"Apple is set to produce a film about the FTX exchange and its founder Sam Bankman-Fried. This is an adaptation of the book 'Going Infinite: The Rise and Fall of a New Tycoon', released last year.
The script covers the rise and fall of the cryptocurrency exchange, Sam's life journey, immersion into the world of cryptocurrencies, and the legal system.
The book became a bestseller according to The New York Times. The film will undoubtedly generate similar excitement."

Trump created DOGE. This is the abbreviation of the new Department for Achieving Government Efficiency, which coincides with the name of Elon Musk's favorite coin.
By a lucky coincidence, Musk will head this department. He will destroy bureaucracy and fight against all things bad together with businessman Vivek Ramaswamy.
Stop persuading to buy Dogecoin.

ZIP Nesting Doll: A New Way to Hack Windows
Cybercriminals continue to search for new ways to bypass protection, and one of the new techniques is the merging of ZIP archives.
This method allows malicious files to be hidden from antivirus software and mislead researchers using analysis tools.
The essence of the attack is that attackers create two or more separate ZIP archives: one containing malicious software, and the others left empty or with safe files.
Then the files are combined into one archive by simply appending the binary data of one file to another.
As a result, a file is created that looks like a regular ZIP, but actually contains several malicious archives inside.

The progress of the new OpenAI models turned out to be less noticeable than when transitioning from GPT-3 to GPT-4.
The model under the code name Orion may not differ in any way from its predecessors, writes The Information.
Because of this, OpenAI is changing its development strategy. Among the potential solutions: training neural networks on generated content due to a lack of fresh data or retraining after launch.

The price of Bitcoin has reached $77,000. The coin continues to update its highs.
Jokes about $100,000 by the end of the year no longer seem like jokes.

Hacking of judicial systems: Washington state paralyzed by hackers
The Administrative Office of the Courts of Washington state (AOC) has reported the detection of "unauthorized activity" in the network of judicial institutions, leading to temporary disruptions in the courts' operations. Despite the lack of official confirmation that it was a ransomware attack, the AOC website has been inaccessible for several days. The incident occurred just days after a similar cyber attack in California, where perpetrators paralyzed the digital services of the San Joaquin County court.

What is QwakMyAgent?

QwakMyAgent is a PowerShell script that is a previously unknown custom module agent for Mythic. When executed, this script sends information about the infected system, periodically receives and processes commands from the server.


The initial infection vector was not detected. It is known that after compromising host systems, attackers established connections with hosts through the WinRM service and executed HTA scripts available via URL links using the system utility mshta.exe.


Experts warn of the possibility of using QwakMyAgent to conduct large-scale cyber attacks on enterprises of any size. To protect against such threats, it is necessary to ensure timely updating of security measures and network security monitoring.

Characteristics of the QwakMyAgent agent:



  • A new Mythic agent that uses PowerShell for its operation.

  • Sends information about the infected system to malicious actors.

  • Receives and executes commands from a remote server.

  • The exact method of agent distribution is unknown.


F.A.C.C.T. company recommends all PowerShell users to take additional security measures to prevent possible infection by the QwakMyAgent agent. It is recommended to use only official and verified script sources, as well as regularly update antivirus databases and software.


Be vigilant and protect your data from cyber threats!

What is the difference between VPS, VDS, and RDP?

In the world of server virtualization, there are several popular technologies such as VPS (Virtual Private Server), VDS (Virtual Dedicated Server), and RDP (Remote Desktop Protocol). While they all provide the ability to remotely manage a server, they have their own features and differences.


VPS (Virtual Private Server)


A Virtual Private Server (VPS) is a virtualized instance of a server that runs on a shared physical server. Each VPS has its own operating system, resources, and configuration. VPS is typically used for hosting websites, applications, and other services. The user accesses the VPS through SSH or RDP (depending on the operating system).


Example command for connecting to VPS via SSH:


ssh username@hostname

  • Has its dedicated resources

  • More flexible and customizable

  • Can be managed through SSH


VDS (Virtual Dedicated Server)


A Virtual Dedicated Server (VDS) is a more powerful and performance-oriented variant of a virtualized server. VDS also runs on a shared physical server but allocates more computational resources and memory for each instance. This makes VDS more suitable for larger projects and applications.


Example command for managing VDS via RDP:


mstsc

  • Allocates more computational resources

  • Suitable for large projects

  • Managed through RDP (Remote Desktop Protocol)


RDP (Remote Desktop Protocol)


Remote Desktop Protocol (RDP) is a remote management protocol that allows a user to connect to a remote computer or server and control it through a graphical interface. RDP is commonly used for remote access to Windows servers.


Example command for connecting to a remote server via RDP:


mstsc /v:hostname

  • Managed through a graphical interface

  • Suitable for Windows servers


So, VPS, VDS, and RDP are different server virtualization technologies, each with its own features and advantages. The choice between them depends on the specific needs of the project and the level of management required by the user.

"What should be done when first connecting to a VPS?"

Connecting to a VPS (Virtual Private Server) is the first step in working with a remote server where you will host your projects. Initial server setup upon the first connection is crucial to ensure the security and efficient operation of your project. In this article, we will discuss the basic steps to take when connecting to a VPS for the first time.


1. Updating the System:


The first step after connecting to a VPS is to update all system packages to the latest versions. Use the following commands to do this:


sudo apt update
sudo apt upgrade

2. Security Configuration:


To ensure server security, you should take the following steps:



  • Change the SSH port for server connection;

  • Create a new user with admin rights and disable root user access;

  • Configure a firewall to block unnecessary ports;

  • Install and configure Fail2Ban to protect against service attacks.


3. Installing Necessary Software:


Additional software installation may be required to work with your project. For example, for the Apache web server:


sudo apt install apache2

4. Setting Up a Domain Name:


If you plan to use your VPS for hosting a website, you should set up a domain name. Specify the server's IP address in the domain settings with the registrar.


After completing all of these steps, your VPS will be ready to work with your projects. Remember that security and regular system updates play an important role in maintaining the stability and security of server operation.

How to connect to a VPS server?

Virtual Private Servers (VPS) have become one of the most popular hosting solutions for websites and applications. They provide users with the ability to have full control over their server without making significant investments in hardware.


To connect to a VPS server, several steps need to be taken.


Step 1: Accessing the VPS Server


The first step is to access the VPS server via SSH (Secure Shell). You will need the server's IP address, username, and password. An example command to connect to the server:


ssh username@ip_address

Step 2: Entering the Password


After entering the command to connect to the server, the system will prompt you to enter the password. Upon successful password entry, you will be connected to the VPS server.


Step 3: Managing the Server


Now you have full access to the server and can manage it as you see fit. You can install applications, configure settings, and much more.


Connecting to a VPS server via SSH allows you to work with the server remotely and securely, as long as you have internet access. This method is the most secure way to manage a server.


In conclusion, connecting to a VPS server is relatively simple but requires some command line skills. However, once you understand the basic SSH commands, you will be able to easily manage your server and deploy applications on it.