Kodama
@kodamachameleon.com
Pinned
Kodama
@kodamachameleon.com
· Sep 2
Kodama Chameleon - Strange Cyber Tails Caught in the Wild
Strange Cyber Tails Caught in the Wild
kodamachameleon.com
I realize changing colors platform to platform might leave some to wonder... so I made a nice, shiny new logo to tie them all together. Look for the K built from Penrose shapes. Why Penrose? I guess I'm just fascinated with making something from the impossible.
kodamachameleon.com
kodamachameleon.com
October 27, 2025 at 2:05 PM
Reposted by Kodama
Discord confirms a data breach through a third-party vendor, exposing user IDs, emails, and even government IDs. Meanwhile, hackers on #Telegram claim responsibility.
Read: hackread.com/discord-data...
#Discord #DataBreach #CyberSecurity #Privacy #InfoSecurity #Hacking
Read: hackread.com/discord-data...
#Discord #DataBreach #CyberSecurity #Privacy #InfoSecurity #Hacking
Discord Data Breach: Hackers Access IDs, Billing Details and Support Chats
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
October 4, 2025 at 4:36 PM
Discord confirms a data breach through a third-party vendor, exposing user IDs, emails, and even government IDs. Meanwhile, hackers on #Telegram claim responsibility.
Read: hackread.com/discord-data...
#Discord #DataBreach #CyberSecurity #Privacy #InfoSecurity #Hacking
Read: hackread.com/discord-data...
#Discord #DataBreach #CyberSecurity #Privacy #InfoSecurity #Hacking
Reposted by Kodama
License plate readers are growing fast. These days, they are cheap to own and operate. Essentially, a $100 burner phone with a $5/month prepaid account can be made into a license plate reader. It's gonna solve a lot of crime, making it impractical to drive anywhere to commit crime.
For most Americans, driving is a part of everyday life. That’s why EFF, ACLU and NACDL are urging the Virginia Court of Appeals to hold that searches of ALPR data require a search warrant. www.eff.org/deeplinks/2...
EFF Urges Virgina Court of Appeals to Require Search Warrants to
This post was co-authored by EFF legal intern Olivia Miller.For most Americans—driving is a part of everyday life. Practically speaking, many of us drive to work, school, play, and anywhere in
www.eff.org
September 29, 2025 at 9:09 PM
License plate readers are growing fast. These days, they are cheap to own and operate. Essentially, a $100 burner phone with a $5/month prepaid account can be made into a license plate reader. It's gonna solve a lot of crime, making it impractical to drive anywhere to commit crime.
🎉🎉 Excited to announce the launch of Twiliompus. A Discord phone verification bot using the Twilio API.
github.com/kodamaChamel...
#GitHub #Discord #Bots #Twilio #phoneverification
github.com/kodamaChamel...
#GitHub #Discord #Bots #Twilio #phoneverification
GitHub - kodamaChameleon/Twiliompus: Discord bot for Twilio Phone Lookups
Discord bot for Twilio Phone Lookups. Contribute to kodamaChameleon/Twiliompus development by creating an account on GitHub.
github.com
September 24, 2025 at 4:02 PM
🎉🎉 Excited to announce the launch of Twiliompus. A Discord phone verification bot using the Twilio API.
github.com/kodamaChamel...
#GitHub #Discord #Bots #Twilio #phoneverification
github.com/kodamaChamel...
#GitHub #Discord #Bots #Twilio #phoneverification
🦓 Exploring why this default security strategy often misses the mark, and how security professionals can communicate more effectively.
#CyberAwareness #SecurityMindset #OnlineSafety
#CyberAwareness #SecurityMindset #OnlineSafety
Security by Anonymity
Most of us in the security profession have heard the term “security through obscurity”—the flawed model that assumes systems are […]
kodamachameleon.com
September 15, 2025 at 10:54 AM
🦓 Exploring why this default security strategy often misses the mark, and how security professionals can communicate more effectively.
#CyberAwareness #SecurityMindset #OnlineSafety
#CyberAwareness #SecurityMindset #OnlineSafety
Reposted by Kodama
Salesloft breach dates back to March and originated from the company's GitHub account, per a new update
trust.salesloft.com?uid=Update+o...
trust.salesloft.com?uid=Update+o...
September 7, 2025 at 3:40 PM
Salesloft breach dates back to March and originated from the company's GitHub account, per a new update
trust.salesloft.com?uid=Update+o...
trust.salesloft.com?uid=Update+o...
