DCG 201
banner
dcg201.bsky.social
DCG 201
@dcg201.bsky.social
Dirty Jersey Represent! We meet in Jersey City once a month to work on hardware/software projects! Part of DEFCON Groups. DMs open.
CFP: info @ http://defcon201.org
Deetz: https://linktr.ee/defcon201
Pinned
BOOTSTRAP 🥾: SUCCESSFUL

DEPENDENCIES 💾: INSTALLED

NETWORK 📡 : CONNECTED

CONTENT 👨🏾‍💻:

█████████████████▒▒▒▒

89%

IMPORTANT & EXCITING #DCG201 ANNOUNCEMENTS LATER TODAY

#weareback #hacktheplanet

@defcon.bsky.social @dcgvr.bsky.social
aisadelrith is the twitter name of the person shown in the dark
ALT: aisadelrith is the twitter name of the person shown in the dark
media.tenor.com
Reposted by DCG 201
Not only does this violates the Constitution, it violates a number of treaties.
Inside Trump’s concentration camps; torture and disappearances by ICE. #Opdeatheaters #3E #GoodvsEvil #ICE #ICEout

www.amnesty.org/en/documents...
January 30, 2026 at 2:58 AM
Reposted by DCG 201
ICE’s tactics have been terrifying and tragic, but Minneapolis is responding in incredible ways. Residents are organizing, feeding and housing their neighbors, and putting real social infrastructure in place. What’s taking shape isn’t just a reaction, it’s a blueprint for resistance.
Minneapolis' Community-Driven Anti-ICE Organizing Is Showing The Way
What Minneapolis activists have to teach us about organizing communities to resist ICE
thinkbigpicture.substack.com
January 30, 2026 at 12:04 AM
Reposted by DCG 201
It's Data Privacy Week ✨

There's never been a better time to take back your privacy, that's why we'll be sharing new tips every day that'll help you improve your privacy & security posture. 🔒
January 28, 2026 at 6:29 AM
Reposted by DCG 201
📅 January 28th is international Data Privacy Day!

It's 2026, and your personal data privacy has never been more important. Privacy is an essential right when it comes to personal safety, upholding democracy, keeping our freedom of speech, and building community. 🧵
January 28, 2026 at 6:27 PM
Reposted by DCG 201
Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
thehackernews.com
January 22, 2026 at 5:09 PM
Reposted by DCG 201
Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks exploiting a critical authentication bypass vulnerability in the GNU InetUtils telnetd server.
Nearly 800,000 Telnet servers exposed to remote attacks
Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks exploiting a critical authentication bypass vulnerability in the GNU InetUtils telnetd server.
www.bleepingcomputer.com
January 26, 2026 at 3:19 PM
Reposted by DCG 201
Person who move to France solely to be able to avoid having to use Teams
“The French government announced that it will stop using American video conferencing platforms such as Microsoft Teams and Zoom, and replace them with Visio, a French platform.”
Zoom Is the First Casualty in France's War on American Big Tech
Homebrewed video conferencing may not be a moonshot, but you gotta start somewhere.
gizmodo.com
January 27, 2026 at 9:23 PM
Reposted by DCG 201
France will ban public officials from using American platforms including Google Meet, Zoom and Teams for videoconferencing, according to a spokesperson.
France to ban officials from US video tools including Zoom, Teams
The government wants staff to shun Silicon Valley and shift to its home-grown Visio platform instead.
www.politico.eu
January 27, 2026 at 6:51 PM
Reposted by DCG 201
France to ban officials from using American video conference tools including Zoom and Teams.
France to ban officials from US video tools including Zoom, Teams
The government wants staff to shun Silicon Valley and shift to its home-grown Visio platform instead.
www.politico.eu
January 27, 2026 at 8:24 PM
Reposted by DCG 201
There are so many elements of this story that are shocking, but these two stand-out:

1) CBP wrote its own Q&A to Congress. Then declined to answer multiple of their own Qs...

2) The vast contradictions between their report and the narrative first put out by this administration.
bit.ly/3McseZt
Read the Report on Alex Pretti’s Killing — and the Bizarre Q&A CBP Gave Congress First
Congress pressed for a report on Alex Pretti’s killing. CBP supplied answers to a list of questions — questions that CBP had written itself.
theintercept.com
January 28, 2026 at 10:19 PM
Reposted by DCG 201
There's a special PAC-MAN-themed exhibit currently on display at The Paley Center, and we got early access to check it out. Is it worth the visit? Let's just say that after going, we have PAC-MAN fever! #pacman #retro #retrogaming #nyc #tech
January 28, 2026 at 10:33 PM
Reposted by DCG 201
"They got working whites to hate the very people that want them to have more pay, clean air, water, healthcare and power to fight back against big banks & corps"

Billionaires, Charlie Kirk, "Murdoch’s role in destabilizing democracy in North America, Europe Australia
www.nytimes.com/interactive/...
January 28, 2026 at 7:37 PM
Reposted by DCG 201
January 28, 2026 at 5:33 PM
Reposted by DCG 201
MinnMax is teaming up with @giantbomb.bsky.social this Friday at 5pm Central for an ICE Out charity stream from our studio in Minneapolis.

