microsoft #WhatsApp

A malware campaign uses WhatsApp messages to deliver VBS scripts that initiate a multi-stage infection chain. The attack leverages renamed Windows tools and cloud-hosted payloads to install MSI backdoors and maintain persistent access to compromised systems.
@da_667 do you have a laptop sticker that says "pcaps or it didn't happen"?
Because if not then you should get one made
RE: https://infosec.exchange/@patrickcmiller/116274883509698953
@dragonwolfsp check this out since we just had a whole conversation on it
RE: https://infosec.exchange/@patrickcmiller/116109968778736907
@dragonwolfsp since we were just talking about this. Here’s some more.
Today in InfoSec Job Security News:
I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.
So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.
https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc
As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.