Reposted by Kodama
I don't know anyone from Obsidian (at least, I'm not aware if i do) but this take is :chef's kiss: spot on accurate and more folks need to recognize this across ecrime, and even state-sponsored ops:
September 2, 2025 at 9:13 PM
I don't know anyone from Obsidian (at least, I'm not aware if i do) but this take is :chef's kiss: spot on accurate and more folks need to recognize this across ecrime, and even state-sponsored ops:
I realize changing colors platform to platform might leave some to wonder... so I made a nice, shiny new logo to tie them all together. Look for the K built from Penrose shapes. Why Penrose? I guess I'm just fascinated with making something from the impossible.
kodamachameleon.com
kodamachameleon.com
Kodama Chameleon - Strange Cyber Tails Caught in the Wild
Strange Cyber Tails Caught in the Wild
kodamachameleon.com
September 2, 2025 at 11:40 PM
I realize changing colors platform to platform might leave some to wonder... so I made a nice, shiny new logo to tie them all together. Look for the K built from Penrose shapes. Why Penrose? I guess I'm just fascinated with making something from the impossible.
kodamachameleon.com
kodamachameleon.com
... I figured this chameleon ought to learn something about the software development process formally for a change. I was in for a bit of a surprise!
#omscy #cs6300 #gatech #cybersecurity
#omscy #cs6300 #gatech #cybersecurity
Software Dev Process
As someone who can easily find themselves up past midnight coding for fun, I figured this chameleon ought to learn […]
kodamachameleon.com
August 12, 2025 at 5:53 PM
... I figured this chameleon ought to learn something about the software development process formally for a change. I was in for a bit of a surprise!
#omscy #cs6300 #gatech #cybersecurity
#omscy #cs6300 #gatech #cybersecurity
It should come as no surprise to those of us who remember what happened with #polyfill.io that the FBI has tied #funnull to #pigbutchering.
www.ic3.gov/CSA/2025/250...
www.ic3.gov/CSA/2025/250...
www.ic3.gov
June 5, 2025 at 4:04 AM
It should come as no surprise to those of us who remember what happened with #polyfill.io that the FBI has tied #funnull to #pigbutchering.
www.ic3.gov/CSA/2025/250...
www.ic3.gov/CSA/2025/250...
Anyone else come across this crypto scam technique? Same website templates, new hook. Stay safe out there!
#crypto #scam #x #twitter #blog
kodamachameleon.com/2025/06/02/1...
#crypto #scam #x #twitter #blog
kodamachameleon.com/2025/06/02/1...
$1.8M in My DMs? Must Be Love
Just when you think you’ve got the whole crypto investment scam playbook memorized...
kodamachameleon.com
June 2, 2025 at 5:48 PM
Not often do #privacy professionals and child safety advocates get to celebrate the same legislation as the most recent #takeitdown act. Enforcement and abuse will undoubtedly be an issue, but let’s not let best be the enemy of the good.
www.yahoo.com/news/down-ac...
www.yahoo.com/news/down-ac...
How the Take It Down Act tackles nonconsensual deepfake porn − and how it falls short
A bill with broad bipartisan support aims to take on AI-generated sexual abuse, but enforcement issues and privacy blind spots could leave victims just as vulnerable.
www.yahoo.com
May 11, 2025 at 7:09 PM
Not often do #privacy professionals and child safety advocates get to celebrate the same legislation as the most recent #takeitdown act. Enforcement and abuse will undoubtedly be an issue, but let’s not let best be the enemy of the good.
www.yahoo.com/news/down-ac...
www.yahoo.com/news/down-ac...
We're back! After a long break, our latest blog has finally been released. This one's on counter-fraud, a world I find myself investigating more and more. Enjoy, and feedback is always welcomed!
#fraud #scams #socialmedia #FTC #ICANN
kodamachameleon.com/2025/04/11/s...
#fraud #scams #socialmedia #FTC #ICANN
kodamachameleon.com/2025/04/11/s...
Social Mayhem: Fighting Fraudsters Ain't Fair
Humans crave connection. Am I right? I mean, that's pretty much what they were created for, and when that slithering serpent (a.k.a. disgraced reptile) got them...
kodamachameleon.com
April 11, 2025 at 5:53 PM
We're back! After a long break, our latest blog has finally been released. This one's on counter-fraud, a world I find myself investigating more and more. Enjoy, and feedback is always welcomed!
#fraud #scams #socialmedia #FTC #ICANN
kodamachameleon.com/2025/04/11/s...
#fraud #scams #socialmedia #FTC #ICANN
kodamachameleon.com/2025/04/11/s...
Reposted by Kodama
NEW: 🚨 Hackers are actively exploiting #ChatGPT's CVE-2024-27564 vulnerability, with 10,000+ attacks recorded in a week!
Read: hackread.com/hackers-expl...
#CyberSecurity #OpenAI #Vulnerability #AI
Read: hackread.com/hackers-expl...
