<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-28T23:41:08Z</updated>
  <generator>https://nostr.ae</generator>

  <title>Nostr notes by IFIN - The Independent Federated Intelligence Network</title>
  <author>
    <name>IFIN - The Independent Federated Intelligence Network</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://nostr.ae/npub1qm4tytdmranfklywc562p7gprs702mzkc4usqv6t8ja3d340evpslnh363.rss" />
  <link href="https://nostr.ae/npub1qm4tytdmranfklywc562p7gprs702mzkc4usqv6t8ja3d340evpslnh363" />
  <id>https://nostr.ae/npub1qm4tytdmranfklywc562p7gprs702mzkc4usqv6t8ja3d340evpslnh363</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/115/741/367/687/413/652/original/8fc4c8a9eead7ead.png</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/115/741/367/687/413/652/original/8fc4c8a9eead7ead.png</logo>




  <entry>
    <id>https://nostr.ae/nevent1qqsf6htk5vz5huys0hytfls6rnyv6tk3ucpdr8ccuuxa3yy9k5nl04szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx2y9ryf</id>
    
      <title type="html">RE: https://infosec.exchange/@ifin/116605052950779161 Important ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf6htk5vz5huys0hytfls6rnyv6tk3ucpdr8ccuuxa3yy9k5nl04szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx2y9ryf" />
    <content type="html">
      RE: &lt;a href=&#34;https://infosec.exchange/@ifin/116605052950779161&#34;&gt;https://infosec.exchange/@ifin/116605052950779161&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Important note. A lot of sources are reporting that the Nx Console extension is the vector by which GitHub was compromised. Although that extension was breached concurrently with the GitHub announcement, GitHub has neither confirmed nor denied this publicly. The connection remains speculation, not fact.&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/note1xwp27qdxh5gzw8js9yw3ern26kel3hrhvwxxn64339tjmxl54sdquauz0v&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;note1xwp…uz0v&lt;/a&gt;&lt;/span&gt;&lt;br/&gt; &lt;/div&gt; GitHub&#39;s internal repositories have been exfiltrated and offered for sale.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/github-internal-repositories-compromised-offered-for-sale/484&#34;&gt;https://discourse.ifin.network/t/github-internal-repositories-compromised-offered-for-sale/484&lt;/a&gt; &lt;/blockquote&gt;
    </content>
    <updated>2026-05-21T15:04:23Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0ja7llqdz93yfhdaf9c6gfycs39jlrhd6l544at7pygcdwqjaf0gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx7s4ud0</id>
    
      <title type="html">We&amp;#39;ve updated the post with the full list of ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0ja7llqdz93yfhdaf9c6gfycs39jlrhd6l544at7pygcdwqjaf0gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx7s4ud0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsr8q40qxnt6yp8regzj8gu3e4dtvlcm3mk8rrfa2ccj4edn062cxsumda0w&#39;&gt;nevent1q…da0w&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;We&amp;#39;ve updated the post with the full list of claimed-compromised repositories.
    </content>
    <updated>2026-05-20T13:10:18Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr8q40qxnt6yp8regzj8gu3e4dtvlcm3mk8rrfa2ccj4edn062cxszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxhhtpph</id>
    
      <title type="html">GitHub&amp;#39;s internal repositories have been exfiltrated and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr8q40qxnt6yp8regzj8gu3e4dtvlcm3mk8rrfa2ccj4edn062cxszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxhhtpph" />
    <content type="html">
      GitHub&amp;#39;s internal repositories have been exfiltrated and offered for sale.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/github-internal-repositories-compromised-offered-for-sale/484&#34;&gt;https://discourse.ifin.network/t/github-internal-repositories-compromised-offered-for-sale/484&lt;/a&gt;
    </content>
    <updated>2026-05-20T04:38:26Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2guna4hslzwuz4ujv5rxxmmt787lr6e8jwqlsswk2hpa8un67j9czyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxdzk5s8</id>
    
      <title type="html">One maintainer&amp;#39;s compromised tokens are responsible for the ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2guna4hslzwuz4ujv5rxxmmt787lr6e8jwqlsswk2hpa8un67j9czyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxdzk5s8" />
    <content type="html">
      One maintainer&amp;#39;s compromised tokens are responsible for the takeover of 500&#43; NPM packages, including the AntV family of packages.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/500-npm-packages-including-antv-compromised-via-single-maintainer/476&#34;&gt;https://discourse.ifin.network/t/500-npm-packages-including-antv-compromised-via-single-maintainer/476&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-05-19T06:22:39Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw0hvn00ty6xmqmge3s604up569f0zc5hmcc32f293hqld9jmlwaszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx5vawyz</id>
    
      <title type="html">Also added to our MISP instance!</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw0hvn00ty6xmqmge3s604up569f0zc5hmcc32f293hqld9jmlwaszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx5vawyz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2vssjemtfvpd3r2qqpa2n5a47qfku8u27pxd2kp3lhk6sacelnwgv3u3dg&#39;&gt;nevent1q…u3dg&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Also added to our MISP instance!
    </content>
    <updated>2026-05-18T21:59:57Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxnftw4spgjc26jxjez0vk8795s94v88cmglm29swmmxypet9xxyczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxjvj7ck</id>
    
      <title type="html">Microsoft Power BI is under a DDoS attack claimed by 313 Team, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxnftw4spgjc26jxjez0vk8795s94v88cmglm29swmmxypet9xxyczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxjvj7ck" />
    <content type="html">
      Microsoft Power BI is under a DDoS attack claimed by 313 Team, the same group that recently claimed the attack on Ubuntu.&lt;br/&gt;&lt;br/&gt;Their booter is still protected by Cloudflare, btw.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/power-bi-ddosed-claimed-by-313-team/470&#34;&gt;https://discourse.ifin.network/t/power-bi-ddosed-claimed-by-313-team/470&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-05-18T17:00:28Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstjw9f0a3w3w9jys9tvdtl9y7yd6sjpz8m27suw58kzfuzjc8sslczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxneg7vx</id>
    
      <title type="html">Two sides of the same mullet. @npub16kg…afn8 @npub1ezn…nyq3</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstjw9f0a3w3w9jys9tvdtl9y7yd6sjpz8m27suw58kzfuzjc8sslczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxneg7vx" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsr6l73y7fx346mfvvscrfg8ljj5wpyjale5uqa3l5fgfr0shflupcctqt4c&#39;&gt;nevent1q…qt4c&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Two sides of the same mullet.&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub16kg9lwzqksrhasxqtasrey5dhz7dkyur86xtupw08ayxppqkj47smwafn8&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Cat 🐈🥗 (D.Burch) :paw:⁠:paw:&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub16kg…afn8&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1eznzdgefq0ece8yljlxtaadscv4skav3ckk38gv3qw04s25mrt2s5fnyq3&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;GAYINT&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1ezn…nyq3&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2026-05-16T19:41:56Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswut8g8dvuhuqfm7k4amfl4vsjh0ezfcewfnmyscjdej03hx4vhaczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxnk9ht6</id>
    
      <title type="html">We have a breakdown of the current attack campaign against Cisco ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswut8g8dvuhuqfm7k4amfl4vsjh0ezfcewfnmyscjdej03hx4vhaczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxnk9ht6" />
    <content type="html">
      We have a breakdown of the current attack campaign against Cisco SD-WAN devices&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/cve-2026-20182-cisco-catalyst-sd-wan-eitw/457&#34;&gt;https://discourse.ifin.network/t/cve-2026-20182-cisco-catalyst-sd-wan-eitw/457&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatInte #ThreatIntelligence #IFIN
    </content>
    <updated>2026-05-15T18:24:30Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrxdnv4dmy2yvlfhgw0ph9vugt7tn3n5snw2ehtf3kyamm9m9cyvqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxuy6vr8</id>
    
