mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.7K
active users

#exploits

2 posts1 participant0 posts today
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://hachyderm.io/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> are leading the use of attributed <a href="https://hachyderm.io/tags/zerodays" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerodays</span></a><br>Google’s says number of <a href="https://hachyderm.io/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a> <a href="https://hachyderm.io/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> — flaws unknown to the software makers at the time hackers abused them — had dropped from 98 exploits in 2023 to 75 exploits in 2024. But the report noted that of the proportion of zero-days that Google could attribute — meaning identifying the hackers who were responsible for exploiting them — at least 23 zero-day exploits were linked to government-backed hackers. <br><a href="https://techcrunch.com/2025/04/29/government-hackers-are-leading-the-use-of-attributed-zero-days-google-says/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/04/29/gove</span><span class="invisible">rnment-hackers-are-leading-the-use-of-attributed-zero-days-google-says/</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Google: 97 <a href="https://hachyderm.io/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> <a href="https://hachyderm.io/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> in #2024, over 50% in <a href="https://hachyderm.io/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> attacks<br>They noted that cyber-espionage threat actors—including government-backed groups and commercial <a href="https://hachyderm.io/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a> vendors' customers—were responsible for more than half of attributable <a href="https://hachyderm.io/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a> attacks in 2024.<br>End-user platforms and products (e.g., web browsers, mobile devices, and desktop operating systems) made up 56% of the tracked <a href="https://hachyderm.io/tags/zerodays" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerodays</span></a>. <br><a href="https://www.bleepingcomputer.com/news/security/google-97-zero-days-exploited-in-2024-over-50-percent-in-spyware-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/google-97-zero-days-exploited-in-2024-over-50-percent-in-spyware-attacks/</span></a></p>
Laurent Cheylus<p>In Q1 2025, VulnCheck identified evidence of 159 CVEs publicly disclosed for the first time as exploited in the wild, 28.3% within 24 hours of disclosure <a href="https://bsd.network/tags/Exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploits</span></a> <a href="https://bsd.network/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://vulncheck.com/blog/exploitation-trends-q1-2025" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulncheck.com/blog/exploitatio</span><span class="invisible">n-trends-q1-2025</span></a></p>
Chema Alonso :verified:<p>El lado del mal - Hacking Home Devices II: PoCs &amp; Hack Just for Fun! Aprende cómo buscar bugs en los dispositivos de tu casa <a href="https://www.elladodelmal.com/2025/04/hacking-home-devices-ii-pocs-hack-just.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">elladodelmal.com/2025/04/hacki</span><span class="invisible">ng-home-devices-ii-pocs-hack-just.html</span></a> de Gerard Fuguet <a href="https://ioc.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://ioc.exchange/tags/Exploiting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploiting</span></a> <a href="https://ioc.exchange/tags/SmartHome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmartHome</span></a> <a href="https://ioc.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://ioc.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentest</span></a> <a href="https://ioc.exchange/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a></p>
Markus Feilner<p>Wahnsinn. <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/log4j" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>log4j</span></a> <a href="https://mastodon.social/tags/itsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsec</span></a> <a href="https://mastodon.social/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a><br>"I am no hero" Unfassbar gut, lieber <span class="h-card" translate="no"><a href="https://ard.social/@br_data" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>br_data</span></a></span> ! <a href="https://mastodon.social/tags/br" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>br</span></a> <a href="https://mastodon.social/tags/bayerischerrundfunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bayerischerrundfunk</span></a></p><p>Linkempfehlung ARD Audiothek</p><p><a href="https://www.ardaudiothek.de/episode/wild-wild-web-geschichten-aus-dem-internet/das-wichtigste-hobby-der-welt/br/14442077/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ardaudiothek.de/episode/wild-w</span><span class="invisible">ild-web-geschichten-aus-dem-internet/das-wichtigste-hobby-der-welt/br/14442077/</span></a></p>
Marcus "MajorLinux" Summers<p>Please make sure to update your devices!</p><p>Update Now: iOS 18.4.1 and macOS Sequoia 15.4.1 Address Actively Exploited Vulnerabilities </p><p><a href="https://www.macrumors.com/2025/04/16/ios-18-4-1-security-fixes/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">macrumors.com/2025/04/16/ios-1</span><span class="invisible">8-4-1-security-fixes/</span></a></p><p><a href="https://toot.majorshouse.com/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://toot.majorshouse.com/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://toot.majorshouse.com/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://toot.majorshouse.com/tags/Sequoia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sequoia</span></a> <a href="https://toot.majorshouse.com/tags/Exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploits</span></a> <a href="https://toot.majorshouse.com/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://toot.majorshouse.com/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://toot.majorshouse.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
