• Biggest And Best Cuphead Plush Drops To Lowest Price Yet

    Club Mocchi-Mocchi Plushie Deals Zelda, Mario, Kirby, Sonic, and more See We’re inching closer to Prime Day, but you don’t have to wait until July 8 to save a few bucks on some of the best video game-inspired plushies around. Tomy's Club Mocchi-Mocchi collection is filled with ultra-soft, officially licensed plushies themed around Super Mario, The Legend of Zelda, Kirby, Animal Crossing, and more popular franchises.While many of the standouts hail from classic Nintendo franchises, one of our favorites is the 15-inch Cuphead plush. Fans can get this very cute Cuphead plush for. This is the lowest price ever for Club Mocchi-Mocchi's Cuphead plush, which is large and chunky enough to be used as a pillow. Cuphead 15-Inch Plush by Club Mocchi-MocchiCuphead displays a wide range of facial expressions in StudioMDHR's brilliant boss rush action game--and in Netflix's TV adaptation--but Club Mocchi-Mocchi opted for happiness with its officially licensed 15-inch plush. The result is an adorable recreation of the beloved character.Since Cuphead's cup head has a handle on the back, you could attach it to your backpack to have the world's largest keychain plush. In all seriousness, it's worth noting that this plush topples over if you try to display it without a support behind it. And yes, it's because Cuphead has an enormous head.Cuphead isn't the only large Club Mocchi-Mocchi plush available for a discount. Check out deals on Nintendo and Sega designs below. See Club Mocchi-Mocchi 15-inch gaming plushiesClub Mocchi Mocchi Plush DealsOther great deals on 15-inch plushies include Super Mario's Goomba for Mario Kart's Blue Shell for and Zelda's Octorok for The list below also includes a few deals from Best Buy, Walmart, and Target. You can get a 15-inch Yoshi Egg plush at Best Buy for and 6-inch Animal Crossing plushies for at Walmart. Target has a 13-inch Dr. Eggman plush for only You can pair Sega's iconic villain with a 15-inch Sonic plush for Continue Reading at GameSpot
    #biggest #best #cuphead #plush #drops
    Biggest And Best Cuphead Plush Drops To Lowest Price Yet
    Club Mocchi-Mocchi Plushie Deals Zelda, Mario, Kirby, Sonic, and more See We’re inching closer to Prime Day, but you don’t have to wait until July 8 to save a few bucks on some of the best video game-inspired plushies around. Tomy's Club Mocchi-Mocchi collection is filled with ultra-soft, officially licensed plushies themed around Super Mario, The Legend of Zelda, Kirby, Animal Crossing, and more popular franchises.While many of the standouts hail from classic Nintendo franchises, one of our favorites is the 15-inch Cuphead plush. Fans can get this very cute Cuphead plush for. This is the lowest price ever for Club Mocchi-Mocchi's Cuphead plush, which is large and chunky enough to be used as a pillow. Cuphead 15-Inch Plush by Club Mocchi-MocchiCuphead displays a wide range of facial expressions in StudioMDHR's brilliant boss rush action game--and in Netflix's TV adaptation--but Club Mocchi-Mocchi opted for happiness with its officially licensed 15-inch plush. The result is an adorable recreation of the beloved character.Since Cuphead's cup head has a handle on the back, you could attach it to your backpack to have the world's largest keychain plush. In all seriousness, it's worth noting that this plush topples over if you try to display it without a support behind it. And yes, it's because Cuphead has an enormous head.Cuphead isn't the only large Club Mocchi-Mocchi plush available for a discount. Check out deals on Nintendo and Sega designs below. See Club Mocchi-Mocchi 15-inch gaming plushiesClub Mocchi Mocchi Plush DealsOther great deals on 15-inch plushies include Super Mario's Goomba for Mario Kart's Blue Shell for and Zelda's Octorok for The list below also includes a few deals from Best Buy, Walmart, and Target. You can get a 15-inch Yoshi Egg plush at Best Buy for and 6-inch Animal Crossing plushies for at Walmart. Target has a 13-inch Dr. Eggman plush for only You can pair Sega's iconic villain with a 15-inch Sonic plush for Continue Reading at GameSpot #biggest #best #cuphead #plush #drops
    WWW.GAMESPOT.COM
    Biggest And Best Cuphead Plush Drops To Lowest Price Yet
    Club Mocchi-Mocchi Plushie Deals at Amazon Zelda, Mario, Kirby, Sonic, and more See at Amazon We’re inching closer to Prime Day, but you don’t have to wait until July 8 to save a few bucks on some of the best video game-inspired plushies around. Tomy's Club Mocchi-Mocchi collection is filled with ultra-soft, officially licensed plushies themed around Super Mario, The Legend of Zelda, Kirby, Animal Crossing, and more popular franchises.While many of the standouts hail from classic Nintendo franchises, one of our favorites is the 15-inch Cuphead plush. Fans can get this very cute Cuphead plush for $27 (was $35) at Amazon. This is the lowest price ever for Club Mocchi-Mocchi's Cuphead plush, which is large and chunky enough to be used as a pillow. Cuphead 15-Inch Plush by Club Mocchi-Mocchi $27 (was $35) Cuphead displays a wide range of facial expressions in StudioMDHR's brilliant boss rush action game--and in Netflix's TV adaptation--but Club Mocchi-Mocchi opted for happiness with its officially licensed 15-inch plush. The result is an adorable recreation of the beloved character.Since Cuphead's cup head has a handle on the back, you could attach it to your backpack to have the world's largest keychain plush. In all seriousness, it's worth noting that this plush topples over if you try to display it without a support behind it. And yes, it's because Cuphead has an enormous head.Cuphead isn't the only large Club Mocchi-Mocchi plush available for a discount. Check out deals on Nintendo and Sega designs below. See at Amazon Club Mocchi-Mocchi 15-inch gaming plushiesClub Mocchi Mocchi Plush DealsOther great deals on 15-inch plushies at Amazon include Super Mario's Goomba for $24.49, Mario Kart's Blue Shell for $22.50, and Zelda's Octorok for $23. The list below also includes a few deals from Best Buy, Walmart, and Target. You can get a 15-inch Yoshi Egg plush at Best Buy for $21 and 6-inch Animal Crossing plushies for $10 at Walmart. Target has a 13-inch Dr. Eggman plush for only $20. You can pair Sega's iconic villain with a 15-inch Sonic plush for $25.Continue Reading at GameSpot
    Like
    Wow
    Love
    Sad
    Angry
    78
    0 Yorumlar 0 hisse senetleri
  • Ah, the AirPods Max – those luxurious little orbs of sound that promise to elevate your auditory experience to heavenly heights. But wait, let’s pause for a moment before we dive headfirst into that Labor Day deal that boasts the lowest price ever – because we all know that’s just a fancy way of saying, "Hey, here’s your chance to pay a premium for something that’ll make you look particularly stylish while ignoring the world around you!"

