Chibi✨
@chibi.nakanod.net
@nakanod.net がブックマークしたページを投稿するよ
I post web pages @nakanod.net has bookmarked
I post web pages @nakanod.net has bookmarked
Summary of the Amazon DynamoDB Service Disruption in Northern Virginia (US-EAST-1) Region
https://aws.amazon.com/message/101925/
https://aws.amazon.com/message/101925/
Summary of the Amazon DynamoDB Service Disruption in Northern Virginia (US-EAST-1) Region
aws.amazon.com
October 23, 2025 at 9:34 AM
Summary of the Amazon DynamoDB Service Disruption in Northern Virginia (US-EAST-1) Region
https://aws.amazon.com/message/101925/
https://aws.amazon.com/message/101925/
Introducing Updog.ai: Real-time provider status from Datadog | Datadog
https://www.datadoghq.com/blog/updog-ai/
https://www.datadoghq.com/blog/updog-ai/
Introducing Updog.ai: Real-time provider status from Datadog | Datadog
Check the real-time health of major SaaS providers and AWS services with Updog.ai, a new public resource powered by Datadog observability data and AI.
www.datadoghq.com
October 23, 2025 at 3:45 AM
Introducing Updog.ai: Real-time provider status from Datadog | Datadog
https://www.datadoghq.com/blog/updog-ai/
https://www.datadoghq.com/blog/updog-ai/
Introducing ChatGPT Atlas | OpenAI
https://openai.com/index/introducing-chatgpt-atlas/
https://openai.com/index/introducing-chatgpt-atlas/
Introducing ChatGPT Atlas | OpenAI
The browser with ChatGPT built in.
openai.com
October 22, 2025 at 3:50 AM
Introducing ChatGPT Atlas | OpenAI
https://openai.com/index/introducing-chatgpt-atlas/
https://openai.com/index/introducing-chatgpt-atlas/
Weaponizing Discord for Command and Control Across npm, PyPI...
https://socket.dev/blog/weaponizing-discord-for-command-and-control
https://socket.dev/blog/weaponizing-discord-for-command-and-control
Weaponizing Discord for Command and Control Across npm, PyPI...
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
socket.dev
October 21, 2025 at 9:33 AM
Weaponizing Discord for Command and Control Across npm, PyPI...
https://socket.dev/blog/weaponizing-discord-for-command-and-control
https://socket.dev/blog/weaponizing-discord-for-command-and-control
Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances | Amazon Web Services
https://aws.amazon.com/blogs/aws/introducing-new-compute-optimized-amazon-ec2-c8i-and-c8i-flex-instances/
https://aws.amazon.com/blogs/aws/introducing-new-compute-optimized-amazon-ec2-c8i-and-c8i-flex-instances/
Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances | Amazon Web Services
AWS launched compute-optimized C8i and C8i-flex EC2 instances powered by custom Intel Xeon 6 processors available only on AWS to offer up to 15% better price performance, 20% higher performance, and 2.5 times more memory throughput compared to previous generations.
aws.amazon.com
October 7, 2025 at 6:44 AM
Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances | Amazon Web Services
https://aws.amazon.com/blogs/aws/introducing-new-compute-optimized-amazon-ec2-c8i-and-c8i-flex-instances/
https://aws.amazon.com/blogs/aws/introducing-new-compute-optimized-amazon-ec2-c8i-and-c8i-flex-instances/
GitHub - AikidoSec/safe-chain
https://github.com/AikidoSec/safe-chain
https://github.com/AikidoSec/safe-chain
GitHub - AikidoSec/safe-chain
Contribute to AikidoSec/safe-chain development by creating an account on GitHub.
github.com
September 18, 2025 at 9:33 AM
GitHub - AikidoSec/safe-chain
https://github.com/AikidoSec/safe-chain
https://github.com/AikidoSec/safe-chain
S1ngularity/nx attackers strike again
https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again
https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again
S1ngularity/nx attackers strike again
The attackers behind the nx attack have struck again, targeting a large amount of packages, with a first-of-its-kind worm payload.
