social.kyiv.dcomm.net.ua is one of the many independent Mastodon servers you can use to participate in the fediverse.
Київський інстанс є частиною https://dcomm.net.ua. Українські локальні інстанси Mastodon були розгорнуті в 9 українських містах у серпні-вересні 2022 року

Administered by:

Server stats:

109
active users

#cybersecurity

324 posts171 participants15 posts today
Nonilex<p>…It was…unclear if <a href="https://masto.ai/tags/Starlink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Starlink</span></a> communications were <a href="https://masto.ai/tags/encrypted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encrypted</span></a>. At a minimum, the system allows for a network separate from existing WH servers that people on the grounds are able to use, keeping that data separate.</p><p>“It’s super rare” to install Starlink or another <a href="https://masto.ai/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> provider as a replacement for existing govt <a href="https://masto.ai/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> that has been vetted &amp; secured, said Jake Williams, a VP for R&amp;D at Hunter Strategy, a <a href="https://masto.ai/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> consultancy. “I can’t think of a time that I have heard of that.”</p>
Matthias Schulze<p>China announces plan to label all AI-generated content with watermarks and metadata <a href="https://go.theregister.com/feed/www.theregister.com/2025/03/17/asia_tech_news_roundup/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/03/17/asia_tech_news_roundup/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Christoffer S.<p>It would appear as if Wiz may have discovered another supply-chain compromise:</p><p><a href="https://www.wiz.io/blog/new-github-action-supply-chain-attack-reviewdog-action-setup" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wiz.io/blog/new-github-action-</span><span class="invisible">supply-chain-attack-reviewdog-action-setup</span></a></p><p>The attack involved compromising the v1 tag of reviewdog/action-setup between March 11th 18:42 and 20:31 UTC. Unlike the tj-actions attack that used curl to retrieve a payload, this attack directly inserted a base64-encoded malicious payload into the install.sh file. When executed, the code dumped CI runner memory containing workflow secrets, which were then visible in logs as double-encoded base64 strings. The attack chain appears to have started with the compromise of reviewdog/action-setup, which was then used to compromise the tj-actions-bot Personal Access Token (PAT), ultimately leading to the compromise of tj-actions/changed-files. Organizations are advised to check for affected repositories using GitHub queries, examine workflow logs for evidence of compromise, rotate any leaked secrets, and implement preventive measures like pinning actions to specific commit hashes rather than version tags.</p><p><a href="https://swecyb.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://swecyb.com/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChain</span></a></p>
Miguel Afonso Caetano<p>"During the Biden administration, CISA vowed to help the tech industry understand and mitigate the risks of open-source software, which is often poorly maintained and has repeatedly been exploited by hackers. But since Trump took office, CISA has lost the three technical luminaries who oversaw that work: Jack Cable, Aeva Black, and Tim Pepper. Open-source security remains a major challenge, but CISA’s efforts to address that challenge are now rudderless.</p><p>The new administration has also frozen CISA’s work on artificial intelligence. The agency had been researching ways to use AI for vulnerability detection and networking monitoring, as well as partnering with the private sector to study AI risks. “About 50 percent of [CISA’s] AI expert headcount has been let go,” says a person familiar with the matter, which is “severely limiting” CISA’s ability to help the US Artificial Intelligence Safety Institute test AI models before deployment.</p><p>The administration also pushed out CISA’s chief AI officer, Lisa Einstein, and closed down her office, the person familiar with the matter says. Einstein’s team oversaw CISA’s use of AI and worked with private companies and foreign governments on AI security.<br>A large team of DHS and CISA AI staffers was set to accompany Vice President JD Vance to Paris in February for an AI summit, but those experts “were all pulled back” from attending, according to a person familiar with the matter."</p><p><a href="https://www.wired.com/story/inside-cisa-under-trump/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/inside-cisa-un</span><span class="invisible">der-trump/</span></a></p><p><a href="https://tldr.nettime.org/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> <a href="https://tldr.nettime.org/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> <a href="https://tldr.nettime.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://tldr.nettime.org/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a></p>
Steele Fortress<p>Poll: What cybersecurity practice do you prioritize the most?</p><p>1. Using strong, unique passwords<br>2. Regular software updates<br>3. Multi-factor authentication<br>4. Being cautious with emails and links</p><p>Comment below to share why you chose your option! Let’s elevate our cyber awareness together. 💻🔒</p><p>Read more: <a href="https://steelefortress.com/fortress-feed/legal-challenges-of-autonomous-vehicles-and-cybersecurity-threats" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">steelefortress.com/fortress-fe</span><span class="invisible">ed/legal-challenges-of-autonomous-vehicles-and-cybersecurity-threats</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a></p>