      <title type="html">Dear threat research firms, A modest proposal for your threat ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrxdnv4dmy2yvlfhgw0ph9vugt7tn3n5snw2ehtf3kyamm9m9cyvqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxuy6vr8" />
    <content type="html">
      Dear threat research firms,&lt;br/&gt;&lt;br/&gt;A modest proposal for your threat intel blog posts:&lt;br/&gt;&lt;br/&gt;A *single table* of Indicators of Compromise.&lt;br/&gt;&lt;br/&gt;3 columns: Value, Type, Description&lt;br/&gt;&lt;br/&gt;The same format. Every time.&lt;br/&gt;&lt;br/&gt;Easier for you, easier for your readers, easier for us. &lt;br/&gt;&lt;br/&gt;XOXO IFIN
    </content>
    <updated>2026-05-15T16:34:51Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd75lanunep4zm8g28zy6jalg6d54kzy64c6c4kam6kgm9nzmrj8szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxejhv0f</id>
    
      <title type="html">I am sure you&amp;#39;re shocked to hear about another NPM ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd75lanunep4zm8g28zy6jalg6d54kzy64c6c4kam6kgm9nzmrj8szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxejhv0f" />
    <content type="html">
      I am sure you&amp;#39;re shocked to hear about another NPM compromise.&lt;br/&gt;&lt;br/&gt;This one was because a maintainer let their email domain expire!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/node-ipc-npm-packages-infected-with-stealer/454&#34;&gt;https://discourse.ifin.network/t/node-ipc-npm-packages-infected-with-stealer/454&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-05-14T22:20:47Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspmjur7e6xyaje96humzzt5gprtxxa9ma0n4txy7fh57w9dv8pqzgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxe965zj</id>
    
      <title type="html">This new Nginx vuln is worth some scrutiny. A heap buffer ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspmjur7e6xyaje96humzzt5gprtxxa9ma0n4txy7fh57w9dv8pqzgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxe965zj" />
    <content type="html">
      This new Nginx vuln is worth some scrutiny. A heap buffer overflow that can lead to service restart and, on systems with ASLR, code execution. Patches available.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/cve-2026-42945-heap-buffer-overflow-in-nginx/441&#34;&gt;https://discourse.ifin.network/t/cve-2026-42945-heap-buffer-overflow-in-nginx/441&lt;/a&gt;
    </content>
    <updated>2026-05-13T19:21:30Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvxvqg7wp8e2aedryky68dx8rls0nnch2lmjhtz68h4rx3xxz9fugzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxmpzqve</id>
    
      <title type="html">We are tracking the new Nightmare Eclipse exploits, and we even ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvxvqg7wp8e2aedryky68dx8rls0nnch2lmjhtz68h4rx3xxz9fugzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxmpzqve" />
    <content type="html">
      We are tracking the new Nightmare Eclipse exploits, and we even have some listed IoCs from the code/repo files for you.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/chaotic-eclipse-nightmare-eclipse-drops-two-windows-0days/437&#34;&gt;https://discourse.ifin.network/t/chaotic-eclipse-nightmare-eclipse-drops-two-windows-0days/437&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-05-12T21:59:37Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspulxrdck5rj6m8xjeez90ja4n6n342f3kww9fgnrcakwn3khs8xgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxq90gcl</id>
    
      <title type="html">If you or someone you know has received Instructure ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspulxrdck5rj6m8xjeez90ja4n6n342f3kww9fgnrcakwn3khs8xgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxq90gcl" />
    <content type="html">
      If you or someone you know has received Instructure #Canvas-themed phishing messages, we want to hear about it! Samples welcome, but also any other circumstances.&lt;br/&gt;&lt;br/&gt;Something seems phishy about the claim that no data is out in the open.
    </content>
    <updated>2026-05-12T18:34:43Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs990jy8vknt2r2zndn64d952d2wmwfv30eqn35re23ms7r5s9whwgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxvervq9</id>
    
      <title type="html">Did you know we have a @npub1mly…rl2t feed? We do! Discourse ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs990jy8vknt2r2zndn64d952d2wmwfv30eqn35re23ms7r5s9whwgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxvervq9" />
    <content type="html">
      Did you know we have a &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1mlypv5xgnd6zxu8ssyzc485ussa5a0mwf3g4t6sz2jtgts2qsuqq6arl2t&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;MISP&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1mly…rl2t&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; feed? We do!&lt;br/&gt;&lt;br/&gt;Discourse posts with valuable indicators are added to our feed, which is free for all.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://misp.ifin.network/feed&#34;&gt;https://misp.ifin.network/feed&lt;/a&gt; (/manifest.json for manual review)&lt;br/&gt;&lt;br/&gt;#MISP #ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-05-12T18:32:17Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9ceudfcwjrnhdsjrajyykg2tgmsmyuerhzhezlzslctqtjhk7ceszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxx9fma4</id>
    
      <title type="html">Aaaand now it&amp;#39;s in PyPi</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9ceudfcwjrnhdsjrajyykg2tgmsmyuerhzhezlzslctqtjhk7ceszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxx9fma4" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsranum5an82qz9e74t6a4hcxk62nts4s90g46pzjn527k4ypxc7rqq3au6n&#39;&gt;nevent1q…au6n&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Aaaand now it&amp;#39;s in PyPi
    </content>
    <updated>2026-05-12T15:47:22Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsranum5an82qz9e74t6a4hcxk62nts4s90g46pzjn527k4ypxc7rqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxygazex</id>
    
      <title type="html">RE: https://infosec.exchange/@ifin/116558531955700753 This has ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsranum5an82qz9e74t6a4hcxk62nts4s90g46pzjn527k4ypxc7rqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxygazex" />
    <content type="html">
      RE: &lt;a href=&#34;https://infosec.exchange/@ifin/116558531955700753&#34;&gt;https://infosec.exchange/@ifin/116558531955700753&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;This has evolved to impact 170 packages, including those from Mistral and OpenSearch.&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/note1w6n44ehck2rdnh5ayedurga94dn9sf0lqazdneg2t038xxkg5mdqzrz3sx&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;note1w6n…z3sx&lt;/a&gt;&lt;/span&gt;&lt;br/&gt; &lt;/div&gt; TanStack, a popular web UI framework has had its NPM packages compromised by another installment of Mini Shai-Hulud.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/mini-shai-hulud-strikes-again-tanstack-npm-packages-compromised/428&#34;&gt;https://discourse.ifin.network/t/mini-shai-hulud-strikes-again-tanstack-npm-packages-compromised/428&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN &lt;/blockquote&gt;
    </content>
    <updated>2026-05-12T13:22:50Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8df66umut9pkem6wjvk7p5wj6kejcyhlsw3xeu599hcnnrty2dkszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx8f2eql</id>
    
      <title type="html">TanStack, a popular web UI framework has had its NPM packages ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8df66umut9pkem6wjvk7p5wj6kejcyhlsw3xeu599hcnnrty2dkszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx8f2eql" />
    <content type="html">
      TanStack, a popular web UI framework has had its NPM packages compromised by another installment of Mini Shai-Hulud.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/mini-shai-hulud-strikes-again-tanstack-npm-packages-compromised/428&#34;&gt;https://discourse.ifin.network/t/mini-shai-hulud-strikes-again-tanstack-npm-packages-compromised/428&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-05-11T23:27:32Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfex33j8uj6g7zw5rummpuc3ntx9yqklkxsa22782sfwjtyzvpvrszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxtlzl97</id>
    
      <title type="html">Cloudflare is reporting issues as well, since, uh, all their ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfex33j8uj6g7zw5rummpuc3ntx9yqklkxsa22782sfwjtyzvpvrszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxtlzl97" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspfnrp6u8spj8pcx3tl092lm945s6tta0mqxenxcpaqy6ltpamrrqtk8pzr&#39;&gt;nevent1q…8pzr&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Cloudflare is reporting issues as well, since, uh, all their services get their certs from LetsEncrypt
    </content>
    <updated>2026-05-08T20:15:25Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspfnrp6u8spj8pcx3tl092lm945s6tta0mqxenxcpaqy6ltpamrrqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx9zyx72</id>
    
