10/10
The lesson? Even billion-dollar companies can overlook BASIC security hygiene:
Protect your dev environments
Secure critical infrastructure
Vet your third-party providers
Otherwise, congratsβyou've just funded North Korea.
10/10
The lesson? Even billion-dollar companies can overlook BASIC security hygiene:
Protect your dev environments
Secure critical infrastructure
Vet your third-party providers
Otherwise, congratsβyou've just funded North Korea.
9/10
Experts point to North Koreaβs Lazarus Group as the likely culprits. Yep, Bybitβs crypto stash might now fund a little a small country...
8/10
Bybit has been scrambling, promising tighter security. Safe{Wallet} is investigating how a single compromised developer environment brought down their entire security.
7/10
Forensic analysts discovered the truth hidden in the Chrome cacheβbecause even hackers forget browser cache exists... sometimes.
6/10
And just TWO MINUTES after pulling off the heist, the attackers wiped all evidence, updating Safe{Wallet}βs AWS bucket with clean code. Talk about efficiency.
5/10
When Bybit security signed off on the transaction, it appeared perfectly legitimate, until the altered script silently redirected all the ETH straight into the hackerβs wallet.
4/10
This code didnβt just blindly steal funds, it specifically activated ONLY when Bybit moved funds from their cold wallet. Sneaky, targeted, and patient.
3/10
Hackers compromised a Safe{Wallet} developer's computer via social engineering, stole AWS tokens, and quietly injected malicious JavaScript into Safe{Wallet}'s AWS bucket.
2/10
Bybit relied on Safe{Wallet}, a secure, third-party multisig wallet.
Sounds safe, right?
Well, someone thought it'd be a good idea to store critical signing JavaScript in an AWS bucket.
1/10
Bybit, a major crypto exchange, lost $1.5 BILLION in Ethereum. But this wasn't some high-tech, futuristic cyberattack.... it's worse.
BYBIT ROBBED OF $1.5 BILLIONβAND THE REASON IS DUMBER THAN YOU THINK
a π§΅
#BybitHack #CryptoFail #CyberSecurity
A USB stick helped unleash the first cyberweapon that sabotaged nuclear centrifuges and rewrote the rules of cyberwarfare.
π₯ Watch here: www.youtube.com/watch?v=SzEd...
Next up: Miraiβthe botnet that turned baby monitors into cyberweapons. Maker vids still coming!
#CyberSecurity #MalwareStories
This isnβt hacking, this is psychological warfare against common sense. And the worst part? Itβs working.
www.bleepingcomputer.com/news/securit...
VPNs are getting hit by 2.8 million brute-force attacks. Soon, VPN providers will start offering 'double VPN' services, which is just two layers of failure for twice the price.
www.tomsguide.com/computing/vp...
Cybercriminals took out a newspaperβnext, theyβll hack into billboards and start running ads for their ransomware services. 'Get locked out of your files in 30 minutes or less, guaranteed.'
www.stltoday.com/newspaper-op...
Oh great, Chrome is getting hacked just by visiting a website. Guess itβs time to browse the internet exclusively through Notepad again.
www.forbes.com/sites/daveyw...
RTX 4090 with a full air conditionerβbecause nothing says 'gaming' like a GPU that needs its own climate control system. RTX 5090? Probably gonna require a mini nuclear reactor.
www.tomshardware.com/pc-component...
soo... don't forget things inside a retrobrightbox, pls!
youtu.be/qibXysiGQRk
Found a new way to watch my favorite videos...with horrendous framerate and an even worse ppi!
Thanks @chromalock.bsky.social
youtu.be/yPI6gURLLUs
I don't think stock.
You could theoretically vary the magnetronβs output power to encode binary data. This would involve dynamically adjusting the power supply to create different output levels.
high voltage that is necessary for multiple components would be needed to switch on/off rapidly...
if you replace the magnetron with a wifi transmitter, yes!
Got some new electrical wires, and they have this weirdly sweet, synthetic apple scent. I canβt stop sniffing themβ¦
Now I have a headache. Totally worth it.
2. **Truncated SHA-256 Hash Collisions**: The request hashing mechanism truncates SHA-256 hashes to only 12 characters. This significantly reduces entropy, making it feasible for an attacker to generate collisions. By exploiting this, a previously built malicious image can be served in place of a legitimate one, allowing the attacker to "poison" the artifact cache and deliver compromised images to unsuspecting users.
Stop. Truncating. Hashes.
www.phoronix.com/news/OpenWrt...
TIL: That you can still rip CDs with Windows Media Player (Legacy).
And it appears that the fingerprinting for media location services is not only still working, but the catalog appears to be up-to-date.
I got a whole jar of 1 and 2 cent coins that we don't use here anymore, we can work out a deal
If we make one for you... would you edit the next video faster?
pretty please?
FatFern incoming!
This is a 'keyhole slot.' Riveting stuff, huh?
The next video: Yellow fades, the light burns, and the plastic remembers. Itβs not ready. Neither am I.
Who knew lightbulb USB chargers were already a thing?
Not me. But I still made one, and itβs gloriously inefficient and totally not universal.
youtu.be/LM-pTcHPPNs