    First, let’s talk about the design. Oh, the design! They’re like the love child of a spaceship and a pair of earmuffs you’d find at your grandma’s house. Who wouldn’t want to sport that look while strolling down the street, desperately trying to convince everyone that you’re both hip and excessively wealthy? But really, when you put them on, it's not just about sound quality; it’s about transforming into an audio-engineering superhero, ready to save the world from mediocre bass and treble.

    Now, let’s address the elephant in the room: the price. Yes, they’re on sale for the lowest price ever. It’s almost like saying, “Look, we’ve slashed the price of your next existential crisis!” Because let’s be honest, do you really need headphones that are priced higher than your monthly grocery budget? Sure, you’ll be able to hear every single whisper of the universe, but will you also be able to afford rent? It’s a fine balance between living your best life and living in your parents’ basement.

    And how about that "noise cancellation"? It’s almost magical! You’ll be so immersed in your own world that you won’t hear your friends trying to communicate with you. Remember socializing? That’s out the window. You’ll be too busy basking in the glory of your overpriced headphones to notice that your social life is slowly fading away. But hey, at least you’ll have great sound quality while binge-watching that show you promised you’d watch with your friends three months ago!

    Let’s not forget about the battery life. They say it lasts long enough to get you through a full workday. But let’s be real: if you’re using them all day, are you even working? Or are you just pretending to be busy while actually listening to your secret playlist of 90s boy bands? Either way, you’ll be the picture of productivity, even if your productivity is strictly limited to singing along to “I Want It That Way.”

    In conclusion, while the AirPods Max may be your favorite headphones, maybe just maybe, you should save your hard-earned cash for something a little less extravagant. After all, there’s a fine line between enjoying life’s luxuries and being the punchline in a “what was I thinking?” story. So go ahead, indulge in that Labor Day deal, but don’t say I didn’t warn you when you find yourself hiding from your friends in the corner of your apartment, cranking up the volume on your guilt over your questionable financial decisions.