Christoph Schmees<p>Apple schon wieder mit Notfall-Update</p><p>Erneut gibt Apple Notfall-Updates für alle Systeme heraus, um eine Sicherheitslücke zu schließen. Diese wird in iOS bereits für "extrem ausgefeilte Angriffe gegen spezielle Zielpersonen" ausgenutzt (Zero-Day)</p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/04/17/apple-schon-wieder-mit-notfall-update/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/04/17/apple-schon-wieder-mit-notfall-update/</span></a></p><p><a href="https://social.tchncs.de/tags/Empfehlung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Empfehlung</span></a> <a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/Mobilfunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mobilfunk</span></a> <a href="https://social.tchncs.de/tags/Warnung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Warnung</span></a> <a href="https://social.tchncs.de/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a> <a href="https://social.tchncs.de/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://social.tchncs.de/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://social.tchncs.de/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://social.tchncs.de/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://social.tchncs.de/tags/macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macos</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/privatsph%C3%A4re" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privatsphäre</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/spionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spionage</span></a> <a href="https://social.tchncs.de/tags/vorf%C3%A4lle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vorfälle</span></a> <a href="https://social.tchncs.de/tags/wissen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wissen</span></a> <a href="https://social.tchncs.de/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a></p>
Christoph Schmees<p>Apple aktualisiert alles 2025-03</p><p>Genau so wie Microsoft (MS) veröffentlicht Apple monatlich Updates, die Sicherheitslücken schließen (sollen) und die neue Funktionen mitbringen (KI, mehr Spionage). Noch mehr als MS strengt Apple sich an, die Updates zu unentwirrbaren Paketen zu schnüren</p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/04/10/apple-aktualisiert-alles-2025-03/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/04/10/apple-aktualisiert-alles-2025-03/</span></a></p><p><a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/Mobilfunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mobilfunk</span></a> <a href="https://social.tchncs.de/tags/Warnung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Warnung</span></a> <a href="https://social.tchncs.de/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a> <a href="https://social.tchncs.de/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://social.tchncs.de/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://social.tchncs.de/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://social.tchncs.de/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://social.tchncs.de/tags/macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macos</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/smartphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smartphone</span></a> <a href="https://social.tchncs.de/tags/usb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usb</span></a> <a href="https://social.tchncs.de/tags/vorbeugen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vorbeugen</span></a></p>
IT News<p>“The girl should be calling men.” Leak exposes Black Basta’s influence tactics. - A leak of 190,000 chat messages traded among members of the Black Basta ra... - <a href="https://arstechnica.com/security/2025/04/leaked-messages-expose-trade-secrets-of-prolific-black-basta-ransomware-group/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">04/leaked-messages-expose-trade-secrets-of-prolific-black-basta-ransomware-group/</span></a> <a href="https://schleuss.online/tags/socialengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialengineering</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@JessTheUnstill" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>JessTheUnstill</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@Pibble" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Pibble</span></a></span><br><br>And yes, I treat all devices as insecure and would rather invest the time and effort needed get <a href="https://infosec.space/tags/TechIlliterates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechIlliterates</span></a> up to speed on the <a href="https://infosec.space/tags/OfflinePGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OfflinePGP</span></a> <a href="https://www.youtube.com/watch?v=vdab4T_CoN8" rel="nofollow noopener noreferrer" target="_blank">method!</a></p><ul><li>Sounds cumbersome, but when your threat model literally goes against the #1 <a href="https://infosec.space/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.space/tags/Regime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Regime</span></a> (<a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a>) with more <a href="https://infosec.space/tags/Exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploits</span></a> stockpiled than any hacking forum (cuz <a href="https://infosec.space/tags/NOBUS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NOBUS</span></a> <a href="https://en.wikipedia.org/wiki/NOBUS" rel="nofollow noopener noreferrer" target="_blank">doctrine</a>), you gotta have to upgrade.</li></ul><p>Given the cheapness of storage (legitimate 1TB microSD cards exist and they ain't 4-digit items!) I'd legitimately look into <a href="https://infosec.space/tags/OTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTP</span></a> <a href="https://infosec.space/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> and (<em>IF I had the €€€€€€ to do so!</em>) would even sponsor implementing it in <a href="https://infosec.space/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenVPN</span></a>, <a href="https://infosec.space/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> and <a href="https://infosec.space/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> (for <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunmeling).</p><ul><li>The <a href="https://infosec.space/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> is a <a href="https://infosec.space/tags/RogueNation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RogueNation</span></a> with a Rogue Government! The sooner we accept this reality the sooner we can not only adjust to it but act accordingly…</li></ul><p>I <em>sincerely wish</em> y'all could legitimately call me a tinfoilhat but so far I've been proven right all the time...</p>