      <title type="html">BREAKING: LetsEncrypt appears to be stopping certificate issuance ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspfnrp6u8spj8pcx3tl092lm945s6tta0mqxenxcpaqy6ltpamrrqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx9zyx72" />
    <content type="html">
      BREAKING: LetsEncrypt appears to be stopping certificate issuance due to a &amp;#34;potential incident.&amp;#34;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/letsencrypt-stopping-issuance/415&#34;&gt;https://discourse.ifin.network/t/letsencrypt-stopping-issuance/415&lt;/a&gt;
    </content>
    <updated>2026-05-08T19:47:21Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfuepp4t5ep5kuptsfvcz8ctk0umfs0lheyg7qq5tz8lmlm7c4mgczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx9fl8jn</id>
    
      <title type="html">Fixes for both Debian-derivative and RHEL-like systems listed!</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfuepp4t5ep5kuptsfvcz8ctk0umfs0lheyg7qq5tz8lmlm7c4mgczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx9fl8jn" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsv3c8ct92l2gzup4s7e3nw8cnrkvcxt6x00cye67fydklktcl260g6g48tj&#39;&gt;nevent1q…48tj&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Fixes for both Debian-derivative and RHEL-like systems listed!
    </content>
    <updated>2026-05-07T22:34:38Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsv3c8ct92l2gzup4s7e3nw8cnrkvcxt6x00cye67fydklktcl260gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxe7r2wf</id>
    
      <title type="html">We&amp;#39;re also tracking the new #CopyFail variants here. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv3c8ct92l2gzup4s7e3nw8cnrkvcxt6x00cye67fydklktcl260gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxe7r2wf" />
    <content type="html">
      We&amp;#39;re also tracking the new #CopyFail variants here. DirtyFrag requires the same af_alg module as CopyFail, but another variant does not.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/new-copyfail-variants/395&#34;&gt;https://discourse.ifin.network/t/new-copyfail-variants/395&lt;/a&gt;
    </content>
    <updated>2026-05-07T21:08:50Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0sdyljcumemm4z8v95mjj4e05whjvdqr8hve5fch8u7y2fucv6fczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxfyvng7</id>
    
      <title type="html">RE: https://infosec.exchange/@wdormann/116533862391306228 We love ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0sdyljcumemm4z8v95mjj4e05whjvdqr8hve5fch8u7y2fucv6fczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxfyvng7" />
    <content type="html">
      RE: &lt;a href=&#34;https://infosec.exchange/@wdormann/116533862391306228&#34;&gt;https://infosec.exchange/@wdormann/116533862391306228&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;We love direct action you can take to confound the adversary! Disable .URL files (and .js files) today.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/disable-url-files-before-the-baddies-use-them/393&#34;&gt;https://discourse.ifin.network/t/disable-url-files-before-the-baddies-use-them/393&lt;/a&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/note1lp3x2ewgexxg26yg7wtgfq6x46da3wdsxk2pgyjvlge3xnvwfy4qnfu5wj&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;note1lp3…u5wj&lt;/a&gt;&lt;/span&gt;&lt;br/&gt; &lt;/div&gt; Let&#39;s talk about Windows .URL (InternetShortcut) files.&lt;br/&gt;&lt;br/&gt;Last year there was discussion about a vulnerability in how Windows handles .URL files. Specifically, when a .URL file specifies a WorkingDirectory directive, an otherwise harmless app being launched would load DLLs from the remote (e.g. WebDAV) server specified. You know, being the current working directory of the app being launched and all.  This vulnerability was being [exploited in the wild](&lt;a href=&#34;https://www.virustotal.com/gui/file/e0a44274d5eb01a0379894bb59b166c1482a23fede1f0ee05e8bf4f7e4e2fcc6&#34;&gt;https://www.virustotal.com/gui/file/e0a44274d5eb01a0379894bb59b166c1482a23fede1f0ee05e8bf4f7e4e2fcc6&lt;/a&gt; ), and it worked well because it bypassed annoying (to attackers) things like SmartScreen.  Sure, it required the victim to click Open on a dialog saying Type: Unknown File Type (😂), but we all know that users are click-happy, so this is fine.  Besides, the file clearly has a .pdf extension, so it should be safe (😂).&lt;br/&gt;&lt;br/&gt;Microsoft recognized the vulnerability and published an [update in the form of CVE-2025-33053](&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;If we were to believe the [Microsoft documentation at the time](&lt;a href=&#34;https://web.archive.org/web/20250710095434/https://learn.microsoft.com/en-us/windows/win32/lwef/internet-shortcuts&#34;&gt;https://web.archive.org/web/20250710095434/https://learn.microsoft.com/en-us/windows/win32/lwef/internet-shortcuts&lt;/a&gt; ), &lt;br/&gt;&lt;br/&gt;&gt; When the user clicks the icon, the browser is launched and displays the site associated with the shortcut.&lt;br/&gt;&lt;br/&gt;But wait...&lt;br/&gt;How did this .URL file cause a program to be launched?  The URL= parameter specifies a website address to be loaded in the browser.&lt;br/&gt;&lt;br/&gt;Oh, naive child.  Obviously a .URL file can directly point to code on a remote (e.g. WebDAV) server. This technique is also [being exploited ITW as well](&lt;a href=&#34;https://www.virustotal.com/gui/file/93a2d60d1ccfe3e009b1a81951653b559e0cae01c2454244a3a0fbd49a5e4539&#34;&gt;https://www.virustotal.com/gui/file/93a2d60d1ccfe3e009b1a81951653b559e0cae01c2454244a3a0fbd49a5e4539&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;I reported this to Microsoft, as this has the **EXACT SAME IMPACT** as CVE-2025-33053.  So if that&#39;s a vulnerability, then this too is a vulnerability, right?  &lt;br/&gt;&lt;br/&gt;Bless your innocent soul.  Per MSRC:&lt;br/&gt;&lt;br/&gt;&gt; When the Shell invokes an app from a remote share, it&#39;s expected that you will see the legacy Windows Security prompt, not the SmartScreen one. SmartScreen Application Reputation (AppRep) evaluation applies to locally downloaded files that bear an Internet Zone mark of the web. It is not meant to apply to execution of files from Network Shares.&lt;br/&gt;&lt;br/&gt;Okie dokie.  I&#39;m sure Windows users surely appreciate this.  But what about the [incorrect documentation](&lt;a href=&#34;https://archive.ph/MgBI8&#34;&gt;https://archive.ph/MgBI8&lt;/a&gt; )?  After my prodding, they [updated the wording](&lt;a href=&#34;https://learn.microsoft.com/en-us/windows/win32/lwef/internet-shortcuts&#34;&gt;https://learn.microsoft.com/en-us/windows/win32/lwef/internet-shortcuts&lt;/a&gt; ):&lt;br/&gt;&lt;br/&gt;&gt; When the user clicks the icon, the URL path is opened by the handler application, typically the user&#39;s default web browser.&lt;br/&gt;&lt;br/&gt;Leaving in the quite misleading first sentence:&lt;br/&gt;&lt;br/&gt;&gt; The Internet shortcut object is used to create desktop shortcuts to Internet sites.&lt;br/&gt;&lt;br/&gt;(An &#34;Internet site&#34; is a web page, right?)&lt;br/&gt;&lt;br/&gt;How can CVE-2025-33053 warrant a CVE, while the behavior I described has the exact same trigger and impact is **not** CVE worthy?  That&#39;s pretty easy.  Microsoft assigns CVEs to **updates**, not **vulnerabilities**.  They are the decider as to what is a vulnerability and what is not.&lt;br/&gt;&lt;br/&gt;What can we do about it?&lt;br/&gt;&lt;br/&gt;At the very least, turn off the Windows feature that hides file extensions, **even if you have the option turned on to see file extensions**.  The disdain that Microsoft has for Windows users is tangible here.  On what planet would I not want to see the actual extension of a file?  Go to HKCU\InternetShortcut and delete the NeverShowExt value.  After this, your pwned.pdf file will reveal its true self as being pwned.pdf.url.&lt;br/&gt;&lt;br/&gt;More powerful protection would be to block the ability to receive .URL files via email, web browsers, etc.  There is no workflow that I can imagine that requires a user to double-click on a .URL file that **came from the internet**.&lt;br/&gt;&lt;br/&gt;Even more powerful than that would be to disassociate .URL files from opening in Windows (thx &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1yg8lnapwc8yyd0m32jcfdp7k28hwmsvtsqc59rsj6d6d0m3mynqs7tccz0&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Taggart :ifin:&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1yg8…ccz0&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; ).&lt;br/&gt;&lt;br/&gt;This screen recording is a Windows 11 system that has no internet connectivity.  The fact that no warning was displayed that SmartScreen cannot be reached is evidence that SmartScreen is not in play at all.  And that dialog...Do you want to open this file?&lt;br/&gt;&lt;br/&gt;andType: Unknown File Type&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;Do you think that users are presented with enough information to make an informed security decision?  Of course not.  But obviously we all know that we can&#39;t rely on users making informed security decisions in general.  Don&#39;t put users in that position.&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/533/712/734/034/973/original/7873081a273e8a42.mp4&#34;&gt;&lt;/video&gt;&lt;br/&gt; &lt;/blockquote&gt;
    </content>
    <updated>2026-05-07T15:38:05Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2cs0mt5j5rkdds63yemvppf0x3z3pxnvf4llhhh95phw4772hu9szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxwjqj3s</id>
    