    #AirPodsMax #Headphones #LuxuryLifestyle #TechHumor #SmartSpending
    Ah, the AirPods Max – those luxurious little orbs of sound that promise to elevate your auditory experience to heavenly heights. But wait, let’s pause for a moment before we dive headfirst into that Labor Day deal that boasts the lowest price ever – because we all know that’s just a fancy way of saying, "Hey, here’s your chance to pay a premium for something that’ll make you look particularly stylish while ignoring the world around you!" First, let’s talk about the design. Oh, the design! They’re like the love child of a spaceship and a pair of earmuffs you’d find at your grandma’s house. Who wouldn’t want to sport that look while strolling down the street, desperately trying to convince everyone that you’re both hip and excessively wealthy? But really, when you put them on, it's not just about sound quality; it’s about transforming into an audio-engineering superhero, ready to save the world from mediocre bass and treble. Now, let’s address the elephant in the room: the price. Yes, they’re on sale for the lowest price ever. It’s almost like saying, “Look, we’ve slashed the price of your next existential crisis!” Because let’s be honest, do you really need headphones that are priced higher than your monthly grocery budget? Sure, you’ll be able to hear every single whisper of the universe, but will you also be able to afford rent? It’s a fine balance between living your best life and living in your parents’ basement. And how about that "noise cancellation"? It’s almost magical! You’ll be so immersed in your own world that you won’t hear your friends trying to communicate with you. Remember socializing? That’s out the window. You’ll be too busy basking in the glory of your overpriced headphones to notice that your social life is slowly fading away. But hey, at least you’ll have great sound quality while binge-watching that show you promised you’d watch with your friends three months ago! Let’s not forget about the battery life. They say it lasts long enough to get you through a full workday. But let’s be real: if you’re using them all day, are you even working? Or are you just pretending to be busy while actually listening to your secret playlist of 90s boy bands? Either way, you’ll be the picture of productivity, even if your productivity is strictly limited to singing along to “I Want It That Way.” In conclusion, while the AirPods Max may be your favorite headphones, maybe just maybe, you should save your hard-earned cash for something a little less extravagant. After all, there’s a fine line between enjoying life’s luxuries and being the punchline in a “what was I thinking?” story. So go ahead, indulge in that Labor Day deal, but don’t say I didn’t warn you when you find yourself hiding from your friends in the corner of your apartment, cranking up the volume on your guilt over your questionable financial decisions. #AirPodsMax #Headphones #LuxuryLifestyle #TechHumor #SmartSpending
    The AirPods Max are my favourite headphones – but you shouldn't buy them
    This Labor Day deal is the lowest price they've ever gone for.
    Like
    Love
    Wow
    Sad
    Angry
    297
    1 Yorumlar 0 hisse senetleri
  • The 20 Worst Movies of the Last 20 Years

    There is no good without bad. It’s a cliché, but it’s true. How can you fully appreciate an exceptional work of art without comparing it to one that didn’t work? A truly awful movie puts a truly great masterpiece into perspective.So consider this piece a study in perspectives. No one who made any of the 20 movies below, our picks for the 20 worst movies of the last 20 years, set out to produce a bad movie. But it happened anyway, despite all their hard work and good intentions. Writing is hard. Casting is hard. Directing is hard. Movies are hard.If you’re thinking about using this list to help program your friends’ next Bad Movie Night, just keep in mind: Some of the films below are not so-bad-they’re-good. They’re just plain awful.Proceed with caution and remember: There is no good without bad ... but sometimes it’s better to just watch a good movie instead of forcing the comparison.The 20 Worst Movies of the Last 20 YearsMovies can bring us to the highest highs and the lowest lows. These 20 films of the last 20 years are very much the latter.READ MORE: 25 Actors Who Turned Down Roles in Huge MoviesGet our free mobile appThe 20 Best Movies of the Last 20 YearsThe 20 films of the last two decades that you absolutely need to see.Categories: Lists, Longform, Movie News, Special Features
    #worst #movies #last #years
    The 20 Worst Movies of the Last 20 Years
    There is no good without bad. It’s a cliché, but it’s true. How can you fully appreciate an exceptional work of art without comparing it to one that didn’t work? A truly awful movie puts a truly great masterpiece into perspective.So consider this piece a study in perspectives. No one who made any of the 20 movies below, our picks for the 20 worst movies of the last 20 years, set out to produce a bad movie. But it happened anyway, despite all their hard work and good intentions. Writing is hard. Casting is hard. Directing is hard. Movies are hard.If you’re thinking about using this list to help program your friends’ next Bad Movie Night, just keep in mind: Some of the films below are not so-bad-they’re-good. They’re just plain awful.Proceed with caution and remember: There is no good without bad ... but sometimes it’s better to just watch a good movie instead of forcing the comparison.The 20 Worst Movies of the Last 20 YearsMovies can bring us to the highest highs and the lowest lows. These 20 films of the last 20 years are very much the latter.READ MORE: 25 Actors Who Turned Down Roles in Huge MoviesGet our free mobile appThe 20 Best Movies of the Last 20 YearsThe 20 films of the last two decades that you absolutely need to see.Categories: Lists, Longform, Movie News, Special Features #worst #movies #last #years
    SCREENCRUSH.COM
    The 20 Worst Movies of the Last 20 Years
    There is no good without bad. It’s a cliché, but it’s true. How can you fully appreciate an exceptional work of art without comparing it to one that didn’t work? A truly awful movie puts a truly great masterpiece into perspective.So consider this piece a study in perspectives. No one who made any of the 20 movies below, our picks for the 20 worst movies of the last 20 years, set out to produce a bad movie. But it happened anyway, despite all their hard work and good intentions. Writing is hard. Casting is hard. Directing is hard. Movies are hard.(Okay, strike that. At least one filmmaker on the list reportedly exploited a tax loophole that meant investors only had to pay taxes on investments in films that turned a profit, leaving a financial incentive for a movie to flop. So maybe someone occasionally does set out to make a bad movie. Or at least, the movie’s quality is of far lesser concern than, say, sales to foreign distributors. But it’s rare.)If you’re thinking about using this list to help program your friends’ next Bad Movie Night, just keep in mind: Some of the films below are not so-bad-they’re-good. They’re just plain awful. (The tax loophole guy’s film, for example, that’s a real tough sit.) Proceed with caution and remember: There is no good without bad ... but sometimes it’s better to just watch a good movie instead of forcing the comparison.The 20 Worst Movies of the Last 20 Years (2005-2024)Movies can bring us to the highest highs and the lowest lows. These 20 films of the last 20 years are very much the latter.READ MORE: 25 Actors Who Turned Down Roles in Huge MoviesGet our free mobile appThe 20 Best Movies of the Last 20 Years (2005-2024)The 20 films of the last two decades that you absolutely need to see.Categories: Lists, Longform, Movie News, Special Features
    Like
    Love
    Wow
    Sad
    Angry
    411
    2 Yorumlar 0 hisse senetleri
  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

    Jun 16, 2025Ravie LakshmananMalware / DevOps

    Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others.
    The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions."
    The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week.
    Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload.
    Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer.