The Voyager's Workshop<p>What did you encounter during your last TTRPG adventures? Whatever the tales, I’m sure they are worthy of being remembered in song!</p><p><a href="https://mastodon.art/tags/rpg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rpg</span></a> <a href="https://mastodon.art/tags/fantasymaps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fantasymaps</span></a> <a href="https://mastodon.art/tags/fantasyart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fantasyart</span></a> <a href="https://mastodon.art/tags/dragon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dragon</span></a> <a href="https://mastodon.art/tags/cartography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cartography</span></a> <a href="https://mastodon.art/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://mastodon.art/tags/celebration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>celebration</span></a> <a href="https://mastodon.art/tags/noai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>noai</span></a></p>
Christoph Schmees<p>Oracle leugnet Cyber-Einbruch und Datenleck</p><p>Jemand überrascht? Die Zutaten: Eine Big-Tech Firma aus einem Land, das von einem Irren und notorischen Lügner geführt wird, und ein "Cyber-Vorfall". Oracle ist DIE Firma auf dem Gebiet der Datenbanken</p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/03/30/oracle-leugnet-cyber-einbruch-und-datenleck/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/03/30/oracle-leugnet-cyber-einbruch-und-datenleck/</span></a></p><p><a href="https://social.tchncs.de/tags/Allgemein" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Allgemein</span></a> <a href="https://social.tchncs.de/tags/Empfehlung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Empfehlung</span></a> <a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/Warnung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Warnung</span></a> <a href="https://social.tchncs.de/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://social.tchncs.de/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://social.tchncs.de/tags/erpresser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>erpresser</span></a> <a href="https://social.tchncs.de/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://social.tchncs.de/tags/hersteller" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hersteller</span></a> <a href="https://social.tchncs.de/tags/politik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>politik</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/privatsph%C3%A4re" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privatsphäre</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/UnplugTrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnplugTrump</span></a> <a href="https://social.tchncs.de/tags/usa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usa</span></a> <a href="https://social.tchncs.de/tags/vorf%C3%A4lle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vorfälle</span></a></p>
The Spamhaus Project<p>Despite a -20% ⬇️ decrease, 🇺🇸 US-based "charter.com" is #1 for hosting IPs associated with exploited devices: 139, 714 detections over the last 30 days....</p><p>....as well as 166 Spamhaus Blocklist (SBL) listings.&nbsp;</p><p>Spamhaus reputation statistics:<br>👉 <a href="https://www.spamhaus.org/reputation-statistics/networks/exploit/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/reputation-statis</span><span class="invisible">tics/networks/exploit/</span></a><br><a href="https://charter.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">charter.com</span><span class="invisible"></span></a> </p><p>SBL listings:<br>👉 <a href="https://check.spamhaus.org/sbl/listings/charter.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">check.spamhaus.org/sbl/listing</span><span class="invisible">s/charter.com/</span></a></p><p><a href="https://infosec.exchange/tags/IPs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPs</span></a> <a href="https://infosec.exchange/tags/Exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploits</span></a> <a href="https://infosec.exchange/tags/Spamhaus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spamhaus</span></a> <a href="https://infosec.exchange/tags/ReputationStatistics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReputationStatistics</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a></p>
Christoph Schmees<p>Warnung vor Online-Konvertern</p><p>Im Internet bieten viele Online-Dienste eine Bearbeitung von Benutzerdaten an. Beispiele sind OCR oder Formatwandler. Hier sind zwei Warnungen angebracht. Man muss immer im Hinterkopf behalten, dass die Anbieter ihre Dienste nicht aus reiner Menschenfreundlichkeit betreiben. </p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/03/22/warnung-vor-online-konvertern/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/03/22/warnung-vor-online-konvertern/</span></a></p><p><a href="https://social.tchncs.de/tags/Allgemein" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Allgemein</span></a> <a href="https://social.tchncs.de/tags/Empfehlung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Empfehlung</span></a> <a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/Warnung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Warnung</span></a> <a href="https://social.tchncs.de/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://social.tchncs.de/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/privatsph%C3%A4re" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privatsphäre</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/vorbeugen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vorbeugen</span></a> <a href="https://social.tchncs.de/tags/wissen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wissen</span></a></p>
