Hm, #TIL about the "most widespread security incident in the history of the Web", when in 1999 a security flaw in Hotmail was revealed that permitted anybody to log in to any Hotmail account using the password "eh".
she/her
| twitter.com/nyxilar |

| twitter.com/nyxilar |
Hm, #TIL about the "most widespread security incident in the history of the Web", when in 1999 a security flaw in Hotmail was revealed that permitted anybody to log in to any Hotmail account using the password "eh".
playing PC games from the 2000s is like
This game, like most Scringle Engine 3 games, does not support widescreen, and instead crops the 4:3 image to a 16:9 ratio. This can be fixed with Jambo's Game Tool, although this will disable the "Advanced Features" video option, which will remove reflections from puddles and mirrors.
To fix the immediate crash when starting the cutscene on level 3, download GregFix.dll from the GregUtils website (no link provided - Greg will send DMCA takedowns to any websites besides Google that provide his website's URL) and drop it in your system32 folder. Run the game with administrator privileges twice, letting it crash both times, then start it normally. This is confirmed to work on December 2022 through April 2023 builds of Windows 10.
NEW: Network Rail has trialled 'emotion detection' CCTV systems at multiple train stations around the UK.
The technology has been used as part of widespread AI trials at train stations in the UK. Currently Leeds station has 350 CCTV cameras hooked up to AI.
https://www.wired.com/story/amazon-ai-cameras-emotions-uk-train-passengers/ #tech #surveillance #privacy
If you have received a phishing email from namecheap please send it to me with any extra details you have I'm currently mapping out the campaign and it's a fun one to say the least.
Please boost for reach!
#namecheap update.
The TAs behind this campaign have been phishing on IP 105.147.236[.]238 since at least January 22.
@AtomicMaya and twitter.com/blairnoctis helped with the JavaScript analysis, thanks to you both! The initial javascript decodes and executes a second-stage payload which draws a base64 image with x64hash128 'adf846c5a02e79a0c3feb36c7ea97511'. It tries to add the webdriver to localstorage, checks if window properties include 'tronweb', browser is Chrome & supports PDF rendering, & other anti-analysis features. Passing these, it sends a POST to '/index.php?authentification' with key + info about PDF exec. capability.
This smells like malware....
#namecheap appears to have been #breached, with phishing emails sent out through their marketing infrastructure.
The links resolve to accomplish-delivery[.].mysafebridge[.]info, a site which contains obfuscated javascript. URLScan claims it downloads a PDF but this is false.
Scan here https://urlscan.io/result/784fd97a-0b32-438a-a44e-90363899110a/#summary.
⚡️MSTICpy is a powerful python library for threat intelligence and threat investigation! I created a new security artwork for a brief overview.
Learn more with @ianhellen & @PeteABryan at BlueHat for an in-depth look. 🤓#ThreatIntel #infosec #python #cybersecurity