      <title type="html">As a chaser, here are two *other* CVEs on Ollama from yesterday. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2cs0mt5j5rkdds63yemvppf0x3z3pxnvf4llhhh95phw4772hu9szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxwjqj3s" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsylulkat6m9xsjhvq3r2ntf7z9qsz8sftwj40udjwjm382gpjdmscckgwmk&#39;&gt;nevent1q…gwmk&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;As a chaser, here are two *other* CVEs on Ollama from yesterday.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/cve-2026-42248-cve-2026-42249-ollama-on-windows-doesnt-verify-updates-writes-anywhere/378&#34;&gt;https://discourse.ifin.network/t/cve-2026-42248-cve-2026-42249-ollama-on-windows-doesnt-verify-updates-writes-anywhere/378&lt;/a&gt;
    </content>
    <updated>2026-05-06T17:44:46Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsylulkat6m9xsjhvq3r2ntf7z9qsz8sftwj40udjwjm382gpjdmsczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxkrephw</id>
    
      <title type="html">Another AI service that&amp;#39;s dangerous when exposed to the ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsylulkat6m9xsjhvq3r2ntf7z9qsz8sftwj40udjwjm382gpjdmsczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxkrephw" />
    <content type="html">
      Another AI service that&amp;#39;s dangerous when exposed to the internet? Well I never!&lt;br/&gt;&lt;br/&gt;Anyway go check for exposed Ollama endpoints.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/unauthenticated-memory-leak-in-ollama-cve-2026-7482/389&#34;&gt;https://discourse.ifin.network/t/unauthenticated-memory-leak-in-ollama-cve-2026-7482/389&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#CVE #ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-05-06T17:35:41Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8p5gdfpjcz4raczx93f6a9zwcf5lcxlrzjzfvup0wl09zy5yhm2szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxky9qdz</id>
    
      <title type="html">This morning we decided to launch a &amp;#34;Vulnerabilities&amp;#34; ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8p5gdfpjcz4raczx93f6a9zwcf5lcxlrzjzfvup0wl09zy5yhm2szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxky9qdz" />
    <content type="html">
      This morning we decided to launch a &amp;#34;Vulnerabilities&amp;#34; category to track vulns without further actionable intelligence besides patching and monitoring. And wouldn&amp;#39;t you know it, a crit on Palo Alto&amp;#39;s User-ID portal showed up to ring it in!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/cve-2026-0300-9-3-cvss-pan-os-unauthenticated-user-initiated-buffer-overflow-captive-portal/382&#34;&gt;https://discourse.ifin.network/t/cve-2026-0300-9-3-cvss-pan-os-unauthenticated-user-initiated-buffer-overflow-captive-portal/382&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#CVE-2026-0300 #CVE #IFIN
    </content>
    <updated>2026-05-06T13:57:47Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsghtcu5j73auap6086r2995f5w5pgjwy5ln6xg7s8qgga9hvcnmygzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx354fks</id>
    
      <title type="html">As of 0740 UTC, Ubuntu&amp;#39;s security and archive sites are ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsghtcu5j73auap6086r2995f5w5pgjwy5ln6xg7s8qgga9hvcnmygzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx354fks" />
    <content type="html">
      As of 0740 UTC, Ubuntu&amp;#39;s security and archive sites are *finally* behind Cloudflare&amp;#39;s CDN...sorta. So while it&amp;#39;s still ridiculous that Cloudflare is serving both sides, at least Ubuntu&amp;#39;s repos should be more stable.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/522/736/487/143/212/original/91bd94e9afd5bcf8.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-05-05T15:44:17Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0kgcz76vcpf7xtep9f6cgrwz893ru5440tl9wzetnyvkkf3wa96qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxza33vp</id>
    
      <title type="html">313 Team, the Iraqi-aligned group claiming credit for the Ubuntu ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0kgcz76vcpf7xtep9f6cgrwz893ru5440tl9wzetnyvkkf3wa96qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxza33vp" />
    <content type="html">
      313 Team, the Iraqi-aligned group claiming credit for the Ubuntu attack, are now encouraging the use of #CopyFail against Ubuntu targets while servers may not be able to reach updates.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/ubuntu-services-under-attack/356&#34;&gt;https://discourse.ifin.network/t/ubuntu-services-under-attack/356&lt;/a&gt;
    </content>
    <updated>2026-05-03T05:02:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswcn4vdxcg6czwz4fv8kltpm0h4hvnz9ntkhxfjhlnzl475x84ppgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxyesm6c</id>
    
      <title type="html">The worms keep worming, unfortunately. The &amp;#34;Mini ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswcn4vdxcg6czwz4fv8kltpm0h4hvnz9ntkhxfjhlnzl475x84ppgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxyesm6c" />
    <content type="html">
      The worms keep worming, unfortunately. The &amp;#34;Mini Shai-Hulud&amp;#34; attack appears to pivot to #PyPi with a compromise of a #pytorch library:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/pytorch-lightning-library-hit-by-supply-chain-attack/357&#34;&gt;https://discourse.ifin.network/t/pytorch-lightning-library-hit-by-supply-chain-attack/357&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN #Python
    </content>
    <updated>2026-04-30T21:22:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsycxytxwfx3j3n0pj3ze0vjhsfawzuj3fd94tfe45dpvcf8f3f2tszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx73ur69</id>
    
      <title type="html">It&amp;#39;s not just you: Ubuntu services are down. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsycxytxwfx3j3n0pj3ze0vjhsfawzuj3fd94tfe45dpvcf8f3f2tszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx73ur69" />
    <content type="html">
      It&amp;#39;s not just you: Ubuntu services are down.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/ubuntu-services-appear-down/356&#34;&gt;https://discourse.ifin.network/t/ubuntu-services-appear-down/356&lt;/a&gt;
    </content>
    <updated>2026-04-30T20:32:51Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspurernka0mkjtm5lwlv0q33gld942sea09h55xcrck3q28yat45czyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxnaeuqz</id>
    
