Michael Grafl (@mykey_) 's Twitter Profile
Michael Grafl

@mykey_

Software Engineer, working at @skidata | Studied at @alpenadriauni | Tweets are my own (unless blatantly plagiarized)

ID: 53986297

linkhttps://bsky.app/profile/mgrafl.bsky.social calendar_today05-07-2009 19:42:21

10,10K Tweet

237 Followers

584 Following

Scobel (@scobelverse) 's Twitter Profile Photo

i still can’t believe this was a real answer… one of the most frustrating UX experiences on earth (posts showing for a second then disappearing) and the answer was “it tests better” 🤦‍♂️

Sam Brannen (@sam_brannen) 's Twitter Profile Photo

#JUnit 6.0 RC1 is ready for testing! 📰 Everything in 6.0 M1 and 6.0 M2 🏷 Improved display names for parameterized classes/tests ♻ MethodOrderer.Default and ClassOrderer.Default for @⁠Nested classes Please try it out before 6.0 GA! ✅ junit.org/junit5/docs/6.…

Sam Brannen (@sam_brannen) 's Twitter Profile Photo

#JUnit 6.0.0 is released! ✨ Java 17 and Kotlin 2.2 baseline 🌄 JSpecify nullability annotations 🛫 Integrated JFR support 🚟 Kotlin suspend function support 🛑 Support for cancelling test execution 🧹 Removal of deprecated APIs docs.junit.org/6.0.0/release-…

vx-underground (@vxunderground) 's Twitter Profile Photo

Non-malware schizos asking about why the Notepad++ malware payload was so interesting. Okay, we'll discuss it without getting too schizo. First, Rapid7 (and other various Cyber Threat Intelligence vendors) seem to generally attribute the Notepad++ compromise to Chinese APT

Georgy Kucherin (@kucher1n) 's Twitter Profile Photo

It turned out there are many more payloads used in the Notepad++ attack! To stay undetected, its masterminds were COMPLETELY changing execution chains about every month. Here are more IPs used in the attack: 45.76.155[.]202 45.32.144[.]255 Read below for many other IoCs! [1/8]

It turned out there are many more payloads used in the Notepad++ attack! To stay undetected, its masterminds were COMPLETELY changing execution chains about every month.

Here are more IPs used in the attack:
45.76.155[.]202
45.32.144[.]255

Read below for many other IoCs! [1/8]