Christoffer S.<p>The always entertaining team at watchTowr labs recently published a new article: <a href="https://labs.watchtowr.com/bypassing-authentication-like-its-the-90s-pre-auth-rce-chain-s-in-kentico-xperience-cms/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">labs.watchtowr.com/bypassing-a</span><span class="invisible">uthentication-like-its-the-90s-pre-auth-rce-chain-s-in-kentico-xperience-cms/</span></a></p><p>watchTowr Labs researchers discovered multiple critical vulnerabilities in Kentico Xperience CMS that allow for pre-authentication remote code execution. The research identified two distinct authentication bypass vulnerabilities (WT-2025-0006 and WT-2025-0011) that, when chained with a post-authentication RCE vulnerability (WT-2025-0007), enable complete system compromise. The vulnerabilities affect Kentico Xperience 13 installations with the Staging Service enabled and configured with username/password authentication. The first vulnerability was patched in version 13.0.173, while the second authentication bypass and RCE were addressed in version 13.0.178. The researchers note that these vulnerabilities likely affect Kentico Xperience 12 as well. The root cause of the authentication bypasses was found in the obsolete Microsoft Web Services Enhancement 3.0 library, which the researchers strongly advise against using.</p><p><a href="https://swecyb.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://swecyb.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://swecyb.com/tags/Research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Research</span></a></p>
Europe Says<p><a href="https://www.europesays.com/1920893/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/1920893/</span><span class="invisible"></span></a> Citi Trends Gets Employee Data Breach Claims Sent to Arbitration <a href="https://pubeurope.com/tags/arbitration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arbitration</span></a> <a href="https://pubeurope.com/tags/ClassActions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClassActions</span></a> <a href="https://pubeurope.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://pubeurope.com/tags/Data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Data</span></a> <a href="https://pubeurope.com/tags/DataBreaches" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreaches</span></a> <a href="https://pubeurope.com/tags/dismissal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dismissal</span></a> <a href="https://pubeurope.com/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://pubeurope.com/tags/preemption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>preemption</span></a> <a href="https://pubeurope.com/tags/UnconscionabilityDefense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnconscionabilityDefense</span></a></p>
The New Oil<p>Large enterprises scramble after supply-chain attack spills their secrets</p><p><a href="https://arstechnica.com/information-technology/2025/03/supply-chain-attack-exposing-credentials-affects-23k-users-of-tj-actions/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2025/03/supply-chain-attack-exposing-credentials-affects-23k-users-of-tj-actions/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a></p>
BeyondMachines :verified:<p>State of (in)security - Week 11, 2025 <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/knowledge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>knowledge</span></a> <a href="https://infosec.exchange/tags/weeklyreport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>weeklyreport</span></a><br><a href="https://beyondmachines.net/event_details/state-of-in-security-week-11-2025-v-d-o-c-b/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/state-of-in-security-week-11-2025-v-d-o-c-b/gD2P6Ple2L</span></a></p>
The New Oil<p>Consumer Groups Push New Law Fighting 'Zombie' <a href="https://mastodon.thenewoil.org/tags/IoT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoT</span></a> Devices</p><p><a href="https://yro.slashdot.org/story/25/03/17/0126204/consumer-groups-push-new-law-fighting-zombie-iot-devices" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/03/1</span><span class="invisible">7/0126204/consumer-groups-push-new-law-fighting-zombie-iot-devices</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
AAKL<p>Tech Crunch: TikTok rolls out a ‘Security Checkup’ tool to help users secure their accounts <a href="https://techcrunch.com/2025/03/17/tiktok-rolls-out-a-security-checkup-tool-to-help-users-secure-their-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/17/tikt</span><span class="invisible">ok-rolls-out-a-security-checkup-tool-to-help-users-secure-their-accounts/</span></a> <span class="h-card" translate="no"><a href="https://mstdn.social/@TechCrunch" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>TechCrunch</span></a></span> <a href="https://infosec.exchange/tags/TikTok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TikTok</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Avoid the Hack! :donor:<p>Week 11 of the <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> Roundup is out. Featuring:</p><p>- Data broker bragging about having personal information of billions of people<br>- How the ESP32 <a href="https://infosec.exchange/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bluetooth</span></a> backdoor isn't a backdoor<br>- North Korean government APTs spreading <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> on <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> play, <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>npm</span></a><br>- An ICE OSINT Tool that can monitor 200+ websites of a target<br>- <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> patching an exploited zero-day in WebKit<br>- <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> Patch Tuesday, 6 exploited zero-days</p><p>... and more, of course.</p><p><a href="https://infosec.exchange/tags/privacymatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacymatters</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> </p><p><a href="https://avoidthehack.com/privacy-week11-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">avoidthehack.com/privacy-week1</span><span class="invisible">1-2025</span></a></p>
