pawb.fun is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance aimed at any and all within the furry fandom, though anyone is welcome! We're friendly towards members of the LGBTQ+ community and aiming to offer a safe space for our users.

Server stats:

297
active users

#cybersecurity

116 posts63 participants8 posts today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/GitHubAction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHubAction</span></a> supply chain attack exposed secrets in 218 repos</p><p><a href="https://www.bleepingcomputer.com/news/security/github-action-supply-chain-attack-exposed-secrets-in-218-repos/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/github-action-supply-chain-attack-exposed-secrets-in-218-repos/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/HellCat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HellCat</span></a> hackers go on a worldwide <a href="https://mastodon.thenewoil.org/tags/Jira" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jira</span></a> hacking spree</p><p><a href="https://www.bleepingcomputer.com/news/security/hellcat-hackers-go-on-a-worldwide-jira-hacking-spree/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hellcat-hackers-go-on-a-worldwide-jira-hacking-spree/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p>Hackers are ramping up attacks using year-old <a href="https://mastodon.thenewoil.org/tags/ServiceNow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ServiceNow</span></a> security bugs to target unpatched systems</p><p><a href="https://techcrunch.com/2025/03/20/hackers-are-ramping-up-attacks-using-year-old-servicenow-security-bugs-to-break-into-unpatched-systems/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/20/hack</span><span class="invisible">ers-are-ramping-up-attacks-using-year-old-servicenow-security-bugs-to-break-into-unpatched-systems/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/RansomHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomHub</span></a> ransomware uses new <a href="https://mastodon.thenewoil.org/tags/Betruger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Betruger</span></a> ‘multi-function’ backdoor</p><p><a href="https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-uses-new-betruger-multi-function-backdoor/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/ransomhub-ransomware-uses-new-betruger-multi-function-backdoor/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/VSCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VSCode</span></a> extensions found downloading early-stage <a href="https://mastodon.thenewoil.org/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/vscode-extensions-found-downloading-early-stage-ransomware/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/vscode-extensions-found-downloading-early-stage-ransomware/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/WordPress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WordPress</span></a> security plugin <a href="https://mastodon.thenewoil.org/tags/WPGhost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WPGhost</span></a> vulnerable to remote code execution bug</p><p><a href="https://www.bleepingcomputer.com/news/security/wordpress-security-plugin-wp-ghost-vulnerable-to-remote-code-execution-bug/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/wordpress-security-plugin-wp-ghost-vulnerable-to-remote-code-execution-bug/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p>Critical <a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> Smart Licensing Utility flaws now exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/critical-cisco-smart-licensing-utility-flaws-now-exploited-in-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-cisco-smart-licensing-utility-flaws-now-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/CSLU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSLU</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> urges critical orgs to adopt <a href="https://mastodon.thenewoil.org/tags/quantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantum</span></a> <a href="https://mastodon.thenewoil.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> by 2035</p><p><a href="https://www.bleepingcomputer.com/news/security/uk-urges-critical-orgs-to-adopt-quantum-cryptography-by-2035/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/uk-urges-critical-orgs-to-adopt-quantum-cryptography-by-2035/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/pqe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pqe</span></a></p>
The New Oil<p>Spring <a href="https://mastodon.thenewoil.org/tags/Sale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sale</span></a>: 25%* Off <a href="https://mastodon.thenewoil.org/tags/Cryptomator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptomator</span></a></p><p><a href="https://cryptomator.org/blog/2025/03/20/spring-sale/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cryptomator.org/blog/2025/03/2</span><span class="invisible">0/spring-sale/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a></p>
The New Oil<p>The war on encryption is dangerous</p><p><a href="https://discuss.techlore.tech/t/the-war-on-encryption-is-dangerous-ft-com/13018" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discuss.techlore.tech/t/the-wa</span><span class="invisible">r-on-encryption-is-dangerous-ft-com/13018</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>politics</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> at <a href="https://mastodon.thenewoil.org/tags/stalkerware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stalkerware</span></a> <a href="https://mastodon.thenewoil.org/tags/SpyX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpyX</span></a> affects close to 2 million, including thousands of <a href="https://mastodon.thenewoil.org/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> users</p><p><a href="https://techcrunch.com/2025/03/19/data-breach-at-stalkerware-spyx-affects-close-to-2-million-including-thousands-of-apple-users/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/19/data</span><span class="invisible">-breach-at-stalkerware-spyx-affects-close-to-2-million-including-thousands-of-apple-users/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> campaign '<a href="https://mastodon.thenewoil.org/tags/DollyWay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DollyWay</span></a>' breached 20,000 <a href="https://mastodon.thenewoil.org/tags/WordPress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WordPress</span></a> sites</p><p><a href="https://www.bleepingcomputer.com/news/security/malware-campaign-dollyway-breached-20-000-wordpress-sites/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/malware-campaign-dollyway-breached-20-000-wordpress-sites/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
