Another gem from our emails and messages: someone keeps sending us photos of their cat and saying "big". That is all they say — that is the entire point of the conversation. We have no idea who they are or what they want.
❤137🤣44😁13🥰9👍4🤯3😢2🔥1👏1🤓1
The Internet Archive users are reporting to have received this e-mail just moments ago.
It appears that the person(s) who compromised The Internet Archive still maintain some form of persistent access and are trying to send a message.
Information and photo courtesy of zenullfur
It appears that the person(s) who compromised The Internet Archive still maintain some form of persistent access and are trying to send a message.
Information and photo courtesy of zenullfur
😢138🤣34😱11👍9🔥7❤3🥰1😁1🤔1🤓1
vx-underground
why can't i hold all these malicious windows binaries
We were told that our memes are "cringe" and read like they're written by a middle-aged man. Those criticisms are accurate — they are indeed cringe and the average age of vx-underground staff members is like, 35. We're not cool and young, we're old and achy
❤194🤓49😁16🔥10💯6😢4🤣4🎉3🫡2🥰1👏1
update.txt
4.8 KB
Good morning, evening, or night.
We've made a large update to vx-underground. The initial update posted resulted in two posts — sorry.
Attached is a list of all additions.
Have a nice day,
We've made a large update to vx-underground. The initial update posted resulted in two posts — sorry.
Attached is a list of all additions.
Have a nice day,
👍35❤11❤🔥3🫡3🔥1🎉1😇1
We have a profound respect for the video game cheat makers and video game reverse engineers.
The video game cheat producers and video game reverse engineers are very much disenfranchised by the information security community.
There is an innate bias and condescending tone directed toward them because of the dislike of video game cheaters and the false belief that this skillset (video game reverse engineering) is not an applicable skillset in real-world scenarios. This cannot be further from the truth.
Individuals capable of reverse engineering video games and developing cheats for them are lethal. These people can easily transfer and apply this skillset to targeted application exploitation or weaponization.
We've had the privilege of conversing with some truly special and gifted young people. Unfortunately, we are not privy with this community in totality, but we wanted to take this moment to express our gratitude to people such as daaximus, JustasMasiulis, and namazso.
We have witnessed these individuals make considerable contributions to recent trendy research topics and, in our opinion, have been given insufficient credit for their work. Very few people seem to realize these people have been core contributors to recently re-discovered (or newly announced?) process injection techniques. Additionally, Namazso is in essence the primary person who produced code and information on the recent trend of stack spoofing.
Much love and respect to these people. We see you. We hope others do too. 🫡
The video game cheat producers and video game reverse engineers are very much disenfranchised by the information security community.
There is an innate bias and condescending tone directed toward them because of the dislike of video game cheaters and the false belief that this skillset (video game reverse engineering) is not an applicable skillset in real-world scenarios. This cannot be further from the truth.
Individuals capable of reverse engineering video games and developing cheats for them are lethal. These people can easily transfer and apply this skillset to targeted application exploitation or weaponization.
We've had the privilege of conversing with some truly special and gifted young people. Unfortunately, we are not privy with this community in totality, but we wanted to take this moment to express our gratitude to people such as daaximus, JustasMasiulis, and namazso.
We have witnessed these individuals make considerable contributions to recent trendy research topics and, in our opinion, have been given insufficient credit for their work. Very few people seem to realize these people have been core contributors to recently re-discovered (or newly announced?) process injection techniques. Additionally, Namazso is in essence the primary person who produced code and information on the recent trend of stack spoofing.
Much love and respect to these people. We see you. We hope others do too. 🫡
🫡227❤68👍23❤🔥8👏4😁2😢2💯1
This media is not supported in your browser
VIEW IN TELEGRAM
Thank you to the person who made this. It is very cute. It is appreciated.
❤🔥144❤31🤣14😁13🥰8😢3👍2🔥1🎉1🙏1
vx-underground
Thank you to the person who made this. It is very cute. It is appreciated.
Also, thank you to the people for sending us photos of their critters. We have seen your messages. We appreciate you and your animals thinking of us.