www.aikido.dev
September 18, 2025 at 9:32 AM
S1ngularity/nx attackers strike again
https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again
https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again
npmパッケージ/GitHub Actionsを利用する側/公開する側でサプライチェーン攻撃を防ぐためにやることメモ
https://zenn.dev/azu/articles/ad168118524135
https://zenn.dev/azu/articles/ad168118524135
npmパッケージ/GitHub Actionsを利用する側/公開する側でサプライチェーン攻撃を防ぐためにやることメモ
zenn.dev
September 10, 2025 at 9:31 AM
npmパッケージ/GitHub Actionsを利用する側/公開する側でサプライチェーン攻撃を防ぐためにやることメモ
https://zenn.dev/azu/articles/ad168118524135
https://zenn.dev/azu/articles/ad168118524135
Booking.com phishing campaign uses sneaky 'ん' character to trick you
https://www.bleepingcomputer.com/news/security/bookingcom-phishing-campaign-uses-sneaky-character-to-trick-you/
https://www.bleepingcomputer.com/news/security/bookingcom-phishing-campaign-uses-sneaky-character-to-trick-you/
Booking.com phishing campaign uses sneaky 'ん' character to trick you
Threat actors are leveraging a Unicode character to make phishing links appear like legitimate Booking.com links in a new campaign distributing malware. The attack makes use of the Japanese hiragana character, ん, which can, on some systems, appear as a forward slash and make a phishing URL appear realistic to a person at first.
www.bleepingcomputer.com
August 29, 2025 at 6:44 AM
Booking.com phishing campaign uses sneaky 'ん' character to trick you
https://www.bleepingcomputer.com/news/security/bookingcom-phishing-campaign-uses-sneaky-character-to-trick-you/
https://www.bleepingcomputer.com/news/security/bookingcom-phishing-campaign-uses-sneaky-character-to-trick-you/
ghrc.io Appears to be Malicious
https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/
https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/
ghrc.io Appears to be Malicious
A simple typo of ghcr.io to ghrc.io would normally be a small goof.
You’d typically get a 404 or similar error, finally work out the issue, fix it, and move along.
But in this case, that typo appears to be doing something very malicious, stealing GitHub credentials.
What’s ghcr.io?
First, a quick bit of background.
ghcr.io is an OCI conformant registry for container images and OCI artifacts used by a lot of projects.
It’s part of GitHub and is a very popular image and artifact repository used by open source projects.
bmitch.net
August 29, 2025 at 6:43 AM
ghrc.io Appears to be Malicious
https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/
https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/
脆弱性診断内製化ガイド | デジタル人材の育成 | IPA 独立行政法人 情報処理推進機構
https://www.ipa.go.jp/jinzai/ics/core_human_resource/final_project/2025/Vulnerability-assessment.html
https://www.ipa.go.jp/jinzai/ics/core_human_resource/final_project/2025/Vulnerability-assessment.html
脆弱性診断内製化ガイド | デジタル人材の育成 | IPA 独立行政法人 情報処理推進機構
情報処理推進機構(IPA)の「脆弱性診断内製化ガイド」に関する情報です。
www.ipa.go.jp
August 5, 2025 at 4:17 AM
脆弱性診断内製化ガイド | デジタル人材の育成 | IPA 独立行政法人 情報処理推進機構
https://www.ipa.go.jp/jinzai/ics/core_human_resource/final_project/2025/Vulnerability-assessment.html
https://www.ipa.go.jp/jinzai/ics/core_human_resource/final_project/2025/Vulnerability-assessment.html
【Kiro】はじめる前に知っておくべきこと ~データプライバシー&セキュリティ編~ - サーバーワークスエンジニアブログ
https://blog.serverworks.co.jp/kiro-data-privacy-security
https://blog.serverworks.co.jp/kiro-data-privacy-security
【Kiro】はじめる前に知っておくべきこと ~データプライバシー&セキュリティ編~ - サーバーワークスエンジニアブログ
KiroのAI開発環境を安全に使うためのデータプライバシーとセキュリティ対策を解説。AWS責任共有モデルや暗号化、サービス改善のためのデータ利用について詳述。
blog.serverworks.co.jp
July 18, 2025 at 1:05 PM
【Kiro】はじめる前に知っておくべきこと ~データプライバシー&セキュリティ編~ - サーバーワークスエンジニアブログ
https://blog.serverworks.co.jp/kiro-data-privacy-security
https://blog.serverworks.co.jp/kiro-data-privacy-security
Introducing Kiro
https://kiro.dev/blog/introducing-kiro/
https://kiro.dev/blog/introducing-kiro/
Introducing Kiro
A new agentic IDE that works alongside you from prototype to production
kiro.dev
July 16, 2025 at 1:05 PM
Introducing Kiro
https://kiro.dev/blog/introducing-kiro/
https://kiro.dev/blog/introducing-kiro/
Terraform AWS provider 6.0 now generally available
https://www.hashicorp.com/en/blog/terraform-aws-provider-6-0-now-generally-available
https://www.hashicorp.com/en/blog/terraform-aws-provider-6-0-now-generally-available
Terraform AWS provider 6.0 now generally available
HashiCorp and AWS continue to support the widespread demand for standardized infrastructure lifecycle management with the Terraform AWS provider 6.0.