#CyberSecurity #OpenAI #Vulnerability #AI
Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week
Follow us on Bluesky, Twitter (X) and Facebook at @Hackread
hackread.com
March 17, 2025 at 9:36 PM
NEW: 🚨 Hackers are actively exploiting #ChatGPT's CVE-2024-27564 vulnerability, with 10,000+ attacks recorded in a week!
Read: hackread.com/hackers-expl...
#CyberSecurity #OpenAI #Vulnerability #AI
Read: hackread.com/hackers-expl...
#CyberSecurity #OpenAI #Vulnerability #AI
Just watched @pexx’s walkthrough of WhatsMyName-Docker. Awesome breakdown of how to streamline username enumeration! Huge thanks for the detailed walkthrough. Check it out at youtu.be/oqxRg4EBeNA!
#WhatsMyName #OSINT #Docker
#WhatsMyName #OSINT #Docker
Automating OSINT... | What's My Name Docker Walkthrough
YouTube video by pexx
youtu.be
February 17, 2025 at 8:38 PM
Just watched @pexx’s walkthrough of WhatsMyName-Docker. Awesome breakdown of how to streamline username enumeration! Huge thanks for the detailed walkthrough. Check it out at youtu.be/oqxRg4EBeNA!
#WhatsMyName #OSINT #Docker
#WhatsMyName #OSINT #Docker
Reposted by Kodama
Silent Push has discovered a Chinese CDN that rents IPs from major could providers and makes them available to various cybercrime operations.
FUNNULL has hosted phishing portals, online romance scams, and gambling sites linked to money laundering operations.
www.silentpush.com/blog/infrast...
FUNNULL has hosted phishing portals, online romance scams, and gambling sites linked to money laundering operations.
www.silentpush.com/blog/infrast...
Infrastructure Laundering: Silent Push Exposes Cloudy Behavior Around FUNNULL CDN Renting IPs from Big Tech
Infrastructure Laundering is a criminal practice of intermediaries enabling threat actors to hide infrastructure with major cloud providers.
www.silentpush.com
February 1, 2025 at 9:28 PM
Silent Push has discovered a Chinese CDN that rents IPs from major could providers and makes them available to various cybercrime operations.
FUNNULL has hosted phishing portals, online romance scams, and gambling sites linked to money laundering operations.
www.silentpush.com/blog/infrast...
FUNNULL has hosted phishing portals, online romance scams, and gambling sites linked to money laundering operations.
www.silentpush.com/blog/infrast...
Reposted by Kodama
New Blog! Tracking Adversaries: Ghostwriter APT Infrastructure 🇧🇾
blog.bushidotoken.net/2025/01/trac...
blog.bushidotoken.net/2025/01/trac...
Tracking Adversaries: Ghostwriter APT Infrastructure
CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security
blog.bushidotoken.net
January 20, 2025 at 10:35 AM
New Blog! Tracking Adversaries: Ghostwriter APT Infrastructure 🇧🇾
blog.bushidotoken.net/2025/01/trac...
blog.bushidotoken.net/2025/01/trac...
Not really in a position to investigate this myself, so if anyone else wants to pay my “urgent toll bills” at https://ezdrive.com-hgyz[.]top/us, would love for you to tell me what you find.
#scam #fraud #cybersecurity #smishing
#scam #fraud #cybersecurity #smishing
January 14, 2025 at 6:38 PM
Not really in a position to investigate this myself, so if anyone else wants to pay my “urgent toll bills” at https://ezdrive.com-hgyz[.]top/us, would love for you to tell me what you find.
#scam #fraud #cybersecurity #smishing
#scam #fraud #cybersecurity #smishing
Reposted by Kodama
Discover techniques to identify origin IPs behind Web Application Firewalls (WAFs). Professionals emphasize ethical practices while using various tools for this task. Understanding these methods can enhance #cybersecurity efforts. Stay informed about the challenges in addressing #threats to web appl
Techniques for Identifying Origin IPs Behind WAFs
The article discusses techniques and tools used by cybersecurity professionals to uncover the origin IP addresses of websites protected by Web Application Firewalls, emphasizing the importance of ethical considerations in this process.
decrypt.lol
December 31, 2024 at 11:21 PM
Discover techniques to identify origin IPs behind Web Application Firewalls (WAFs). Professionals emphasize ethical practices while using various tools for this task. Understanding these methods can enhance #cybersecurity efforts. Stay informed about the challenges in addressing #threats to web appl
🚀 Exciting News! WhatsMyName-Docker v1.1.0 is Here!
I am thrilled to announce the latest update to WMN-Docker, packed with amazing new features and enhancements!
👉 github.com/kodamaChamel...
#WhatsMyName #OpenSource #OSINT #Docker #TechRelease
I am thrilled to announce the latest update to WMN-Docker, packed with amazing new features and enhancements!
👉 github.com/kodamaChamel...