    The stealer malware is equipped to siphon a wide range of data from infected machines. This includes -

    JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers
    Pod sandbox environment authentication tokens and git information
    CI/CD information from environment variables
    Zscaler host configuration
    Amazon Web Services account information and tokens
    Public IP address
    General platform, user, and host information

    The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems.
    The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis.
    "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said.

    "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity."
    The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below -

    eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry.
    SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown.
    "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said.
    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
    "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server.
    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB.
    "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user.
    The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT.
    "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent."
    Crypto Malware in the Open-Source Supply Chain
    The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem.

    Some of the examples of these packages include -

    express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys
    bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing.
    lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers

    "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said.
    "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets."
    AI and Slopsquatting
    The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks.
    Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences.

    Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting.
    "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said.
    "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #malicious #pypi #package #masquerades #chimera
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server. This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB. "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #malicious #pypi #package #masquerades #chimera
    THEHACKERNEWS.COM
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development of [machine learning] solutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithm (DGA) in order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former package ("proxy.eslint-proxy[.]site") to retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel"). This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co"). "[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence (AI)-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language models (LLMs) can hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol (MCP)-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Yorumlar 0 hisse senetleri
  • Why Companies Need to Reimagine Their AI Approach

    Ivy Grant, SVP of Strategy & Operations, Twilio June 13, 20255 Min Readpeshkova via alamy stockAsk technologists and enterprise leaders what they hope AI will deliver, and most will land on some iteration of the "T" word: transformation. No surprise, AI and its “cooler than you” cousin, generative AI, have been hyped nonstop for the past 24 months. But therein lies the problem. Many organizations are rushing to implement AI without a grasp on the return on investment, leading to high spend and low impact. Without anchoring AI to clear friction points and acceleration opportunities, companies invite fatigue, anxiety and competitive risk. Two-thirds of C-suite execs say GenAI has created tension and division within their organizations; nearly half say it’s “tearing their company apart.” Mostreport adoption challenges; more than a third call it a massive disappointment. While AI's potential is irrefutable, companies need to reject the narrative of AI as a standalone strategy or transformational savior. Its true power is as a catalyst to amplify what already works and surface what could. Here are three principles to make that happen. 1. Start with friction, not function Many enterprises struggle with where to start when integrating AI. My advice: Start where the pain is greatest. Identify the processes that create the most friction and work backward from there. AI is a tool, not a solution. By mapping real pain points to AI use cases, you can hone investments to the ripest fruit rather than simply where it hangs at the lowest. Related:For example, one of our top sources of customer pain was troubleshooting undeliverable messages, which forced users to sift through error code documentation. To solve this, an AI assistant was introduced to detect anomalies, explain causes in natural language, and guide customers toward resolution. We achieved a 97% real-time resolution rate through a blend of conversational AI and live support. Most companies have long-standing friction points that support teams routinely explain. Or that you’ve developed organizational calluses over; problems considered “just the cost of doing business.” GenAI allows leaders to revisit these areas and reimagine what’s possible. 2. The need forspeed We hear stories of leaders pushing an “all or nothing” version of AI transformation: Use AI to cut functional headcount or die. Rather than leading with a “stick” through wholesale transformation mandates or threats to budgets, we must recognize AI implementation as a fundamental culture change. Just as you wouldn't expect to transform your company culture overnight by edict, it's unreasonable to expect something different from your AI transformation. Related:Some leaders have a tendency to move faster than the innovation ability or comfort level of their people. Most functional leads aren’t obstinate in their slow adoption of AI tools, their long-held beliefs to run a process or to assess risks. We hired these leaders for their decades of experience in “what good looks like” and deep expertise in incremental improvements; then we expect them to suddenly define a futuristic vision that challenges their own beliefs. As executive leaders, we must give grace, space and plenty of “carrots” -- incentives, training, and support resources -- to help them reimagine complex workflows with AI. And, we must recognize that AI has the ability to make progress in ways that may not immediately create cost efficiencies, such as for operational improvements that require data cleansing, deep analytics, forecasting, dynamic pricing, and signal sensing. These aren’t the sexy parts of AI, but they’re the types of issues that require superhuman intelligence and complex problem-solving that AI was made for. 3. A flywheel of acceleration The other transformation that AI should support is creating faster and broader “test and learn” cycles. AI implementation is not a linear process with start here and end there. Organizations that want to leverage AI as a competitive advantage should establish use cases where AI can break down company silos and act as a catalyst to identify the next opportunity. That identifies the next as a flywheel of acceleration. This flywheel builds on accumulated learnings, making small successes into larger wins while avoiding costly AI disasters from rushed implementation. Related:For example, at Twilio we are building a customer intelligence platform that analyzes thousands of conversations to identify patterns and drive insights. If we see multiple customers mention a competitor's pricing, it could signal a take-out campaign. What once took weeks to recognize and escalate can now be done in near real-time and used for highly coordinated activations across marketing, product, sales, and other teams. With every AI acceleration