www.hashicorp.com
July 10, 2025 at 4:03 AM
Terraform AWS provider 6.0 now generally available
https://www.hashicorp.com/en/blog/terraform-aws-provider-6-0-now-generally-available
https://www.hashicorp.com/en/blog/terraform-aws-provider-6-0-now-generally-available
Terraform AWS Provider version 6がリリースされ、複数リージョンへの展開がかなり簡単になりました | DevelopersIO
https://dev.classmethod.jp/articles/terraform-aws-provider-version-6/
https://dev.classmethod.jp/articles/terraform-aws-provider-version-6/
Terraform AWS Provider version 6がリリースされ、複数リージョンへの展開がかなり簡単になりました | DevelopersIO
dev.classmethod.jp
July 10, 2025 at 4:02 AM
Terraform AWS Provider version 6がリリースされ、複数リージョンへの展開がかなり簡単になりました | DevelopersIO
https://dev.classmethod.jp/articles/terraform-aws-provider-version-6/
https://dev.classmethod.jp/articles/terraform-aws-provider-version-6/
16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now
https://www.forbes.com/sites/daveywinder/2025/06/19/16-billion-apple-facebook-google-passwords-leaked---change-yours-now/
https://www.forbes.com/sites/daveywinder/2025/06/19/16-billion-apple-facebook-google-passwords-leaked---change-yours-now/
16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now
Change all your account passwords now — don’t wait: 16 billion credentials are confirmed as having been leaked.
www.forbes.com
June 20, 2025 at 6:45 AM
16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now
https://www.forbes.com/sites/daveywinder/2025/06/19/16-billion-apple-facebook-google-passwords-leaked---change-yours-now/
https://www.forbes.com/sites/daveywinder/2025/06/19/16-billion-apple-facebook-google-passwords-leaked---change-yours-now/
DevOps Tools Targeted for Cryptojacking | Wiz Blog
https://www.wiz.io/blog/jinx-0132-cryptojacking-campaign
https://www.wiz.io/blog/jinx-0132-cryptojacking-campaign
DevOps Tools Targeted for Cryptojacking | Wiz Blog
The Wiz Threat Research team has identified a widespread cryptojacking campaign targeting commonly used DevOps applications including Nomad and Consul.
www.wiz.io
June 3, 2025 at 9:36 AM
DevOps Tools Targeted for Cryptojacking | Wiz Blog
https://www.wiz.io/blog/jinx-0132-cryptojacking-campaign
https://www.wiz.io/blog/jinx-0132-cryptojacking-campaign
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
https://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers
https://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
GreyNoise uncovers a stealth campaign exploiting ASUS routers, enabling persistent backdoor access via CVE-2023-39780 and unpatched techniques. Learn how attackers evade detection, how GreyNoise discovered it with AI-powered tooling, and what defenders need to know.
www.greynoise.io
June 2, 2025 at 6:47 AM
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
https://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers
https://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin
https://thehackernews.com/2025/05/over-100000-wordpress-sites-at-risk.html
https://thehackernews.com/2025/05/over-100000-wordpress-sites-at-risk.html
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin
CVE-2025-47577 flaw in TI WooCommerce Wishlist lets unauthenticated attackers upload malicious files—no patch yet, 100K+ sites at risk.
thehackernews.com
May 29, 2025 at 9:34 AM
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin
https://thehackernews.com/2025/05/over-100000-wordpress-sites-at-risk.html
https://thehackernews.com/2025/05/over-100000-wordpress-sites-at-risk.html
GitHub MCP Exploited: Accessing private repositories via MCP
https://invariantlabs.ai/blog/mcp-github-vulnerability
https://invariantlabs.ai/blog/mcp-github-vulnerability
GitHub MCP Exploited: Accessing private repositories via MCP
We showcase a critical vulnerability with the official GitHub MCP server, allowing attackers to access private repository data. The vulnerability is among the first discovered by Invariant's security analyzer for detecting toxic agent flows.
