Today, Binance released an announcement that it has sold its Russian business to commex.com.
Looking at the commex.com website I found
This host is used by binance for tracking mailings.
CommEX uses Binance infrastructure.
The king is dead — long live the king!
Looking at the commex.com website I found
MONITOR_HOST: "https://log.bntrace.com" (source).This host is used by binance for tracking mailings.
CommEX uses Binance infrastructure.
The king is dead — long live the king!
🎉8👍1🔥1
Somebody just did it! Awesome! Carton is a universal loader for any weight files formats (Tensorflow, Keras, Torch, etc).
Forwarded from Протестировал (Sergey Bronnikov)
"Universal Fuzzing via Large Language Models"
https://arxiv.org/pdf/2308.04748.pdf
LLM обязательно найдут себе применение в фаззинге, потому что это именно та область, где создание большого количества чуши является плюсом.
https://arxiv.org/pdf/2308.04748.pdf
LLM обязательно найдут себе применение в фаззинге, потому что это именно та область, где создание большого количества чуши является плюсом.
Open X-Embodiment: Robotic Learning Datasets and RT-X Models — https://robotics-transformer-x.github.io/ one more step
https://ant-rng.ru/ — ANT true RNG, Cloudflare hold my beer
😁3
It may be good toolkit for smart-contracts development too?
--
What is Ferrocene?
Ferrocene is the main Rust compiler - rustc - but quality managed and qualified for use in automotive and industrial environments (currently by ISO 26262 and IEC 61508) by Ferrous Systems. It operates as a downstream to the Rust project, further increasing its testing and quality on specific platforms. We will publish further detailed blog posts on the components and changes in Ferrocene in the coming weeks.
All changes we made to increase the quality of the Rust compiler have already made it to the main Rust project upstream. See Pietro’s blog post for more details.
(Source)
--
What is Ferrocene?
Ferrocene is the main Rust compiler - rustc - but quality managed and qualified for use in automotive and industrial environments (currently by ISO 26262 and IEC 61508) by Ferrous Systems. It operates as a downstream to the Rust project, further increasing its testing and quality on specific platforms. We will publish further detailed blog posts on the components and changes in Ferrocene in the coming weeks.
All changes we made to increase the quality of the Rust compiler have already made it to the main Rust project upstream. See Pietro’s blog post for more details.
(Source)
Ferrous-Systems
Open Sourcing Ferrocene
Today we’re publishing Ferrocene, the Rust compiler for safety-critical and cyber-security use, as an open source project. After 2 years of work, we feel ready to make it available - but also fully open source under the classic Rust license: Apache...
https://curl.se/docs/CVE-2023-38545.html why didn't I find this? ((((
🌚1
One more attack on web3 developers:
Through
The attack scenario is as follows:
— Ads, offers for artists and moderators are posted in the group-chat rooms (pic).
— An operator communicates with a person and asks verification questions (creating the appearance of filtering and selection).
— Then invited to Discord, where it is offered to download the game client and check the game (pic).
— For downloading, they send the user to the site (link above), where instead of playing the game, the user downloads malware (pic).
Discord has about 3667 users and 24 boosters for now. Discord users send messages when you're online (gm/hi). Moreover, they fill chats history with fake conversations from multiple users. Without deep thinking, it is very nature.
Virus-total Report is https://www.virustotal.com/gui/file/0c547caa2a441a4ee10cc04e68473ffa768303fab7f7658ad4efc2c84476f7da?nocache=1
C&C // C2 (server used to collect stolen data) is
Little bit about AMOS Stealer: https://telegra.ph/Atomic-Stealer---Obzor-loga-06-27
I think that next time, ICO/IEO investors may be targeted.
Never, never installs any software from recruiters or job offerers. Never send your private keys.
Pay attention and protect yourself, have a good night, my dear stranger!
Through
https://playcrypterium.io (don't open) and https://discord.gg/MyZgrYnh (don't open) they distribute AMOS malware (OS X, Linux, Win) that steals cryptocurrency wallets.The attack scenario is as follows:
— Ads, offers for artists and moderators are posted in the group-chat rooms (pic).
— An operator communicates with a person and asks verification questions (creating the appearance of filtering and selection).
— Then invited to Discord, where it is offered to download the game client and check the game (pic).
— For downloading, they send the user to the site (link above), where instead of playing the game, the user downloads malware (pic).
Discord has about 3667 users and 24 boosters for now. Discord users send messages when you're online (gm/hi). Moreover, they fill chats history with fake conversations from multiple users. Without deep thinking, it is very nature.
Virus-total Report is https://www.virustotal.com/gui/file/0c547caa2a441a4ee10cc04e68473ffa768303fab7f7658ad4efc2c84476f7da?nocache=1
C&C // C2 (server used to collect stolen data) is
http://185.106.93.154/ (don't open)Little bit about AMOS Stealer: https://telegra.ph/Atomic-Stealer---Obzor-loga-06-27
I think that next time, ICO/IEO investors may be targeted.
Never, never installs any software from recruiters or job offerers. Never send your private keys.
Pay attention and protect yourself, have a good night, my dear stranger!
🤬5👍4🤯4💩1