8e
Johnson
8e0049085bf55b5b9d07e8624fe082dc6e2a2ad1f40d8458f523b39dcf3e1801

📰 Today's Top 21 Hacker News Stories (Sorted by Score) 📰

----------------------------------------

🔖 Title: My 16-month theanine self-experiment

🔗 URL: https://dynomight.net/theanine/

👍 Score: [640]

💬 Discussion: https://news.ycombinator.com/item?id=43305803

----------------------------------------

🔖 Title: The DOJ still wants Google to sell off Chrome

🔗 URL: https://www.wired.com/story/the-doj-still-wants-google-to-divest-chrome/

👍 Score: [436]

💬 Discussion: https://news.ycombinator.com/item?id=43299886

----------------------------------------

🔖 Title: It is as if you were on your phone

🔗 URL: https://pippinbarr.com/it-is-as-if-you-were-on-your-phone/info/

👍 Score: [300]

💬 Discussion: https://news.ycombinator.com/item?id=43308994

----------------------------------------

🔖 Title: Presenterm: Markdown Slideshows in the Terminal

🔗 URL: https://github.com/mfontanini/presenterm

👍 Score: [260]

💬 Discussion: https://news.ycombinator.com/item?id=43303752

----------------------------------------

🔖 Title: Layoffs Don't Work

🔗 URL: https://thehustle.co/originals/why-layoffs-dont-work

👍 Score: [234]

💬 Discussion: https://news.ycombinator.com/item?id=43307755

----------------------------------------

🔖 Title: Gleam v1.9

🔗 URL: https://gleam.run/news/hello-echo-hello-git/

👍 Score: [166]

💬 Discussion: https://news.ycombinator.com/item?id=43307987

----------------------------------------

🔖 Title: Building an open-source Wi-Fi Mac layer for the ESP32

🔗 URL: https://esp32-open-mac.be

👍 Score: [146]

💬 Discussion: https://news.ycombinator.com/item?id=43304962

----------------------------------------

🔖 Title: Goravel: A Go framework inspired by Laravel

🔗 URL: https://www.goravel.dev

👍 Score: [121]

💬 Discussion: https://news.ycombinator.com/item?id=43306797

----------------------------------------

🔖 Title: Europe bets once again on RISC-V for supercomputing

🔗 URL: https://www.theregister.com/2025/03/07/dare_europe_risc_v_project/

👍 Score: [99]

💬 Discussion: https://news.ycombinator.com/item?id=43311091

----------------------------------------

🔖 Title: Online Embedded Rust Simulator

🔗 URL: https://wokwi.com/rust

👍 Score: [99]

💬 Discussion: https://news.ycombinator.com/item?id=43305973

----------------------------------------

🔖 Title: A Post Mortem on the Gino Case

🔗 URL: https://statmodeling.stat.columbia.edu/2025/03/08/a-post-mortem-on-the-gino-case-committing-fraud-is-right-now-a-viable-career-strategy-that-can-propel-you-at-the-top-of-the-academic-world/

👍 Score: [98]

💬 Discussion: https://news.ycombinator.com/item?id=43306435

----------------------------------------

🔖 Title: Improving on std:count_if()'s auto-vectorization

🔗 URL: https://nicula.xyz/2025/03/08/improving-stdcountif-vectorization.html

👍 Score: [82]

💬 Discussion: https://news.ycombinator.com/item?id=43302394

----------------------------------------

🔖 Title: Magnesium Self-Experiments

🔗 URL: https://gwern.net/nootropic/magnesium

👍 Score: [81]

💬 Discussion: https://news.ycombinator.com/item?id=43306599

----------------------------------------

🔖 Title: Show HN: Evolving Agents Framework

🔗 URL: https://github.com/matiasmolinas/evolving-agents

👍 Score: [62]

💬 Discussion: https://news.ycombinator.com/item?id=43310963

----------------------------------------

🔖 Title: Orange Pi RV2 is a single-board PC with an 8-core RISC-V processor

🔗 URL: https://liliputing.com/orange-pi-rv2-is-a-single-board-pc-with-an-8-core-risc-v-processor/

👍 Score: [59]

💬 Discussion: https://news.ycombinator.com/item?id=43309376

----------------------------------------

🔖 Title: 16-Bit to 1-Bit: Visual KV Cache Quantization for Efficient Multimodal LLMs

