#Nim

2025-05-03

Saturday here, time for the new, weekly, development report from my #opensource projects: a roguelike game and #Nim binding for Nuklear GUI library, as almost always, got some new features and bugs. ๐Ÿ˜‰ More information: www.laeran.pl.eu.org/blog/devblog... Happy and calm weekend, everyone. ๐Ÿ˜Ž

2025-04-30

Nimy Resources ( #NIM ) has released " Block 3 Gallium Exhibits Highly Favourable Mineralogy " on Thu 01 May at 09:01 AEST #CSIRO #Commodity #China #Mining #India
grafa.com/asset/nimy-resources

2025-04-30

HANNIBAL Stealer: A Rebranded Threat Born from Sharp and TX Lineage

The Hannibal Stealer is a sophisticated information stealer targeting Chromium and Gecko-based browsers, developed in C# and operating on the .NET Framework. It bypasses Chrome Cookie V20 protection and steals data from cryptocurrency wallets, FTP clients, VPNs, and messaging apps. The malware performs system profiling, captures screenshots, and exfiltrates targeted files. It includes a crypto clipper module and is controlled via a dedicated C2 user panel. Advertised on various forums, it employs geofencing, domain-matching, and comprehensive data theft techniques. The stealer is likely a rebranded version of earlier SHARP and TX Stealers, with minimal innovation beyond updated communication methods.

Pulse ID: 6811dd434197b551215abaf3
Pulse Link: otx.alienvault.com/pulse/6811d
Pulse Author: AlienVault
Created: 2025-04-30 08:20:19

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #Chrome #CyberSecurity #DataTheft #InfoSec #Malware #NET #Nim #OTX #OpenThreatExchange #RAT #Troll #VPN #bot #cryptocurrency #AlienVault

2025-04-30

Nimy Resources ( #NIM ) has released " Quarterly Activities and Cashflow Report " on Wed 30 Apr at 16:07 AEST #today #tax #government #CSIRO #Commodity
grafa.com/asset/nimy-resources

2025-04-28

HANNIBAL Stealer: A Rebranded Threat Born from Sharp and TX Lineage

The Hannibal Stealer is a sophisticated information-stealing malware, rebranded from Sharp and TX stealers. Developed in C#, it targets Chromium and Gecko-based browsers, extracting sensitive data while bypassing Chrome Cookie V20 protection. Its capabilities extend to cryptocurrency wallets, FTP clients, VPN credentials, and various system information. The malware includes a crypto clipper module and is controlled via a dedicated C2 panel. Sold on dark web forums, it employs geofencing, domain-matching, and comprehensive system profiling. The threat actor behind Hannibal Stealer has been linked to previous iterations, indicating minimal innovation beyond rebranding and updated communication methods. Active Telegram channels and control panels suggest ongoing operations and infrastructure maintenance.

Pulse ID: 680cb2700eb7c459dbb78e4a
Pulse Link: otx.alienvault.com/pulse/680cb
Pulse Author: AlienVault
Created: 2025-04-26 10:16:16

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #Chrome #CyberSecurity #InfoSec #Malware #Nim #OTX #OpenThreatExchange #RAT #Telegram #Troll #VPN #bot #cryptocurrency #AlienVault

2025-04-26

Here we go again, without Whitesnake, but with the weekly development report from my #opensource projects. As usual, two on the table: a roguelike game and #Nim binding to Nuklear GUI library. More info here: www.laeran.pl.eu.org/blog/devblog... Happy weekend everyone. ๐Ÿ˜ƒ

2025-04-21

It's 2025... so why are obviously malicious advertising URLs still going strong?

In 2025, a phishing email containing a malicious link redirected through Google Ads was received by the Internet Storm Center. The link led to a credential-stealing page hosted on a dynamic DNS service. Despite being clearly fraudulent and detected by VirusTotal, the ad redirect remained active for over a week. The article questions why major ad providers like Google aren't implementing basic security measures to prevent such obvious threats. It suggests that ad companies should filter out links to domains unsuitable for legitimate ads and regularly check landing pages for malicious content. The author argues that this should be the minimum expected from ad providers in 2025, especially given the availability of AI and tools like VirusTotal for threat detection.