      <title type="html">Since the CopyFail disclosure left some of us feeling a ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspurernka0mkjtm5lwlv0q33gld942sea09h55xcrck3q28yat45czyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxnaeuqz" />
    <content type="html">
      Since the CopyFail disclosure left some of us feeling a little...unsupported, we&amp;#39;re talking about what we love to see in vulnerability disclosures. Come join the conversation!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/your-ideal-vuln-disclosure/350&#34;&gt;https://discourse.ifin.network/t/your-ideal-vuln-disclosure/350&lt;/a&gt;
    </content>
    <updated>2026-04-30T17:10:12Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9xtyxnk8e5weu9hgye0de8mnnx7sxrlws5lmrxj2l3xep3qz6zqqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxcz4ycf</id>
    
      <title type="html">Regarding #CopyFail, It is worth noting that the exploit can ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9xtyxnk8e5weu9hgye0de8mnnx7sxrlws5lmrxj2l3xep3qz6zqqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxcz4ycf" />
    <content type="html">
      Regarding #CopyFail,&lt;br/&gt;&lt;br/&gt;It is worth noting that the exploit can target *any* file and overwrite its contents. That&amp;#39;s not just privilege escalation; that&amp;#39;s the potential for stealthy persistence.&lt;br/&gt;&lt;br/&gt;Our thread now has more technical discussion and also some clever detections.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/copy-fail-732-bytes-to-root-on-every-major-linux-distributions/342/26&#34;&gt;https://discourse.ifin.network/t/copy-fail-732-bytes-to-root-on-every-major-linux-distributions/342/26&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-04-30T15:41:19Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdy7g9mwwvrgew9aw6wmeh2zhekl89cnfc79hcg3rapwhdkzreqkgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx4p2ama</id>
    
      <title type="html">After careful analysis, we believe the best option for ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdy7g9mwwvrgew9aw6wmeh2zhekl89cnfc79hcg3rapwhdkzreqkgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx4p2ama" />
    <content type="html">
      After careful analysis, we believe the best option for remediation is to turn off the computers and go for a nice walk. Maybe call your mother.
    </content>
    <updated>2026-04-29T20:12:57Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2wedxnl64lwr86hfkj6elw9qhxs2h69n3jdasgyydvnk99ey2uvczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxj8p8l0</id>
    
      <title type="html">What is going on today?? We&amp;#39;re also tracking #CopyFail. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2wedxnl64lwr86hfkj6elw9qhxs2h69n3jdasgyydvnk99ey2uvczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxj8p8l0" />
    <content type="html">
      What is going on today??&lt;br/&gt;&lt;br/&gt;We&amp;#39;re also tracking #CopyFail.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/copy-fail-732-bytes-to-root-on-every-major-linux-distributions/342&#34;&gt;https://discourse.ifin.network/t/copy-fail-732-bytes-to-root-on-every-major-linux-distributions/342&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-04-29T18:51:59Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsf023er6gfh0266jgwlmxjnk4sse2c3tkcq24x77shxdcffrm0c8qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx4dp7ss</id>
    
      <title type="html">Looks like we have another #supplychain attack underway, this ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf023er6gfh0266jgwlmxjnk4sse2c3tkcq24x77shxdcffrm0c8qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx4dp7ss" />
    <content type="html">
      Looks like we have another #supplychain attack underway, this time facing #SAP-related NPM packages.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/sap-npm-packages-targeted-with-credential-stealing-malware/340&#34;&gt;https://discourse.ifin.network/t/sap-npm-packages-targeted-with-credential-stealing-malware/340&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-04-29T16:25:36Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqcp6qzfej8quklj3fu9p359yayzl0lt7j388zplaftez69ugss7gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxgmg53p</id>
    
      <title type="html">RE: https://infosec.exchange/@mttaggart/116461922134943653 When ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqcp6qzfej8quklj3fu9p359yayzl0lt7j388zplaftez69ugss7gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxgmg53p" />
    <content type="html">
      RE: &lt;a href=&#34;https://infosec.exchange/@mttaggart/116461922134943653&#34;&gt;https://infosec.exchange/@mttaggart/116461922134943653&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;When opportunity (malware) comes a-knocking, you let it in (fire up the sandbox and disassembler).&lt;br/&gt;&lt;br/&gt;#malware #ThreatIntel #ThreatIntelligence #IFIN&lt;br/&gt;nostr:note1nq6ga2rz9d8jrkgpzg93n6fdswsjlu840gy69wvldumpmhh6j0ns8dctqd&lt;br/&gt;
    </content>
    <updated>2026-04-24T21:59:20Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy4z44tkuj60g8gvkzpz4hvsw7kudp3z405snwzmpnkvegcpnhdtqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxs4mx97</id>
    
      <title type="html">Since we were the ones subtooted, it&amp;#39;s worth clarifying: it ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy4z44tkuj60g8gvkzpz4hvsw7kudp3z405snwzmpnkvegcpnhdtqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxs4mx97" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszufxzullqueuf88xk94upy8kj33s4cvng95vvnzeun0upuqhw7esa0mwks&#39;&gt;nevent1q…mwks&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Since we were the ones subtooted, it&amp;#39;s worth clarifying: it is *impossible* to get every moderation decision right, and avenues for appeal are absolutely possible. If we make a mistake, we&amp;#39;ll own it. Always.&lt;br/&gt;&lt;br/&gt;However, on balance, this signal tends to demonstrate the seriousness with which you approach the issue and our community. If leaning on the side of safety means an occasional false positive, that&amp;#39;s a price worth paying.
    </content>
    <updated>2026-04-24T20:54:27Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxuxdn4rfju3s68g7ds3sj5mlw0ny8hy9e3kav8zlxkzak3rqsdqczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxp40fkt</id>
    
      <title type="html">Tell your friends. Mess around with the single field we ask for ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxuxdn4rfju3s68g7ds3sj5mlw0ny8hy9e3kav8zlxkzak3rqsdqczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxp40fkt" />
    <content type="html">
      Tell your friends. Mess around with the single field we ask for during onboarding, and we will toss you. If you don&amp;#39;t take this seriously, we have no reason to expect you to respect our community&amp;#39;s safety.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/461/007/477/566/875/original/76376544204c5095.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-24T18:05:47Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsta0g76ngpfpylm62wye9dmsr0r7d87gsfm5h5e6x9asddr7yvmwszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxgtm75g</id>
    
      <title type="html">We&amp;#39;ve been on a tear adding new sources to our RSS ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsta0g76ngpfpylm62wye9dmsr0r7d87gsfm5h5e6x9asddr7yvmwszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxgtm75g" />
    <content type="html">
      We&amp;#39;ve been on a tear adding new sources to our RSS aggregator! All the cyber news that&amp;#39;s fit to print, in one place: &lt;a href=&#34;https://news.ifin.network&#34;&gt;https://news.ifin.network&lt;/a&gt;
    </content>
    <updated>2026-04-23T17:39:38Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8alyd8py02wz4n4f57x4dnpvcpakgd34alekck35f765z4rps7tszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx654m92</id>
    
      <title type="html">Bitwarden&amp;#39;s CLI NPM package was hijacked and used to spread ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8alyd8py02wz4n4f57x4dnpvcpakgd34alekck35f765z4rps7tszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx654m92" />
    <content type="html">
      Bitwarden&amp;#39;s CLI NPM package was hijacked and used to spread credential stealer malware. This is related to the previous Checkmarx compromise.&lt;br/&gt;&lt;br/&gt;We&amp;#39;ll be updating this thread as always with new information. Come join the effort!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/teampcp-campaign-spreads-to-npm-via-a-hijacked-bitwarden-cli/305&#34;&gt;https://discourse.ifin.network/t/teampcp-campaign-spreads-to-npm-via-a-hijacked-bitwarden-cli/305&lt;/a&gt;
    </content>
    <updated>2026-04-23T15:08:31Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs268jk94eee0gvl3fuf5k47xerjdysqzvnf57yauc2z22g5clc9ngzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx5k6f9v</id>
    