🔗 URL: https://arxiv.org/abs/2502.14882

👍 Score: [54]

💬 Discussion: https://news.ycombinator.com/item?id=43268477

----------------------------------------

🔖 Title: Nickel superconductor works above -233°C threshold at normal pressure

🔗 URL: https://phys.org/news/2025-02-nickel-superconductor-233c-threshold-pressure.html

👍 Score: [51]

💬 Discussion: https://news.ycombinator.com/item?id=43311610

----------------------------------------

🔖 Title: PurrCrypt: Steganographic encryption disguised as pet sounds

🔗 URL: https://github.com/vxfemboy/purrcrypt

👍 Score: [51]

💬 Discussion: https://news.ycombinator.com/item?id=43284927

----------------------------------------

🔖 Title: Mako: Fast, production-grade web bundler

🔗 URL: https://makojs.dev/

👍 Score: [43]

💬 Discussion: https://news.ycombinator.com/item?id=43310047

----------------------------------------

🔖 Title: Global coffee trade grinding to a halt, hit hard by brutal price hikes

🔗 URL: https://www.reuters.com/markets/commodities/global-coffee-trade-grinding-halt-hit-hard-by-brutal-prices-hikes-2025-03-07/

👍 Score: [43]

💬 Discussion: https://news.ycombinator.com/item?id=43312034

----------------------------------------

🔖 Title: Show HN: C++ AWS MSK IAM Auth Implementation – Goodbye Kafka Passwords

🔗 URL: https://github.com/timeplus-io/proton/blob/develop/src/IO/Kafka/AwsMskIamSigner.cpp

👍 Score: [32]

💬 Discussion: https://news.ycombinator.com/item?id=43284293

----------------------------------------

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

Due mesi alla RHC Conference 2025! Grazie ai nostri Sponsor per aver reso questo evento possibile!

Mancano solo due mesi alla quarta edizione della Red Hot Cyber Conference 2025, l’evento annuale gratuito organizzato dalla community di Red Hot Cyber. La conferenza si terrà a Roma, come lo scorso anno presso il Teatro Italia in Via Bari 18, nelle giornate di giovedì 8 e venerdì 9 maggio 2025.

Questo appuntamento è diventato un punto di riferimento nel panorama italiano della sicurezza informatica, dell’intelligenza artificiale e dell’innovazione tecnologica, con l’obiettivo di sensibilizzare il pubblico sui rischi del digitale e promuovere la cultura della cybersecurity, soprattutto tra i più giovani.

La community di Red Hot Cyber, fondata nel 2019 da Massimiliano Brolli, si dedica alla diffusione di informazioni, notizie e ricerche su temi legati alla sicurezza informatica, all’intelligence e all’Information Technology. Con la convinzione che la condivisione della conoscenza e la collaborazione siano fondamentali per affrontare le sfide del cyberspazio, RHC si impegna attivamente nella promozione di una cultura della sicurezza, incoraggiando il pensiero critico e stimolando l’interesse per le discipline informatiche tra i giovani.

Programma della Red Hot Cyber Conference 2025

Registrazione per la sola giornata di Giovedì 8 Maggio (Workshop e Capture The Flag)

Registrazione per la sola giornata di Venerdì 9 Maggio (Conferenza)

Regolamento per la Capture The Flag (CTF)

Accoglienza alla Red Hot Cyber Conference 2024 Una Prima Giornata Dedicata Esclusivamente Ai Giovani

Come ogni anno, la prima giornata della conferenza sarà interamente dedicata ai giovani, in particolare agli studenti delle scuole medie e superiori, per avvicinarli al mondo dell’information technology e della sicurezza informatica. A differenza degli scorsi anni, i Workshop saranno accessibili solo alla giornata di Giovedì 8 maggio.

I workshop hands-on – anche questo anno organizzati con il supporto di Accenture – saranno il cuore pulsante della giornata: prima spiegheremo ai ragazzi come si fa qualcosa, poi gli daremo la possibilità di rifarlo direttamente loro stessi sui loro laptop. Questo approccio pratico e interattivo è pensato per stimolare l’interesse verso il mondo della tecnologia e della cybersecurity e fornire un’opportunità unica di toccare con mano la tecnologia.

Il Cane SPOT della Boston Dynamics all’interno dei Workshop “hands-on” della Red Hot Cyber Conference 2024

Invitiamo i ragazzi delle scuole medie, superiori ed Università a registrarsi alla conferenza, affinché possano vivere un’esperienza formativa concreta e immersiva.

