Natsume Mio reshared this.

The media in this post is not displayed to visitors. To view it, please go to the original post.

3月5日は
八奈見杏菜役
遠野ひかるさんのお誕生日

Natsume Mio reshared this.

Natsume Mio reshared this.

The media in this post is not displayed to visitors. To view it, please go to the original post.

『#とある暗部の少女共棲』2026年放送決定✨

とあるプロジェクト 新シリーズ
学園都市の闇に生きる、少女たちの物語

▽スタッフ解禁!!
監督 ⻑井⿓雪
キャラクターデザイン︓⽊本茂樹
アニメーション制作︓J.C.STAFF

▽ティザーサイト公開!!
toaru-project.com/item/

#少女共棲 #アイテム #とある

Natsume Mio reshared this.

Natsume Mio reshared this.

The media in this post is not displayed to visitors. To view it, please go to the original post.

🎁フォロワー500人ごとにアイコン🎁

147000フォロワー
ありがとうございます🎀

Natsume Mio reshared this.

Natsume Mio reshared this.

The media in this post is not displayed to visitors. To view it, please go to the original post.

#マケイン
8.5巻時点での人間関係。意外とよく出てくる「元生徒会長」を加えた。かなり濃い人だったみたいなので温水達に指針を与えるような立場で出てくるかも

reshared this

Natsume Mio reshared this.

避个大坑。去验证了下 ClawHub 里的 Skill,发现有些高赞的居然带毒。它会美其名曰“为了更好使用该功能请安装某模块”,然后直接把 OpenClaw 变成下载器去拖木马。

各位玩 AI 工具的时候长点心,一定要用隔离环境(Docker 或 VM)。

现在的 AI 太听话,文本发过去就是指令,一旦让它联网操作文件,风险太大了。

Natsume Mio reshared this.

Natsume Mio reshared this.

The media in this post is not displayed to visitors. To view it, please go to the original post.

印度杀毒软件 eScan 更新基础设施被用来投毒,黑客入侵其更新服务器并通过 eScan 更新机制向客户投放恶意载荷。问题是被攻击后 eScan 自己还没发现,还是其他同行公司发现异常后进行通报才阻断攻击,由于病毒还会修改 hosts 文件阻断 eScan 更新,因此客户只能联系其支持工程师手动排查:https://www.landiannews.com/archives/111725.html?utm_source=x.com&utm_medium=social&utm_campaign=杀毒软件被劫持用来投毒+印度杀毒软件eScan更新基础设施被黑用于投毒

Natsume Mio reshared this.

Natsume Mio reshared this.

The media in this post is not displayed to visitors. To view it, please go to the original post.

#CloudCone 被黑事件:你以为他们很专业,其实都是业余玩家,甚至在工单中提交明文root密码。根据Virtualizor的回复,攻击源头在于Virtualizor工单被黑,里面有1500个工单被查看,部分工单包含VPS提供商提交的明文 root 密码,且长期不更换暴露的密码,还没设置白名单访问:ourl.co/111724?x

Natsume Mio reshared this.

Natsume Mio reshared this.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Virtualizor has released the technical details regarding the recent wave of attacks on Cloudcone, HostSlick, and others. The breach was not a direct software exploit, but a session hijacking attack on their support ticket system.

Attackers gained access to approximately 1,500 tickets where providers had carelessly sent plain-text root credentials via email instead of using secure forms.

The compromised providers were vulnerable because they failed to rotate these passwords after support cases were resolved - some credentials were over a year old - and did not have IP whitelisting enabled for their Admin Panels or SSH.

Virtualizor is urging all admins to immediately rotate any root passwords previously shared in tickets and to restrict Admin Panel access to trusted IPs only.

Source: Hosteroid on LET

Natsume Mio reshared this.