      <title type="html">The best time to block api.telegram[.]org was like, I dunno, five ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs268jk94eee0gvl3fuf5k47xerjdysqzvnf57yauc2z22g5clc9ngzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx5k6f9v" />
    <content type="html">
      The best time to block api.telegram[.]org was like, I dunno, five years ago? The second best time to do it is now.&lt;br/&gt;&lt;br/&gt;Seriously. Cross that one off the easy wins list today.&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-04-22T15:25:32Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg35g0vvctltdzpv63jg43nwy2wrkuazadmcyhctz4sjrwd6d4uwczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxsy4mef</id>
    
      <title type="html">RE: https://infosec.exchange/@ifin/116432853020620365 Thanks to ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg35g0vvctltdzpv63jg43nwy2wrkuazadmcyhctz4sjrwd6d4uwczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxsy4mef" />
    <content type="html">
      RE: &lt;a href=&#34;https://infosec.exchange/@ifin/116432853020620365&#34;&gt;https://infosec.exchange/@ifin/116432853020620365&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Thanks to some excellent reporting from Infostealers by Hudson Rock, we know a context[.]ai employee was seeking Roblox cheats when they got hit with LummaStealer, leading to the initial breach which impacted Vercel.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/293/7&#34;&gt;https://discourse.ifin.network/t/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/293/7&lt;/a&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/note1v6vqu2qzyk9zulzpplvgr655ffwndc84m5jdl50lwsl7h06aaagsq6k8zn&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;note1v6v…k8zn&lt;/a&gt;&lt;/span&gt;&lt;br/&gt; &lt;/div&gt; We&#39;re actively tracking developments here: &lt;a href=&#34;https://discourse.ifin.network/t/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/293&#34;&gt;https://discourse.ifin.network/t/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/293&lt;/a&gt; &lt;/blockquote&gt;
    </content>
    <updated>2026-04-21T16:58:33Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs20yy24stuc3txtpk02kpyhrs4dsyhsd774rfy5qk5vc98jpzphrgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxdan4xs</id>
    
      <title type="html">What a hassle! We&amp;#39;ll look into it. Apologies for the ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs20yy24stuc3txtpk02kpyhrs4dsyhsd774rfy5qk5vc98jpzphrgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxdan4xs" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs83cug2qrrgxe95nyfkg292p3pyxhd93st6rfcq7c07qmjmws87zq8gzvsy&#39;&gt;nevent1q…zvsy&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;What a hassle! We&amp;#39;ll look into it. Apologies for the inconvenience!&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1kp7e9nzstq7up4rfch5j4nxa0mqxqy4gsqme6p7y847nmq2h0ygqrgrszc&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Fritz Adalis&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1kp7…rszc&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1v9rfxr538ppy58765llpk88spjrdmph4lalf7lu574fqwdwpxzjqr9d02r&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Rob Carlson&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1v9r…d02r&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2026-04-21T14:27:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsretz8seg7cz7sp053j4k4ym5jmfv5h0ktv083c0pwnmee9sg823qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxmu3eav</id>
    
      <title type="html">Today we&amp;#39;re talking about another (???) issue in the Cursor ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsretz8seg7cz7sp053j4k4ym5jmfv5h0ktv083c0pwnmee9sg823qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxmu3eav" />
    <content type="html">
      Today we&amp;#39;re talking about another (???) issue in the Cursor AI IDE. Well actually it&amp;#39;s two issues, one of which is simple command injection; the other is takeover via Dev tunnels. Don&amp;#39;t know what dev tunnels are? Come find out—then block them with extreme prejudice.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/cursors-remote-tunnel-capability-is-vulnerable-to-malicious-prompt-injection/295&#34;&gt;https://discourse.ifin.network/t/cursors-remote-tunnel-capability-is-vulnerable-to-malicious-prompt-injection/295&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#IFIN #ThreatIntel #ThreatIntelligence
    </content>
    <updated>2026-04-20T19:08:26Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqst4plsdlm75vzws8wrw8df54lex9uwm4vrdphrfam7msq833qwvxszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx929qj8</id>
    
      <title type="html">#Vercel update. We now know, thanks to Vercel&amp;#39;s CEO, that the ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqst4plsdlm75vzws8wrw8df54lex9uwm4vrdphrfam7msq833qwvxszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx929qj8" />
    <content type="html">
      #Vercel update. We now know, thanks to Vercel&amp;#39;s CEO, that the compromise came by way of the context[.]ai  Office Suite, using OAuth tokens collected from a breach last month. Details here:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/293/6&#34;&gt;https://discourse.ifin.network/t/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/293/6&lt;/a&gt;
    </content>
    <updated>2026-04-20T12:16:39Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxdxqw9qpztz3w03qslkypa22y5hfkur6a6fxl68lhg0lthaw775gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxu2w8tf</id>
    
      <title type="html">We&amp;#39;re actively tracking developments here: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxdxqw9qpztz3w03qslkypa22y5hfkur6a6fxl68lhg0lthaw775gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxu2w8tf" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0m9sk5ljaq3uffprrqhrwur5rq2qkyf2qvp9m79uduv3s3dyrgugmg2v3j&#39;&gt;nevent1q…2v3j&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;We&amp;#39;re actively tracking developments here: &lt;a href=&#34;https://discourse.ifin.network/t/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/293&#34;&gt;https://discourse.ifin.network/t/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/293&lt;/a&gt;
    </content>
    <updated>2026-04-19T18:45:44Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0m9sk5ljaq3uffprrqhrwur5rq2qkyf2qvp9m79uduv3s3dyrgugzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxkgzf6y</id>
    
      <title type="html">#Vercel customers: don&amp;#39;t wait. Proactively rotate keys, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0m9sk5ljaq3uffprrqhrwur5rq2qkyf2qvp9m79uduv3s3dyrgugzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxkgzf6y" />
    <content type="html">
      #Vercel customers: don&amp;#39;t wait. Proactively rotate keys, passwords and environment variables ASAP.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://vercel.com/kb/bulletin/vercel-april-2026-security-incident&#34;&gt;https://vercel.com/kb/bulletin/vercel-april-2026-security-incident&lt;/a&gt;
    </content>
    <updated>2026-04-19T17:46:34Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszyvvgrkeyhsrtvgq7wk3xsmy5zxn2gnlvamsy6c953ugqx7r2cfqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx0j28xk</id>
    
