home.social

Search

1000 results for “lazarus”

  1. @lazarus

    My personal preference is hardware from a company that is committed to #FreeSoftware, and that invests in both hardware and software.

    Also, keep in mind that the hardware might be older, but the Linux operating system for phones is often way longer supported than the short term support of Android.

    If you use de-googled stuff, you keep kind of dependent on Google and Android hardware. Therefore I have a strong preference for #MobileLinux.

    @fdroidorg

  2. Lazarus Group + IA = une industrialisation inquiétante des attaques ciblant les développeurs. Ce qui était artisanal devient scalable : fausses offres d'emploi, social engineering automatisé, code malveillant personnalisé. La menace ne s'améliore pas, elle se démultiplie. Rester curieux sur ces TTPs, c'est déjà une forme de défense. 🔍 #infosec #ThreatIntel #Lazarus
    infosec.pub/post/45532833

  3. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec9743b876273d04a7efb0
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:19

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  4. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec9743b876273d04a7efb0
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:19

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  5. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec9743b876273d04a7efb0
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:19

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  6. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec9743b876273d04a7efb0
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:19

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  7. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec9743b876273d04a7efb0
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:19

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  8. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec976bddee2a8bbe864445
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  9. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec976bddee2a8bbe864445
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  10. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec976bddee2a8bbe864445
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  11. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec976bddee2a8bbe864445
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  12. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec976bddee2a8bbe864445
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  13. Lazarus Group Targets KelpDAO in $290m Crypto Heist

    In a shocking crypto heist, North Korea's notorious Lazarus Group is accused of swiping $290 million from KelpDAO, raising questions about accountability in the digital age. This brazen theft is a stark reminder of the threats lurking in the shadows of the cryptocurrency world.

    osintsights.com/lazarus-group-

    #LazarusGroup #NorthKorea #CryptoHeist #290mCryptoTheft #Kelpdao

  14. Lazarus Hackers Orchestrate $290 Million KelpDAO Heist

    In a shocking turn of events, the Lazarus hackers struck again, making off with a staggering $290 million from the KelpDAO decentralized finance project in a single weekend heist. But who benefits from this massive theft, and who's left to deal with the devastating aftermath?

    osintsights.com/lazarus-hacker

    #Lazarus #NorthKorea #Statesponsored #DecentralizedFinance #Defi

  15. @jbz time to thank your nearest crypto bro for drawing all the truly scary incoming fire from #DPRK and #LazarusGroup etc.

  16. Interesting to see #Lazarus and #BlueExorcist in the latest Criminal Threats promo, even though neither of them are airing now.
    #Toonami

  17. Interesting to see #Lazarus and #BlueExorcist in the latest Criminal Threats promo, even though neither of them are airing now.
    #Toonami

  18. Interesting to see #Lazarus and #BlueExorcist in the latest Criminal Threats promo, even though neither of them are airing now.
    #Toonami

  19. Interesting to see #Lazarus and #BlueExorcist in the latest Criminal Threats promo, even though neither of them are airing now.
    #Toonami

  20. [Translation] How a “dream job invitation” turns into an attack

    It all starts with a notification that feels familiar and exciting for any developer: “You’ve been shortlisted for an AI developer position.” The company looks impressive — DLMind, an “AI innovation lab.” The recruiter appears legitimate — Tim Morenc, CEDS, with a polished LinkedIn profile, professional communication style, and mutual connections.

    But behind this friendly outreach is BeaverTail — a malicious operation designed to steal your code, credentials, and developer assets.

    The attack is part of a broader pattern associated with North Korean cyber operations, including groups such as Lazarus Group.

    How the attack works

    The victim is approached via LinkedIn or similar platforms

    A convincing fake company and recruiter profile is used

    A “technical assignment” or test task is provided

    The task contains malicious code or a compromised dependency

    Once executed, it extracts sensitive data such as:

    GitHub / Git credentials

    SSH keys

    API tokens

    browser session data

    Why it works

    The campaign relies on social engineering rather than technical exploitation:

    trust in recruitment processes

    desire for career opportunities

    familiarity of developer workflows (GitHub, npm, Python, etc.)

    Key takeaway

    Any unsolicited “test assignment” should be treated as potentially hostile code. Execution environments must be isolated, and credentials should never be exposed in evaluation setups.

    ---

    #hashtags
    #cybersecurity #infosec #malware #socialengineering #phishing #infostealer #supplychainattack #github #developers #techsecurity #beavertail #lazarusgroup

  21. @habr25 [Translation] How a “dream job invitation” turns into an attack

    It all starts with a notification that feels familiar and exciting for any developer: “You’ve been shortlisted for an AI developer position.” The company looks impressive — DLMind, an “AI innovation lab.” The recruiter appears legitimate — Tim Morenc, CEDS, with a polished LinkedIn profile, professional communication style, and mutual connections.

    But behind this friendly outreach is BeaverTail — a malicious operation designed to steal your code, credentials, and developer assets.

    The attack is part of a broader pattern associated with North Korean cyber operations, including groups such as Lazarus Group.

    How the attack works

    The victim is approached via LinkedIn or similar platforms

    A convincing fake company and recruiter profile is used

    A “technical assignment” or test task is provided

    The task contains malicious code or a compromised dependency

    Once executed, it extracts sensitive data such as:

    GitHub / Git credentials

    SSH keys

    API tokens

    browser session data

    Why it works

    The campaign relies on social engineering rather than technical exploitation:

    trust in recruitment processes

    desire for career opportunities

    familiarity of developer workflows (GitHub, npm, Python, etc.)

    Key takeaway

    Any unsolicited “test assignment” should be treated as potentially hostile code. Execution environments must be isolated, and credentials should never be exposed in evaluation setups.

    ---

    #hashtags
    #cybersecurity #infosec #malware #socialengineering #phishing #infostealer #supplychainattack #github #developers #techsecurity #beavertail #lazarusgroup

  22. Heute Abend nochmal zum Abschluss meines Urlaubs eine ganz starke Retro Brise: #TurboPascal. Lang ist's her, dass ich damit mal unterwegs war. Im Bild sieht man ein Quellcode Teil von einem Programm, das ich gerade archiviere. Ich muss mal schauen, ob ich den Originalautor noch zu fassen bekomme. Bisher gibt es darüber jedenfalls _gar nichts_ im Netz. #retro #retrocomputing #pascal #lazarus

  23. Нюансы локализации приложений в Lazarus IDE

    О переводе начинаешь думать тогда, когда приложение уже написано и работает. Архитектура сложилась органически, строки разбросаны по хелперам и метаданным перечислений, или торчат где-то в теле функции. Когда код пишется, особо не задумываешься о том, что всё это однажды придётся переводить. Добавить поддержку i18n в Lazarus — дело пяти минут. Проблемы начинаются потом: DefaultTranslator не подхватывает файлы, компилятор молча принимает resourcestring в const-массиве и ничего не переводит, fuzzy -флаг тихо блокирует строку без единого предупреждения. Эта статья — про те вещи, которые не являются очевидными и, к сожалению, не описаны в базовых руководствах.

    habr.com/ru/articles/1021718/

    #lazarus #translation #localization