hafenpanK's Avatar

hafenpanK

@hafenpank.bsky.social

für immer Punk, NIKAD JE KRAJ!, => Pöbelmaul Techie (also #nerd, so richtig doll), Streamer, Labertasche, viel zu viele Hobbies... dumme Ideen bitte hier einsenden ;)

105 Followers  |  190 Following  |  1,140 Posts  |  Joined: 31.01.2024
Posts Following

Posts by hafenpanK (@hafenpank.bsky.social)

Preview
3D-gedrucktes Fluggerät Dart fliegt Hyperschallgeschwindigkeit Hypersonix Launch Systems hat erfolgreich sein Hyperschallfluggerät Dart getestet. Dart kommt aus dem 3D-Drucker und fliegt mit Wasserstoff.

Hypersonix Launch Systems hat erfolgreich sein Hyperschallfluggerät Dart getestet. Dart kommt aus dem 3D-Drucker und fliegt mit Wasserstoff. #Luftfahrt

03.03.2026 11:42 — 👍 12    🔁 3    💬 1    📌 1

Oh ja, geil,

komm grad von nem fucking Behördentermin am Morgen,
direkt danach aufm Weg zur Arbeit (heute großes/wichtiges Meeting), erstmal von so nem clichée-Ü50-Rüdiger an der Bushalte (& DANACH AUCH NOCH IM SELBEN BUS WEITERHIN) öffentlich angefeindet worden.

Mmmh, richtig geiler Dienstag!!!
🤮

03.03.2026 08:10 — 👍 0    🔁 0    💬 0    📌 0

Den Wasserspender

02.03.2026 07:07 — 👍 2    🔁 0    💬 0    📌 0
Preview
Clouddienste: US-Diplomaten sollen Datensouveränität bekämpfen - Golem.de Die US-Regierung stört sich daran, dass Länder ihre digitale Infrastruktur von den USA abkoppeln wollen. Das behindere die Entwicklung von KI-Diensten.

Die US-Regierung stört sich daran, dass Länder ihre digitale Infrastruktur von den USA abkoppeln wollen. Das behindere die AI-Slop-Dienste www.golem.de/news/clouddi...

25.02.2026 20:56 — 👍 168    🔁 72    💬 9    📌 8

Discover our world-first gigabit-per-second laser link between aircraft and geostationary satellite 👇

26.02.2026 12:04 — 👍 94    🔁 13    💬 1    📌 2
Preview
Weiter hohe Lohnlücke zwischen Frauen und Männern Gender Pay Gap unverändert hoch: Frauen verdienen weiter 16 Prozent weniger pro Stunde als Männer.

Weiter hohe Lohnlücke zwischen Frauen und Männern #GenderPayGap #Lohn #Männer

26.02.2026 12:10 — 👍 24    🔁 9    💬 1    📌 4

Übrigens auch n geiler Schnack:
"Geh bitte, du verletzt meine Hitbox."

xD

Erinnert mich direkt an:
"Geh bitte, das beruhigt mich."

25.02.2026 07:16 — 👍 0    🔁 0    💬 0    📌 0
Preview
Flyer M - Rheinland-Pfalz - Landtagswahlen LIEFERBAR AB 2.2. - Aber ihr könnt gern schon vorbestellen. Inhalt: 200 Flyer (8-seitig, A5) zur Landtagswahl in Rheinland-Pfalz Weitere Infos zur Wahl findest du auch hier: <a href="https://www.a...

Fällt mir gerade auf, hatte ich das eigentlich schon geteilt? Egal. Habe mir hier 200 Flyer bestellt und werde die allen in die Hand drücken, die es nötig haben.

Die Aktion geht vom VVN-BdA aus.

25.02.2026 07:11 — 👍 23    🔁 7    💬 0    📌 0

Am besten noch die ohne Voicelines, null Reaktion auf ihre Umgebung zeigen, verbuggte Animationen und Pathfinding-Schwierigkeiten haben, hin und wieder despawnen (z.B. genau dann wenn sie mal "gebraucht" werden), und hin und wieder in ihre ikonische T-Pose verfallen, oder den Roomba machen...

