Big big drama today in Cybersecurity world. A cybersecurity company is faced with telling the truth, or using "softer language" to avoid losing money or (worse case scenario) employees disappearing
See subsequent post for the full news article. Here is the drama summary
> be palo alto
> have threat intel division named unit42
> unit42 finds hacking campaign
> calls it "shadow campaign"
> attribute hacking campaign to chinese government
> palo alto executives see report
> suggest remove attribution to china
> new suggestion appears
> "state-aligned group that operates out of Asia"
> original draft given to reuters
> lolwtf
> backup, rewind
> January 2026 china say palo alto bad
> palo alto worried about china government
> palo alto have employees in china
> palo alto have five offices in china
> vp lady from palo alto emails journalists
> "not worried about china lol"
> ask why change then
> VP: "attribution is irrelevent"
> ask if scared of china
> VP: "speculative and false"
> ask why change (again)
> VP: "Choice of language in Palo Alto's report reflected how to best inform and protect governments about this widespread campaign"
> ???
See subsequent post for the full news article. Here is the drama summary
> be palo alto
> have threat intel division named unit42
> unit42 finds hacking campaign
> calls it "shadow campaign"
> attribute hacking campaign to chinese government
> palo alto executives see report
> suggest remove attribution to china
> new suggestion appears
> "state-aligned group that operates out of Asia"
> original draft given to reuters
> lolwtf
> backup, rewind
> January 2026 china say palo alto bad
> palo alto worried about china government
> palo alto have employees in china
> palo alto have five offices in china
> vp lady from palo alto emails journalists
> "not worried about china lol"
> ask why change then
> VP: "attribution is irrelevent"
> ask if scared of china
> VP: "speculative and false"
> ask why change (again)
> VP: "Choice of language in Palo Alto's report reflected how to best inform and protect governments about this widespread campaign"
> ???
π€£88π₯°13π₯11β€3
The United States Military made a post today on social media about spies.
/me taps sign
/me taps sign
π€£125π₯°12β€7π«‘4π2
vx-underground
The United States Military made a post today on social media about spies. /me taps sign
Half you stinky fucking nerds would fold immediately. You'd know it's a spy too, you'd be like, "fuck it, I don't give a shit".
π₯°83π44β€12π«‘8π5π₯5π―3β€βπ₯2
vx-underground
The United States Military made a post today on social media about spies. /me taps sign
Exhibit A:
π€£105β€28π₯°8π3π«‘2π₯1π’1
Spoke with normal people today.
Within the first couple of minutes I realized I'm a degenerate no life who is completely detached from reality
They discussed foreign concepts such as, "plans this weekend" and "sports".
They asked me about "plans this weekend" and "sports". I froze. I could barely make sense of these concepts.
Using context clues I was able to string together a few sentences which seemed to throw them off my scent. I said something akin to, "Not a fan of Tiger Woods, but the Dow Jones is over 50,000".
Mission accomplished.
Within the first couple of minutes I realized I'm a degenerate no life who is completely detached from reality
They discussed foreign concepts such as, "plans this weekend" and "sports".
They asked me about "plans this weekend" and "sports". I froze. I could barely make sense of these concepts.
Using context clues I was able to string together a few sentences which seemed to throw them off my scent. I said something akin to, "Not a fan of Tiger Woods, but the Dow Jones is over 50,000".
Mission accomplished.
π€£185π₯°33β€19π―10π6π5π«‘2
vx-underground
Last week two of my posts regarding Epstein exceeded 100,000 likes. One of the posts I made exceeded 200,000 likes. In the spirit of full disclosure, it resulted in an X payment of over $3,000.
While this is a pretty penny, I like to imagine how much money controversial or politically charged accounts make. If they can make a few big posts a month then they're set.
π―94π’15β€7π₯°6
How do I install Windows Defender on Kali Linux?
π€£197π23β€17π€10π10π€5π4π₯°3π’3β€βπ₯1π₯1
Hello,
If you're a tiny person living inside my computer, and also by chance like malware, I have added more malware to malware city.
Approx. 250,000 malwares have been added. I also added some more malware analysis stuff. More stuff is coming.
https://vx-underground.org/Updates
If you're a tiny person living inside my computer, and also by chance like malware, I have added more malware to malware city.
Approx. 250,000 malwares have been added. I also added some more malware analysis stuff. More stuff is coming.
https://vx-underground.org/Updates
β€58π€―10β€βπ₯8π5π₯°2
I have some cool malware proof of concepts I'm working on. They're pretty cool and kind of undocumented.
My problem is I have carpal tunnel and (playful) amounts of nerve damage.
I need someone to lend me their hands. Give me your hands.
My problem is I have carpal tunnel and (playful) amounts of nerve damage.
I need someone to lend me their hands. Give me your hands.
π66π€17β€7π«‘6π3π2π₯°1
I've updated my personal website malwaresourcecode.com.
I've added new ways to do the following:
- CaplockString
- CopyMemory
- StringCompare
- StringConcat
- StringLength
- ZeroMemory
You're probably thinking, "why do i give a fuck about this? this all standard crt stuff". The answer is: "idk lol". I like exploring different ways to do things. It is interesting to me.
I'm currently working on a way to download files from a remote host using NdrClientCall3 (RPCs with IBackgroundCopyJob) and ended up falling down a weird rabbit hole.
Maybe you'll find it mildly interesting, maybe you're rolling your eyes because it is kind of goofy to find seven different ways to zero fill a buffer.
But is it goofy I have 18 different ways to hash a string? Yes, it is still goofy, but I admire it for some reason.
Cheers,
I've added new ways to do the following:
- CaplockString
- CopyMemory
- StringCompare
- StringConcat
- StringLength
- ZeroMemory
You're probably thinking, "why do i give a fuck about this? this all standard crt stuff". The answer is: "idk lol". I like exploring different ways to do things. It is interesting to me.
I'm currently working on a way to download files from a remote host using NdrClientCall3 (RPCs with IBackgroundCopyJob) and ended up falling down a weird rabbit hole.
Maybe you'll find it mildly interesting, maybe you're rolling your eyes because it is kind of goofy to find seven different ways to zero fill a buffer.
But is it goofy I have 18 different ways to hash a string? Yes, it is still goofy, but I admire it for some reason.
Cheers,
π₯°21β€7β€βπ₯6π₯1