Ma la prima giornata non sarà solo formazione: anche quest’anno si terrà la Capture The Flag (CTF), una competizione per hacker etici provenienti da tutta Italia. I partecipanti si sfideranno in una serie di prove pratiche di cybersecurity, hacking etico e problem-solving, accumulando punteggi per scalare la classifica e vincere la challenge.

Una CTF è una competizione di cybersecurity in cui i partecipanti devono risolvere sfide di sicurezza informatica per trovare e “catturare” delle flag, ovvero dei codici nascosti all’interno di vari scenari digitali. La CTF di RHC si svolgerà in un ambiente sicuro e controllato, offrendo a giovani hacker l’opportunità di mettere alla prova le proprie capacità, imparare nuove tecniche e confrontarsi con altri appassionati del settore.

Programma della Red Hot Cyber Conference 2025

Registrazione per la sola giornata di Giovedì 8 Maggio (Workshop e Capture The Flag)

Registrazione per la sola giornata di Venerdì 9 Maggio (Conferenza)

Regolamento per la Capture The Flag (CTF)

Capture The Flag (CTF) della Red Hot Cyber Conference 2024 Una Seconda Giornata All’Insegna Della Conferenza

Se la prima giornata sarà focalizzata sui giovani e sulla formazione pratica, la seconda giornata della Red Hot Cyber Conference 2025 sarà dedicata esclusivamente alla conferenza, con una serie di speech di alto livello interamente in lingua italiana.

Esperti di sicurezza informatica, information technology e innovazione digitale si alterneranno sul palco con interventi di eccezione, affrontando temi come l’hacking, l’intelligenza artificiale applicata alla cybersecurity, la sicurezza del cloud e delle infrastrutture critiche, le guerre informatiche, la geopolitica e le strategie di difesa digitale, oltre all’evoluzione del crimine informatico.

Panel alla Red Hot Cyber Conference 2024. Da Sinistra a destr: Dott. Mario Nobile Direttore Generale di AGID, l’agenzia per l’Italia digitale, Dott. Umberto Rosini, Direttore Sistemi Informativi alla Presidenza del Consiglio dei Ministri – Dipartimento della Protezione Civile, Dott. Paolo Galdieri: Avvocato penalista, Cassazionista, è Docente universitario di Diritto penale dell’informatica, Ing. David Cenciotti: Giornalista aerospaziale, ex ufficiale dell’AM, ingegnere informatico ed esperto di cybersecurity

La giornata si aprirà con un panel istituzionale di alto livello, in cui esperti giuridici, rappresentanti delle istituzioni e professionisti del settore discuteranno di strategie e normative per la protezione digitale del Paese. Il tema del panel sarà “IL FUTURO DELLA CYBERSICUREZZA IN ITALIA – STRATEGIE PER LA PROSSIMA ERA DIGITALE”, un dibattito cruciale su come l’Italia si sta preparando ad affrontare le nuove minacce cyber, con un focus su regolamentazione, prevenzione e strategie nazionali per rafforzare la sicurezza digitale.

La Red Hot Cyber Conference 2025 sarà un’occasione unica per confrontarsi con i maggiori esperti del settore, approfondire i temi più attuali della sicurezza informatica e comprendere come il nostro Paese può affrontare le sfide digitali del futuro.

Programma della Red Hot Cyber Conference 2025

Registrazione per la sola giornata di Giovedì 8 Maggio (Workshop e Capture The Flag)

Registrazione per la sola giornata di Venerdì 9 Maggio (Conferenza)

Regolamento per la Capture The Flag (CTF)

Una inquadratura dei partecipanti alla Capture The Flag Tutto Questo grazie Ai Nostri Sponsor

La realizzazione di questo evento non sarebbe possibile senza il prezioso supporto dei nostri sponsor. La loro collaborazione è fondamentale per offrire un’esperienza formativa e coinvolgente a tutti i partecipanti.