win, we uncover more places to improve hand-offs, activation speed, and business decision-making. That flywheel of innovation is how true AI transformation begins to drive impactful business outcomes. Ideas to Fuel Your AI Strategy Organizations can accelerate their AI implementations through these simple shifts in approach: Revisit your long-standing friction points, both customer-facing and internal, across your organization -- particularly explore the ones you thought were “the cost of doing business” Don’t just look for where AI can reduce manual processes, but find the highly complex problems and start experimenting Support your functional experts with AI-driven training, resources, tools, and incentives to help them challenge their long-held beliefs about what works for the future Treat AI implementation as a cultural change that requires time, experimentation, learning, and carrots Recognize that transformation starts with a flywheel of acceleration, where each new experiment can lead to the next big discovery The most impactful AI implementations don’t rush transformation; they strategically accelerate core capabilities and unlock new ones to drive measurable change. About the AuthorIvy GrantSVP of Strategy & Operations, Twilio Ivy Grant is Senior Vice President of Strategy & Operations at Twilio where she leads strategic planning, enterprise analytics, M&A Integration and is responsible for driving transformational initiatives that enable Twilio to continuously improve its operations. Prior to Twilio, Ivy’s career has balanced senior roles in strategy consulting at McKinsey & Company, Edelman and PwC with customer-centric operational roles at Walmart, Polo Ralph Lauren and tech startup Eversight Labs. She loves solo international travel, hugging exotic animals and boxing. Ivy has an MBA from NYU’s Stern School of Business and a BS in Applied Economics from Cornell University. See more from Ivy GrantReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    #why #companies #need #reimagine #their
    Why Companies Need to Reimagine Their AI Approach
    Ivy Grant, SVP of Strategy & Operations, Twilio June 13, 20255 Min Readpeshkova via alamy stockAsk technologists and enterprise leaders what they hope AI will deliver, and most will land on some iteration of the "T" word: transformation. No surprise, AI and its “cooler than you” cousin, generative AI, have been hyped nonstop for the past 24 months. But therein lies the problem. Many organizations are rushing to implement AI without a grasp on the return on investment, leading to high spend and low impact. Without anchoring AI to clear friction points and acceleration opportunities, companies invite fatigue, anxiety and competitive risk. Two-thirds of C-suite execs say GenAI has created tension and division within their organizations; nearly half say it’s “tearing their company apart.” Mostreport adoption challenges; more than a third call it a massive disappointment. While AI's potential is irrefutable, companies need to reject the narrative of AI as a standalone strategy or transformational savior. Its true power is as a catalyst to amplify what already works and surface what could. Here are three principles to make that happen. 1. Start with friction, not function Many enterprises struggle with where to start when integrating AI. My advice: Start where the pain is greatest. Identify the processes that create the most friction and work backward from there. AI is a tool, not a solution. By mapping real pain points to AI use cases, you can hone investments to the ripest fruit rather than simply where it hangs at the lowest. Related:For example, one of our top sources of customer pain was troubleshooting undeliverable messages, which forced users to sift through error code documentation. To solve this, an AI assistant was introduced to detect anomalies, explain causes in natural language, and guide customers toward resolution. We achieved a 97% real-time resolution rate through a blend of conversational AI and live support. Most companies have long-standing friction points that support teams routinely explain. Or that you’ve developed organizational calluses over; problems considered “just the cost of doing business.” GenAI allows leaders to revisit these areas and reimagine what’s possible. 2. The need forspeed We hear stories of leaders pushing an “all or nothing” version of AI transformation: Use AI to cut functional headcount or die. Rather than leading with a “stick” through wholesale transformation mandates or threats to budgets, we must recognize AI implementation as a fundamental culture change. Just as you wouldn't expect to transform your company culture overnight by edict, it's unreasonable to expect something different from your AI transformation. Related:Some leaders have a tendency to move faster than the innovation ability or comfort level of their people. Most functional leads aren’t obstinate in their slow adoption of AI tools, their long-held beliefs to run a process or to assess risks. We hired these leaders for their decades of experience in “what good looks like” and deep expertise in incremental improvements; then we expect them to suddenly define a futuristic vision that challenges their own beliefs. As executive leaders, we must give grace, space and plenty of “carrots” -- incentives, training, and support resources -- to help them reimagine complex workflows with AI. And, we must recognize that AI has the ability to make progress in ways that may not immediately create cost efficiencies, such as for operational improvements that require data cleansing, deep analytics, forecasting, dynamic pricing, and signal sensing. These aren’t the sexy parts of AI, but they’re the types of issues that require superhuman intelligence and complex problem-solving that AI was made for. 3. A flywheel of acceleration The other transformation that AI should support is creating faster and broader “test and learn” cycles. AI implementation is not a linear process with start here and end there. Organizations that want to leverage AI as a competitive advantage should establish use cases where AI can break down company silos and act as a catalyst to identify the next opportunity. That identifies the next as a flywheel of acceleration. This flywheel builds on accumulated learnings, making small successes into larger wins while avoiding costly AI disasters from rushed implementation. Related:For example, at Twilio we are building a customer intelligence platform that analyzes thousands of conversations to identify patterns and drive insights. If we see multiple customers mention a competitor's pricing, it could signal a take-out campaign. What once took weeks to recognize and escalate can now be done in near real-time and used for highly coordinated activations across marketing, product, sales, and other teams. With every AI acceleration win, we uncover more places to improve hand-offs, activation speed, and business decision-making. That flywheel of innovation is how true AI transformation begins to drive impactful business outcomes. Ideas to Fuel Your AI Strategy Organizations can accelerate their AI implementations through these simple shifts in approach: Revisit your long-standing friction points, both customer-facing and internal, across your organization -- particularly explore the ones you thought were “the cost of doing business” Don’t just look for where AI can reduce manual processes, but find the highly complex problems and start experimenting Support your functional experts with AI-driven training, resources, tools, and incentives to help them challenge their long-held beliefs about what works for the future Treat AI implementation as a cultural change that requires time, experimentation, learning, and carrots Recognize that transformation starts with a flywheel of acceleration, where each new experiment can lead to the next big discovery The most impactful AI implementations don’t rush transformation; they strategically accelerate core capabilities and unlock new ones to drive measurable change. About the AuthorIvy GrantSVP of Strategy & Operations, Twilio Ivy Grant is Senior Vice President of Strategy & Operations at Twilio where she leads strategic planning, enterprise analytics, M&A Integration and is responsible for driving transformational initiatives that enable Twilio to continuously improve its operations. Prior to Twilio, Ivy’s career has balanced senior roles in strategy consulting at McKinsey & Company, Edelman and PwC with customer-centric operational roles at Walmart, Polo Ralph Lauren and tech startup Eversight Labs. She loves solo international travel, hugging exotic animals and boxing. Ivy has an MBA from NYU’s Stern School of Business and a BS in Applied Economics from Cornell University. See more from Ivy GrantReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like #why #companies #need #reimagine #their
