Correction:
We made a post about the recent legislation changes between the United States and Canada impacting social media. We have been corrected by our Canadian friends that this has been the case for several years in Canada now due to laws to combat misinformation.
We were mislead by social media discussions to believe that this is the result of tariffs. Current discussions (primarily from Americans) suggest these blocks are new.
tl;dr misinformationed by Americans, or political agendas, whatever
We made a post about the recent legislation changes between the United States and Canada impacting social media. We have been corrected by our Canadian friends that this has been the case for several years in Canada now due to laws to combat misinformation.
We were mislead by social media discussions to believe that this is the result of tariffs. Current discussions (primarily from Americans) suggest these blocks are new.
tl;dr misinformationed by Americans, or political agendas, whatever
🤣51❤7🤓6😁2😢2
vx-underground
Correction: We made a post about the recent legislation changes between the United States and Canada impacting social media. We have been corrected by our Canadian friends that this has been the case for several years in Canada now due to laws to combat misinformation.…
mfw canadians politely correct us, americans call us fat retards
🥰79🤣36💯9😢6❤4😇3🤝2😎2👏1🎉1
This media is not supported in your browser
VIEW IN TELEGRAM
The fight between our previous hosting provider has escalated. Instead of exchanging passive-aggressive (yet professional) e-mails, we will be restoring the entire 20TB collection from a local NAS on a residential line.
We keep it gangsta, dawg
We keep it gangsta, dawg
🔥75🤝9👏6😁4🤣3😢1🤓1
vx-underground
The fight between our previous hosting provider has escalated. Instead of exchanging passive-aggressive (yet professional) e-mails, we will be restoring the entire 20TB collection from a local NAS on a residential line. We keep it gangsta, dawg
We're throwin' up gang signs at the computer monitor to some underpaid help desk representative in Massachusetts (we're gangsta, dawg)
😁61🔥8❤4🤯2🤣2🤓2👍1😢1
vx-underground
Try not to cringe level: IMPOSSIBLE
This is a clip from: "You Fired A Tech Genius" produced by ReelShort.
Originally found by malwrhunterteam, cross-posted from X
Originally found by malwrhunterteam, cross-posted from X
🤓61🤣7🔥4😢1
vx-underground
Try not to cringe level: IMPOSSIBLE
Try not to cringe level: DEATH WISH
The entire 71 minutes of the pilot episode. Do you have what it takes? Can you survive 71 raw action packed minutes of Erik Martin and his hacker skills?
Viewer discretion advised. Cringe is lethal.
https://www.dailymotion.com/video/x9cu5dq
The entire 71 minutes of the pilot episode. Do you have what it takes? Can you survive 71 raw action packed minutes of Erik Martin and his hacker skills?
Viewer discretion advised. Cringe is lethal.
https://www.dailymotion.com/video/x9cu5dq
🤣80😁9😱6❤🔥4👍2😢2❤1🤝1
This media is not supported in your browser
VIEW IN TELEGRAM
pov you meet the twitter comment section computer experts irl
😁82🤣69😢8❤4👍3🤔2💯2🤓2🤯1🎉1
We're still in the process of restoring the virus exchange data. In the meantime, as we process and restore data, we can now get real accurate data.
Unique samples:
APTs: 36,547
APK Collection: 24,553
Virusshare.00000: 87,072
Virusshare.00001: 70,927
Virusshare.00002: 37,847
Virusshare.00003: 122,306
Virusshare.00004: 113,896
Virusshare.00005: 99,708
Samples restored: 592,856
Remaining: idk, like, 39,400,000
Unique samples:
APTs: 36,547
APK Collection: 24,553
Virusshare.00000: 87,072
Virusshare.00001: 70,927
Virusshare.00002: 37,847
Virusshare.00003: 122,306
Virusshare.00004: 113,896
Virusshare.00005: 99,708
Samples restored: 592,856
Remaining: idk, like, 39,400,000
❤40🎉6🫡2👍1🔥1
The past couple of weeks we've noticed Threat Actors hijacking expired bit-dot-ly hyperlinks to push rug pulls and fraudulent meme coins**
In this particular case, they've used it to push AI generated pornography of President Trump
*Cryptodraining nerds corrected us. Initial post we incorrectly said these are drainers. These are not drainers. These are campaigns aimed to push misleading people into purchasing a meme-coin to then subsequently get rug pulled.
*Cryptodraining nerds have notified us bit-dot-ly has introduced additional precautions to combat the recent surge of hijacking expired short links.
In this particular case, they've used it to push AI generated pornography of President Trump
*Cryptodraining nerds corrected us. Initial post we incorrectly said these are drainers. These are not drainers. These are campaigns aimed to push misleading people into purchasing a meme-coin to then subsequently get rug pulled.
*Cryptodraining nerds have notified us bit-dot-ly has introduced additional precautions to combat the recent surge of hijacking expired short links.
🤣118❤6😱5😘5🔥3🙏2
Today a Threat Actor(s) operating under the moniker "FutureSeeker" claimed to have compromised TrumpHotels-dot-com.
The Threat Actor(s) appear to have compromised TrumpHotels e-mail notification system. Specifically, the service responsible for reminding and/or verifying reservation details for guests. The data present includes:
- UniqueId (SQL Table)
- First name
- Last name
- Email
- Creation Date
- Unit ID (N/A)
- Status
- Last updated
- Expiration Date
- Sampling exclusion
164,910 records are present in the data dump.
The data exfiltrated from the Threat Actor(s) range from January 18th, 2018 to January 15th, 2025.
While the information does unveil the guests present at the hotel(s) operated by the Trump organization, no PII from guests (omit name, e-mail, reservation date) are present within the data dump. Furthermore, the information does not include wherein the guests resided or date of departure from the hotel(s).
Based on review of the data we do not believe this compromise to be politically motivated or financially motivated. Rather, because of the recent inauguration of the United States president, we perceive this compromise as a way for the Threat Actor(s) to verify their legitimacy as a Threat Group and/or Actor.
The Threat Actor(s) appear to have compromised TrumpHotels e-mail notification system. Specifically, the service responsible for reminding and/or verifying reservation details for guests. The data present includes:
- UniqueId (SQL Table)
- First name
- Last name
- Creation Date
- Unit ID (N/A)
- Status
- Last updated
- Expiration Date
- Sampling exclusion
164,910 records are present in the data dump.
The data exfiltrated from the Threat Actor(s) range from January 18th, 2018 to January 15th, 2025.
While the information does unveil the guests present at the hotel(s) operated by the Trump organization, no PII from guests (omit name, e-mail, reservation date) are present within the data dump. Furthermore, the information does not include wherein the guests resided or date of departure from the hotel(s).
Based on review of the data we do not believe this compromise to be politically motivated or financially motivated. Rather, because of the recent inauguration of the United States president, we perceive this compromise as a way for the Threat Actor(s) to verify their legitimacy as a Threat Group and/or Actor.
🤣64👍9🔥5❤1🥰1😢1
Just used my botnet swarm to DDoS 300 elite hackers and scrape all their personal information from the IP address when my IP address was locked
🤣118❤16🤓13❤🔥7🔥6🤔4🤯3😁2😢2👍1
Yesterday Google updated their AI Principles. Google has removed their pledge to not use AI for weapons or surveillance.
“There’s a global competition taking place for AI leadership within an increasingly complex geopolitical landscape” — Demis Hassabis, CEO of Google DeepMind
“There’s a global competition taking place for AI leadership within an increasingly complex geopolitical landscape” — Demis Hassabis, CEO of Google DeepMind
🤣91😱16😢16🤯4🎉4😁3👍2❤1