Logitech has announced their new "Logi AI Prompt Builder" software. This software ships with Logi Options+ 1.7 which was deployed earlier this month.
With Logitech's AI software users can click a button on their mouse and automatically bring up a ChatGPT prompt.
We hate it
With Logitech's AI software users can click a button on their mouse and automatically bring up a ChatGPT prompt.
We hate it
🤣149😢17💯10👍9😱9❤4🤓4
vx-underground
Logitech has announced their new "Logi AI Prompt Builder" software. This software ships with Logi Options+ 1.7 which was deployed earlier this month. With Logitech's AI software users can click a button on their mouse and automatically bring up a ChatGPT…
Hot take: we don't want ChatGPT in our mouse. We just want a mouse – that's all.
❤123👍29🔥15💯9❤🔥5🤓3😢2😁1
This media is not supported in your browser
VIEW IN TELEGRAM
Angel Drainer shared a rap song and music video today.
We give this song and music video a B+
We give this song and music video a B+
🤣101❤11🤓7😢5👍2👏2😁2🤯2🔥1
Bad passwords are illegal and for nerds
Literally, the United Kingdom has made bad passwords illegal
(this applies strictly to manufacturers who provide poor default passwords to consumers, among other issues)
More information: https://news.sky.com/story/admin-and-12345-banned-from-being-used-as-passwords-in-uk-crackdown-on-cyber-attacks-13125565
Literally, the United Kingdom has made bad passwords illegal
(this applies strictly to manufacturers who provide poor default passwords to consumers, among other issues)
More information: https://news.sky.com/story/admin-and-12345-banned-from-being-used-as-passwords-in-uk-crackdown-on-cyber-attacks-13125565
Sky News
'Admin' and '12345' banned from being used as passwords in UK crackdown on cyber attacks
From today, new laws in the UK aim to make it tougher for cyber attacks to succeed and increase consumer confidence in the security of the products they use and buy.
🤣111🥰23👏13👍8😢5❤4😁4🤔2
This media is not supported in your browser
VIEW IN TELEGRAM
Today Julius Kivimäki a/k/a Zeekill, a former member of Lizard Squad, was sentenced to 6 years and 3 months in prison for the extortion of a psychiatric healthcare facility – threatening to disclose notes on 30,000 patients
Information and footage via Joe Tidy / BBC News
Information and footage via Joe Tidy / BBC News
🫡117🤣59👍23🎉15😢6😇6😁5❤4
Them: "lmfap"
Me: *sees obvious typo* "laughing my fucking ass pants"
Me: *sees obvious typo* "laughing my fucking ass pants"
🤣79🤓21😢2
"Are your malware builders clean?"
Hell no they're not clean – don't trust those things, not memeing.
Hell no they're not clean – don't trust those things, not memeing.
❤60🤣31💯9🥰5❤🔥4👍3🔥3😁1🤯1😢1
This media is not supported in your browser
VIEW IN TELEGRAM
🤣144🥰27💯15❤11😘2
On Monday a former NSA employee was sentenced for attempting to sell Top Secret United States documents to the Russian Federation.
His plot was foiled when he tried to sell the documents to an undercover FBI Agent.
He was sentenced to 21 years in prison
https://www.justice.gov/opa/pr/former-nsa-employee-sentenced-over-21-years-prison-attempted-espionage
His plot was foiled when he tried to sell the documents to an undercover FBI Agent.
He was sentenced to 21 years in prison
https://www.justice.gov/opa/pr/former-nsa-employee-sentenced-over-21-years-prison-attempted-espionage
www.justice.gov
Former NSA Employee Sentenced to Over 21 Years in Prison for Attempted
Jareh Sebastian Dalke, 32, of Colorado Springs, was sentenced today to 262 months in prison for attempted espionage in connections with his efforts to transmit classified National Defense Information (NDI) to an agent of the Russian Federation.
🤣151🫡26😁8❤5🤯5😢5🔥2👍1🤝1
2 weeks ago McAfee reported a variant of Redline stealer using Lua.
This is 100% some nerd from Roblox who decided to go into the stealer game 😂😂😂
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/redline-stealer-a-novel-approach/
This is 100% some nerd from Roblox who decided to go into the stealer game 😂😂😂
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/redline-stealer-a-novel-approach/
McAfee Blog
Redline Stealer: A Novel Approach | McAfee Blog
Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the wild, leveraging Lua bytecode to perform
🤣102❤12😁7🤓6🔥4👍2❤🔥1
Today Yaroslav Vasinskyi, the REvil ransomware operator responsible for the infamous Kaseya supply chain attack, was sentenced to 13 years in prison.
https://www.justice.gov/opa/pr/sodinokibirevil-affiliate-sentenced-role-700m-ransomware-scheme
https://www.justice.gov/opa/pr/sodinokibirevil-affiliate-sentenced-role-700m-ransomware-scheme
www.justice.gov
Sodinokibi/REvil Affiliate Sentenced for Role in $700M Ransomware
A Ukrainian national was sentenced today to 13 years and seven months in prison and ordered to pay over $16 million in restitution for his role in conducting over 2,500 ransomware attacks and demanding over $700 million in ransom payments.
😢48🔥20🤣15😁9👍3🎉2
vx-underground
Today Yaroslav Vasinskyi, the REvil ransomware operator responsible for the infamous Kaseya supply chain attack, was sentenced to 13 years in prison. https://www.justice.gov/opa/pr/sodinokibirevil-affiliate-sentenced-role-700m-ransomware-scheme
These are the last publicly posted images of Yaroslav Vasinskyi.
He was approx. 19 years old in these pictures.
He was arrested at approx. 22 years old.
He was sentenced at approx. age 25 years old.
He will be released from prison when he is approx. 38 years old.
He made approx. $8,300,000. Don't throwaway your life for ransomware.
He was approx. 19 years old in these pictures.
He was arrested at approx. 22 years old.
He was sentenced at approx. age 25 years old.
He will be released from prison when he is approx. 38 years old.
He made approx. $8,300,000. Don't throwaway your life for ransomware.
😢150🤣63🫡40❤17👍10🤓6😘1
Today DropBox reported to the SEC that on April 24th, 2024, they detected unauthorized access to the DropBox Sign prod environment.
DropBox states an unknown Threat Actor(s) was able to access user e-mails, usernames, account settings, and in some scenarios hashed passwords, phone numbers, API keys, OAuth tokens, and MFA.
DropBox states there is no evidence the Threat Actor(s) accessed user contents or payment information. They state no other products owned by DropBox were compromised – only DropBox Sign was compromised.
They state an investigation is on-going and no specific Threat Actor(s) or group have been attributed to the attack.
More information: https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/dbx-20240429.htm
DropBox states an unknown Threat Actor(s) was able to access user e-mails, usernames, account settings, and in some scenarios hashed passwords, phone numbers, API keys, OAuth tokens, and MFA.
DropBox states there is no evidence the Threat Actor(s) accessed user contents or payment information. They state no other products owned by DropBox were compromised – only DropBox Sign was compromised.
They state an investigation is on-going and no specific Threat Actor(s) or group have been attributed to the attack.
More information: https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/dbx-20240429.htm
👍45🤣16🤔15😢4🥰3😁2❤1😱1🎉1💯1