Toggle light / dark theme

Nitrokod stealth malware hides on a pc for a month before it goes to work infects over 111,000 users

A Turkish entity going by the name of Nitrokod has been accused of running a campaign by spoofing a desktop version of Google Translate to actively mine cryptocurrency from its more than 111,000 users across eleven countries (UK, US, Sri Lanka, Greece, etc., Israel, Germany, Turkey, Cyprus, Australia, Mongolia, and Poland) in 2019.

In addition to Google Translate, there are five other fake desktop applications on the Nitrokod website. Most of them impersonate programs that are not officially available as desktop applications, but as web or mobile applications, which makes the desktop version created by the attackers particularly attractive. In any case, they are popular applications that can be found on websites such as Softpedia and UpToDown.

Six fake applications available on the Nitrokod website. When installing any of these programs, the malicious effects do not manifest until after a sequence of dropper for almost a month after installation, in order to hide such effects from the antiviruses.

Crypto platform accidentally transfers $10.5m to Melbourne woman — now they want it back

When you hit the jackpot-or don’t.

Imagine receiving $10.5 million while expecting a $100 refund to be transferred to your bank account and no one, except you, recognizes it until seven months have passed. That’s recently what happened in Melbourne, Australia when a cryptocurrency company bestowed a fortune to a woman, initially reported by 7NEWS. Back in May 2021, Crypto.com, one of the world’s largest cryptocurrency trading platforms, transferred the amount to Thevamanogari Manivel. Upon receiving the money, Manivel and her sister Thilagavathy Gangadory started spending it like greased lightning.


It took the company seven months to realise its mistake. By the time they did, millions had already been spent.

FBI: Hackers increasingly exploit DeFi bugs to steal cryptocurrency

The U.S. Federal Bureau of Investigation (FBI) is warning investors that cybercriminals are increasingly exploiting security vulnerabilities in Decentralized Finance (DeFi) platforms to steal cryptocurrency.

“The FBI has observed cyber criminals exploiting vulnerabilities in the smart contracts governing DeFi platforms to steal investors’ cryptocurrency,” the federal law enforcement agency said.

“The FBI encourages investors who suspect cyber criminals have stolen their DeFi investments to contact the FBI via the Internet Crime Complaint Center or their local FBI field office.”

Postumanism (Full Documentary)

TABLE OF CONTENTS —————
0:00–15:11 : Introduction.
15:11–36:12 CHAPTER 1: POSTHUMANISM
a. Neurotechnology b. Neurophilosophy c. Teilhard de Chardin and the Noosphere.

TWITTER https://twitter.com/Transhumanian.
PATREON https://www.patreon.com/transhumania.
BITCOIN 14ZMLNppEdZCN4bu8FB1BwDaxbWteQKs8i.
BITCOIN CASH 1LhXJjN4FrfJh8LywR3dLG2uGXSaZjey9f.
ETHEREUM 0x1f89b261562C8D4C14aA01590EB42b2378572164
LITECOIN LdB94n8sTUXBto5ZKt82YhEsEmxomFGz3j.
CHAINLINK 0xDF560E12fF416eC2D4BAECC66E323C56af2f6666.

POSTHUMAN TECHNOLOGY

36:12–54:39 CHAPTER 2 : TELEPATHY/ MIND-READING
a. MRI
b. fMRI
c. EEG
d. Cognitive Liberty e. Dream-recording, Dream-economies f. Social Credit Systems g. Libertism VS Determinism.

1:02:07–1:25:48 : CHAPTER 3 : MEMORY/ MIND-AUGMENTING
a. Memory Erasure and Neuroplasticity b. Longterm Potentiation (LTP/LTD)
c. Propanolol d. Optogenetics e. Neuromodulation f. Memory-hacking g. Postmodern Dystopias h. Total Recall, the Matrix, and Eternal Sunshine of the Spotless Mind i. Custom reality and identity.