invariantlabs.ai
May 27, 2025 at 3:36 PM
GitHub MCP Exploited: Accessing private repositories via MCP
https://invariantlabs.ai/blog/mcp-github-vulnerability
https://invariantlabs.ai/blog/mcp-github-vulnerability
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware | FortiGuard Labs
https://www.fortinet.com/blog/threat-research/multilayered-email-attack-how-a-pdf-invoice-and-geofencing-led-to-rat-malware
https://www.fortinet.com/blog/threat-research/multilayered-email-attack-how-a-pdf-invoice-and-geofencing-led-to-rat-malware
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware | FortiGuard Labs
FortiGuard Labs highlights a malware campaign's increasing sophistication of attack methodologies, leveraging the legitimate functionalities of remote administration tools for malicious purposes. L…
www.fortinet.com
May 27, 2025 at 9:34 AM
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware | FortiGuard Labs
https://www.fortinet.com/blog/threat-research/multilayered-email-attack-how-a-pdf-invoice-and-geofencing-led-to-rat-malware
https://www.fortinet.com/blog/threat-research/multilayered-email-attack-how-a-pdf-invoice-and-geofencing-led-to-rat-malware
Fake KeePass password manager leads to ESXi ransomware attack
https://www.bleepingcomputer.com/news/security/fake-keepass-password-manager-leads-to-esxi-ransomware-attack/
https://www.bleepingcomputer.com/news/security/fake-keepass-password-manager-leads-to-esxi-ransomware-attack/
Fake KeePass password manager leads to ESXi ransomware attack
Threat actors have been distributing trojanized versions of the KeePass password manager for at least eight months to install Cobalt Strike beacons, steal credentials, and ultimately, deploy ransomware on the breached network.
www.bleepingcomputer.com
May 21, 2025 at 6:45 AM
Fake KeePass password manager leads to ESXi ransomware attack
https://www.bleepingcomputer.com/news/security/fake-keepass-password-manager-leads-to-esxi-ransomware-attack/
https://www.bleepingcomputer.com/news/security/fake-keepass-password-manager-leads-to-esxi-ransomware-attack/
Introducing Codex | OpenAI
https://openai.com/index/introducing-codex/
https://openai.com/index/introducing-codex/
Introducing Codex | OpenAI
Introducing Codex: a cloud-based software engineering agent that can work on many tasks in parallel, powered by codex-1. With Codex, developers can simultaneously deploy multiple agents to independently handle coding tasks such as writing features, answering questions about your codebase, fixing bugs, and proposing pull requests for review.
openai.com
May 20, 2025 at 9:36 AM
Introducing Codex | OpenAI
https://openai.com/index/introducing-codex/
https://openai.com/index/introducing-codex/
GitHub - hashicorp/terraform-mcp-server: The Terraform MCP Server provides seamless integration with Terraform ecosystem, enabling advanced automation and interaction capabilities for Infrastructure as Code (IaC) development.
https://github.com/hashicorp/terraform-mcp-server
https://github.com/hashicorp/terraform-mcp-server
GitHub - hashicorp/terraform-mcp-server: The Terraform MCP Server provides seamless integration with Terraform ecosystem, enabling advanced automation and interaction capabilities for Infrastructure as Code (IaC) development.
The Terraform MCP Server provides seamless integration with Terraform ecosystem, enabling advanced automation and interaction capabilities for Infrastructure as Code (IaC) development. - hashicorp/...
github.com
May 20, 2025 at 9:35 AM
GitHub - hashicorp/terraform-mcp-server: The Terraform MCP Server provides seamless integration with Terraform ecosystem, enabling advanced automation and interaction capabilities for Infrastructure as Code (IaC) development.
https://github.com/hashicorp/terraform-mcp-server
https://github.com/hashicorp/terraform-mcp-server
Sophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2 | Veracode
https://www.veracode.com/resources/sophisticated-npm-attack-leveraging-unicode-steganography-and-google-calendar-c2
https://www.veracode.com/resources/sophisticated-npm-attack-leveraging-unicode-steganography-and-google-calendar-c2
Sophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2 | Veracode
Find out how a simple npm package turned into a steganography attack using Google Calendar for malicious purposes. Stay alert!
www.veracode.com
May 16, 2025 at 9:34 AM
Sophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2 | Veracode
https://www.veracode.com/resources/sophisticated-npm-attack-leveraging-unicode-steganography-and-google-calendar-c2
https://www.veracode.com/resources/sophisticated-npm-attack-leveraging-unicode-steganography-and-google-calendar-c2