25.02.2026 07:09 — 👍 1    🔁 0    💬 1    📌 0

Socializing Algorithms Conference
Kiel University, Germany — 7–9 Oct 2026.
Call for abstracts ends 28 Feb 2026

@amoorelouise.bsky.social

@uni-kiel.de

www.uni-kiel.de/de/zentren/d...

24.02.2026 11:05 — 👍 10    🔁 6    💬 0    📌 0

Tech that once called itself MechaHitler to design our weapons systems. What could possibly go wrong?

24.02.2026 05:00 — 👍 535    🔁 136    💬 28    📌 7
Preview
KI soll bei Modernisierung von COBOL-Systemen helfen: IBM-Aktie stürzt ab Nachdem Anthropic ein Werkzeug für die Automatisierung der zeitaufwendigen COBOL-Modernisierung vorgestellt hat, ist die IBM-Aktie über 13 Prozent abgestürzt.

Nachdem Anthropic ein Werkzeug für die Automatisierung der zeitaufwendigen COBOL-Modernisierung vorgestellt hat, ist die IBM-Aktie über 13 Prozent abgestürzt. #IBM

24.02.2026 06:12 — 👍 23    🔁 4    💬 1    📌 2
Greece's flag, white and blue

Greece's flag, white and blue

Artist's impression of CubeSats in-orbit

Artist's impression of CubeSats in-orbit

⚡️ Laser communications are taking center stage in Greece this March as three new missions, with five CubeSats, prepare to launch and put this technology to the test.

Curious about what’s next for connectivity? Stay tuned for updates.

#GreekCubeSats

23.02.2026 18:51 — 👍 12    🔁 2    💬 0    📌 0
Preview
Digitale Unabhängigkeit - Veranstaltung am Sonntag, 1. März, 15 bis 18 Uhr im Chaos Computer Club Digital Independence Day im CCC Flensburg am 1. März 2026: Mastodon-Workshop, Linux und Fediverse – welcher Schwerpunkt ergibt sich spontan?

Workshop zu Mastodon und Fediverse: 1. März, 15 bis 18 Uhr, im CCC #Flensburg – Komm vorbei für Austausch und Unterstützung! www.shz.de/lokales/wir-...

23.02.2026 22:20 — 👍 62    🔁 30    💬 1    📌 0

moin ☕

24.02.2026 06:53 — 👍 0    🔁 0    💬 0    📌 0
Post image 22.02.2026 21:57 — 👍 3155    🔁 1190    💬 37    📌 46
Preview
Umstrittene Polizei-Software: „Einführung der bundesweiten Nutzung von Palantir wird es mit SPD nicht geben“ - WELT Die amerikanische Polizei-Software Palantir kann große Datenmengen schnell auswerten, in einigen Bundesländern ist sie schon im Einsatz. Doch nun wächst angesichts der Konflikte mit der US-Regierung…

Absetzbewegungen: SPD im Bundestag schließt #Palantir klar aus www.welt.de/politik/deut...

23.02.2026 16:33 — 👍 130    🔁 23    💬 10    📌 2

na denn ma rin damit! ☕
& moin ^^

20.02.2026 06:53 — 👍 1    🔁 0    💬 0    📌 0

In meinen Augen ein "Teilerfolg". Auch wenn der "Teil" recht groß ist.
Natürlich hätte ich mir den kleinen Rest auch noch dazu gewünscht, aber Luft nach oben is ja immer...
Alles in allem bin ich aber doch sehr zufrieden damit, wie es abgelaufen ist.

Fest steht aber: Ich habs hart gerockt!

(2/2)

19.02.2026 14:43 — 👍 0    🔁 0    💬 0    📌 0

Okay, also das tatsächliche Endergebnis hat nur 90% meiner eigenen, und ca. 95% der Erwartungen anderer an mich in diesem Sachverhalt erfüllt.
Komplett losgelöst davon hat sich aber alles mehr als nur im normalen Rahmen abgespielt und generell wurde von allen Seiten Zufriedenheit signalisiert. (1/2)

