BugBlow
@BugBlow
Followers
261
Following
125
Media
17
Statuses
105
Protecting DeFi and Web3 with indispensable cybersecurity skills. Conducting security audits.
Joined July 2024
Every champion needs a solid defense — thanks @delabsOfficial for letting us guard your corner. 🥊 From KOs to rewards, we make sure everything lands exactly where it should. 🎯
🛡️ Security is our daily quest. Thanks @BugBlow for a routine check‑up on Boxing Star X, making sure every KO, reward & asset stays in the right hands, ours. Play bold, play safe.
0
2
20
Congratulations @usestate! I hope this reward will serve you in whatever DeFi project you're building or want to build. DM me for getting the reward, and I will leave the txID in the comments here. For everyone who participated, no worries, we'll do more giveaways, stay
💸$ giveaway for the DeFi crowd We’ve been working with a lot of teams lately and figured we’d give something back to the community that keeps building (and breaking) things. Running a giveaway from BugBlow. To join: — follow @BugBlow — repost this — drop a comment with a DeFi
52
9
38
Lots of pictures, naked pictures, work documents, and a bunch of junk files. Of course I removed all of it, but if it wasn't me, there might someone else who would upload all of it on the internet
0
0
15
In fact, when I bought a new hard drive 1 year ago, it turned out it was someone's else before! Out of curiosity I tried to recover removed files. you won't believe what i found there
1
0
15
Think about all the passwords, keys, other secrets you once stored there. If you sell your laptop, the other person can now own everything you had. A few years later you notice all your crypto is suddenly gone 🥲 and that is how. This has happened in the past.
1
0
0
That means that unless there is no space on your hard drive, your deleted files won't get overwritten and someone (or you) can easily recover them.
1
0
0
Well first of all, let me tell you that the only way to delete your data is to physically destroy your hard drive. When you delete a file, your OS being efficient just marks the data as "deleted" but keeps the content for overwriting it later, far in the future.
1
0
1
NEVER sell your laptop. Especially if you had your crypto keys or private pictures. You think when you delete a file, empty the trash, it actually gets deleted? It doesn't. Photorec is an open-source forensic tool that can restore deleted files. How?
3
15
20
💸$ giveaway for the DeFi crowd We’ve been working with a lot of teams lately and figured we’d give something back to the community that keeps building (and breaking) things. Running a giveaway from BugBlow. To join: — follow @BugBlow — repost this — drop a comment with a DeFi
75
70
74
Vlad @vlzhr, we appreciate the work you do and are sorry for your loss. Maybe the DeFi community could donate some money to support you and your project? We are ready to donate some money, please let us know your address
I GOT ROBBED FOR $500K, $WAVES GOT ROBBED FOR >$1m, HACKER PLEASE SEND BACK MONEY, @CROSSCURVEFI @NEWMICHWILL PLEASE SAVE US https://t.co/174hQIdAEi
0
1
10
We have been working non-stop for the last few months, guarding the frontiers of web3 companies. Hackers are cruel, relentless. They come at the worst possible time. But we will not let them get to you. Here are our stats for one of our dearest clients. Several projects.
0
0
9
Fix: Your application must not allow any other characters (including spaces and tabs) except the 6-digit code. This will prevent the space padding attack. Stay safe.
0
0
6
In combination, this poses a major risk to all Hashicorp users. Update Hashicorp immediately.
1
0
2
Furthermore, the past expired codes can be bruteforced, because vault is very informative about the errors. When sent a used code, the vault responds with this error: "code already used; new code is available in %v seconds"
1
0
0
The latest version of Hashicorp is vulnerable to reuse of the expired codes with space padding attack. This allows an attacker to bypass all TOTP security controls. Example: "123456" and " 123456" are treated as equivalent by the validator. https://t.co/Q1HVgQr4xh
cyata.ai
Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems,...
1
0
1