#icecap
Explore tagged Tumblr posts
theskeletongames · 1 year ago
Text
Tumblr media
Some Studies I did before drawing the characters in an anniversary project
1K notes · View notes
creators-lounge · 1 year ago
Text
Tumblr media Tumblr media
Second collab group from Creators Lounge (Discord Server)!
Credits!
Background - @zirkkun
Chara & Asriel - @zirkkun Aaron, Undyne & Alphys - @tatatale Grillby & Frisk - @normalayasstuff Jerry, Icecap & Snowdrake - @poetax Mettaton & Lesser dog - @tgempress-curse Annoying dog & Napstablook - @codeyspace Ice cream guy & Papyrus - @ayinspanner (Twitter) Toriel & Asgore - @sui-imi (Twitter) Sans - @slylock-syl Monster kid & Muffet - Mumder / Instagram
297 notes · View notes
raddest-hat-showdown · 2 years ago
Text
🎩Raddest Hat Battle👒
The Man in the Yellow Hat from Curious George vs Ice Cap from Undertale
Round 1 Side 2B
Tumblr media Tumblr media
268 notes · View notes
noisettesgfandwifenojoke · 6 months ago
Text
Tumblr media
MOVE OUT OF THE WAY TOPPIN GALS!!!
13 notes · View notes
washedupfae · 1 year ago
Text
WeirdCore Au List
This will be updated as I continue to work on the AU.
Character Concept Posts:
From the Parlor Posts, a little glimpse into WC and just a hint of how it came to be.
A small snippet of information on him and the rest of the WeirdCoreTale crew.
There is still a great deal of missing information, what event set everything in motion, but we do know that WCTale ended after far too many runs, on the Surface. However, something changed in the original code, and the monsters there, were brought back to the Great War.
Unable to fathom the idea of not only all of his friends dying yet again, but this time, the last remaining chance for monster kind, Sans joined up alongside the royal guard and other like-minded monsters, and joined the ancient monsters lost to the annuals of history, in the fight.
He has fought a mage before, after all, wasn't Frisk one? Ruling their domain over time itself? Though, Frisk was a child, an untrained child.
The battle was gruesome, and as he fought, he witnessed so many fall, dusting, an event marked in time, unchanging it seemed, they would be forced Underground again.
And.. He couldn't. He could not see his brother's HoPe dashed, his friends' dying cries, the pain of magic searing his bones.
He snapped.
The mage he faced, a purple soul, vile beast of a human, and they called his kind monsters. Monsters had never sought out to destroy an entire species, but humans would, humans had, were these descendants of these very monsters, fighting for their lives, their freedom, not the only race of monsters to have faced humans? Where were the fae? The elven, the banshee, those beasts that took human form then turned with rise of the moon? Where went the bloodthirsty beasts of horror?
In hiding, perhaps. Or victims of a ruthless genocide. By any matter, humans had been the cause of so much suffering. It was here, now, so many years brought back before his Judge's eye, that he determined and weighed the soul of this mage.. and devoured her soul.
Bitter, ash in his mouth, copper on his tongue, and magic that should not mix with his own. The first eye opened.
Disoriented, he was nearly taken off his feet as his brother defended him, construct in hand, shouting jeers at the opponent and unfortunately, glancing back to check on the horrific scene of his own dear brother, Sans.
You could say, Papyrus lost his head.
Rage, and persistence burned within his tainted soul, his next foe, a Determination mage, soon followed his fellow to the earth. Acting without thought, Sans cast back a curtain of time, but he didn't know how to wield the magic, it was unnatural, warped, disgusting in how it oozed in against his own soul's true nature.
The second eye opened.
Time, he turned back time, again and again. Watching his brother fall to another mage, watching Toriel be torn apart, Undyne crushed beneath a horde of human Soldiers. This was not a fight they could win. This was never a fight they were supposed to win.
This. Was a massacre.
Pushed back. Underground, sealed away, the magic, however, was weaker now. Two mages short, but the code was written, and so it must be followed.
Monsters would be forced beneath ground, but now, there was a .. hiccup.. a glitch perhaps? A little bug in the code.
There was Sans, or how shall we call him now? Cryptic seemed good.. Ostracized by those around him, his family, his friends fallen to the hands of humans yet once more. He was the beast in the depths of the mountain, but this time, they would not await human souls to fall into their hands.
But we can talk about that story, at another time. You need only know this. They all returned to their proper place in time, but the Code remembered. And the Code, began to fail.
