Binance Square

github

62,976 views
74 Discussing
Crypto News Snap
--
#Microsoft 's Independent Strategy in the AI Race: On the Path to a $5 Trillion Valuation Microsoft is advancing its #Aİ capabilities beyond its OpenAI partnership, leading analysts to hope its market value could reach $5 trillion by 2026. The company's current value is $3.59 trillion. Microsoft's AI Empire: With and Without OpenAI Microsoft has invested approximately $13 billion in OpenAI to date, securing a 27% ownership stake. However, the majority of Microsoft's AI revenue (75%) comes from its own Azure AI services, not from reselling OpenAI's models (which accounts for only 6%). Microsoft has made a $5 billion investment in Anthropic, which will purchase $30 billion in Azure computing. The company has locked in $250 billion in Azure commitments and intends to spend $80 billion on AI infrastructure by 2025. Integrating AI into Every Product Microsoft has implemented AI across all its major product lines: Copilot has been integrated into Microsoft 365, Windows, and #Github . AI capabilities are now part of the Azure cloud, Office apps, Bing, Edge, and developer tools. According to experts, the company's broad reach (Azure training, GitHub Copilot, Office AI) is its biggest advantage for the next decade. The Next Step: Agentic AI Analysts believe Agentic AI (AI capable of handling multi-step tasks) could be Microsoft's next breakthrough, where it will lead alongside ServiceNow and Salesforce. Risks and Challenges Heavy infrastructure investments by Microsoft could be at risk if AI demand weakens or competing models improve. The company could face challenges if market sentiment is affected by AI delivery outcomes. Microsoft continues to strengthen its independent position in the AI race, where the OpenAI partnership is an important pillar, but only one part of the overall strategy. #USJobsData #TrumpTariffs {future}(BTCUSDT) {future}(SOLUSDT)
#Microsoft 's Independent Strategy in the AI Race: On the Path to a $5 Trillion Valuation
Microsoft is advancing its #Aİ capabilities beyond its OpenAI partnership, leading analysts to hope its market value could reach $5 trillion by 2026. The company's current value is $3.59 trillion.
Microsoft's AI Empire: With and Without OpenAI
Microsoft has invested approximately $13 billion in OpenAI to date, securing a 27% ownership stake.
However, the majority of Microsoft's AI revenue (75%) comes from its own Azure AI services, not from reselling OpenAI's models (which accounts for only 6%).
Microsoft has made a $5 billion investment in Anthropic, which will purchase $30 billion in Azure computing.
The company has locked in $250 billion in Azure commitments and intends to spend $80 billion on AI infrastructure by 2025.
Integrating AI into Every Product
Microsoft has implemented AI across all its major product lines:
Copilot has been integrated into Microsoft 365, Windows, and #Github .
AI capabilities are now part of the Azure cloud, Office apps, Bing, Edge, and developer tools.
According to experts, the company's broad reach (Azure training, GitHub Copilot, Office AI) is its biggest advantage for the next decade.
The Next Step: Agentic AI
Analysts believe Agentic AI (AI capable of handling multi-step tasks) could be Microsoft's next breakthrough, where it will lead alongside ServiceNow and Salesforce.
Risks and Challenges
Heavy infrastructure investments by Microsoft could be at risk if AI demand weakens or competing models improve.
The company could face challenges if market sentiment is affected by AI delivery outcomes.
Microsoft continues to strengthen its independent position in the AI race, where the OpenAI partnership is an important pillar, but only one part of the overall strategy.

#USJobsData #TrumpTariffs
(#Cryptodiffer ) Top-15 Projects by average daily development activity growth on #github in the last 30 days$PHA $FIO $POLYX $WLD $SAITO $RPL $JUP $XYO $MINA $BZZ $KDA $PNK $GNO $ZIL #1INCH
(#Cryptodiffer )
Top-15 Projects by average daily development activity growth on #github in the last 30 days$PHA $FIO $POLYX $WLD $SAITO $RPL $JUP $XYO $MINA $BZZ $KDA $PNK $GNO $ZIL #1INCH
@Torkelrogstad: Brand new scam technique just dropped: #github bots trying to phish you into downloading #Malware . Within a minute of creating an issue mentioning the words "seed derivation" and "xpriv", a shady-looking link was posted by a bot. Stay vigilant, folks! #phishing #Hacked
@Torkelrogstad: Brand new scam technique just dropped: #github bots trying to phish you into downloading #Malware .