1:25:48–1:45:14 CHAPTER 4 : BCI/ MIND-UPGRADING

The Holographic Principle, Quantum Mechanics, and Simulated Reality (SR)

TWITTER https://twitter.com/Transhumanian.
PATREON https://www.patreon.com/transhumania.
BITCOIN 14ZMLNppEdZCN4bu8FB1BwDaxbWteQKs8i.
BITCOIN CASH 1LhXJjN4FrfJh8LywR3dLG2uGXSaZjey9f.
ETHEREUM 0x1f89b261562C8D4C14aA01590EB42b2378572164
LITECOIN LdB94n8sTUXBto5ZKt82YhEsEmxomFGz3j.
CHAINLINK 0xDF560E12fF416eC2D4BAECC66E323C56af2f6666.

KEYWORDS:
Scienc, Technology, Philosophy, Futurism, Simulation, Simulationism, Ockham’s Razor, Argument, Hypothesis, Anthropic Principle, Holographic Principle, Holographic Universe theory, Brain in a Vat, Brain in a Jar, Matrix, Inception, Hologram, Artificial Intelligence, Vocaloid Hologram, Reality, Ontology, Epistemology, Elon Musk, Solipsism, Illusion, Renee Descartes, George Berkeley, Materialism, Idealism, Solipsism, Cogito Ergo Sum, Esse es Percepi, Gilbert Harman, Hillary Putnam, Robert Nozick, The Experience Machine, Multiverse, Omniverse, Black Hole Hologram, Event Horizon, Singularity, Moore’s Law, Black Dual Linear Error Correcting Code, Jim James Sylvester Gates, Neil DeGrasse Tyson, Plato’s Cave, Quantum Mechanics, Schrondinger’s Cat, Observer Effect, Double-Slit Experiment, Heisenberg Uncertainty Principle, Artificial Intelligence, Quantum Superdeterminism, Free Will, Albert Einstein, Stephen Hawking, Quantum Gravity Research, Eugene Vignor, Consciousness, Fermi Paradox, SETI (search for extraterrestrial intelligence), Drake Equation, Alpha Centauri, Wave Function Collapse, Video Games, VR, Virtual Reality, God, Theology, Fine-Tuning Argument, Teleological Argument, Simulationism, Mormonism, LDS, Heavenly Father, Glitch, Dyson Sphere.

The Man behind Stable Diffusion

An interview with Emad Mostaque, founder of Stability AI.

OUTLINE:
0:00 — Intro.
1:30 — What is Stability AI?
3:45 — Where does the money come from?
5:20 — Is this the CERN of AI?
6:15 — Who gets access to the resources?
8:00 — What is Stable Diffusion?
11:40 — What if your model produces bad outputs?
14:20 — Do you employ people?
16:35 — Can you prevent the corruption of profit?
19:50 — How can people find you?
22:45 — Final thoughts, let’s destroy PowerPoint.

Links:
Homepage: https://ykilcher.com.
Merch: https://ykilcher.com/merch.
YouTube: https://www.youtube.com/c/yannickilcher.
Twitter: https://twitter.com/ykilcher.
Discord: https://ykilcher.com/discord.
LinkedIn: https://www.linkedin.com/in/ykilcher.

If you want to support me, the best thing to do is to share out the content smile

If you want to support me financially (completely optional and voluntary, but a lot of people have asked for this):
SubscribeStar: https://www.subscribestar.com/yannickilcher.
Patreon: https://www.patreon.com/yannickilcher.
Bitcoin (BTC): bc1q49lsw3q325tr58ygf8sudx2dqfguclvngvy2cq.
Ethereum (ETH): 0x7ad3513E3B8f66799f507Aa7874b1B0eBC7F85e2
Litecoin (LTC): LQW2TRyKYetVC8WjFkhpPhtpbDM4Vw7r9m.
Monero (XMR): 4ACL8AGrEo5hAir8A9CeVrW8pEauWvnp1WnSDZxW7tziCDLhZAGsgzhRQABDnFy8yuM9fWJDviJPHKRjV4FWt19CJZN9D4n

Hackers Loot Blockchain Bridge for Millions In “Frenzied Free For All”

On Monday, hackers exploited a basic vulnerability in the code of Nomad — a crypto “bridge” that allows customers to transfer cryptocurrencies between different blockchains — getting away with roughly $190 million in user investments, CNBC reports.

This hack is just the latest in a string of attacks on crypto bridges, platforms that, according to CNBC, have collectively lost more than $1 billion to hackers in 2022 alone.

Given that Nomad markets itself as a “secure” platform, the company definitely has a lot of explaining to do.

/* */