PrivacyDigest<p>Thousands of <a href="https://mas.to/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread malware | Tom's Guide</p><p>report from the Cato CTRL team, the <a href="https://mas.to/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet <a href="https://mas.to/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router.</p><p>The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> can spread itself across the internet automatically. has also been used to spread other <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> families</p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
Joaquim Homrighausen<p><span class="h-card" translate="no"><a href="https://mastodon.social/@cisene" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cisene</span></a></span> I sincerely hope this has been patched/changed now ... WTAFF?! 😑 </p><p>"Abusing the MS Office protocol scheme"</p><p><a href="https://blog.syss.com/posts/abusing-ms-office-protos/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.syss.com/posts/abusing-ms</span><span class="invisible">-office-protos/</span></a></p><p><a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.online/tags/msoffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>msoffice</span></a> <a href="https://mastodon.online/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://mastodon.online/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
nickbearded<p>Less is More in Security</p><p>As Henry Ford said, "The more things in a car, the more can break." The same applies to operating systems: more software means more vulnerabilities and potential exploits.</p><p>A minimalist OS like BashCore reduces risks by limiting the attack surface. Fewer processes mean fewer entry points for attackers—efficiency, security, and control.</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Minimalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Minimalism</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/Hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hardening</span></a> <a href="https://mastodon.social/tags/Exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploits</span></a> <a href="https://mastodon.social/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.social/tags/BashCore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BashCore</span></a></p>
Doyensec<p>Ahoy! 🦜 Our first "!exploitable" post provides a technical dive 🤿 into the sea 🌊 of IoT exploitation. Read it today to learn how our team 🏴‍☠️ developed an exploit while floating in the Mediterranean! </p><p><a href="https://blog.doyensec.com/2025/02/11/exploitable-iot.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.doyensec.com/2025/02/11/e</span><span class="invisible">xploitable-iot.html</span></a></p><p><a href="https://infosec.exchange/tags/doyensec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>doyensec</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/iot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iot</span></a> <a href="https://infosec.exchange/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a></p>
Christoph Schmees<p>Microsoft Flickentag 2025-01</p><p>Wow, da hat Microsoft (MS) in die Vollen gegriffen. Je nach Zählweise berichten die Meldungen von 161 bis 209 Sicherheitslücken, die jetzt geschlossen würden. Seit 2017 wurden nicht mehr so viele Lücken auf einen Schlag geflickt. Nicht allein die Zahl ist beeindruckend, </p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/01/15/microsoft-flickentag-2025-01/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/01/15/microsoft-flickentag-2025-01/</span></a></p><p><a href="https://social.tchncs.de/tags/Empfehlung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Empfehlung</span></a> <a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/Warnung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Warnung</span></a> <a href="https://social.tchncs.de/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a> <a href="https://social.tchncs.de/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://social.tchncs.de/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.tchncs.de/tags/outlook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>outlook</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/vorbeugen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vorbeugen</span></a> <a href="https://social.tchncs.de/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://social.tchncs.de/tags/wissen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wissen</span></a></p>
PrivacyDigest<p>From <a href="https://mas.to/tags/Pegasus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pegasus</span></a> to <a href="https://mas.to/tags/Predator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Predator</span></a> - The evolution of Commercial <a href="https://mas.to/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> on <a href="https://mas.to/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> - media.ccc.de</p><p>My talk explores the trajectory of iOS spyware from the initial discovery of Pegasus in 2016 to the latest cases in 2024.</p><p>The talk will start with an analysis how <a href="https://mas.to/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> , <a href="https://mas.to/tags/infection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infection</span></a> vectors and methods of commercial spyware on iOS have changed over time<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/ccc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ccc</span></a> </p><p><a href="https://media.ccc.de/v/38c3-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-ios" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">media.ccc.de/v/38c3-from-pegas</span><span class="invisible">us-to-predator-the-evolution-of-commercial-spyware-on-ios</span></a></p>