Within a minute of creating an issue mentioning the words "seed derivation" and "xpriv", a shady-looking link was posted by a bot.

Stay vigilant, folks! #phishing #Hacked
How Hackers Use GitHub to Stay Under the RadarIn the world of cybersecurity, attackers are always evolving, finding new ways to hide in plain sight, and one of the latest examples shows just how creative they’ve become. The case of the Astaroth banking trojan demonstrates how hackers are now using legitimate platforms like GitHub to stay invisible to security experts while continuing to steal sensitive information It all begins with a simple phishing email that looks completely normal, often disguised as an official message asking you to download an important document. The attached file, usually with a .lnk extension that appears harmless, is actually a trap. Once opened, it silently installs malware onto your device and begins its work in the background. What follows is a stealthy operation where the trojan quietly records your keystrokes, capturing logins, passwords, and other personal data connected to your bank accounts and crypto wallets. All that stolen information is then sent back to the attackers who control the malware’s network But the truly fascinating part is how Astaroth manages to remain undetected for so long. Most trojans rely on a central command server that coordinates all infected machines. Once authorities discover and take down that server, the entire operation falls apart. Astaroth, however, doesn’t play by those rules. Instead, it uses GitHub — the same platform developers use to host and share open-source code — as part of its communication system. The malware doesn’t store any dangerous files there but hides a small configuration file in a GitHub repository. That file contains new instructions, such as where to connect next if the main server goes offline. In essence, GitHub acts as a message board for the trojan, telling it where to find the next command center without ever raising suspicion According to cybersecurity experts at McAfee, this trick makes Astaroth remarkably resilient. Even if one part of its infrastructure is destroyed, it can quickly recover and continue its operations using legitimate channels that no one expects to be part of a cyberattack. To make things even more sophisticated, the trojan is programmed to avoid drawing attention from analysts in certain countries. If it detects that it’s running on a system based in the United States or another English-speaking region, it deletes itself immediately, leaving no trace behind. Its main focus has been users in South America, particularly in Brazil, Argentina, and Chile, where it has caused significant damage So what can regular users do in the face of such clever tactics? The answers may sound familiar, but they are more important than ever. Never open attachments or click on links from unknown senders, no matter how legitimate they appear. Keep your antivirus software updated and make sure it’s actively monitoring your system. Most importantly, use two-factor authentication on all your critical accounts, especially for online banking and crypto exchanges. Even if your password is stolen, the attacker will need an additional code to access your funds The Astaroth case is a powerful reminder that even trusted and widely used platforms like GitHub can be misused for malicious purposes. It challenges the very idea of online safety, showing that in today’s digital landscape, the line between good and bad tools depends entirely on how they’re used. Perhaps there is no truly safe place on the internet anymore only safer habits and smarter vigilance that help us stay one step ahead #GitHub #Cybersecurity #CryptoNews #McAfee #OnlineSafety

How Hackers Use GitHub to Stay Under the Radar

In the world of cybersecurity, attackers are always evolving, finding new ways to hide in plain sight, and one of the latest examples shows just how creative they’ve become. The case of the Astaroth banking trojan demonstrates how hackers are now using legitimate platforms like GitHub to stay invisible to security experts while continuing to steal sensitive information

It all begins with a simple phishing email that looks completely normal, often disguised as an official message asking you to download an important document. The attached file, usually with a .lnk extension that appears harmless, is actually a trap. Once opened, it silently installs malware onto your device and begins its work in the background. What follows is a stealthy operation where the trojan quietly records your keystrokes, capturing logins, passwords, and other personal data connected to your bank accounts and crypto wallets. All that stolen information is then sent back to the attackers who control the malware’s network