19.02.2026 14:40 — 👍 1    🔁 0    💬 1    📌 0
Preview
DigitStealer Gains Attention as macOS-Targeting Infostealer Exposes Key Infrastructure Weaknesses DigitStealer, a sophisticated information-stealing malware targeting macOS systems, has recently surged in activity, drawing significant attention from the cybersecurity community. First emerging in late 2025, this malicious software specifically targets Apple M2 devices, distinguishing itself from generic threats. It operates primarily by harvesting sensitive user data, including information from 18 different cryptocurrency wallets, browser data, and macOS keychain entries. Unlike many modern infostealers that function as part of a Malware-as-a-Service (MaaS) ecosystem , DigitStealer lacks a web panel for affiliates, strongly suggesting it is managed by a private operator or a small, exclusive team. The primary infection vector involves the distribution of the malware disguised as legitimate applications, such as the productivity tool “DynamicLake”. Once a user installs the compromised software, the malware initiates a multi-stage infection process. It establishes persistence on the victim’s machine by creating a Launch Agent, which ensures the malicious code runs automatically. This backdoor capability allows the attacker to maintain long-term access, polling the C2 server every 10 seconds for new AppleScript or JavaScript payloads to execute different malicious functions on the device. Cyber and Ramen analysts identified that the malware’s infrastructure reveals a distinct lack of diversity, pointing towards a centralized operation. Their investigation highlighted that the malware’s command servers are clustered within specific hosting networks, often using consistent domain registration patterns via providers like Tucows and nameservers from Njalla. This operational security failure has provided researchers with valuable indicators to track the threat. By analyzing these patterns, security teams can better identify and block communication attempts between infected devices and the attacker’s infrastructure. Evasion and Communication Tactics A closer examination of DigitStealer’s technical behavior reveals a complex mechanism designed to evade detection and analysis. The malware communicates with its C2 server through four specific API endpoints— /api/credentials ,  /api/grabber ,  /api/poll , and  /api/log —handling tasks such as credential exfiltration and file uploads. To prevent security researchers from easily probing these servers, the malware implements a cryptographic challenge-response system. Before the server issues any commands, it sends a unique “challenge” string and a complexity level to the infected client. Example request to a DigitStealer C2 containing the cryptographic challenge (Source – Cyber and Ramen) The malware must solve this computational puzzle by hashing the challenge string with a generated number to match a specific pattern. Only after successfully solving this challenge does the server grant a valid session token. This anti-analysis feature ensures that automated scanners cannot easily interact with the command server . Furthermore, the malware sends the hardware UUID of the system hashed with MD5 to the C2, creating a recognizable digital fingerprint for defenders to actively monitor and analyze.​ Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post DigitStealer Gains Attention as macOS-Targeting Infostealer Exposes Key Infrastructure Weaknesses appeared first on Cyber Security News .

DigitStealer Gains Attention as macOS-Targeting Infostealer Exposes Key Infrastructure Weaknesses

18.02.2026 01:00 — 👍 4    🔁 2    💬 0    📌 0
Two rulers, unalike in measurements

Two rulers, unalike in measurements

They released this like this

Why would anyone ever drive a car by people who do not Look At MEASUREMENTS

17.02.2026 10:25 — 👍 478    🔁 144    💬 42    📌 69

remends me strongly of that shop item image for an ampere clamp they put around an optical cable...

