Christ is my all
1825 stories
·
3 followers

Wake Up

1 Share


Read the whole story
rtreborb
7 hours ago
reply
San Antonio, TX
Share this story
Delete

Iranian university offers free tuition to US students expelled over anti-Israel protests: "These are our people."

1 Share

As if it weren't blatantly obvious at this point, but the anti-Israel protesters on universities across the country have way more in common with Iran than the majority of Americans. Some might even call them terrorists.

Read the whole story
rtreborb
9 hours ago
reply
San Antonio, TX
Share this story
Delete

LuJo&Co Inc. Launching Kickstarter Campaign for Cigar Bibs

1 Share

Ruined a pair of pants with hot cigar ash? A new product aims to prevent that.

The post LuJo&Co Inc. Launching Kickstarter Campaign for Cigar Bibs appeared first on halfwheel.

Read the whole story
rtreborb
1 day ago
reply
San Antonio, TX
Share this story
Delete

HILARIOUS VIDEO: New Yorker arrested by Florida police for keying truck with "Let's Go Brandon" bumper sticker

1 Share

Mess around, find out!

Read the whole story
rtreborb
3 days ago
reply
San Antonio, TX
Share this story
Delete

Tweet of the Day

1 Share
Read the whole story
rtreborb
4 days ago
reply
San Antonio, TX
Share this story
Delete

Using Legitimate GitHub URLs for Malware

1 Share

Interesting social-engineering attack vector:

McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft GitHub repository for the “C++ Library Manager for Windows, Linux, and MacOS,” known as vcpkg.

The attacker is exploiting a property of GitHub: comments to a particular repo can contain files, and those files will be associated with the project in the URL.

What this means is that someone can upload malware and “attach” it to a legitimate and trusted project.

As the file’s URL contains the name of the repository the comment was created in, and as almost every software company uses GitHub, this flaw can allow threat actors to develop extraordinarily crafty and trustworthy lures.

For example, a threat actor could upload a malware executable in NVIDIA’s driver installer repo that pretends to be a new driver fixing issues in a popular game. Or a threat actor could upload a file in a comment to the Google Chromium source code and pretend it’s a new test version of the web browser.

These URLs would also appear to belong to the company’s repositories, making them far more trustworthy.

Read the whole story
rtreborb
7 days ago
reply
San Antonio, TX
Share this story
Delete
Next Page of Stories