OTX Bot<p>Clickbait to Catastrophe: How a Fake Meta Email Leads to Password Plunder</p><p>A sophisticated phishing campaign targeting Meta Business accounts has been uncovered by the Cofense Phishing Defense Center. The attack begins with a fake Instagram alert claiming the user's ads are suspended due to policy violations. Victims are directed to a fraudulent page mimicking Meta's business help center, where they're prompted to interact with a fake chat support or follow step-by-step instructions. The ultimate goal is to trick users into adding the attacker's device as a secure login method via Two-Factor Authentication, effectively hijacking the account. The campaign employs convincing email templates, landing pages, and even includes live agent support to add credibility. Users are urged to verify communications and examine URLs carefully before taking action to protect their social media credentials.</p><p>Pulse ID: 67dd406e35e3344749124f94<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67dd406e35e3344749124f94" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67dd4</span><span class="invisible">06e35e3344749124f94</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-21 10:33:18</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Instagram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Instagram</span></a> <a href="https://social.raytec.co/tags/Mimic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mimic</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Password</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> <a href="https://social.raytec.co/tags/Word" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Word</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Operation FishMedley targeting governments, NGOs, and think tanks</p><p>ESET researchers have uncovered a global espionage operation called Operation FishMedley, conducted by the FishMonger APT group, which is operated by the Chinese contractor I-SOON. The campaign targeted governments, NGOs, and think tanks across Asia, Europe, and the United States during 2022. The attackers used implants like ShadowPad, SodaMaster, and Spyder, which are common or exclusive to China-aligned threat actors. The operation involved sophisticated tactics including lateral movement, credential theft, and custom malware deployment. Seven victims were identified across various countries and sectors. The analysis provides technical details on the malware used, initial access methods, and command and control infrastructure.</p><p>Pulse ID: 67dd406f6ba9eecd280aa95e<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67dd406f6ba9eecd280aa95e" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67dd4</span><span class="invisible">06f6ba9eecd280aa95e</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-21 10:33:19</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Asia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Asia</span></a> <a href="https://social.raytec.co/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://social.raytec.co/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/ISoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISoon</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/ShadowPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShadowPad</span></a> <a href="https://social.raytec.co/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedStates</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
The New Oil<p>Ukrainian military targeted in new <a href="https://mastodon.thenewoil.org/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> spear-<a href="https://mastodon.thenewoil.org/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>Fun one by <span class="h-card" translate="no"><a href="https://infosec.exchange/@JohnHammond" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>JohnHammond</span></a></span> testing <a href="https://infosec.exchange/tags/convoC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>convoC2</span></a> by <span class="h-card" translate="no"><a href="https://bird.makeup/users/cxnturi0n" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cxnturi0n</span></a></span> </p><p><a href="https://youtu.be/FqZIm6vP7XM?si=5N2Oa3sD8dXl3eEI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/FqZIm6vP7XM?si=5N2Oa3</span><span class="invisible">sD8dXl3eEI</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/video" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>video</span></a> <a href="https://infosec.exchange/tags/msteams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>msteams</span></a> <a href="https://infosec.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a></p>
WinFuture.de<p>Sicherheits-Alarm bei <a href="https://mastodon.social/tags/VisualStudioCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VisualStudioCode</span></a>: In zwei Erweiterungen wurden Komponenten einer Ransomware entdeckt. Microsoft reagiert, nachdem man Meldungen erst ignorierte. <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://winfuture.de/news,149755.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,149755.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
JayeLTee<p>Dealing with something ridiculous at the moment that is a great example of just how 'easy' it really is to close down exposed data:</p><p>Found a server recently with no access controls at all that was hit by ransomware in May 2024 and most of the data is encrypted. (It got hit by an automated script, it wasn't targeted by a ransom group)</p><p>Found a non encrypted directory:</p><p>The company is STILL uploading, monthly, hundreds of millions of records of logs with their clients data.</p><p>Tried to reach out to the company, nothing. Company is from AUS so I tried ASD, nothing.</p><p>I sent an email to AUSCERT, they validated with me the issue and forwarded the information and my contact to ASD, they also tried to reach out to the company themselves.</p><p>Not a word from anyone and the server is still exposed a month after my initial alerts.</p><p>Logs are still being uploaded to the server so it's obvious no one did anything. </p><p>So what am I supposed to do here?</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/asd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>asd</span></a> <a href="https://infosec.exchange/tags/australia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>australia</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>Same feeling here.. </p><p><a href="https://www.resilientcyber.io/p/vibe-coding-conundrums" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">resilientcyber.io/p/vibe-codin</span><span class="invisible">g-conundrums</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/vibecoding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vibecoding</span></a></p>
ChiefGyk3D<p>Let's discuss I got banned from Tiktok live again... | Open Source Fun, News, Tech Talk 💻, Cybersecurity 🔒, Gaming on Linux, and Chill. Live on Twitch: <a href="https://twitch.tv/chiefgyk3d" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twitch.tv/chiefgyk3d</span><span class="invisible"></span></a> 🎥 <a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://social.chiefgyk3d.com/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://social.chiefgyk3d.com/tags/Twitch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitch</span></a> <a href="https://social.chiefgyk3d.com/tags/Streamer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Streamer</span></a></p>