    WWW.INFORMATIONWEEK.COM
    Why Companies Need to Reimagine Their AI Approach
    Ivy Grant, SVP of Strategy & Operations, Twilio June 13, 20255 Min Readpeshkova via alamy stockAsk technologists and enterprise leaders what they hope AI will deliver, and most will land on some iteration of the "T" word: transformation. No surprise, AI and its “cooler than you” cousin, generative AI (GenAI), have been hyped nonstop for the past 24 months. But therein lies the problem. Many organizations are rushing to implement AI without a grasp on the return on investment (ROI), leading to high spend and low impact. Without anchoring AI to clear friction points and acceleration opportunities, companies invite fatigue, anxiety and competitive risk. Two-thirds of C-suite execs say GenAI has created tension and division within their organizations; nearly half say it’s “tearing their company apart.” Most (71%) report adoption challenges; more than a third call it a massive disappointment. While AI's potential is irrefutable, companies need to reject the narrative of AI as a standalone strategy or transformational savior. Its true power is as a catalyst to amplify what already works and surface what could. Here are three principles to make that happen. 1. Start with friction, not function Many enterprises struggle with where to start when integrating AI. My advice: Start where the pain is greatest. Identify the processes that create the most friction and work backward from there. AI is a tool, not a solution. By mapping real pain points to AI use cases, you can hone investments to the ripest fruit rather than simply where it hangs at the lowest. Related:For example, one of our top sources of customer pain was troubleshooting undeliverable messages, which forced users to sift through error code documentation. To solve this, an AI assistant was introduced to detect anomalies, explain causes in natural language, and guide customers toward resolution. We achieved a 97% real-time resolution rate through a blend of conversational AI and live support. Most companies have long-standing friction points that support teams routinely explain. Or that you’ve developed organizational calluses over; problems considered “just the cost of doing business.” GenAI allows leaders to revisit these areas and reimagine what’s possible. 2. The need for (dual) speed We hear stories of leaders pushing an “all or nothing” version of AI transformation: Use AI to cut functional headcount or die. Rather than leading with a “stick” through wholesale transformation mandates or threats to budgets, we must recognize AI implementation as a fundamental culture change. Just as you wouldn't expect to transform your company culture overnight by edict, it's unreasonable to expect something different from your AI transformation. Related:Some leaders have a tendency to move faster than the innovation ability or comfort level of their people. Most functional leads aren’t obstinate in their slow adoption of AI tools, their long-held beliefs to run a process or to assess risks. We hired these leaders for their decades of experience in “what good looks like” and deep expertise in incremental improvements; then we expect them to suddenly define a futuristic vision that challenges their own beliefs. As executive leaders, we must give grace, space and plenty of “carrots” -- incentives, training, and support resources -- to help them reimagine complex workflows with AI. And, we must recognize that AI has the ability to make progress in ways that may not immediately create cost efficiencies, such as for operational improvements that require data cleansing, deep analytics, forecasting, dynamic pricing, and signal sensing. These aren’t the sexy parts of AI, but they’re the types of issues that require superhuman intelligence and complex problem-solving that AI was made for. 3. A flywheel of acceleration The other transformation that AI should support is creating faster and broader “test and learn” cycles. AI implementation is not a linear process with start here and end there. Organizations that want to leverage AI as a competitive advantage should establish use cases where AI can break down company silos and act as a catalyst to identify the next opportunity. That identifies the next as a flywheel of acceleration. This flywheel builds on accumulated learnings, making small successes into larger wins while avoiding costly AI disasters from rushed implementation. Related:For example, at Twilio we are building a customer intelligence platform that analyzes thousands of conversations to identify patterns and drive insights. If we see multiple customers mention a competitor's pricing, it could signal a take-out campaign. What once took weeks to recognize and escalate can now be done in near real-time and used for highly coordinated activations across marketing, product, sales, and other teams. With every AI acceleration win, we uncover more places to improve hand-offs, activation speed, and business decision-making. That flywheel of innovation is how true AI transformation begins to drive impactful business outcomes. Ideas to Fuel Your AI Strategy Organizations can accelerate their AI implementations through these simple shifts in approach: Revisit your long-standing friction points, both customer-facing and internal, across your organization -- particularly explore the ones you thought were “the cost of doing business” Don’t just look for where AI can reduce manual processes, but find the highly complex problems and start experimenting Support your functional experts with AI-driven training, resources, tools, and incentives to help them challenge their long-held beliefs about what works for the future Treat AI implementation as a cultural change that requires time, experimentation, learning, and carrots (not just sticks) Recognize that transformation starts with a flywheel of acceleration, where each new experiment can lead to the next big discovery The most impactful AI implementations don’t rush transformation; they strategically accelerate core capabilities and unlock new ones to drive measurable change. About the AuthorIvy GrantSVP of Strategy & Operations, Twilio Ivy Grant is Senior Vice President of Strategy & Operations at Twilio where she leads strategic planning, enterprise analytics, M&A Integration and is responsible for driving transformational initiatives that enable Twilio to continuously improve its operations. Prior to Twilio, Ivy’s career has balanced senior roles in strategy consulting at McKinsey & Company, Edelman and PwC with customer-centric operational roles at Walmart, Polo Ralph Lauren and tech startup Eversight Labs. She loves solo international travel, hugging exotic animals and boxing. Ivy has an MBA from NYU’s Stern School of Business and a BS in Applied Economics from Cornell University. See more from Ivy GrantReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    0 Yorumlar 0 hisse senetleri
  • Nitecore’s new tactical flashlight is a rechargeable 8,000 lumens powerhouse