But the truly fascinating part is how Astaroth manages to remain undetected for so long. Most trojans rely on a central command server that coordinates all infected machines. Once authorities discover and take down that server, the entire operation falls apart. Astaroth, however, doesn’t play by those rules. Instead, it uses GitHub — the same platform developers use to host and share open-source code — as part of its communication system. The malware doesn’t store any dangerous files there but hides a small configuration file in a GitHub repository. That file contains new instructions, such as where to connect next if the main server goes offline. In essence, GitHub acts as a message board for the trojan, telling it where to find the next command center without ever raising suspicion

According to cybersecurity experts at McAfee, this trick makes Astaroth remarkably resilient. Even if one part of its infrastructure is destroyed, it can quickly recover and continue its operations using legitimate channels that no one expects to be part of a cyberattack. To make things even more sophisticated, the trojan is programmed to avoid drawing attention from analysts in certain countries. If it detects that it’s running on a system based in the United States or another English-speaking region, it deletes itself immediately, leaving no trace behind. Its main focus has been users in South America, particularly in Brazil, Argentina, and Chile, where it has caused significant damage

So what can regular users do in the face of such clever tactics? The answers may sound familiar, but they are more important than ever. Never open attachments or click on links from unknown senders, no matter how legitimate they appear. Keep your antivirus software updated and make sure it’s actively monitoring your system. Most importantly, use two-factor authentication on all your critical accounts, especially for online banking and crypto exchanges. Even if your password is stolen, the attacker will need an additional code to access your funds

The Astaroth case is a powerful reminder that even trusted and widely used platforms like GitHub can be misused for malicious purposes. It challenges the very idea of online safety, showing that in today’s digital landscape, the line between good and bad tools depends entirely on how they’re used. Perhaps there is no truly safe place on the internet anymore only safer habits and smarter vigilance that help us stay one step ahead

#GitHub #Cybersecurity #CryptoNews #McAfee #OnlineSafety
Gaia Project Ranks Among Top Open-Source Startups in Q3 2024. 🏆🗻 Gaia, a New York-based startup focused on decentralized AI infrastructure, ranked 14th in the top trending open-source projects for Q3 2024. The project saw a 4.8x growth in GitHub stars, reaching 10,000 stars by the end of the quarter, reflecting strong developer interest in its decentralized AI solutions. Founded in New York in 2024 and having raised $10 million from Mirana, EVM Capital, ByteTrade Lab, etc., Gaia is at the forefront of decentralized AI innovation and stands out from competitors like Plandex AI and Composio. Its rapid growth and unique approach to AI infrastructure point to a promising future in the decentralized AI space. The quarterly rankings highlight Gaia's technical innovation, community support, and market potential. #GAIA #Gaianet #OpenSourceAI #Github #RunaCapital
Gaia Project Ranks Among Top Open-Source Startups in Q3 2024. 🏆🗻

Gaia, a New York-based startup focused on decentralized AI infrastructure, ranked 14th in the top trending open-source projects for Q3 2024. The project saw a 4.8x growth in GitHub stars, reaching 10,000 stars by the end of the quarter, reflecting strong developer interest in its decentralized AI solutions.

Founded in New York in 2024 and having raised $10 million from Mirana, EVM Capital, ByteTrade Lab, etc., Gaia is at the forefront of decentralized AI innovation and stands out from competitors like Plandex AI and Composio. Its rapid growth and unique approach to AI infrastructure point to a promising future in the decentralized AI space.

The quarterly rankings highlight Gaia's technical innovation, community support, and market potential.

#GAIA #Gaianet #OpenSourceAI #Github #RunaCapital
🧑‍💻 $BNB #Santiment : Top 20 BSC and Binance Chain coins by development frequency This list is compiled by counting all notable #github activity of each project, and averaging their daily activity over the past 30 days.
🧑‍💻 $BNB #Santiment : Top 20 BSC and Binance Chain coins by development frequency