Sponsor Sostenitori Workshop

Accenture Italia

Sponsor Sostenitori

Fortinet

TrendMicro

Fata Informatica

Digital Value Cybersecurity

Enterprise

Akamai

Crowdstrike

Sponsor Platinum

ITCentric

OPLIUM

Tinexta Cyber

Ermetix

S3K

Digimat

Sponsor Gold

IAD

Olympos Consulting

CheckPoint technologies

Ancharia

Elmi

Utilia

Sponsor Silver

Recorded Future

Delfi Security

Cyber Evolution

BraiIT

Inoltre ringraziamo tutti i nostri media Partner che sono i Fintech Awards, i Cyber Actors, Women 4 Cyber, Digital Security Summit, GDPR Day, E-Campus Università, Hackmageddon, CyberSecurityUP, Federazione Italiana Combattenti, Ri-Creazione, Aipsi e RedHotCyber Academy.

Invitiamo tutte le aziende interessate a sostenere la Red Hot Cyber Conference 2025 a contattarci per informazioni sui pacchetti di sponsorizzazione ancora disponibili. La vostra partecipazione contribuirà a promuovere la cultura della sicurezza informatica e a formare i professionisti del futuro.

Programma della Red Hot Cyber Conference 2025

Registrazione per la sola giornata di Giovedì 8 Maggio (Workshop e Capture The Flag)

Registrazione per la sola giornata di Venerdì 9 Maggio (Conferenza)

Regolamento per la Capture The Flag (CTF)

Non perdete l’opportunità di essere parte di questo importante appuntamento nel mondo della cybersecurity!

Dei ragazzi riprendono il workshop “hands on” Ragazzi che stanno seguendo i workshop “hands-on”Francesco Conti, Luca Vinciguerra e Salvatore RIcciardi del gruppo AI di Red Hot Cyber presentano il workshop “COME CREARE UN SISTEMA DI FACE RECOGNITION CON LE AI” Andrea Tassotti di CyberSecurityUP presenta il workshop “COME HACKERARE UN ESEGUIBILE ELUDENDO CONTROLLI APPLICATIVI” Immagine dei Ragazzi che giocano alla Capture The Flag Immagine dei Ragazzi che giocano alla Capture The Flag Immagine dei Ragazzi che giocano alla Capture The Flag Una inquadratura dei partecipanti alla Capture The Flag Platea alla Red Hot Cyber Conference 2024 Ingresso di SPOT della Boston Dynamics alla Red Hot Cyber Conference 2024 Pranzo alla Red Hot Cyber Conference 2024 Una inquadratura dei partecipanti alla CTF sulla seconda scalinata del teatro Una foto dello STAFF Al completo della Red Hot Cyber Conference 2024

L'articolo Due mesi alla RHC Conference 2025! Grazie ai nostri Sponsor per aver reso questo evento possibile! proviene da il blog della sicurezza informatica.

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

Replying to b8058b7b...

nostr:nprofile1qy3hwumn8ghj7un9d3shjtt5v4ehgmn9wshxkwrn9ekxz7t9wgejumn9waesqg9cqk9hh0wney6lrqzkyn2s4xyfg48palredp53ep8lmyxegc3wncaqxh7s

?resize=1200,800

CrowdStrike says a hacker had access to PowerSchool's internal system as far back as August. © 2024 TechCrunch. All rights reserved. For personal use only.

https://techcrunch.com/2025/03/10/hacker-accessed-powerschools-network-months-before-massive-december-breach/

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

Replying to Avatar Layer3.news

nostr:nprofile1qy3hwumn8ghj7un9d3shjtt5v4ehgmn9wshxkwrn9ekxz7t9wgejumn9waesqg9cqk9hh0wney6lrqzkyn2s4xyfg48palredp53ep8lmyxegc3wncaqxh7s

HACKER ACCESSED POWERSCHOOL’S NETWORK MONTHS BEFORE MASSIVE DECEMBER BREACH

?resize=1200,800

--

✍️ CrowdStrike has discovered that a hacker had access to PowerSchool's internal system since August.

--

👉 Hacker had access to PowerSchool's internal system since August

👉 Investigation is still ongoing

👉 Unclear how hacker gained access to the system

👉 Unknown if data was compromised

--

#technology

--

nostr:nevent1qvzqqqqqqypzpwq93damm57fxhccq43y659f3z29fc00c7tgdywgfl7epk2xyt57qy3hwumn8ghj7un9d3shjtt5v4ehgmn9wshxkwrn9ekxz7t9wgejumn9waesqgqd3053skndtfzfx43v4jpcqm77evmug6r26a2dj30c26rffalswqg22zl6

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

Replying to c2ed5c40...

nostr:nprofile1qy3hwumn8ghj7un9d3shjtt5v4ehgmn9wshxkwrn9ekxz7t9wgejumn9waesqg9cqk9hh0wney6lrqzkyn2s4xyfg48palredp53ep8lmyxegc3wncaqxh7s

✍️ CrowdStrike has discovered that a hacker had access to PowerSchool's internal system since August.