18.02.2026 07:11 — 👍 0    🔁 0    💬 0    📌 0
Preview
Cybercriminals Leverage Atlassian Cloud for Spam Campaigns Redirecting Targets to Fraudulent Investment Schemes Cybercriminals have launched a sophisticated spam campaign leveraging the trusted infrastructure of Atlassian Cloud. By abusing legitimate features within the platform, attackers are effectively bypassing traditional email security controls to reach high-value targets. This campaign focuses on redirecting users to fraudulent investment schemes, utilizing the inherent trust associated with well-known software-as-a-service providers to deceive recipients. The attacks are highly targeted, focusing on government and corporate entities across various regions, including English, French, German, Italian, Portuguese, and Russian-speaking demographics. Instead of generic spam, these messages are tailored to specific language groups. The ultimate goal is to funnel traffic to malicious landing pages via Keitaro TDS, generating revenue through scams and illicit advertising. Trend Micro researchers identified that this activity became prominent between late December 2025 and January 2026. By operating through established cloud services with strong domain reputations, the attackers ensure their emails pass standard authentication checks like Sender Policy Framework and DomainKeys Identified Mail. This makes detection significantly harder for conventional security filters, which typically prioritize notifications from reputable SaaS platforms. The campaign demonstrates a high level of automation, allowing threat actors to rapidly scale their operations. They create multiple Atlassian instances to distribute their messages, ensuring that even if one instance is blocked, others continue to function. One of the final landing pages of the spam campaign (Source – Trend Micro) This resilience highlights the evolving tactics of modern cybercriminals who weaponize legitimate tools to conduct malicious activities without triggering immediate alarms. Mechanism of Infrastructure Abuse The core of this campaign lies in the ease with which threat actors can provision disposable infrastructure to facilitate their attacks. Attackers initiate the process by creating Atlassian Cloud accounts using randomized naming conventions, enabling them to generate numerous Jira Cloud instances without requiring domain ownership verification. Creating a trial Jira instance (Source – Trend Micro) These instances resolve to legitimate AWS IP addresses shared by valid deployments, further masking the malicious nature of the activity. Attackers rely on the inherent trust of Atlassian-generated emails rather than reinforcing legitimacy through domain registration. Once the infrastructure is in place, the attackers utilize Jira Automation to construct and send crafted emails. Jira Kanban Board allows for the creation of automation rules (Source – Trend Micro) This method allows them to deliver messages directly through Atlassian’s integrated email system, avoiding the need for their own mail servers. The recipients do not need to be listed users within the instance, permitting widespread distribution without exposing the attacker’s true identity or infrastructure. Breakdown of targets by industry (Source – Trend Micro) Organizations should reassess their trust assumptions regarding third-party cloud-generated emails to prevent such abuses. Security teams are advised to deploy advanced email security solutions that provide layered detection and identity-aware controls. These measures are essential to identify and block phishing attempts that exploit trusted SaaS platforms. Additionally, monitoring for indicators of compromise, such as specific URL patterns and redirect chains, can help mitigate these threats effectively. Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post Cybercriminals Leverage Atlassian Cloud for Spam Campaigns Redirecting Targets to Fraudulent Investment Schemes appeared first on Cyber Security News .

Cybercriminals Leverage Atlassian Cloud for Spam Campaigns Redirecting Targets to Fraudulent Investment Schemes

18.02.2026 03:44 — 👍 1    🔁 2    💬 0    📌 0

Idk about the U.S. but isn't there any kind of service availability quota per year your ISP has, by contract, to follow?
May be a straw to pull on, to put some pressure on their table fixing your line...

18.02.2026 07:06 — 👍 0    🔁 0    💬 0    📌 0

All your base
Base
Base
All your base
Are belong to us

🔉🎶

17.02.2026 07:14 — 👍 0    🔁 0    💬 0    📌 0

Morgen is ein sehr wichtiger Tag für mich.

Und entweder direkt morgen, oder in den darauffolgenden Tagen bis spätestens nächste Woche iwann, wird sich ein nicht unwichtiger Sachverhalt herauskristallisieren.

Mal schauen wie ich mich morgen nachmittag/abend fühlen werd...^^"

- Update wird folgen -

16.02.2026 21:54 — 👍 1    🔁 0    💬 1    📌 1

8 Tage lang Ohrwurm von
Helium Vola - Omnis mundi creatura

& wie war euer WE so..?^^"

15.02.2026 17:41 — 👍 0    🔁 0    💬 0    📌 0
Preview
Spotlight on the Shingles Vaccine—Again! Two new studies add to a remarkable body of evidence for benefit

Prevention may have wider spillovers than we thought: Eric Topol explores the evidence that older adults who received a shingles vaccine had a roughly 20% lower risk of developing dementia in later years buff.ly/iuMmX9U
#ShareGoodNewsToo

14.02.2026 14:50 — 👍 93    🔁 33    💬 1    📌 0
Post image

'Always wear shoes that are good for running or fighting.' — Joe Strummer

#punk #punks #punkrock #docs #DocShoe #joestrummer #history #punkrockhistory

14.02.2026 05:19 — 👍 386    🔁 56    💬 20    📌 19