      <title type="html">Thanks so much for including us! @npub1ljm…w8tm ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszyvvgrkeyhsrtvgq7wk3xsmy5zxn2gnlvamsy6c953ugqx7r2cfqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx0j28xk" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0935rj6s4esx4tmxsqdsvmqeqt9q2t78mr6heu09gjh7c6wje3ecd6q7p7&#39;&gt;nevent1q…q7p7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Thanks so much for including us!&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1ljmfkwmllavdpnf5tgmrfay6mj4t78c0xryugfw4qka0c4exas0q2pw8tm&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;jonny (good kind)&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1ljm…w8tm&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1n7zz894h5ugju2uzuvtsladk0lq3tznlrjd52nljvf45smprjghqcwjm2n&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Lenny Zeltser&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1n7z…jm2n&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1ur9qljq4fg3ahdy4rxal8n37xuscn2958g69kkp3ngfu23g23xass8v3q2&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Fractal Kitty&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1ur9…v3q2&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub18ak6r2run0k5vadryvdp5nuzscqkummqp3z5m3dzz24zfepnudwsf3untn&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;ploum&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub18ak…untn&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; [@otterlove](&lt;a href=&#34;https://mastodon.art/@otterlove&#34;&gt;https://mastodon.art/@otterlove&lt;/a&gt; ) &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1388cy7ljtym4jag6l7d9c2tczk64y7c4qhxzy2g87wfy830760xqlusxrr&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Max Leibman&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1388…sxrr&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1jjwz42h80fn278xjas9y2k9eeysjqyyh0w4r2kagqw6wf6wt748sex2z5l&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Hyde 📷 🖋 :debian:&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1jjw…2z5l&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1xhjvfwgv2nqnespjrvxh5ky9jzvxappwpm4kxdcjl90l559gexds98hq9k&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Naty&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1xhj…hq9k&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1yg8lnapwc8yyd0m32jcfdp7k28hwmsvtsqc59rsj6d6d0m3mynqs7tccz0&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Taggart :ifin:&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1yg8…ccz0&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1c993q8n9ke28hqf9x7u0clqedrd8rpq7n9lueuw9d3nfnrcjyfpsczljas&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;readbeanicecream&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1c99…ljas&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1x7454l785ug9mhfg0dh2aq9xj9equmrgyhj05lchj4vn5k5z97asvnruph&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Joel :casio: :blobcatderpy:&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1x74…ruph&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1j33kuu9hrg2ukwtnnpyy4hgs70hhlvl5pf3vgv9l68y8spe8cdxqsj55x2&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Taran Rampersad&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1j33…55x2&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1wp7duwkkw0r7q45f6yfdr3kn63chtm4dfy76yjetx4nhmqantekspr7eym&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Red 🟥&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1wp7…7eym&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; [@_elena](&lt;a href=&#34;https://mastodon.social/@_elena&#34;&gt;https://mastodon.social/@_elena&lt;/a&gt; ) &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1c2u267rt55rdn6h3myzw0c3fs0ake3ez8g54675as3h20eqam8sscdzg55&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Space Hobo&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1c2u…zg55&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1l2k3sf7vk3kpy0s4ggvaf8dq8079lduf4q38thxz8chmgdwyee0qp46m2l&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Connected Places&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1l2k…6m2l&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1dhl6470pzgczhuy6yxgpf595l998vppl0jje2swukmwyk7qny6dq0qud8y&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;gloriouscow&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1dhl…ud8y&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1090hjdt6ra9glpm5chzx8vahs5rerzejcy0ektcwyr32078ar8yqe9cff7&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Nicolas Gouny&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1090…cff7&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2026-04-18T11:47:39Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsf9s7vd8shhqn7na8haq72y7z7p0f3zxh3ghnukwd0tw2x7lrvlkqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx90hexw</id>
    
      <title type="html">Proud of you bb</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf9s7vd8shhqn7na8haq72y7z7p0f3zxh3ghnukwd0tw2x7lrvlkqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx90hexw" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstgmpj4eyaxz0fkfj29f044gr82se5jnc7cfedz6mnsqzdaqwdlrcapnca2&#39;&gt;nevent1q…nca2&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Proud of you bb
    </content>
    <updated>2026-04-18T00:26:55Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs202evwjy0yvve4gtcyswwjzc4xe4wxet99wzy0fhh0qt8ysvh82gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxhdjknv</id>
    
      <title type="html">After working on it a bit, we have a fix for a recent #ClickFix ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs202evwjy0yvve4gtcyswwjzc4xe4wxet99wzy0fhh0qt8ysvh82gzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxhdjknv" />
    <content type="html">
      After working on it a bit, we have a fix for a recent #ClickFix attack against #macOS that leverages AppleScript. Here&amp;#39;s the writeup, and a link to the forum thread!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://ifin-intel.org/blog/applescript/&#34;&gt;https://ifin-intel.org/blog/applescript/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #IFIN
    </content>
    <updated>2026-04-16T01:05:08Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs05993cqs8w0a5wlh7c6wsdh6f0utqhrrw3ey5cqr7ew22tu6h2lszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxltr7wg</id>
    
      <title type="html">Well well well, would you look at that ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs05993cqs8w0a5wlh7c6wsdh6f0utqhrrw3ey5cqr7ew22tu6h2lszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxltr7wg" />
    <content type="html">
      Well well well, would you look at that&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/activitypub-test/271/1&#34;&gt;https://discourse.ifin.network/t/activitypub-test/271/1&lt;/a&gt;
    </content>
    <updated>2026-04-15T04:33:44Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgf0kw4nfeef8m4qmr7upcx0vg3d0ygqchtgrxvdkav8wzdxp7xngzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx78tsue</id>
    
      <title type="html">Following up on an excellent blog post we discovered (linked in ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgf0kw4nfeef8m4qmr7upcx0vg3d0ygqchtgrxvdkav8wzdxp7xngzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx78tsue" />
    <content type="html">
      Following up on an excellent blog post we discovered (linked in thread), we dug a little deeper on a recent #WordPress plugin compromise. We have more IoCs for you, and what we believe to be a use of the blockchain for an initial access auction for the plugin install base.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/265/8&#34;&gt;https://discourse.ifin.network/t/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/265/8&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #ThreatHunting #IFIN
    </content>
    <updated>2026-04-14T17:13:23Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy4d8y32pvkjk44ml7zznmtcwrynu75vtsz40a4a745cd7davzn3qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxmgft33</id>
    
      <title type="html">CISA is claiming that #Iran is once again targeting Programmable ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy4d8y32pvkjk44ml7zznmtcwrynu75vtsz40a4a745cd7davzn3qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxmgft33" />
    <content type="html">
      CISA is claiming that #Iran is once again targeting Programmable Logic Controllers (PLCs), similar to efforts in 2024. Has anyone seen recent evidence of this? None was provided from CISA, and we&amp;#39;d love independent confirmation.
    </content>
    <updated>2026-04-13T19:21:03Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfea9ngul78fm4q3egkytjr4y6zh0w99ulhnghfkgumxkff3leraczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxp4tfnd</id>
    
      <title type="html">We ask for preferred pronouns when you register. We do this so ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfea9ngul78fm4q3egkytjr4y6zh0w99ulhnghfkgumxkff3leraczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxp4tfnd" />
    <content type="html">
      We ask for preferred pronouns when you register. We do this so everyone can address you how you wish. But it&amp;#39;s also a signal of how you&amp;#39;ll treat others. &lt;br/&gt;&lt;br/&gt;We just rejected a forum account application because of joke pronouns. That is such a low barrier and if you don&amp;#39;t take it seriously, we have no confidence you&amp;#39;ll treat our community members with respect.
    </content>
    <updated>2026-04-11T14:56:14Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9up6fy54y7d0x4fpyz4u0fpd6r57ns7j23gv69jet8tk7t62tkyqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxev4tge</id>
    
      <title type="html">RE: https://infosec.exchange/@cR0w/116052391841771930 Come gather ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9up6fy54y7d0x4fpyz4u0fpd6r57ns7j23gv69jet8tk7t62tkyqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxev4tge" />
    <content type="html">
      RE: &lt;a href=&#34;https://infosec.exchange/@cR0w/116052391841771930&#34;&gt;https://infosec.exchange/@cR0w/116052391841771930&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Come gather round. We&amp;#39;ll tell stories together for free.&lt;br/&gt;nostr:note17teqm8m359cjtwf6qcafdl02c44l94j5k02ypkylgjsf9savh4gq2e9am9&lt;br/&gt;
    </content>
    <updated>2026-04-10T21:04:23Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0mqnt2mgwakvfmkxwzykm80ztzv9sv65uxnkumy74x97p30e9jrszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxumxh3p</id>
    
      <title type="html">CPUID downloads were temporarily compromised earlier today. We ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0mqnt2mgwakvfmkxwzykm80ztzv9sv65uxnkumy74x97p30e9jrszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxumxh3p" />
    <content type="html">
      CPUID downloads were temporarily compromised earlier today. We have a thread compiling analysis and IoCs for you to investigate:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/hwmonitor-download-compromised/249&#34;&gt;https://discourse.ifin.network/t/hwmonitor-download-compromised/249&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #IFIN #ThreatIntelligence
    </content>
    <updated>2026-04-10T13:49:31Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgm50nrjsdqe0xpnuqvlrpdh84dqa2sjflv56gwna3hrkrr869j5qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx9zx406</id>
    