👉 Hacker had access to PowerSchool's internal system since August

👉 Investigation is still ongoing

👉 Unclear how hacker gained access to the system

👉 Unknown if data was compromised

#technology

nostr:nevent1qvzqqqqqqypzpwq93damm57fxhccq43y659f3z29fc00c7tgdywgfl7epk2xyt57qy3hwumn8ghj7un9d3shjtt5v4ehgmn9wshxkwrn9ekxz7t9wgejumn9waesqgqd3053skndtfzfx43v4jpcqm77evmug6r26a2dj30c26rffalswqg22zl6

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

Elon Musk denuncia ataque hacker massivo contra X

O empresário sul-africano https://revistaoeste.com/tag/elon-musk/

denunciou nesta segunda-feira, 10, que está ocorrendo um "grande ataque cibernético massivo contra o X".

O empresário sul-africano Elon Musk, dono do X | Fotos: Kevin Lamarque/Reuters

Na postagem, Musk salientou que esse ataque hacker é maior do que o normal.

Saiba mais: https://revistaoeste.com/tecnologia/a-rede-social-x-esta-fora-do-ar-usuarios-relatam-problemas/

“Somos atacados todos os dias, mas isso foi feito com muitos recursos. Ou um grande grupo ou um país está envolvido".

Grupo hacker anunciou ataque contra X

De acordo com a Newsweek, em uma postagem pública no Telegram, o grupo de hackers chamado "Dark Storm Team" assumiu a responsabilidade por um ataque DDoS na rede social, essencialmente bloqueando o acesso em quase todo o planeta.

Saiba mais: https://revistaoeste.com/politica/stf-esclarece-o-que-houve-com-a-conta-de-alexandre-de-moraes-no-x/

A Dark Storm Team é conhecida por seus sofisticados ataques de guerra cibernética e ataques de hackers em sistemas de alta segurança.

De acordo com a Orange Cyberdefense, o grupo foi formado em 2023 e tem um foco pró-palestino.

Saiba mais: https://revistaoeste.com/mundo/tesla-empresa-de-elon-musk-tem-lojas-atacadas-nos-eua/

No mês passado, o grupo postou em seu blog uma postagem prometendo desencadear uma onda de ataques cibernéticos em sites governamentais de países da OTAN, Israel e nações que apoiam Israel.

O X, antigo Twitter, caiu por volta das 10h desta manhã e ficou inacessível para a maioria dos países do mundo.

O post https://revistaoeste.com/mundo/elon-musk-ataque-hacker-contra-x/

.

https://revistaoeste.com/mundo/elon-musk-ataque-hacker-contra-x/

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

Replying to Avatar Decrypt

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

Replying to Avatar Layer3.news

nostr:nprofile1qy3hwumn8ghj7un9d3shjtt5v4ehgmn9wshxkwrn9ekxz7t9wgejumn9waesqgp2xxkjwclvq23ath8wunczcrxzqrv9dkag8vj8prufrujh4gaa95mzysv4

X OUTAGE LINKED TO DARK STORM HACKER GROUP AS ELON MUSK CONFIRMS 'MASSIVE CYBERATTACK'

--

✍️ Elon Musk's social network X was hit by at least three distributed denial of service attacks on Monday, taking the site down intermittently worldwide.

--

👉 X was hit by at least three distributed denial of service attacks on Monday

👉 The attacks were reported to be carried out by the hacking group Dark Storm

👉 The attacks flooded the site with excessive traffic, overwhelming its resources

👉 The attacks affected 57% of X users, with 32% of those affected using the X mobile app

--

#ElonMusk #technology

--

nostr:nevent1qvzqqqqqqypzq23345nk8mqz502aemhy7qkqessqmptdh2pmy3cglzgly4a280fdqy3hwumn8ghj7un9d3shjtt5v4ehgmn9wshxkwrn9ekxz7t9wgejumn9waesqg9zfflu0jayz8xlltk9dwdfprp62l66q70hatk3eauxakl2htzj0s6kxdxt

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction