metin, to infosec
@metin@graphics.social avatar

From the ar(t)chive…

Stylized 3D illustration for an early-2000s article in the Dutch PC-Active magazine, about a mobile phone virus. This was before smartphones were introduced. 🙂

publicvoit, to windows
@publicvoit@graz.social avatar

So, will not come with activated, just Recall spyware pre-installed.

What a relief. Not. 🙄

https://www.theverge.com/2024/6/7/24173499/microsoft-windows-recall-response-security-concerns

If I'd own a company which is still using , I'd have a migration path to worked out meanwhile.

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

16-year-old arrested in France in connection with high-profile Epsilon hacking group attacks.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/16-year-old-arrested-in-france-in-connection-with-high-profile-epsilon-hacking-group-attacks/

br00t4c, to random
@br00t4c@mastodon.social avatar
br00t4c, to TikTok
@br00t4c@mastodon.social avatar

TikTok confirms CNN, other high-profile accounts hijacked via zero-day vulnerability

https://go.theregister.com/feed/www.theregister.com/2024/06/05/tiktok_confirms_cnn_accounts_hijacked/

metin, to infosec
@metin@graphics.social avatar

From the ar(t)chive…

Stylized 3D illustration for a 2001 article in the Dutch PC-Active magazine, about the Code Red worm, which was the first large-scale, mixed-threat attack to successfully target enterprise networks.

br00t4c, to random
@br00t4c@mastodon.social avatar
br00t4c, to random
@br00t4c@mastodon.social avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

This week’s international #cybersecurity hotchpotch: more Russian influence ops, #Chinese Chips investments, Botnet takedowns & psychological tricks, mysterious router bricking, lots of #malware, #ICQ and, of course, Amigas! https://tinyurl.com/3u2kedj9?utm_source=dlvr.it&utm_medium=mastodon

dubbel, to python
@dubbel@mstdn.io avatar

Reported 5 malicious packages to : numberpy, tqmmd, pandans, openpyexl, reqwestss all by the same user leemay1782.

All with the same "functionality", getting commands via a socket from dzgi0h7on1jhzdg0vknw9pp9309rxjl8.oastify[.]com and executing it.
I don't think I saw the setup.py entry_points being used as a trigger mechanism before?

br00t4c, to Law
@br00t4c@mastodon.social avatar

Law enforcement operation takes aim at an often-overlooked cybercrime lynchpin

https://arstechnica.com/?p=2027800

br00t4c, to Law
@br00t4c@mastodon.social avatar
br00t4c, to random
@br00t4c@mastodon.social avatar
kubikpixel, to random
@kubikpixel@chaos.social avatar

Mystery malware destroys 600,000 routers from a single ISP during 72-hour span:

An unknown threat actor with equally unknown motives forces ISP to replace routers.
One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them.

🔓 https://arstechnica.com/security/2024/05/mystery-malware-destroys-600000-routers-from-a-single-isp-during-72-hour-span/


#password #hack #pwhack #isp #mystery #malware #routers #unknown #october

davidbisset, to random
@davidbisset@phpc.social avatar

This is nuts.

Mystery destroys 600,000 routers from a single during 72-hour span.

https://blog.lumen.com/the-pumpkin-eclipse/

br00t4c, to random
@br00t4c@mastodon.social avatar

Mystery malware destroys 600,000 routers from a single ISP during 72-hour span

https://arstechnica.com/?p=2027651

ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar

Wow, someone deployed malware in October of 2023 which bricked 600,000 Internet routers -- owned by a SINGLE ISP.

"over 600,000 small office/home office (SOHO) routers were taken offline belonging to a single internet service provider (ISP). The incident took place over a 72-hour period between October 25-27, rendered the infected devices permanently inoperable, and required a hardware-based replacement."

https://blog.lumen.com/the-pumpkin-eclipse/

TalosSecurity, to random
@TalosSecurity@mstdn.social avatar

A new threat actor known as #LilacSquid is using several different pieces of #malware to silently infiltrate networks and steal sensitive data. Read more about this group and the TTPs they share with some North Korean state-sponsored actors https://blog.talosintelligence.com/lilacsquid/

nikita, to random German
@nikita@social.tchncs.de avatar

Fast 150.000 Android-Smartphones mit Banking-#Trojaner infiziert

In den vergangenen Monaten wurden einer neuen Untersuchung zufolge mehr als fünf Millionen Android-Smartphones mit #Malware infiziert. Darunter ist auch ein äußerst gefährlicher Banking-Trojaner.

