mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#infosec

315 Beiträge172 Beteiligte65 Beiträge heute
Open Security Conference<p>Ready, set, go! Register now to get your package for the Open Security Conference 2025. 🤩</p><p>🗓️ When? October 2-5<br>📍 Where? Close to Frankfurt am Main, Germany<br>💜 Why? It's a one of a kind conference! </p><p>Open space, from the community for the community, including everyone interested in cybersecurity. What we value: <a href="https://opensecurityconference.org/about/values/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensecurityconference.org/abo</span><span class="invisible">ut/values/</span></a></p><p>➡️ Register now: <a href="https://opensecurityconference.org/conference/registration" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensecurityconference.org/con</span><span class="invisible">ference/registration</span></a> </p><p><a href="https://infosec.exchange/tags/osco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osco</span></a> <a href="https://infosec.exchange/tags/osco25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osco25</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/ProductSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProductSecurity</span></a> <a href="https://infosec.exchange/tags/OTsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTsecurity</span></a> <a href="https://infosec.exchange/tags/OpenSpace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSpace</span></a> [lisi]</p>
Shawn Webb<p>Hey <span class="h-card"><a href="https://fosstodon.org/@frameworkcomputer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>frameworkcomputer</span></a></span>, are the AMD Framework laptops vulnerable to the recent AMD speculative execution vulnerabilities? See: <a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amd.com/en/resources/product-s</span><span class="invisible">ecurity/bulletin/amd-sb-7029.html</span></a></p><p>If the Framework 16 is impacted, do you all have a timeframe for publishing a new UEFI firmware update? This page currently shows version 3.05, which was released before this AMD security announcement: <a href="https://knowledgebase.frame.work/en_us/framework-laptop-16-bios-and-driver-releases-BkeqkVovp" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">knowledgebase.frame.work/en_us</span><span class="invisible">/framework-laptop-16-bios-and-driver-releases-BkeqkVovp</span></a></p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/Framework16" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Framework16</span></a> <a href="https://bsd.network/tags/FrameworkComputer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FrameworkComputer</span></a></p>
ƧƿѦςɛ♏ѦਹѤʞ<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@agreenberg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>agreenberg</span></a></span> <br>What possible use could that information be to anyone?<br>LOLz<br><a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
DEF CON<p>Already dreading the post-DEF CON blues? Delay them by staying for <a href="https://defcon.social/tags/DEFCONTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCONTraining</span></a>.</p><p>Choose from over 40 courses and spend two or four days learning alongside fellow hackers and cybersecurity professionals.</p><p>Register today to secure your spot: <a href="https://training.defcon.org/lasvegas2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/lasvegas20</span><span class="invisible">25</span></a> </p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://defcon.social/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://defcon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
Matthias Schulze<p>Grok Is Spewing Antisemitic Garbage on X <a href="https://www.wired.com/story/grok-antisemitic-posts-x-xai/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/grok-antisemit</span><span class="invisible">ic-posts-x-xai/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Brian Anderson (He/Him)<p>If you have to notify a small biz that they’ve been compromised (especially if you have to ask awkward questions about their security posture), try to remember to be kind. </p><p>Look to be empathetic rather than smug. </p><p>Yes, you infosec genius, you’ve seen and done it all and you have earned a jaded moment (and those of us in the business will pat you on the back later). Just, keep it to yourself a little, because shame and gloating is not a part of anyone’s remediation plan.</p><p><a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a><br><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Eddie.<p>Love the feeling of updating documentation. Once a month I have a team meeting where we walk through technical IR tabletops. </p><p>Today it was a brainstorming exercise on how to hunt behaviors and information over multiple tools, in case one goes down. And assuming I died. Work with my team to get creative and understand how tools work, especially with expertise missing. </p><p>This is a good exercise for team robustness and education.</p><p>And lets me take vacations mostly uninterrupted. Only 2x in 10 years, and both of those uninterrupted trips were in the last three years. Yee haw.