It'll be simulcast on all channels...

www.twitch.tv/minnmaxshow
www.youtube.com/minnmax
www.twitch.tv/giantbomb
www.youtube.com/giantbomb
January 27, 2026 at 6:40 PM
Reposted by DCG 201
So initial experiments with Open AI's vibe-coding science tool Prism are going about as well as expected.
January 27, 2026 at 10:42 PM
Reposted by DCG 201
Gods this is literally the thing that reddit thread I mentioned the other day was about. Way too many people I’ve met in tech have a moral framework where their ethical evaluation of what harms they will contribute to start and end with whether the code they wrote excels at the task they were given.
“In a Saturday thread on Slack discussing [Alex] Pretti’s killing, Palantir workers questioned both the ethics and the business logic of continuing the company’s work with ICE,” while Palantir’s internal wiki states their commitment to providing “the best software for the job.”
Palantir Defends Work With ICE to Staff Following Killing of Alex Pretti
“In my opinion ICE are the bad guys. I am not proud that the company I enjoy so much working for is part of this,” one worker wrote on Slack.
www.wired.com
January 27, 2026 at 5:01 PM
Reposted by DCG 201
“In a Saturday thread on Slack discussing [Alex] Pretti’s killing, Palantir workers questioned both the ethics and the business logic of continuing the company’s work with ICE,” while Palantir’s internal wiki states their commitment to providing “the best software for the job.”
Palantir Defends Work With ICE to Staff Following Killing of Alex Pretti
“In my opinion ICE are the bad guys. I am not proud that the company I enjoy so much working for is part of this,” one worker wrote on Slack.
www.wired.com
January 27, 2026 at 4:32 PM
Reposted by DCG 201
G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload
G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload
On January 23rd, 2026, security researchers discovered a dangerous npm package named ansi-universal-ui that disguised itself as a legitimate user interface component library. The deceptive package description claimed to offer a lightweight UI system for modern web applications. However, beneath this innocent facade lay G_Wagon, a highly sophisticated multi-stage information stealer designed to harvest sensitive data from victims’ computers. G_Wagon operates as a complex attack framework that downloads its own Python runtime and executes heavily obfuscated code to extract browser credentials, cryptocurrency wallet data, cloud credentials, and messaging tokens. The malware uses an embedded Windows DLL injected directly into browser processes through native NT APIs, demonstrating advanced technical capabilities. The stolen information gets exfiltrated to Appwrite storage buckets controlled by the attackers. The infection process reveals careful planning. When users installed ansi-universal-ui, a postinstall hook triggered the malicious code automatically. The dropper component fetches a Python payload from command and control servers, pipes it through stdin to avoid writing files to disk, and executes the destructive stealer in memory. Aikido analysts and researchers identified the malware after observing version iterations and tracking the attack development across multiple package releases between January 21st and January 23rd. Detection Evasion Through Continuous Evolution What makes G_Wagon particularly concerning is its rapid evolution and sophisticated evasion techniques. The attackers published ten package versions over two days, progressively refining their approach. Early versions included a simple placeholder script to test the dropper infrastructure. By version 1.3.5, they added legitimate-looking branding with detailed README files describing fictional components like a “Virtual Rendering Engine” and “ThemeProvider.” The attackers gradually enhanced obfuscation across later versions. Version 1.4.1 introduced hex-encoded command and control URLs, split into chunks to evade pattern matching. They renamed directories from python_runtime to lib_core/renderer and changed variable names from pythonCode to _texture_data, making the code resemble graphics rendering instead of malware. They also switched to piping payloads through stdin rather than creating files, leaving no forensic artifacts on disk for investigators to recover. This continuous refinement demonstrates an active threat actor learning from their implementation. They fixed bugs within eighteen minutes of discovering issues, moved between different command and control endpoints, and progressively added anti-forensics capabilities including automatic payload deletion. Organizations should immediately remove the malicious package versions 1.3.5 through 1.4.1, rotate all stored browser passwords, revoke cryptocurrency wallet extensions, and regenerate cloud provider credentials. Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload appeared first on Cyber Security News .
cybersecuritynews.com
January 27, 2026 at 5:07 PM
Reposted by DCG 201
A federal agent allegedly tried to enter Google’s Cambridge campus in the fall, WIRED has learned. Now, staffers want policies that protect them from immigration officials. www.wired.com/story/google...
Google DeepMind Staffers Ask Leaders to Keep Them ‘Physically Safe’ From ICE
A federal agent allegedly tried to enter Google’s Cambridge campus in the fall, WIRED has learned. Now, staffers want policies that protect them from immigration officials.
www.wired.com
January 27, 2026 at 5:07 PM
Reposted by DCG 201
“This is a preschool you stupid motherf*ckers!”

(From Somali Snaps)
January 27, 2026 at 5:08 PM
Reposted by DCG 201
Oh, so _that's_ what they mean by "riding shotgun"!
January 26, 2026 at 10:18 AM
Reposted by DCG 201
oh my god he's BOP. A fucking prison guard like those knuckleheads Trump bussed into DC in 2020 where none of their gear matched
January 26, 2026 at 5:53 AM