3 Followers
7 Following
16 Posts
'If you're lonely when you're alone, you're in bad company.'
- Jean-Paul Sartre -
The Cult of the Dead Cow (cDc) & The Application Framework VEILID

Read on and learn a bit about these interesting cult and what are they up to!

Rod’s Substack

🚨 Overnight on Aug. 26 in just over four hours, unidentified attackers compromised more than 1,000 Javascript developers, stealing their GitHub tokens, npm tokens, SSH keys, application secrets, and cryptocurrency wallet files.

They pulled that off by infecting a widely popular build system called "Nx" and by infusing their supply chain malware with artificial intelligence (AI)-powered intel-gathering capabilities.

https://www.darkreading.com/cyberattacks-data-breaches/1000-devs-lose-secrets-ai-powered-stealer

πŸ“° Larry Sanger, ex-founder of Wikipedia, says the online encyclopedia is a "veritable engine of defamation".

The best part, Larry proposed law changes to hold the biased platform accountable.

https://larrysanger.org/2025/08/on-the-cybersecurity-subcommittees-wikipedia-investigation/

On the cybersecurity subcommittee's Wikipedia investigation

Congress is now investigating Wikipedia. More precisely, according to a letter dated August 27, 2025 and sent by Rep James Comer (R-KY) and Rep. Nancy Mace (R-SC) to the CEO of the Wikimedia Foundation, Maryana Iskander, the cybersecurity subcommittee of the House Oversight and Government Reform

LarrySanger.org
🚨 If you use browser extensions and online services for your password management read on... And yes, you are doing it wrong, switch to FOSS offline tools and avoid browser extensions...
https://thehackernews.com/2025/08/dom-based-extension-clickjacking.html
DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft

DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.

The Hacker News

🚨 Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The "Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file," Trellix researcher Sagar Bade said in a technical write-up. "The payload isn't hidden inside the file content or a macro, it's encoded directly.

Finally somebody said it better πŸ˜…πŸ€£

Echo Chamber, Prompts Used to Jailbreak GPT-5 in 24 Hours

https://neuraltrust.ai/blog/gpt-5-jailbreak-with-echo-chamber-and-storytelling

GPT-5 Jailbreak with Echo Chamber and Storytelling | NeuralTrust

Using the Echo Chamber and Crescendo Attack techniques, our research team has uncovered a critical vulnerability in the newly released model by OpenAI.

NeuralTrust