      <title type="html">:ablobcatpopcorn:</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgm50nrjsdqe0xpnuqvlrpdh84dqa2sjflv56gwna3hrkrr869j5qzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx9zx406" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsd53zp9ll6t79jt9kvtzh2s7m93n0nvz7jfaqlrwgmxnk639dn67cmjqp6w&#39;&gt;nevent1q…qp6w&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;:ablobcatpopcorn:
    </content>
    <updated>2026-04-09T16:20:46Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs28djadv4t94j5xx0cqjgjfzd5gyuxeft83rhae9m0la2hh2v6uwczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx4dhl7m</id>
    
      <title type="html">This right here? This is a huge part of why we exist. It&amp;#39;s ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs28djadv4t94j5xx0cqjgjfzd5gyuxeft83rhae9m0la2hh2v6uwczyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx4dhl7m" />
    <content type="html">
      This right here?&lt;br/&gt;&lt;br/&gt;This is a huge part of why we exist. It&amp;#39;s time to trust in each other for our mutual protection, because nobody is coming to save us.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/white-house-seeks-to-slash-cisa-funding-by-707-million/&#34;&gt;https://www.securityweek.com/white-house-seeks-to-slash-cisa-funding-by-707-million/&lt;/a&gt;
    </content>
    <updated>2026-04-09T13:09:12Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswuh0ptwsx204n8eawkdfwvgg5xvx023v9cves7evmecg7lznfeaqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx7d2uz3</id>
    
      <title type="html">So, how this works is:&amp;lt;li&amp;gt;Our community finds something ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswuh0ptwsx204n8eawkdfwvgg5xvx023v9cves7evmecg7lznfeaqzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx7d2uz3" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsyg7kg6vf33vhsxd9trkvajpuas9h8nt975c4nr9ldg5chv6messg42ch6q&#39;&gt;nevent1q…ch6q&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;So, how this works is:&amp;lt;li&amp;gt;Our community finds something interesting&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;We make a thread&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;We investigate together&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;The data &amp;lt;u&amp;gt;remains searchable&amp;lt;/u&amp;gt; for future reference&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;We all win&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Come join us!
    </content>
    <updated>2026-04-08T19:09:36Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsyg7kg6vf33vhsxd9trkvajpuas9h8nt975c4nr9ldg5chv6messgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxm3hqhh</id>
    
      <title type="html">Looks like we have a live one here. Weird Rust maintainer ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyg7kg6vf33vhsxd9trkvajpuas9h8nt975c4nr9ldg5chv6messgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxm3hqhh" />
    <content type="html">
      Looks like we have a live one here. Weird Rust maintainer phishing campaign using crates[.]ws:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/bizarre-crates-io-phishing-campaign/232&#34;&gt;https://discourse.ifin.network/t/bizarre-crates-io-phishing-campaign/232&lt;/a&gt;
    </content>
    <updated>2026-04-08T18:53:37Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0xnwhq8ssngmnf7zhelwhqw8cajwkswyy53d82tpmhv0jzu2386szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx92eyrn</id>
    
      <title type="html">I&amp;#39;ve been trying to think of a way to describe our ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0xnwhq8ssngmnf7zhelwhqw8cajwkswyy53d82tpmhv0jzu2386szyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx92eyrn" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdxljntqphljuvek4fc5skvw9ul0raw0vzqpuatcdjlpsvu9xqt5qgeg55t&#39;&gt;nevent1q…g55t&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;ve been trying to think of a way to describe our relationship and this is pretty much flawless.&lt;br/&gt;&lt;br/&gt;IFIN :rainbow_heart: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1eznzdgefq0ece8yljlxtaadscv4skav3ckk38gv3qw04s25mrt2s5fnyq3&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;GAYINT&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1ezn…nyq3&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2026-04-07T19:05:27Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8ssjyn4reyat7z74knxdzqf3xwsdk4f5770jyg8tr3ajpzmsqtdgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxr3m0ex</id>
    
      <title type="html">CISA just published an advisory about IRGC activity against ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8ssjyn4reyat7z74knxdzqf3xwsdk4f5770jyg8tr3ajpzmsqtdgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxr3m0ex" />
    <content type="html">
      CISA just published an advisory about IRGC activity against Rockwell/Allen-Bradley PLCs. This is a return to form for IRGC, following patterns observed in 2023.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/iran-conflict-cyber-threat-activity/145/25&#34;&gt;https://discourse.ifin.network/t/iran-conflict-cyber-threat-activity/145/25&lt;/a&gt;
    </content>
    <updated>2026-04-07T18:35:33Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsq72ym46tmg4vzss5q8vak5c0ul67zek60znzpur0c9egr8dfvengzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxcmyd83</id>
    
      <title type="html">Folks here will probably be interested in our AI policy: &amp;gt; ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsq72ym46tmg4vzss5q8vak5c0ul67zek60znzpur0c9egr8dfvengzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxcmyd83" />
    <content type="html">
      Folks here will probably be interested in our AI policy:&lt;br/&gt;&lt;br/&gt;&amp;gt; With so many downside risks, and with such dubious benefit to usage, the choice for IFIN is clear: we choose not to participate in the toxic cult of generative AI. Our published material and code are not produced with these models.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://ifin-intel.org/policies/ai/&#34;&gt;https://ifin-intel.org/policies/ai/&lt;/a&gt;
    </content>
    <updated>2026-04-07T17:30:23Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs95vg92ky74cjgwz8wjgz6jy206m6uwzf57wj7tzw4gnx0y42chpgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx69p5d2</id>
    
      <title type="html">Haha insta-hugged. Standby!</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs95vg92ky74cjgwz8wjgz6jy206m6uwzf57wj7tzw4gnx0y42chpgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx69p5d2" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0ptdhcaems3u90aytzrkme5hgxuuyddthhn6n649luyd6uz9jexsfpxwed&#39;&gt;nevent1q…xwed&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Haha insta-hugged. Standby!
    </content>
    <updated>2026-04-07T15:48:30Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0ptdhcaems3u90aytzrkme5hgxuuyddthhn6n649luyd6uz9jexszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxcmp2zt</id>
    
      <title type="html">And our first contribution: here is our thread on currently ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0ptdhcaems3u90aytzrkme5hgxuuyddthhn6n649luyd6uz9jexszyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sxcmp2zt" />
    <content type="html">
      And our first contribution: here is our thread on currently tracked #Iran-based cyber threat activity, including motivations and targeting information.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://discourse.ifin.network/t/iran-conflict-cyber-threat-activity/145/23&#34;&gt;https://discourse.ifin.network/t/iran-conflict-cyber-threat-activity/145/23&lt;/a&gt;
    </content>
    <updated>2026-04-07T15:45:24Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqst0xvxd0v04mqdkxwg2s4zhss93dz9d28dt9735d45nrc7vwkk4vgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx7y288w</id>
    
      <title type="html">Hello, world! We are IFIN, the Independent Federated Intelligence ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqst0xvxd0v04mqdkxwg2s4zhss93dz9d28dt9735d45nrc7vwkk4vgzyqrw4v3dhv0kdxmu3mznfg8eqywreatv2mzhjqpnfv7tk9kx4l9sx7y288w" />
    <content type="html">
      Hello, world!&lt;br/&gt;&lt;br/&gt;We are IFIN, the Independent Federated Intelligence Network, and we want to change how threat intelligence is done.&lt;br/&gt;&lt;br/&gt;We believe we&amp;#39;re all safer when we share what we know. Come learn more and join us!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://ifin-intel.org/blog/hello/&#34;&gt;https://ifin-intel.org/blog/hello/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #ThreatIntelligence #Cybersecurity #Infosec
    </content>
    <updated>2026-04-07T15:31:14Z</updated>
  </entry>

</feed>