TECHBOOK zeigt, welche betroffenen Apps Sie umgehend löschen sollten.

https://www.techbook.de/mobile-lifestyle/apps/anatsa-banking-trojaner

redhotcyber, to Software Italian
@redhotcyber@mastodon.bida.im avatar

Attacco agli ATM riuscito! Un Tasso del 99% di Efficacia Spaventa tutte le Banche Europee

Nello spazio si sta diffondendo attivamente un nuovo tipo di . Il suo tasso di successo, secondo i suoi autori, raggiunge il 99%.

Questo dannoso, chiamato “EU ATM Malware”, è in grado di quasi tutti gli sportelli in e circa il 60% degli sportelli bancomat in tutto il mondo, il che rappresenta una significativa per la sicurezza bancaria globale..

https://www.redhotcyber.com/post/attacco-agli-atm-riuscito-un-tasso-del-99-di-efficacia-spaventa-tutte-le-banche-europee/

brume, to android French
@brume@piaille.fr avatar

via @techbot

Un logiciel malveillant distribué via le PlayStore

Les auteurs distribuent le logiciel malveillant Anatsa via le PlayStore en le déguisant en applications telles que des lecteurs de PDF et des scanners de QRcode. Une fois installé, Anatsa télécharge sa charge utile et vole des infos bancaires sensibles à l'aide de superpositions. Anatsa a ciblé des applications bancaires en Europe et s'est étendu aux US, à la Corée et à Singapour.

Pulse ID : 6655bb0af84356806f384f5a
Lien Pulse : https://otx.alienvault.com/pulse/6655bb0af84356806f384f5a
Pulse Author : AlienVault
Créé : 2024-05-28

aarbrk, to Help Spanish
@aarbrk@mstdn.mx avatar

Hi folks, I need with a possible infection in on . After accidentally visiting a spammy website I am getting suspicious and short-lived windows with a grey border in the corner of the screen. Their text seems to always starts with (A). The first one was ostensibly about Norton, this one McAfee. Tough to verify any fix since they only appear once in a while; I did get a photo of one:

Please advise me!

jsrailton, to poland
@jsrailton@mastodon.social avatar

NEW: second judge in reportedly confirmed as spyware victim.

Appeals court judge told reporter her responsibilities included classified cases where wiretapping was used.

Poland's spyware reckoning continues.

[PL, machine trans.]
Story: https://oko.press/wiemy-o-drugim-polskim-sedzi-inwigilowanym-pegasusem-to-sedzia-apelacyjna-z-krakowa-news-oko-press

gtbarry, to Canada
@gtbarry@mastodon.social avatar

LockBit says they stole data in London Drugs ransomware attack

the LockBit ransomware gang claimed they were behind the April cyberattack on Canadian pharmacy chain London Drugs and is now threatening to publish stolen data online after allegedly failed negotiations

#LondonDrugs #canada #databreach #LockBit #ransomware #malware #security #cybersecurity #infosec #hackers #hacking #hacked

https://www.bleepingcomputer.com/news/security/lockbit-says-they-stole-data-in-london-drugs-ransomware-attack/

publicvoit, to security
@publicvoit@graz.social avatar

Google Online Blog: On Fire Drills and Tests
https://security.googleblog.com/2024/05/on-fire-drills-and-phishing-tests.html

"The more effective approach to both risks is a focused pursuit of secure-by-default systems in the long term, and a focus on investment in engineering defenses such as unphishable credentials (like passkeys) and implementing multi-party approval for sensitive security contexts throughout production systems."

I'd say that basically means: no products.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • GTA5RPClips
  • tacticalgear
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • ethstaker
  • anitta
  • provamag3
  • Leos
  • cisconetworking
  • lostlight
  • All magazines