This list is compiled by counting all notable #github activity of each project, and averaging their daily activity over the past 30 days.
continue update projects Monad[CLAIM USDC!](https://www.binance.com/referral/earn-together/refertoearn2000usdc/claim?hl=en-US&ref=GRO_14352_1IEAU&utm_source=Homepage_log_in) #Monad Welcome to ELEPHAPP, where each elephant figurine embodies exquisite design and careful craftsmanship. Our collection features smooth shapes and soft colors, resulting in unique pieces that radiate purity, calmness, and joyful energy. We take pride in the impeccable quality and dedication to perfection that goes into every single piece. ALL free MINT cute little elephant 🐘 from #Github GitHub - elephapp/ELEPHAPP: ELEPHAPP — where elegant elephant figur... ELEPHAPP — where elegant elephant figurines, smooth shapes, and soft colors bring purity, tranquility, and joy to every piece. - elephapp/#ELEPHAPP
continue update projects MonadCLAIM USDC!
#Monad

Welcome to ELEPHAPP, where each elephant figurine embodies exquisite design and careful craftsmanship. Our collection features smooth shapes and soft colors, resulting in unique pieces that radiate purity, calmness, and joyful energy. We take pride in the impeccable quality and dedication to perfection that goes into every single piece.

ALL free MINT cute little elephant 🐘 from #Github
GitHub - elephapp/ELEPHAPP: ELEPHAPP — where elegant elephant figur...
ELEPHAPP — where elegant elephant figurines, smooth shapes, and soft colors bring purity, tranquility, and joy to every piece. - elephapp/#ELEPHAPP
--
Bullish
Indian Dev's Ruling The World 🌎 🔥 🚨 Microsoft owned software platform GitHub has 13.2 million Indian developers using the platform, and is expected to overtake the US as the largest developer community by 2027 - Satya Nadella. #Developmentactivity #Microsoft #github
Indian Dev's Ruling The World 🌎 🔥

🚨 Microsoft owned software platform GitHub has 13.2 million Indian developers using the platform, and is expected to overtake the US as the largest developer community by 2027 - Satya Nadella.

#Developmentactivity #Microsoft #github
See original
🚨 New scam alert targeting programmers through GitHub The discovery of hidden malware in job application projects on GitHub has shocked the developer community. Although the file logo.png appears to be an image, it actually contains malware activated through config-overrides.js, aimed at stealing cryptocurrency private keys and installing a trojan that runs automatically when the computer starts. 🔍 Significant impacts: • 🎯 Target audience: Programmers, especially those looking for jobs – easily becoming victims by trusting sample projects sent by 'employers'. • 🛡️ Serious security risks: Private keys and personal crypto assets can be easily stolen if mistakenly opening unverified projects. • 🧨 Breaking community trust in open source: Increasing concerns about security in code sharing and project templates. ✅ Recommendations: • Do not run code from unclear sources, including from employers. • Always thoroughly check the source code and any unusual files (including images, configuration files). • Use a sandbox or virtual machine when testing unverified projects. 💬 This is a wake-up call for the dev and crypto community – vigilance is the first line of defense against increasingly sophisticated attack forms. #SecurityAlert #Github #CryptoScam #CyberSecurity #BinanceSquare
🚨 New scam alert targeting programmers through GitHub

The discovery of hidden malware in job application projects on GitHub has shocked the developer community. Although the file logo.png appears to be an image, it actually contains malware activated through config-overrides.js, aimed at stealing cryptocurrency private keys and installing a trojan that runs automatically when the computer starts.

🔍 Significant impacts:
• 🎯 Target audience: Programmers, especially those looking for jobs – easily becoming victims by trusting sample projects sent by 'employers'.
• 🛡️ Serious security risks: Private keys and personal crypto assets can be easily stolen if mistakenly opening unverified projects.
• 🧨 Breaking community trust in open source: Increasing concerns about security in code sharing and project templates.

✅ Recommendations:
• Do not run code from unclear sources, including from employers.
• Always thoroughly check the source code and any unusual files (including images, configuration files).
• Use a sandbox or virtual machine when testing unverified projects.

💬 This is a wake-up call for the dev and crypto community – vigilance is the first line of defense against increasingly sophisticated attack forms.

#SecurityAlert #Github #CryptoScam #CyberSecurity #BinanceSquare
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number