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <br><a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <br><a href="https://infosec.exchange/tags/documentation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>documentation</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://universeodon.com/@cryptadamist" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cryptadamist</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@panigrc" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>panigrc</span></a></span> <span class="h-card" translate="no"><a href="https://pounced-on.me/@finalstaticfox" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>finalstaticfox</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@dansup" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dansup</span></a></span> </p><p>Obviously that's another evidence of why <em><a href="https://infosec.space/tags/KYC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KYC</span></a> IS THE ILLICIT ACTIVITY!</em>... </p><ul><li><p><a href="https://universeodon.com/@cryptadamist/114825088355068446" rel="nofollow noopener" target="_blank">That problem</a> doesn't exist with <a href="https://infosec.space/tags/Monero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Monero</span></a> as one cannot determine <a href="https://infosec.space/tags/transactions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transactions</span></a>, <a href="https://infosec.space/tags/balances" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>balances</span></a> or link wallets by observing the <a href="https://infosec.space/tags/blockchain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blockchain</span></a>. Unlike with all those Shitcoins like <a href="https://infosec.space/tags/Bitcoin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitcoin</span></a> or <a href="https://infosec.space/tags/Ethereum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ethereum</span></a>! </p></li><li><p>So even if I had a Monero Wallet and even if you knew the wallet address, you cannot see what's on it or what transactions go in and out. </p></li><li><p>It's even more secure than <a href="https://infosec.space/tags/SEPA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SEPA</span></a> because thanks to <a href="https://infosec.space/tags/SWIFT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SWIFT</span></a> &amp; <a href="https://infosec.space/tags/FATCA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FATCA</span></a> the <a href="https://infosec.space/tags/IRS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IRS</span></a> and <a href="https://infosec.space/tags/TreasuryDept" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TreasuryDept</span></a>. have bulk access to these systems and can basically see account balances in real time (when it comes to <a href="https://infosec.space/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> citizens! The rest they can approximate with bulk access to payment providers and intelligence).</p></li></ul><p>So yeah, blame lack of <a href="https://infosec.space/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a>, <a href="https://infosec.space/tags/secrecy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secrecy</span></a>, and <a href="https://infosec.space/tags/custody" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>custody</span></a> as well as <a href="https://infosec.space/tags/doxxing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doxxing</span></a> in the form of KYC under the pretense of <a href="https://infosec.space/tags/AML" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AML</span></a> for the rampant rise of <a href="https://infosec.space/tags/kidnappings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kidnappings</span></a> and armed robberies of <a href="https://infosec.space/tags/shitcoin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shitcoin</span></a> HODL'ers.</p><ul><li>Obviously I do condemn such acts of violence as a matter of principle.</li></ul><p>The fact that there are automated, idiot-proof tools like <a href="https://infosec.space/tags/chainalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chainalysis</span></a> that enable statistical tracking and linking of transactions for everything <em>except Monero</em> is the problem. </p><ul><li><p>Don't believe that such <em>"AML compliance"</em> tools are unique to the clients of said providers, because it's just connecting dots from public records. No warrant nor insiders nor MLAT needed.</p></li><li><p>OFC I'd have to expect getting robbed by organized crime if I were to post evidence of me sleeping on genuine gold bars. That's what [bank] vaults are for. Sadly shitcoin-fans seem to disregard basic <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a>, <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> &amp; <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> that even <a href="https://infosec.space/tags/TradFinance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TradFinance</span></a> do execute.</p></li></ul>
