mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

939
active users

Learn more

#infosec

309 posts115 participants44 posts today
César Pose<p>90% of code will be writen by AI, they say...<br>And Bug Bounty Hunters...<br>😅😅😅😅😅😅</p><p><a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/aicoding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aicoding</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS31898<br>Location: Phoenix, US<br>Added: 2025-03-26T16:17</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS3462<br>Location: Taipei, TW<br>Added: 2025-03-27T21:46</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
BeyondMachines :verified:<p>Critical security vulnerability in Verizon Call Filter App for iOS <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-security-vulnerability-in-verizon-call-filter-app-for-ios-e-w-8-7-f/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-security-vulnerability-in-verizon-call-filter-app-for-ios-e-w-8-7-f/gD2P6Ple2L</span></a></p>
Shodan Safari<p>ASN: AS4134<br>Location: Shenzhen, CN<br>Added: 2025-03-24T12:17</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
OWASP Foundation<p>Get ready for an exhilarating time at <a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> Global <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> EU this May! Imagine navigating between sessions, connecting with peers over coffee... Why not enhance your experience by becoming a Mentor? Sign up here: <a href="https://owasp.wufoo.com/forms/zk2cdkr1qla6o8/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.wufoo.com/forms/zk2cdkr1</span><span class="invisible">qla6o8/</span></a> 🚀 <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatmodeling</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devsecops</span></a></p>
BeyondMachines :verified:<p>Critical Pre-Authentication SQL Injection vulnerability reported in Halo ITSM <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-pre-authentication-sql-injection-vulnerability-reported-in-halo-itsm-s-r-h-p-7/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-pre-authentication-sql-injection-vulnerability-reported-in-halo-itsm-s-r-h-p-7/gD2P6Ple2L</span></a></p>
Shodan Safari<p>ASN: AS24940<br>Location: Falkenstein, DE<br>Added: 2025-03-31T08:01</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
beardedtechguy@infosec:~$<p>This makes for good education for clients!</p><p>QR codes sent in attachments are the new favorite for phishers <a href="https://www.malwarebytes.com/blog/news/2025/04/qr-codes-sent-in-attachments-are-the-new-favorite-for-phishers" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwarebytes.com/blog/news/202</span><span class="invisible">5/04/qr-codes-sent-in-attachments-are-the-new-favorite-for-phishers</span></a></p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a></p>
Nonilex<p>A federal Judge Denise Cote in NY rejected the <a href="https://masto.ai/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> admin’s effort to dismiss lawsuit alleging <a href="https://masto.ai/tags/DOGE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOGE</span></a> directed a massive breach of <a href="https://masto.ai/tags/OPM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPM</span></a> data affecting millions of people.</p><p><a href="https://masto.ai/tags/law" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>law</span></a> <a href="https://masto.ai/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://masto.ai/tags/NationalSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationalSecurity</span></a> <br><a href="https://storage.courtlistener.com/recap/gov.uscourts.nysd.636793/gov.uscourts.nysd.636793.72.0.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">storage.courtlistener.com/reca</span><span class="invisible">p/gov.uscourts.nysd.636793/gov.uscourts.nysd.636793.72.0.pdf</span></a></p>
0x40k<p>FIN7 *again*? Seriously, these guys just don't quit, do they? 🙄</p><p>Heads up – they've cooked up an Anubis backdoor using Python. And nope, *it's not* the Android Trojan people know. It's pretty wild what this thing packs: we're talking remote shell capabilities, file uploads, messing with the registry... 🤯 Basically, the keys to the kingdom!</p><p>And let me tell you from a pentester's perspective: Just relying on AV? That's *definitely* not gonna cut it anymore. We all know that, right?</p><p>Looks like they're slipping in through compromised SharePoint sites now? Yikes. The nasty part? A Python script decrypts the payload *directly in memory*, making it incredibly tough to spot! 🥴 Plus, their command and control chats happen over a Base64-encoded TCP socket.</p><p>So, keep a *sharp eye* on those ZIP attachments! Double-check your SharePoint sites' integrity. You'll also want to monitor network traffic closely (especially that TCP activity!). And make sure your endpoint security is actually up to snuff – remember, they love finding ways to bypass defenses!</p><p>How are *you* tackling threats like this one? What are your go-to tools and strategies for defense? 🤔 Let's share some knowledge!</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/FIN7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIN7</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharePoint</span></a> <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a></p>
BeyondMachines :verified:<p>"Gay Daddy" dating App leaks data of 50,000 User profiles and private messages <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/incident" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incident</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a><br><a href="https://beyondmachines.net/event_details/gay-daddy-dating-app-leaks-data-of-50000-user-profiles-and-private-messages-d-i-1-6-9/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/gay-daddy-dating-app-leaks-data-of-50000-user-profiles-and-private-messages-d-i-1-6-9/gD2P6Ple2L</span></a></p>

ah tiens, ce serait donc celle-là la mystérieuse vulnérabilité en exploitation observée par les honeypots ? 👀

⚠️ Vulnérabilité critique chez Ivanti Connect Secure (CVE-2025-22457)

Mandiant signale qu’une faille critique affectant certaines versions des VPN Ivanti est activement exploitée depuis mars 2025. Des acteurs liés à la Chine (UNC5221) ont déployé plusieurs malwares furtifs, comme TRAILBLAZE (dropper en mémoire) et BRUSHFIRE (porte dérobée passive), via cette faille.

➡️ Un patch est dispo depuis février, mais la menace a été sous-estimée au départ.
➡️ Si vous utilisez Ivanti ICS, mettez à jour rapidement vers la version 22.7R2.6 ou ultérieure.

(Utilisez les outils d'intégrité d'Ivanti pour détecter toute activité anormale.)

"Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)"👇
cloud.google.com/blog/topics/t

#CyberVeille
#Ivanti #Mandiant #CVE_2025_22457 #infosec

Google Cloud BlogSuspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) | Google Cloud Blog