14 notes · View notes
autoacafiles · 6 months ago
Text
Tumblr media Tumblr media
5 notes · View notes
skelekins · 2 years ago
Text
Tumblr media
Icecaps Violet and Blue - all grown up <3
I like to think they have little snowclouds that follow them to keep them chill
12 notes · View notes
sendrew · 1 year ago
Text
Rejected Frost posts
Am Icecap and a frosty Asriel
Tumblr media Tumblr media
2 notes · View notes
nesrodesigns · 1 year ago
Text
Autumn Pattern
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
2 notes · View notes
vintagenews · 1 year ago
Photo
Tumblr media
Source and details.
4 notes · View notes
ceroba-asks · 3 months ago
Note
are not going to talk about Jerry somehow having a friend?
[ doesn't he have icecap and chilldrake? ]
1 note · View note
govindhtech · 5 months ago
Text
APT44, Cyber Espionage & More In NATO Cyber Threats
Tumblr media
Emboldened and Evolving: NATO Cyber Threats snapshot
As NATO members and partners prepare for a landmark summit, the cyber threat must be considered. Empowered state-sponsored actors, hacktivists, and criminals are willing to cross lines and commit acts previously unthinkable to attack the Alliance. Besides military targets, NATO must address hybrid threats including APT44, Cyber Espionage & More harmful cyber activities against hospitals, civic society, and other targets, which could affect contingency resilience. The Ukraine crisis is linked to rising cyber risks, but many will grow separately and simultaneously.
NATO faces clandestine, aggressive cyber actors that gather intelligence, assault key infrastructure, and spread disinformation. Google is closely watching cyber threats, including those in this report, to safeguard its customers and businesses, but this is just a snapshot of a bigger and developing world.
What is Cyber espionage?
Cyber espionage is the act of stealing information without permission over the internet. It’s the digital version of traditional espionage
Cyber espionage
NATO’s enemies have long used Cyber Espionage to gain political, diplomatic, and military insight and acquire defence technologies and economic secrets. However, Alliance intelligence will be crucial in the coming months. This summit represents a transition time, with Mark Rutte as Secretary General and other changes planned to strengthen the Alliance’s defence posture and long-term support for Ukraine. Threat actor Cyber Espionage might weaken NATO’s strategic advantage and inform opponent leadership on how to oppose NATO’s investments and ambitions.
NATO faces global Cyber Espionage from various actors. Many still use simple but successful approaches like social engineering. Others have advanced their tradecraft to become formidable opponents for even the most skilled defenders.
APT29 (ICECAP)
APT29, attributed to the Russian Foreign Intelligence Services (SVR) by various governments, collects diplomatic and political intelligence on Europe and NATO member states. APT29 has committed several high-profile compromises of technology corporations that give public sector access. In the past year, Mandiant has seen APT29 target NATO member technology businesses and IT service providers to compromise government and policy organisations’ third-party and software supply chains.The actor is skilled in cloud environments and adept at disguising their tracks, making them hard to detect, monitor, and expel from infiltrated networks.
In addition to spear-phishing NATO members, APT29 has traditionally targeted diplomatic bodies. The actor has breached European and U.S. executive authorities multiple times. They have also targeted political parties in Germany and the U.S. to gather intelligence on potential government policy.
Cyberespionage from China
Recently, Chinese Cyber Espionage has shifted from noisy, easily identifiable operations to stealth. Technical advances have made defending harder and helped NATO member states attack government, military, and commercial targets.
Chinese Cyber Espionage increasingly uses:
Targeting the network edge and exploiting zero-day vulnerabilities in security devices and other internet-facing network infrastructure to limit defence detection. These operators have lowered their risk of user or control identification by using less social engineering. These hackers exploited 12 zero-days (software or hardware vulnerabilities unknown to the vendor, with no patch or fix available, and can be exploited before they can be addressed) in 2023, several in network edge security products. These devices are suitable beachheads in hacked networks because they lack endpoint detection.
Hiding harmful communications via operational relay box (ORB) networks. Threat actors use proxies to mask their malicious traffic on the internet, but proxy tracking is easy. Large ephemeral ORB networks of shared and hacked proxies are used by actors. These networks are hard to trace and hinder infrastructure intelligence sharing for defenders.
Live off the land to avoid defence detection. Some actors utilise non-malware means to break in. Live-off-the-land tactics exploit legitimate system tools, features, and functionalities to traverse networks and commit crimes. Without malware detection and intelligence sharing, defenders are at a disadvantage.