David August ❌👑<p>Request for <a href="https://mastodon.online/tags/recommendations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>recommendations</span></a>: </p><p>I want to find a new <a href="https://mastodon.online/tags/domain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>domain</span></a> <a href="https://mastodon.online/tags/registrar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>registrar</span></a>. </p><p>For my domains with no active site on them (at the moment), meant to forward to main site (using registrar later for active sites). </p><p>I seek a domain registrar able to: </p><p>1) do domain privacy <br>2) do redirects (301 &amp; 302) <br>3) be less expensive than godaddy for registration &amp; privacy <br>4) reliable </p><p>5) perhaps in EU since I'm critical of US admin &amp; want to be harder to censor.</p><p><a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/recommendation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>recommendation</span></a></p>
OTX Bot<p>Malicious pull request infects VS Code extension</p><p>A VS Code extension for Ethereum smart contract development, ETHcode, was compromised through a GitHub pull request. The attacker, using a newly created account, submitted a PR that introduced a malicious dependency and code to execute it. The compromise was subtle, involving only two lines of code changes among thousands. The malicious code downloads and runs a batch script from a public file-hosting service, potentially to steal crypto assets or compromise Ethereum contracts. The extension, with nearly 6,000 installs, was removed from the marketplace after discovery. This incident highlights the importance of carefully reviewing contributions, especially from new accounts, and scrutinizing package dependencies in software development workflows.</p><p>Pulse ID: 686e735ad79ecba7fdb7c152<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/686e735ad79ecba7fdb7c152" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/686e7</span><span class="invisible">35ad79ecba7fdb7c152</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-07-09 13:49:14</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Sniffnet is a cross-platform, Rust-based network traffic monitoring tool. It offers chart visualizations, real-time inspection, and over 6000 protocol/service recognitions—for personal or professional use. Intuitive UI with support for custom themes. <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/GyulyVGC/sniffnet" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/GyulyVGC/sniffnet</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
AAKL<p>Sure, make crypto great again - for criminals. 🤦‍♂️ </p><p>"We identified your personal information contained within documents related to certain of our customers that the unauthorized individual obtained."</p><p>Bleeping Computer: Bitcoin Depot breach exposes data of nearly 27,000 crypto users <a href="https://www.bleepingcomputer.com/news/security/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/bitcoin-depot-breach-exposes-data-of-nearly-27-000-crypto-users/</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@BleepingComputer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BleepingComputer</span></a></span> </p><p>The official filing: file:///C:/Users/sugar/AppData/Local/Temp/AG_Letter_Insert_-_Consumer_Letters_-_Rest_of_US(712666173.1).pdf <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
AAKL<p>Don't click on ads. if an ad appeals to you, note the brand, search for it and go directly to that site.</p><p>"The scam spans more than 50 countries, with websites tailored to local audiences by using native languages, regional celebrities and well-known financial institutions to appear credible."</p><p>"The scheme typically begins with ads placed on platforms like Google and Meta, which redirect users to bogus news articles. Clicking these articles leads to fraudulent investment platforms — often branded as Eclipse Earn, Solara or Vynex." </p><p>The Record: Report: Fake CNN and BBC sites used to push investment scams <a href="https://therecord.media/news-websites-faked-to-spread-investment-scams" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/news-websites-</span><span class="invisible">faked-to-spread-investment-scams</span></a> <span class="h-card" translate="no"><a href="https://mastodon.social/@therecord_media" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>therecord_media</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> </p><p>The REport: BaitTrap: The Rise of Baiting News Sites behind online Investment Fraud <a href="https://cdn.prod.website-files.com/66fbdb04ee8bb0436308fc15/686ba57ad93bc718938e5e0f_BaitTrap.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cdn.prod.website-files.com/66f</span><span class="invisible">bdb04ee8bb0436308fc15/686ba57ad93bc718938e5e0f_BaitTrap.pdf</span></a></p>