The New Oil<p>Fake "Security Alert" issues on <a href="https://mastodon.thenewoil.org/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> use <a href="https://mastodon.thenewoil.org/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> app to hijack accounts</p><p><a href="https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Europe Says<p><a href="https://www.europesays.com/1920620/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/1920620/</span><span class="invisible"></span></a> ‘New World of Opportunity Awaits’: Latvia Seeks Stronger Cyber and Space Ties With India Amid Rising Global Threats – Exclusive <a href="https://pubeurope.com/tags/BaibaBraze" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BaibaBraze</span></a> <a href="https://pubeurope.com/tags/CyberAndSpaceTies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAndSpaceTies</span></a> <a href="https://pubeurope.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://pubeurope.com/tags/EuropeanUnion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EuropeanUnion</span></a> <a href="https://pubeurope.com/tags/Jaunumi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jaunumi</span></a> <a href="https://pubeurope.com/tags/latvia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>latvia</span></a> <a href="https://pubeurope.com/tags/Latvija" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Latvija</span></a> <a href="https://pubeurope.com/tags/LithuaniaAndEstonia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LithuaniaAndEstonia</span></a> <a href="https://pubeurope.com/tags/WorldNewsNewsTimesNow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WorldNewsNewsTimesNow</span></a></p>
The New Oil<p>Malicious <a href="https://mastodon.thenewoil.org/tags/Adobe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Adobe</span></a>, <a href="https://mastodon.thenewoil.org/tags/DocuSign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DocuSign</span></a> <a href="https://mastodon.thenewoil.org/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> apps target <a href="https://mastodon.thenewoil.org/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft365</span></a> accounts</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-adobe-docusign-oauth-apps-target-microsoft-365-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/malicious-adobe-docusign-oauth-apps-target-microsoft-365-accounts/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>Everything's normal.</p><p>🇺🇸 A staff member at the Department of Government Efficiency (DOGE) violated Treasury rules by emailing unencrypted personal data to Trump administration officials. This breach was revealed in a court filing after the staffer, Marko Elez, resigned amidst controversy over racist social media posts.</p><p>Elez has since been rehired at the Social Security Administration, raising concerns about data security.</p><p><a href="https://techcrunch.com/2025/03/17/doge-staffer-violated-treasury-rules-by-emailing-unencrypted-personal-data/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/17/doge</span><span class="invisible">-staffer-violated-treasury-rules-by-emailing-unencrypted-personal-data/</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/uspol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uspol</span></a></p>
Robert [KJ5ELX] :donor:<p>So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use. </p><p>Let me put the important words in uppercase. </p><p>So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use. </p><p>[Edit with H/T: <a href="https://benjojo.co.uk/u/benjojo/h/cR4dJWj3KZltPv3rqX" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">benjojo.co.uk/u/benjojo/h/cR4d</span><span class="invisible">JWj3KZltPv3rqX</span></a>]</p><p><a href="https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cloudflare.com/password-r</span><span class="invisible">euse-rampant-half-user-logins-compromised/</span></a></p><p><a href="https://infosec.exchange/tags/cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudflare</span></a> <a href="https://infosec.exchange/tags/password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>password</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
BeyondMachines :verified:<p>Supply-Chain attack compromises popular GitHub Action used by Over 23,000 organizations <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/supply-chain-attack-compromises-popular-github-action-used-by-over-23000-organizations-u-m-v-0-l/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/supply-chain-attack-compromises-popular-github-action-used-by-over-23000-organizations-u-m-v-0-l/gD2P6Ple2L</span></a></p>
OTX Bot<p>Newly Discovered Ebyte Ransomware Targets Windows Users</p><p>Pulse ID: 67d8457d0f7af00bed6d15c2<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67d8457d0f7af00bed6d15c2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67d84</span><span class="invisible">57d0f7af00bed6d15c2</span></a> <br>Pulse Author: cryptocti<br>Created: 2025-03-17 15:53:33</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RansomWare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomWare</span></a> <a href="https://social.raytec.co/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/cryptocti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocti</span></a></p>
OTX Bot<p>Android Banking Trojan OctoV2 Disguising As DeepSeek AI</p><p>Pulse ID: 67d844602d283f1e5f071363<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67d844602d283f1e5f071363" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67d84</span><span class="invisible">4602d283f1e5f071363</span></a> <br>Pulse Author: cryptocti<br>Created: 2025-03-17 15:48:48</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.raytec.co/tags/Bank" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bank</span></a> <a href="https://social.raytec.co/tags/BankingTrojan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BankingTrojan</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Trojan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojan</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/cryptocti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocti</span></a></p>