Pulse ID: 680630cf7d432f84fd61b71b
Pulse Link: otx.alienvault.com/pulse/68063
Pulse Author: AlienVault
Created: 2025-04-21 11:49:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DNS #Email #Google #InfoSec #Nim #OTX #OpenThreatExchange #Phishing #Rust #VirusTotal #bot #AlienVault

2025-04-19

Another weekend, time for another development report from my #opensource projects. As usual, two of them: a roguelike game and #Nim binding to Nuklear GUI library were changed this week. More info: www.laeran.pl.eu.org/blog/devblog... Happy and lazy weekend, everyone. ๐Ÿ˜‰

2025-04-17

CVE-2025-24054, NTLM Exploit in the Wild

A critical vulnerability, CVE-2025-24054, related to NTLM hash disclosure via spoofing, has been actively exploited since March 19, 2025. The flaw allows attackers to leak NTLM hashes or user passwords using a maliciously crafted .library-ms file, potentially compromising systems. A campaign targeting government and private institutions in Poland and Romania used malspam to distribute Dropbox links containing archives exploiting this vulnerability. The exploit can be triggered with minimal user interaction, such as right-clicking or navigating to the folder containing the malicious file. This vulnerability appears to be a variant of the previously patched CVE-2024-43451, sharing several similarities.

Pulse ID: 680034fc84efc0751b3bc07d
Pulse Link: otx.alienvault.com/pulse/68003
Pulse Author: AlienVault
Created: 2025-04-16 22:53:48

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Dropbox #Government #InfoSec #MalSpam #Nim #OTX #OpenThreatExchange #Password #Passwords #Poland #Spam #Vulnerability #Word #bot #AlienVault

The catapult model I whipped up looked meh so springboard for now!

#gamedev #indiedev #nim

I feel like any game that has a catapult(graphics pending) like mechanic has an innate law to make an endless catapult as the ultimate test.

#nim #gamedev #indiedev

2025-04-12

Saturday, check, the new development report from my #opensource projects, check. ๐Ÿ˜› As usual, two things on the table: a roguelike game and #Nim binding to Nuklear GUI library. More information available here: www.laeran.pl.eu.org/blog/devblog... Happy weekend everyone, be well. ๐Ÿ˜

Matt Hogan :psyduck:mtthgn
2025-04-07

I'm a few days late on (is a thing? lol), but Iโ€™m determined to post nonetheless!

I spent the weekend exploring some of the newly added concepts on Natu's development branch, particularly the additions of โ€œscenesโ€ and โ€œsystemsโ€. To do this, I rewrote one of the Natu examples to use scenes and systems. Check it out!

2025-04-05

New Saturday, the new development report from my #opensource projects is ready: As in the previous weeks, two of them on the table: a roguelike game and the #Nim binding to Nuklear library. More info: www.laeran.pl.eu.org/blog/devblog... Happy weekend and take care, everyone. ๐Ÿ˜ƒ

2025-04-05

Commit Frenzy : #NIM - Developers committed 24.0X the rolling average code to Nim Network this week, published 04/05/2025 #crypto #GitHub
grafa.com/asset/nim-network-ni

2025-03-29

Weekend's tradition: the new development report from my #opensource projects is ready. Exactly two projects were changed: a roguelike game and the #Nim binding to the Nuklear GUI library. More info: www.laeran.pl.eu.org/blog/devblog... As always: happy weekend everyone. ๐Ÿ˜Ž

2025-03-25

I found myself missing a reasonably versatile import sorter for Nim, so I took a crack at one.

github.com/cycneuramus/nimpsor

There may be bugs, especially if you're fond of putting arbitrary line breaks in your import statements.

#nim #nimlang

Vasileios Valatsos :coffefied:aethrvmn@sigmoid.social
2025-03-24

@Kingwulf #nim is ๐Ÿ‘‘

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst