Aol은 안팔고 그대로 있습니다
Alt5도 그대로 있고
사실 지난주 별로 뭘 안했어요. 한번 쉬니까 관성의 법칙이 생겨버림.. 번아웃이 온건지..
Alt5도 그대로 있고
사실 지난주 별로 뭘 안했어요. 한번 쉬니까 관성의 법칙이 생겨버림.. 번아웃이 온건지..
❤9👍3🐳1
생각 정리하는 방
간만에 바이오 복수 하나 완료.. 나스닥 바이오 데이터플레이 6종목 넣어놨는데, 어느정도 다 흥해서 제발 레플리뮨 절반만 매꿔다오..
Dnth best in class
레플리뮨 대참사 이후로 바이오픽을 올려드리진 않는데.. 오늘 들고있던거 임상 다 미친결과 나오네요.
레플리뮨 대참사 이후로 바이오픽을 올려드리진 않는데.. 오늘 들고있던거 임상 다 미친결과 나오네요.
❤12🤔1
Forwarded from infinityhedge
*HACKERS HIJACK NPM PACKAGES IN WHAT IS BEING CALLED THE LARGEST SUPPLY CHAIN ATTACK IN HISTORY
*IF YOU USE A HARDWARE WALLET, PAY ATTENTION TO EVERY TRANSACTION BEFORE SIGNING
*IF YOU DON'T USE A HARDWARE WALLET, REFRAIN FROM MAKING ANY ON-CHAIN TRANSACTIONS FOR NOW: LEDGER CTO
<@INFINITYHEDGE> ⚠️
*The malicious code only impacts individuals accessing the compromised applications over the web, monitoring for cryptocurrency addresses and transactions that are then redirected to attacker-controlled wallet addresses. This causes the transaction to be hijacked by the attackers rather than being sent to the intended address.
*The malware operates by injecting itself into the web browser, monitoring Ethereum, Bitcoin, Solana, Tron, Litecoin, and Bitcoin Cash wallet addresses or transfers. On network responses with crypto transactions, it replaces the destinations with attacker-controlled addresses and hijacks transactions before they're signed.
*What makes it dangerous is that it operates at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users' apps believe they are signing: bleepingcomputer ⚠️
*IF YOU USE A HARDWARE WALLET, PAY ATTENTION TO EVERY TRANSACTION BEFORE SIGNING
*IF YOU DON'T USE A HARDWARE WALLET, REFRAIN FROM MAKING ANY ON-CHAIN TRANSACTIONS FOR NOW: LEDGER CTO
<@INFINITYHEDGE> ⚠️
*The malicious code only impacts individuals accessing the compromised applications over the web, monitoring for cryptocurrency addresses and transactions that are then redirected to attacker-controlled wallet addresses. This causes the transaction to be hijacked by the attackers rather than being sent to the intended address.
*The malware operates by injecting itself into the web browser, monitoring Ethereum, Bitcoin, Solana, Tron, Litecoin, and Bitcoin Cash wallet addresses or transfers. On network responses with crypto transactions, it replaces the destinations with attacker-controlled addresses and hijacks transactions before they're signed.
*What makes it dangerous is that it operates at multiple layers: altering content shown on websites, tampering with API calls, and manipulating what users' apps believe they are signing: bleepingcomputer ⚠️
❤11