Not just Chinese threat actors use these methods. Russian actors APT29, APT28, and APT44 have employed them.
Cyberattacks that disrupt and destroy
Cyberattacks are increasing, threatening NATO directly and indirectly. Iranian and Russian state actors have been eager to attack NATO countries in recent years, but they have concealed behind phoney fronts that take credit. Mandiant described a 2022 damaging attack on Albania by a purported hacktivist group called “HomeLand Justice” that the U.S. Government subsequently ascribed to Iranian actors.
While demonstrating their ability to launch complex strikes on extremely sensitive operational technology systems in Ukraine, state actors are compromising NATO countries’ key infrastructure for future disruptions. These actors have the means and motivation to disrupt NATO’s key infrastructure.
In addition to state cyberattacks, hacktivist and criminal disruptions are no longer ignorable. Global hacktivist resurgence has caused major attacks on the public and private sectors, making illegal activity a national security threat.
APT44 Sandworm, Frozenbarents
Highly advanced cyber threat outfit APT44, also known as Sandworm, is thought to be backed by Russian military intelligence.
Espionage, disruption, and disinformation efforts are APT44’s specialties. For over a decade, they’ve carried out disruptive malware attacks including BlackEnergy and Industroyer.
APT44 summary:
APT44 has targeted essential infrastructure, government agencies, and international sports organisations. Since the Russia conflict, Ukraine has been a top target.
Tactics: APT44 has many tools to achieve its goals. Supply chain attacks, phishing emails, and software flaws are examples. They may use wiper malware to delete data and disrupt operations.
The range of APT44’s capabilities makes it worrisome. APT44 conducts espionage, sabotage, and influence operations, unlike many APT groups.
The global devastating hack NotPetya, Pyeongchang Olympic games strikes, and Ukraine outages have all been carried out by APT44. Russian military intelligence-linked actor has carried out technically complicated interruptions of sensitive operational systems and broad-effect damaging strikes. APT44 has carried out most disruptive assaults in Ukraine and minor attacks in NATO nations since the war.
PRESSTEA (Prestige) ransomware was used against Polish and Ukrainian logistics companies by APT44 in October 2022. The malware was unbreakable and damaging, maybe to demonstrate the group’s ability to harm supply routes carrying lethal aid to Ukraine. APT44’s risk-taking in using a disruptive capacity against a NATO member country is evident in this operation.
Hacktivists
Geopolitical flashpoints like the Russian invasion of Ukraine have sparked a global hacktivism revival. Despite focusing on NATO members, these actors have had mixed results. Many surgeries are meant to draw attention and create a false sense of uneasiness but cause no lasting damage.
These actors cannot be disregarded despite their flaws. Their attacks draw media attention in target countries and sometimes have catastrophic effects. One of their preferred methods, distributed denial-of-service (DDOS) attacks, are cosmetic but might be used to greater effect during elections. Hacktivists like pro-Russian organisation Cyber Army Russia Reborn (CARR) are also testing larger strikes on key infrastructure. CARR, which has questionable ties to APT44, has affected U.S., Polish, and French water systems in a series of basic but aggressive acts.
Cybercriminals
Ransomware-related financial disruptions are already disrupting NATO states’ essential infrastructure, causing hospital patient care, energy, and government service failures. Many crooks target this crucial infrastructure despite their promises. Russian-speaking criminals and North Korean state actors seeking espionage funding have regularly attacked U.S. and European healthcare institutions. This threat will likely grow due to these actors’ ability to operate from states with low cyber crime enforcement or extradition agreements and the lucrative nature of ransomware operations.
Information Operations and Disinformation
Information operations have grown in cyber threat activities over the past decade as wars and geopolitical tensions have increased. These operations range from “troll farm” social media manipulation to intricate network intrusions. Russian and Belarusian information operations have targeted NATO member nations to weaken the Alliance’s cohesiveness and goals.
Some Cyber Espionage operators who acquire clandestine intelligence also conduct information operations. In hack-and-leak activities, APT28 and COLDRIVER have used stolen data, while UNC1151 has used infiltration capabilities in more complicated information operations. False and misleading information is used to influence public opinion, foment strife, and advance political goals.
Google vigorously counters these activities across products, teams, and geographies where they break our standards and disrupt overt and covert information operations campaigns. They report quarterly in the TAG Bulletin on YouTube channel disruptions, blogs, AdSense accounts, and URLs deleted from Google News surfaces.
