GitHub is struggling to contain an ongoing attack that’s flooding the site with millions of code repositories. These repositories contain obfuscated malware that steals passwords and cryptocurrency from developer devices, researchers said.
The malicious repositories are clones of legitimate ones, making them hard to distinguish to the casual eye. An unknown party has automated a process that forks legitimate repositories, meaning the source code is copied so developers can use it in an independent project that builds on the original one. The result is millions of forks with names identical to the original one that add a payload that’s wrapped under seven layers of obfuscation. To make matters worse, some people, unaware of the malice of these imitators, are forking the forks, which adds to the flood.
“Most of the forked repos are quickly removed by GitHub, which identifies the automation,” Matan Giladi and Gil David, researchers at security firm Apiiro, wrote Wednesday. “However, the automation detection seems to miss many repos, and the ones that were uploaded manually survive. Because the whole attack chain seems to be mostly automated on a large scale, the 1% that survive still amount to thousands of malicious repos.”
I just looked up Voyager 1's current position for a talk and saw something wild: https://voyager.jpl.nasa.gov/mission/status/
The distance between Earth and Voyager 1 is actually *decreasing* right now (even though the distance between Voyager 1 and the Sun is increasing). A website bug?
Nope! Earth moves really fast around the Sun. Right now we're moving faster toward Voyager 1 than it's flying away from us
Earth orbits at 30 km/s around the Sun, Voyager is going "only" 17 km/s. I love orbital dynamics!
ok ok yeah yeah high availability and whatever but also have you seen how highly available a single fucking binary running on a single fucking computer can be? Have you seen the performance specs of sqlite?
I'm reminded of that one paper from like 2010 or so when a researcher showed that a single threaded binary could outperform many 100 core clusters because they were so poorly designed to scale *down* at all
Did we learn nothing from that? Anything? Anything at all??
So apparently the term "patch" in software development comes from punch cards.
"Small corrections to the programmed sequence could be done by patching over portions of the paper tape and re-punching the holes in that section."
@technicat the original Mac UI devs noticed and solved so many problems in *1986* that more recent Web 2.0+ frontend devs just ignore -- like this one, *drag delay* -- solving the problem that when the user moves their cursor towards an item on a popup menu, the mouse may drift outside the lines momentarily *en route*, so you should make sure not to close the menu prematurely; these days lots of popup menus instantly pop closed if you stray outside their bounds #UI #UX
Yikes. Postman recently pivoted to store all of your session data (including authentication tokens etc.) in their Cloud Service, which you can fully browse and explore in their online tool.
Their security page makes it clear that they have not considered the Okta-style risks associated with this change. If your company has any devs using Postman for production testing, I would strongly recommend Insomnia: https://insomnia.rest/, and then consider any credentials stored in Postman history to be at risk and should be rotated.
Not kidding about SLIM landing on its head... here is picture! This was taken by LEV-2 (SORA-Q) that adorbs transformer robot carried by SLIM that looks like a ball and then springs open to roll wild across the lunar surface and take photos as the mood takes it.
Clearly, it found this pretty funny and it autonomously selected this shot to send back to Earth.
There's a press release here that HQ can't be bothered to post the English.
Here's today's press release for JAXA's SLIM lunar landing!
TL;DR:
Pinpoint site identification was crazily successful.
We were lowering into position, detecting boulders like a champ.
THEN ONE OF THE ENGINES DROPPED OFF.
(I kid you not)
(we don't know why yet)
(maybe space pirates)
But we still soft-landed on 1 engine.
(TAKE THAT SPACE PIRATES!)
but on our head.
Strangely, might not be a big deal once the Sun moves round to the other side of the spacecraft.
RIP, legend. “German music producer Frank Farian — founder of the disco band Boney M — has died at the age of 82.”
@stitzl @rotnroll666 My only use case for shading has always been cli applications so that they can be launched via a simple `java -jar ...`. If the .jar spec allowed for a `lib/` directory containing dependencies (akin to a simplified .ear or .war) I would almost never need to shade dependencies anymore. Yes, I'm aware there are some custom classloaders floating around that do the above but it needs to be built into the platform.
@realhackhistory No links to any sources like always. I want to believe this, I truly do, but there is no reason why someone wouldn't just post something to paint Twitter in a bad picture. F12 is a thing and isn't hard to use.
It seems to be real after looking it up (the post is gone but the account is suspended), but please people, post sources! And the 77 others who boosted this, I hope you all validated this? You did, right? Right??
Long-time Microsoft employees explain changes in Windows:
https://news.ycombinator.com/item?id=30019307
Designers were handed full control over UX. Engineers who fought for usability over a slick-looking interface burned out and left after repeatedly being overruled.
The New York Times are using the Ruffle WASM Flash emulator to get all of their archived Flash data visualizations to work again, this is so great to see https://flowingdata.com/2024/01/10/nyt-flash-based-visualizations-work-again/
This is an article that took a lot of strength to write and I might take it down again. But I felt like it is an article that is very necessary right now. https://bastianallgeier.com/notes/grandpa
Microsoft says a Russian state-sponsored hacking group known as Midnight Blizzard/Nobelium used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of
"Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents. The investigation indicates they were initially targeting email accounts for information related to Midnight Blizzard itself."
Password spraying is low-tech and pervasive. The good news is, you can password spray your own users just like the bad guys can, and then tighten things up.
Facts, not wishful thinking.
🇨🇦