#WhatsMyName #OpenSource #OSINT #Docker #TechRelease
GitHub - kodamaChameleon/wmn-docker: Docker API Wrapper over WhatsMyName OSINT Username Enumeration Tool
Docker API Wrapper over WhatsMyName OSINT Username Enumeration Tool - kodamaChameleon/wmn-docker
github.com
December 31, 2024 at 3:43 PM
🚀 Exciting News! WhatsMyName-Docker v1.1.0 is Here!
I am thrilled to announce the latest update to WMN-Docker, packed with amazing new features and enhancements!
👉 github.com/kodamaChamel...
#WhatsMyName #OpenSource #OSINT #Docker #TechRelease
I am thrilled to announce the latest update to WMN-Docker, packed with amazing new features and enhancements!
👉 github.com/kodamaChamel...
#WhatsMyName #OpenSource #OSINT #Docker #TechRelease
Reposted by Kodama
parrottalks extension also affected (40k users) kkodiihpgodmdankclfibbiphjkfdenh
t.co/SMFH07Gnv8
t.co/SMFH07Gnv8
December 27, 2024 at 2:26 AM
parrottalks extension also affected (40k users) kkodiihpgodmdankclfibbiphjkfdenh
t.co/SMFH07Gnv8
t.co/SMFH07Gnv8
Classic #usps #scam at https://usps[.]com-tracking-xxxcv.cc/vip/. Site only renders on mobile. It asks for personal info and credit card details.
#cti #ioc #cybersecurity
#cti #ioc #cybersecurity
December 19, 2024 at 9:13 PM
Classic #usps #scam at https://usps[.]com-tracking-xxxcv.cc/vip/. Site only renders on mobile. It asks for personal info and credit card details.
#cti #ioc #cybersecurity
#cti #ioc #cybersecurity
Reposted by Kodama
May have missed the bigger headline: MICROSOFT BUILDS REMOTE BACKDOOR INTO POPULAR DEVELOPMENT APP. What could possibly go wrong?
www.bleepingcomputer.com/news/securit...
#cybersecurity #cti #vscode #microsoft
www.bleepingcomputer.com/news/securit...
#cybersecurity #cti #vscode #microsoft
Chinese hackers use Visual Studio Code tunnels for remote access
Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain persistent access to compromised systems.
www.bleepingcomputer.com
December 12, 2024 at 11:26 PM
May have missed the bigger headline: MICROSOFT BUILDS REMOTE BACKDOOR INTO POPULAR DEVELOPMENT APP. What could possibly go wrong?
www.bleepingcomputer.com/news/securit...
#cybersecurity #cti #vscode #microsoft
www.bleepingcomputer.com/news/securit...
#cybersecurity #cti #vscode #microsoft
May have missed the bigger headline: MICROSOFT BUILDS REMOTE BACKDOOR INTO POPULAR DEVELOPMENT APP. What could possibly go wrong?
www.bleepingcomputer.com/news/securit...
#cybersecurity #cti #vscode #microsoft
www.bleepingcomputer.com/news/securit...
#cybersecurity #cti #vscode #microsoft
Chinese hackers use Visual Studio Code tunnels for remote access
Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain persistent access to compromised systems.
www.bleepingcomputer.com
December 12, 2024 at 11:26 PM
May have missed the bigger headline: MICROSOFT BUILDS REMOTE BACKDOOR INTO POPULAR DEVELOPMENT APP. What could possibly go wrong?
www.bleepingcomputer.com/news/securit...
#cybersecurity #cti #vscode #microsoft
www.bleepingcomputer.com/news/securit...
#cybersecurity #cti #vscode #microsoft
Reposted by Kodama
A classical example of supply chain attacks.
Nowadays, attackers more and more focus on 3rd party like github repository packages, be careful.
Here is an interesting article by wiz about the ultralytics infection :
www.wiz.io/blog/ultraly...
#cybersecurity #infosec #github #malware #hacking #AI
Nowadays, attackers more and more focus on 3rd party like github repository packages, be careful.
Here is an interesting article by wiz about the ultralytics infection :
www.wiz.io/blog/ultraly...
#cybersecurity #infosec #github #malware #hacking #AI
www.wiz.io
December 10, 2024 at 7:28 AM
A classical example of supply chain attacks.
Nowadays, attackers more and more focus on 3rd party like github repository packages, be careful.
Here is an interesting article by wiz about the ultralytics infection :
www.wiz.io/blog/ultraly...
#cybersecurity #infosec #github #malware #hacking #AI
Nowadays, attackers more and more focus on 3rd party like github repository packages, be careful.
Here is an interesting article by wiz about the ultralytics infection :
www.wiz.io/blog/ultraly...
#cybersecurity #infosec #github #malware #hacking #AI