Angry💙💛Mom8️⃣9️⃣6️⃣4️⃣🧸

@angry_mom
26 Followers
56 Following
5K Posts
暴躁,持续愤怒
老大叫🐷
老二叫二妹姐
老三叫毛毛头,领导,大元宵,宝宝,Baby,嘎嘎嘎
不醉不歸 🤪 #beer
俄羅斯國家級駭客鎖定家用及 Soho 路由器
https://news.kagi.com/s/7xseb7

英國及業界研究人員於 4 月 7 日警告,與俄羅斯國家相關的組織 Fancy Bear(亦被追蹤為 APT28 和 Forest Blizzard)在一場長期的間諜活動中,一直在劫持易受攻擊的家用及小型辦公室路由器 。該活動集中在較舊、未修補漏洞的 MikroTik 和 TP-Link 設備,特別是已停止支援的型號,並讓攻擊者更改路由器設置,使受害者的網絡流量流經該組織控制的基礎設施 。
Russian state hackers target home and Soho routers

UK and industry researchers warned on April 7 that the Russian state-linked group Fancy Bear, also tracked as APT28 and Forest Blizzard, has been hijacking vulnerable home and small-office routers in a long-running espionage campaign. The activity centered on older, unpatched MikroTik and TP-Link devices, especially end-of-life models, and let the attackers change router settings so victims’ web traffic flowed through infrastructure the group controlled. According to the UK’s National Cyber Security Centre, Microsoft, and Black Lotus Labs, the operation cast a wide net to reach many potential victims before narrowing in on targets of intelligence interest. Researchers said the technique helped steal passwords and authentication tokens, including Microsoft Office tokens, without planting malware on victims’ computers, highlighting both the risks of aging network gear and the value of timely security updates. The encouraging part is that defenders have now exposed the campaign and laid out practical steps users can take, including replacing unsupported routers, installing the latest firmware, and reviewing DNS settings. Those steps can sharply limit the attackers’ room to operate.

Kagi News
貧乳真的會變稀少價值
🤣
肚子好撑可是嘴巴好饿怎么办。。。。 

那個...應該不太可能有人還沒領吧?

普發現金 10000 元

https://10000.gov.tw

還沒領的趕快處理
領取期間:114年11月5日~115年4月30日

都要下班了我还没摸上鱼!!超气的!!!

第三方 Telegram 客戶端 -- Nekogram -- 被發現有後門,傳送使用者的電話號碼至某個外部的資料庫。

此外,如果使用者有多個 Profile,開發者會收到有關帳戶連結的資訊。

https://xcancel.com/sotanews/status/2039652946233688273

Sota News (@sotanews)

❗️ Unofficial Telegram Client Nekogram Transmits Account-Phone Number Links to Developer An IT expert who analyzed the Nekogram code informed SOTA about a backdoor discovered within the client: "The backdoor is hidden in the http://Extra.java file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace. The same file implements account 'doxing' via several bots; it is possible that the leaked data is used to populate their databases." Additionally, the developer receives information regarding the linkage of accounts if a user has multiple profiles. The creator of the Nekogram client—presumably a Chinese national named Fan Li—was previously known for conducting DDoS attacks and unethical online behavior (including death threats against acquaintances). In early versions of the client, de-anonymization was applied only to Chinese phone numbers, which could have been used for political surveillance; however, it is now applied to all users. Notably, another unofficial Telegram client, "Telega," utilizes VK servers, providing the state with opportunities to monitor correspondence. Telegram itself has recently implemented an option to warn users if their interlocutor is using an unofficial client of the messenger. Illustration: Nekogram code fragment

Nitter
继续聊聊 AI 与 IT 裁员——毕竟, 这是一个可以从不同视角进行观察和评论的现象。 最近几年的 IT 裁员给我的一个印象是: 以往千辛万苦挤进所谓 “大厂” 的那些人不幸挤到了历史的风口浪尖上——因为 “大厂” 恰恰是最有条件也最有意愿使用 AI 的, 而且即便细微的效率提升都可折算成一定数目的裁员。 另一方面, 小公司的情况则颇有不同, 因为如今的 AI 还远不能独当一面, 几乎所有应用都离不开 IT 人员的共同参与——比如要向 AI 描述项目细节, 要为 AI 订正或改良结果, 等等。 既然离不开 IT 人员, 那么 IT 人员本就很少的小公司的裁员空间就很有限了——因为人是 “量子化” 的, 如果裁一个人就对应于很大比例或会导致某个方面彻底缺人, 那么 AI 就会像低能光子无法导致能级跃迁那样, 无法导致裁员。 在同样的比喻下, “大厂” 则由于人多, 如同能级稠密的 “连续谱”, 可吸收各种能量的光子——换言之可因各种程度的 AI 应用而裁员, 故成为了裁员浪潮的风口浪尖。