BeyondMachines :verified:<p>CISA reports multiple vulnerabilities in Emerson ValveLink products, at least one critical</p><p>CISA reported multiple vulnerabilities in Emerson's ValveLink product line affecting critical manufacturing systems, including a critical flaw (CVE-2025-52579) that stores sensitive information in cleartext memory, potentially allowing attackers to read sensitive data, tamper with system parameters, and execute unauthorized code.</p><p>**If you have Emerson ValveLink products (SOLO, DTM, PRM, or SNAP-ON), make sure it's isolated from the internet and accessible only from trusted networks. Then check your version and plan an upgrade to ValveLink 14.0. The issues may not be immediately exploitable, but given enough time it will be exploited. Plan a regular patch.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/cisa-reports-multiple-vulnerabilities-in-emerson-valvelink-products-at-least-one-critical-9-j-n-f-7/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/cisa-reports-multiple-vulnerabilities-in-emerson-valvelink-products-at-least-one-critical-9-j-n-f-7/gD2P6Ple2L</span></a></p>
Tatiana Mikhaleva<p>🎞️ A developer managed to reverse pixelation in video using FFmpeg, GIMP and edge detection - no AI involved.</p><p>By analyzing motion and edges across frames, they could reconstruct original content from blurred areas.</p><p>It’s a reminder: pixelation is visual, not secure.</p><p>🛠️ Code &amp; demo: <a href="https://github.com/KoKuToru/de-pixelate_gaV-O6NPWrI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/KoKuToru/de-pixelat</span><span class="invisible">e_gaV-O6NPWrI</span></a></p><p><a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/ffmpeg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ffmpeg</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://mastodon.social/tags/devtools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devtools</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a></p>
AAKL<p>Not sure if I should laugh or cry. </p><p>The thief "laundered the stolen funds shortly after the theft, changing batches into ethereum as well as the U.S.-dollar pegged stablecoins USDC and DAI." </p><p>The Record: More than $40 million stolen from GMX crypto platform <a href="https://therecord.media/gmx-exchange-cryptocurrency-stolen" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/gmx-exchange-c</span><span class="invisible">ryptocurrency-stolen</span></a> <span class="h-card" translate="no"><a href="https://mastodon.social/@therecord_media" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>therecord_media</span></a></span> <span class="h-card" translate="no"><a href="https://ioc.exchange/@jgreig" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jgreig</span></a></span> </p><p>The company's statement: <a href="https://t.me/GMX_Announcements/1095" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.me/GMX_Announcements/1095</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
AAKL<p>From yesterday.</p><p>The Record: Appeals court revives Salvadoran journalists’ lawsuit against NSO Group <a href="https://therecord.media/appeals-court-revives-salvadoran-journalist-lawsuit-nso-group-spyware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/appeals-court-</span><span class="invisible">revives-salvadoran-journalist-lawsuit-nso-group-spyware</span></a> <span class="h-card" translate="no"><a href="https://mastodon.social/@therecord_media" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>therecord_media</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a></p>
AAKL<p>Tenable provides details on recently-discovered vulnerability on Anthropic's MCP Inspector <a href="https://www.tenable.com/blog/how-tenable-research-discovered-a-critical-remote-code-execution-vulnerability-on-anthropic" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tenable.com/blog/how-tenable-r</span><span class="invisible">esearch-discovered-a-critical-remote-code-execution-vulnerability-on-anthropic</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@tenable" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tenable</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
Kim<p>Yeah I've had to learn a few things at my big age.</p><p><a href="https://beige.party/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialMedia</span></a> <a href="https://beige.party/tags/Gestapo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gestapo</span></a> <a href="https://beige.party/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
AAKL<p>New.</p><p>Palo Alto just listed several security advisories: Main portal: <a href="https://security.paloaltonetworks.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">security.paloaltonetworks.com/</span><span class="invisible"></span></a></p><p>- CVE-2025-0139 Autonomous Digital Experience Manager: Privilege Escalation (PE) Vulnerability <a href="https://security.paloaltonetworks.com/CVE-2025-0139" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">CVE-2025-0139</span></a></p><p>- CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App <a href="https://security.paloaltonetworks.com/CVE-2025-0140" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">CVE-2025-0140</span></a></p><p>- CVE-2025-0141 GlobalProtect App: Privilege Escalation (PE) Vulnerability <a href="https://security.paloaltonetworks.com/CVE-2025-0141" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">CVE-2025-0141</span></a></p><p>Update bulletin: <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0012" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">PAN-SA-2025-0012</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/PaloAlto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PaloAlto</span></a></p>