41 Followers
414 Following
413 Posts
Malicious Checkmarx Artifacts Found in Official KICS Docker Repository and Code Extensions | https://socket.dev/blog/checkmarx-supply-chain-compromise
Malicious Checkmarx Artifacts Found in Official KICS Docker Repository and Code Extensions

Docker and Socket have uncovered malicious Checkmarx KICS images and suspicious code extension releases in a broader supply chain compromise.

Socket
CVE-2026-33824: Remote Code Execution in Windows IKEv2 - the folks from TrendAI Research break down this wormable bug that was patched last week. The show root cause & offer detection guidance. Read the details as https://www.zerodayinitiative.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
Servus from #FIRSTCTI26! πŸ₯¨
Day 2 is live with top‑notch Cyber Threat Intelligence. Our #TLPCLEAR sessions are streamed on YouTube - no Lederhosen required πŸ˜‰
πŸ‘‰ https://www.youtube.com/watch?v=DMAqEP2Kqgs
#CTI #InfoSec
FIRST

9 likes. "2026 FIRST CTI Conference - Day 2 Plenary Sessions - Live Stream"

YouTube

Joined by Katrina Manson to hear all about her latest book release: Project Maven & the Dawn of AI Warfare πŸ‘€

We talk AI usage at the Pentagon, drone intel, AI enabled targeting, and the ethical tipping point of autonomous weapons. Super fascinating ideas. Video: https://youtu.be/OVgruylpVXc

RE: https://infosec.exchange/@bontchev/116441147893045746

Super interesting/detailed analysis of the e-voting system failure that happened recently during a voting in the canton of Basel Stadt.
#evoting #e-voting

⏱️ The internet blackout in #Iran has now surpassed the 1200 hour mark, continuing in its eighth week as of day 51.

As peace negotiations appear to flounder, one of the most important factors for Iranians, the restoration of international connectivity, is still overlooked.

Malspam πŸ“§ targeting Spanish users πŸ‡ͺπŸ‡Έ

Email ➑️ geo filter ➑️ mediafire ➑️ iso ➑️ vbs

1st stage - geo filter πŸ›‘
vmi3228488.contaboserver .net Contabo πŸ‡©πŸ‡ͺ

2nd stage - payload πŸ“„
https://urlhaus.abuse.ch/url/3824487/

Dropped iso:
https://bazaar.abuse.ch/sample/faaa4d005314440dfd7ed5fa2f522e1a2642f08ec3bf0c1e2779a39bf4268349/

Botnet C2:
πŸ“‘ 54.197.208.68 Amazon πŸ‡ΊπŸ‡Έ

Why Fighter Jets Ban 90% of C++ Features |
https://www.youtube.com/watch?v=Gv4sDL9Ljww
Why Fighter Jets Ban 90% of C++ Features

YouTube

Boosts appreciated

I am looking for a new job, specifically in embedded development or embedded security. I have been writing Rust professionally for 5 years, and am also comfortable in C. I've found vulnerabilities in multiple generations of NVIDIA hardware, and have held talks on this. If anyone knows of any openings, or would want to refer me (I am open to more broad Software Engineering work if it's via referral), I would appreciate it. I'm open to both remote work, and hybrid inside Berlin. I'm reachable either here, or via mail at [email protected]

#getfedihired