Information Operations of Prigozhin Survive
Former Russian industrialist Yevgeniy Prigozhin’s disinformation empire continues, albeit less efficiently, after his death. These campaigns continue to spread disinformation and pro-Russia narratives on many social media platforms, recently emphasising alternative sites, across multiple regions.
These efforts advocate for NATO’s disarmament and claim it causes global instability. They criticise NATO leaders too. These commercials’ substance is heavily influenced by geopolitical events like Russia’s 2022 invasion of Ukraine and other Russian strategic aims. NATO and its member states’ backing for Ukraine has made the Alliance a major target directly and indirectly by becoming involved in matters against Russia’s strategic interests.
COLDRIVER
Russian Cyber Espionage actor COLDRIVER has been linked to the Federal Security Service. The actor often conducts credential phishing attempts against prominent NGOs and retired intelligence and military leaders. The hack-and-leak operation employed victim mailbox data stolen by COLDRIVER. In 2022, COLDRIVER leaked information to deepen Brexit-related political divides in the UK.
Before that, the actor revealed U.S.-UK trade deals before the 2019 UK election. Originally targeting NATO countries, COLDRIVER expanded in 2022 to include the Ukrainian government and conflict supporters. In March 2022, COLDRIVER campaigns targeted numerous European militaries and a NATO Centre of Excellence for the first time.
Read more on govindhtech.com
0 notes
perfectpricedeals · 2 years ago
Text
TheraICE Form Fitting Head Gel Ice Cap, Cold Therapy Ice Head Wrap Ice Pack Mask, Cold Cap
Tumblr media Tumblr media
✨️Amazon✨️ Deals Top products. Incredible prices. ✅Grab a great discount today Price : $23.96 40% off. You Save:$15.99
4.6 out of 5 stars 24,676 ratings | 117 answered questions Amazon's Choice in in Cold Packs
✅Buy Now - https://amzn.to/3Knisjw
Tumblr media Tumblr media
Description:
Brand TheraICE Rx Number of Items 1 Unit Count 1.00 Count Material Gel Color Pink / Black Product Benefits Soothing Comfort Item Dimensions LxWxH 9.4 x 0.6 x 6.4 inches Size One Size
About this item
This is a wearable mask. It's stretchable with double seams lets it fit every face, head & eye. Cap is one size fits all. If you are not comfortable with its size return it for a full refund. TheraICE cold flexible ice pack cap provides 360° natural cooling while resting comfortably. The products slip-on design means no messy wraps or uncomfortable ice packs, inserts or awkward band straps.
This form fitting gel ice mask wrap is brought to you by TheraICE. The reusable & wearable therapy ice pack makes it the ideal reusable cap for men, women and kids.
The natural cold cap is one of kind in it's 360° form fitting design. Cap has no hard inserts or velcro. Just pull the cold cap over your eyes, face and head. As you lay in bed or on a couch comfortably with the product on your head, it's soft gel design won't put undo pressure on specific areas like a hard ice pack insert.
It's a comfortable stretchable ice pack eye mask for puffy eyes. Easy to use and reuse. Simply freeze in the included zip bag for 2 hours between uses. It's thick gel and dark color . This easy-to-use cold pack is safe for daily use and ready in the freezer whenever you're ready.
The way the gel forms to the head provides soothing comfort, simply by wearing the cap. Theraice gel ice wrap products are made with cutting-edge material & expert-grade cooling gel. Products can be worn safely on bare skin. Find comfort in this stretchable, single-piece, reusable natural cap. The one size fits all stretchable design makes it a perfect fit for everyone.
Tumblr media Tumblr media
youtube
Style:
Black (Pack of 1)$23.96
Pink (Pack of 1) $23.96
Polar Bear (Pack of 1)$29.95
Black & Pink (Pack of 2) $43.96
Black (Pack of 2) $43.96
Tumblr media
1 note · View note
spanishhighs · 2 years ago
Text
Wall of ice, Patagonia. The serac barrier on the Marconi Glacier in 2014. In 2016 this was impassable as huge holes had opened up everywhere due to melting. We had to look for alternative routes onto the Patagonian Icecap which have now become the new norm
Tumblr media
0 notes
onebizarrekai · 8 months ago
Text
there's an entire temple dedicated to the maintenance of the seasons in holodrum and protecting the rod of seasons and its four spirits. meanwhile nayru is just keeping the harp of ages in her basement
27 notes · View notes
road-kill-eater · 1 year ago
Text
Tumblr media Tumblr media Tumblr media
85 notes · View notes