    While most people probably rely on their smartphones’ flashlights in times when we need a bit of physical illumination, it’s still not always that powerful. There are situations when you would need an actual flashlight, and a strong and tactical one at that, like during power outages, when your card breaks down on a dimly lit road, or in medical and security emergencies. It can also be useful to have a lightweight but powerful device as your EDC or everyday carry gear.
    The Nitecore EDC37 emerges as a contender for a reliable and powerful tactical flashlight, boasting an astonishing 8000-lumen output in a design that emphasizes both performance and portability. This USB-C rechargeable, flat tactical flashlight aims to redefine what users can expect from a compact illumination tool. Its lightweight design also makes you rethink about adding this device to your every day bag since you never know when you’re going to need it.
    Designer: Nitecore

    The standout feature of the Nitecore EDC37 is undoubtedly its incredible 8000-lumen maximum output. This level of brightness is usually found in much larger, search-oriented flashlights, making its inclusion in an EDC form factor truly remarkable. Such power suggests an ability to light up vast areas, pierce through darkness, and handle demanding tasks where visibility is critical. It also has multiple LED configuration so you can switch from wide flood coverage or on a focused throw. The OLED display shows real-time runtime display and output level feedback while the Rapid Lock mechanism with a dedicated switch will lessen accidental activation. The control scheme is intuitive as a circular power button lets you adjust to four brightness levels while the larger mode button lets you play around with the other features.

    The flashlight has a runtime of up to 190 hours on the lowest setting but they didn’t specify how long it would last if you use the full 8,000-lumen output. The integration of USB-C charging is another significant advantage. This modern charging standard offers convenience and faster charging times compared to older micro-USB ports. The construction of the Nitecore EDC37 likely adheres to the brand’s reputation for durability. Aerospace-grade aluminum alloy is a common material choice, ensuring robustness against impacts and wear. An anodized finish would further enhance its longevity and resistance to the elements.

    All in all, the Nitecore EDC37 8000 Lumen USB-C Rechargeable Flat EDC Flashlight appears to be a groundbreaking illumination tool. Its combination of extreme brightness, a portable flat design, and the convenience of USB-C recharging makes it an exciting option for EDC enthusiasts, outdoor adventurers, and professionals who require a high-performance lighting solution in a compact package.

