🚨 $ELF 🚨
Why is e.l.f. Beauty, Inc. trending today? 🤔
Finding myself at a loose end this evening waiting for my cold bedroom to heat to a tolerable level, I decided I might as well post this drawing I did back in December.
I was experimenting with a different technique for shading and highlights, but felt it didn't quite work?
So I never posted it. But realistically, I'm not going to do anything more with it, so what the heck.
The cracked white border is just me messing around.
#MastoArt #FediArt #ArtistsOnMastodon #Fantasy #Elf #Illustration
Black Basta: Defense Evasion Capability Embedded in Ransomware Payload
A recent Black Basta ransomware campaign incorporated a bring-your-own-vulnerable-driver (BYOVD) defense evasion component within the payload itself, a departure from typical practices. The ransomware exploited a vulnerable NsecSoft NSecKrnl driver to terminate security processes. This approach, previously seen in Ryuk and Obscura attacks, may indicate a trend towards bundling additional capabilities in ransomware payloads. The attack also involved a long dwell time and post-deployment activity using GotoHTTP. The Cardinal group, responsible for Black Basta, had been quiet following a chat log leak in 2025 but appears to be resuming activities. This development raises questions about future ransomware tactics and the potential advantages of embedding defense evasion capabilities within payloads.
Pulse ID: 6984fbc6de215c312d2f6c53
Pulse Link: https://otx.alienvault.com/pulse/6984fbc6de215c312d2f6c53
Pulse Author: AlienVault
Created: 2026-02-05 20:21:26
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BlackBasta #CyberSecurity #ELF #HTTP #ICS #InfoSec #OTX #OpenThreatExchange #RAT #RansomWare #UK #bot #AlienVault
Like Twins 🧝🧝
Eliy (Elyi) Lymier (IPA : [ɛlij/ɛlʲi limi.er])
I went on an adventure with someone who looked like me.
There was no one but me, but I felt like a lot of people were looking at me.
#illustration #girl #fairy #elf #starlight #ruins #postapocalypse #landscape #fantasy #originalcharacter #OC #art #digitalart #mastoart #創作 #イラスト #少女 #妖精 #エルフ #遺跡 #星明かり #ポストアポカリプス #風景 #ファンタジー #オリジナル
Video : https://youtu.be/tQo33Ok-wtI
Cassandra for vermin on the artfight discord
Like Twins 🧝🧝
Eliy (Elyi) Lymier (IPA : [ɛlij/ɛlʲi limie.r])
Can you believe there's someone somewhere in the world who looks like you,
And even that name can look like you?
#illustration #girl #fairy #elf #starlight #ruins #postapocalypse #landscape #fantasy #originalcharacter #OC #art #digitalart #mastoart #創作 #イラスト #少女 #妖精 #エルフ #遺跡 #星明かり #ポストアポカリプス #風景 #ファンタジー #オリジナル
Video : https://youtu.be/tQo33Ok-wtI
chibi batch from this year!
[ #commission ] ♦ [ #art #commsopen #chibi #artist #illustration #characterart #ttrpg #elf #worldofwarcraft ]
COMMISSIONS OPEN!
💻 [ http://maddiebiscuitsart.com ]
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom's toolkit
Rapid7 Labs has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom, involving a new custom backdoor named Chrysalis. The attack compromised Notepad++ infrastructure to deliver the backdoor. Analysis revealed multiple custom loaders, including one using Microsoft Warbird for obfuscation. The Chrysalis backdoor has extensive capabilities for information gathering, file operations, and remote command execution. Additional artifacts found include Cobalt Strike beacons and Metasploit payloads. The campaign shows Lotus Blossom evolving its tactics, mixing custom and off-the-shelf tools with advanced obfuscation techniques to evade detection.
Pulse ID: 6981aff0acbb318f992ed03e
Pulse Link: https://otx.alienvault.com/pulse/6981aff0acbb318f992ed03e
Pulse Author: AlienVault
Created: 2026-02-03 08:21:04
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #Chinese #CobaltStrike #CyberSecurity #ELF #ICS #InfoSec #Microsoft #Notepad #OTX #OpenThreatExchange #RAT #Rapid7 #RemoteCommandExecution #bot #AlienVault
Afra for Goldenqilin on Toyhouse <3
[Перевод] Как превратить Linux в Windows
Тезис: следует создать такой дистрибутив Linux, который по умолчанию выполняет двоичные файлы Windows через Wine. Если я найду файл в формате .exe, которому 20 лет, я по-прежнему смогу запустить его на современной Windows. Попробуйте проделать подобное с двоичным файлом Linux, которому всего год. Совершенно не гарантированно, что он запустится, в зависимости от того, какие обновления успели произойти. Также не гарантируется, что заработает даже сегодняшний двоичный файл Linux, если собрать его в одном дистрибутиве, а попытаться запустить на разных других дистрибутивах. Возникает ровно такая же проблема, связанная с версиями установленных библиотек.
https://habr.com/ru/companies/timeweb/articles/991032/
#timeweb_перевод #windows #apple #linux #appimage #elf #win32 #freebsd #reactos #android