- ahhahahhhaha
- 0xAm03113
- SariBezliGurme
- Z3r0n37
- jamiedukee
- _Catal1n
- enigmatikk_
- DevourYourNan
- BigDeuce814
- Chromium_uwu
- w2ppx
- _sem_e
- NSAShips
- ballsplate
- aylacroft
- rtaqqqq
- ArkovFR
- brend000000
- Biggiefat39
- 0xDEC0DED
- thy_cs6
- VesiRott_
- ahhahahhhaha
- 0xAm03113
- SariBezliGurme
- Z3r0n37
- jamiedukee
- _Catal1n
- enigmatikk_
- DevourYourNan
- BigDeuce814
- Chromium_uwu
- w2ppx
- _sem_e
- NSAShips
- ballsplate
- aylacroft
- rtaqqqq
- ArkovFR
- brend000000
- Biggiefat39
- 0xDEC0DED
- thy_cs6
- VesiRott_
❤54🥰12👍6❤🔥4😢1
wHy DoNt u Do UpDatEs DaiLy
Because we're constantly ingesting malware and papers. We prefer to do a weekly, or bi-weekly, or whatever, large update. It's easier.
In the meanwhile we'll just talk about criminal stuff and post dumb pictures.
Thank you for your support.
Because we're constantly ingesting malware and papers. We prefer to do a weekly, or bi-weekly, or whatever, large update. It's easier.
In the meanwhile we'll just talk about criminal stuff and post dumb pictures.
Thank you for your support.
👍73❤🔥18🔥9❤5😁5😘5🤝2🥰1😢1🤓1
Today the United States Securities and Exchange Commission charged four companies for intentionally misleading investors about the severity of the SolarWinds breach.
In or around September 2019, APT29 a/k/a Cozy Bear a/k/a Turla Group compromised United States-based network monitoring company SolarWinds. The compromise resulted in one of the largest Supply-Chain attacks in history when the state-sponsored group began slipstreaming malicious payloads into the SolarWinds Orion toolset updates.
The United States Securities and Exchange Commission has issued the following fines:
- Unisys, an information technology service and consulting company : $4,000,000 fine
- Avaya, a company with provides cloud services and workplace collaboration services: $1,000,000 fine
- Check Point Software, a provider for hardware and software cyber security solutions: $995,000 fine
- Mimecast, a cloud-based email management company: $990,000 fine
In or around September 2019, APT29 a/k/a Cozy Bear a/k/a Turla Group compromised United States-based network monitoring company SolarWinds. The compromise resulted in one of the largest Supply-Chain attacks in history when the state-sponsored group began slipstreaming malicious payloads into the SolarWinds Orion toolset updates.
The United States Securities and Exchange Commission has issued the following fines:
- Unisys, an information technology service and consulting company : $4,000,000 fine
- Avaya, a company with provides cloud services and workplace collaboration services: $1,000,000 fine
- Check Point Software, a provider for hardware and software cyber security solutions: $995,000 fine
- Mimecast, a cloud-based email management company: $990,000 fine
❤47🤣17🤔9🔥5👍4👏3😁1🤝1😘1
Microsoft is introducing "AI employees"
/me sighs
https://www.theguardian.com/technology/2024/oct/21/microsoft-launches-ai-employees-that-can-perform-some-business-tasks
/me sighs
https://www.theguardian.com/technology/2024/oct/21/microsoft-launches-ai-employees-that-can-perform-some-business-tasks
the Guardian
Microsoft introduces ‘AI employees’ that can handle client queries
US company gives customers the ability to build own virtual agents as well as releasing 10 off-the-shelf bots
🤣89😱9😁7🔥4😢4🎉3👍2
It's all over for early-to-mid-2000's mall goths.
A Threat Actor operating under the moniker 'Satanic' claims to have compromised HOTTOPIC and exfiltrated information on 350,000,000 customers.
https://www.infostealers.com/article/largest-retail-breach-in-history-350-million-hot-topic-customers-personal-and-payment-data-exposed-as-a-result-of-infostealer-infection/
A Threat Actor operating under the moniker 'Satanic' claims to have compromised HOTTOPIC and exfiltrated information on 350,000,000 customers.
https://www.infostealers.com/article/largest-retail-breach-in-history-350-million-hot-topic-customers-personal-and-payment-data-exposed-as-a-result-of-infostealer-infection/
InfoStealers
Largest Retail Breach in History: 350 Million "Hot Topic" Customers’ Personal & Payment Data Exposed — As a Result of Infostealer…
😱73🤣15🫡13😢3👍2😎2❤1🤔1
vx-underground
> be american > need medical stuff done > get estimated cost of $70,000 (with insurance) this ransomware thing is starting to make a whole lot more sense
We're not going to do cybercrime to pay for medical bills. We're joking — attempting to convey how bad it feels to see these outrageous medical bills
Regardless, we wouldn't do ransomware. We have standards. We would be like normal everyday Americans and commit violent crimes.
Regardless, we wouldn't do ransomware. We have standards. We would be like normal everyday Americans and commit violent crimes.
🙏80🤣77💯7🫡6🤩5❤🔥3❤3🥰3😢2