    The post Nitecore’s new tactical flashlight is a rechargeable 8,000 lumens powerhouse first appeared on Yanko Design.
    #nitecores #new #tactical #flashlight #rechargeable
    Nitecore’s new tactical flashlight is a rechargeable 8,000 lumens powerhouse
    While most people probably rely on their smartphones’ flashlights in times when we need a bit of physical illumination, it’s still not always that powerful. There are situations when you would need an actual flashlight, and a strong and tactical one at that, like during power outages, when your card breaks down on a dimly lit road, or in medical and security emergencies. It can also be useful to have a lightweight but powerful device as your EDC or everyday carry gear. The Nitecore EDC37 emerges as a contender for a reliable and powerful tactical flashlight, boasting an astonishing 8000-lumen output in a design that emphasizes both performance and portability. This USB-C rechargeable, flat tactical flashlight aims to redefine what users can expect from a compact illumination tool. Its lightweight design also makes you rethink about adding this device to your every day bag since you never know when you’re going to need it. Designer: Nitecore The standout feature of the Nitecore EDC37 is undoubtedly its incredible 8000-lumen maximum output. This level of brightness is usually found in much larger, search-oriented flashlights, making its inclusion in an EDC form factor truly remarkable. Such power suggests an ability to light up vast areas, pierce through darkness, and handle demanding tasks where visibility is critical. It also has multiple LED configuration so you can switch from wide flood coverage or on a focused throw. The OLED display shows real-time runtime display and output level feedback while the Rapid Lock mechanism with a dedicated switch will lessen accidental activation. The control scheme is intuitive as a circular power button lets you adjust to four brightness levels while the larger mode button lets you play around with the other features. The flashlight has a runtime of up to 190 hours on the lowest setting but they didn’t specify how long it would last if you use the full 8,000-lumen output. The integration of USB-C charging is another significant advantage. This modern charging standard offers convenience and faster charging times compared to older micro-USB ports. The construction of the Nitecore EDC37 likely adheres to the brand’s reputation for durability. Aerospace-grade aluminum alloy is a common material choice, ensuring robustness against impacts and wear. An anodized finish would further enhance its longevity and resistance to the elements. All in all, the Nitecore EDC37 8000 Lumen USB-C Rechargeable Flat EDC Flashlight appears to be a groundbreaking illumination tool. Its combination of extreme brightness, a portable flat design, and the convenience of USB-C recharging makes it an exciting option for EDC enthusiasts, outdoor adventurers, and professionals who require a high-performance lighting solution in a compact package. The post Nitecore’s new tactical flashlight is a rechargeable 8,000 lumens powerhouse first appeared on Yanko Design. #nitecores #new #tactical #flashlight #rechargeable
    WWW.YANKODESIGN.COM
    Nitecore’s new tactical flashlight is a rechargeable 8,000 lumens powerhouse
    While most people probably rely on their smartphones’ flashlights in times when we need a bit of physical illumination, it’s still not always that powerful. There are situations when you would need an actual flashlight, and a strong and tactical one at that, like during power outages, when your card breaks down on a dimly lit road, or in medical and security emergencies. It can also be useful to have a lightweight but powerful device as your EDC or everyday carry gear. The Nitecore EDC37 emerges as a contender for a reliable and powerful tactical flashlight, boasting an astonishing 8000-lumen output in a design that emphasizes both performance and portability. This USB-C rechargeable, flat tactical flashlight aims to redefine what users can expect from a compact illumination tool. Its lightweight design also makes you rethink about adding this device to your every day bag since you never know when you’re going to need it. Designer: Nitecore The standout feature of the Nitecore EDC37 is undoubtedly its incredible 8000-lumen maximum output. This level of brightness is usually found in much larger, search-oriented flashlights, making its inclusion in an EDC form factor truly remarkable. Such power suggests an ability to light up vast areas, pierce through darkness, and handle demanding tasks where visibility is critical. It also has multiple LED configuration so you can switch from wide flood coverage or on a focused throw. The OLED display shows real-time runtime display and output level feedback while the Rapid Lock mechanism with a dedicated switch will lessen accidental activation. The control scheme is intuitive as a circular power button lets you adjust to four brightness levels while the larger mode button lets you play around with the other features. The flashlight has a runtime of up to 190 hours on the lowest setting but they didn’t specify how long it would last if you use the full 8,000-lumen output. The integration of USB-C charging is another significant advantage. This modern charging standard offers convenience and faster charging times compared to older micro-USB ports. The construction of the Nitecore EDC37 likely adheres to the brand’s reputation for durability. Aerospace-grade aluminum alloy is a common material choice, ensuring robustness against impacts and wear. An anodized finish would further enhance its longevity and resistance to the elements. All in all, the Nitecore EDC37 8000 Lumen USB-C Rechargeable Flat EDC Flashlight appears to be a groundbreaking illumination tool. Its combination of extreme brightness, a portable flat design, and the convenience of USB-C recharging makes it an exciting option for EDC enthusiasts, outdoor adventurers, and professionals who require a high-performance lighting solution in a compact package. The post Nitecore’s new tactical flashlight is a rechargeable 8,000 lumens powerhouse first appeared on Yanko Design.
    Like
    Love
    Wow
    Sad
    Angry
    749
    0 Yorumlar 0 hisse senetleri