digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

814
active users

#attack

11 posts9 participants0 posts today
BeyondMachines :verified:<p>Amazon Q developer extension for VS Code compromised, used to plant wiping commands</p><p>A malicious actor successfully infiltrated AWS's supply chain between July 13-19, 2025, injecting destructive code into the widely-used Amazon Q Developer Extension for Visual Studio Code (version 1.84.0) that would have instructed the AI assistant to systematically delete user data and cloud infrastructure. This supply chain attack, which potentially exposed tens of thousands of developers during the two-day distribution window, shows a new cybersecurity threat vector in which AI prompt injection can be weaponized at the system level through compromised development tools.</p><p>**Be very careful (and ideally DON'T USE) AI assistants. The AI source code ecosystem is far from stable, and the race to deploy more features causes a lot of problems and vulnerabilities that you are bringing to your own systems. If you use the Amazon Q Developer Extension for VS Code, immediately check your version and update to the latest version (1.85.0 or newer).**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeexploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeexploit</span></a><br><a href="https://beyondmachines.net/event_details/amazon-q-developer-extension-for-vs-code-compromised-j-1-q-e-p/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/amazon-q-developer-extension-for-vs-code-compromised-j-1-q-e-p/gD2P6Ple2L</span></a></p>
Global News<p>Kelowna beach attack victim left with brain injury, semi-paralyzed<br>Ryan Yarush remains in care, barely able to speak, more than a month after a verbal altercation at Mushroom Beach turned physical.<br><a href="https://mastodon.hongkongers.net/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://mastodon.hongkongers.net/tags/injury" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>injury</span></a> <a href="https://mastodon.hongkongers.net/tags/beach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>beach</span></a> <a href="https://mastodon.hongkongers.net/tags/Kelowna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kelowna</span></a> <a href="https://mastodon.hongkongers.net/tags/MushroomBeach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MushroomBeach</span></a> <a href="https://mastodon.hongkongers.net/tags/Canada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canada</span></a><br><a href="https://globalnews.ca/news/11303168/victim-of-alleged-attack-kelowna-beach-brain-injury-semi-paralyzed/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">globalnews.ca/news/11303168/vi</span><span class="invisible">ctim-of-alleged-attack-kelowna-beach-brain-injury-semi-paralyzed/</span></a></p>
Anarchism News<p>Philly Anti-Capitalist: **Cameras Painted in Malcolm X Park**<br> <br><a href="https://phlanticap.noblogs.org/cameras-painted-in-malcolm-x-park/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">phlanticap.noblogs.org/cameras</span><span class="invisible">-painted-in-malcolm-x-park/</span></a><br> <br>Submission Coasting off our excitement about autonomous self-organization, on the night of July 22nd we painted over all four cameras at Malcolm X Park. We want the park to stay the kind of place where people can meet and hang out without being surveilled, that’s why we took the game of Camover there. We’re holding…<br> <br><a href="https://todon.nl/tags/Attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attack</span></a> <a href="https://todon.nl/tags/Immigration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Immigration</span></a> <a href="https://todon.nl/tags/Police" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Police</span></a> <a href="https://todon.nl/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a></p>
Pyrzout :vm:<p>What Is a DDoS Attack? – Source:levelblue.com <a href="https://ciso2ciso.com/what-is-a-ddos-attack-sourcelevelblue-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/what-is-a-ddos-a</span><span class="invisible">ttack-sourcelevelblue-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/1CyberSecurityNewsPost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>1CyberSecurityNewsPost</span></a> <a href="https://social.skynetcloud.site/tags/AT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AT</span></a>&amp;TCybersecurityBlog <a href="https://social.skynetcloud.site/tags/rssfeedsAutogenerated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedsAutogenerated</span></a> <a href="https://social.skynetcloud.site/tags/AT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AT</span></a>&amp;TCybersecurity <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> #'Cyber <a href="https://social.skynetcloud.site/tags/Attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attack</span></a></p>
BeyondMachines :verified:<p>Cisco ISE vulnerabilities actively exploited</p><p>Cisco confirmed that three maximum-severity unauthenticated remote code execution vulnerabilities (CVE-2025-20281, CVE-2025-20282, CVE-2025-20337) in its Identity Services Engine and ISE-PIC platforms are being actively exploited by threat actors.</p><p>**If you still haven't patched your Cisco Identity Services Engine (ISE), DO IT NOW! Your Cisco ISE is being actively attacked. So don't wait.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeexploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeexploit</span></a><br><a href="https://beyondmachines.net/event_details/cisco-ise-vulnerabilities-actively-exploited-l-i-q-i-b/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/cisco-ise-vulnerabilities-actively-exploited-l-i-q-i-b/gD2P6Ple2L</span></a></p>
נאריש זשלאָב מענטש<p>"<a href="https://babka.social/tags/Russian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russian</span></a> courts have sentenced 135 people to prison for their roles in the October 2023 mob <a href="https://babka.social/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> on Makhachkala Uytash Airport in the Muslim-majority region of <a href="https://babka.social/tags/Dagestan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dagestan</span></a>, Russia’s Investigative Committee announced Friday.</p><p>The attack occurred amid heightened tensions following the <a href="https://babka.social/tags/October7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>October7</span></a> <a href="https://babka.social/tags/Hamas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hamas</span></a> massacre in southern <a href="https://babka.social/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a> and Israel’s subsequent war in <a href="https://babka.social/tags/Gaza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaza</span></a>, the <a href="https://babka.social/tags/Jewish" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jewish</span></a> Chronicle reported.</p><p>On October 29, 2023, hundreds of young <a href="https://babka.social/tags/Muslim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Muslim</span></a> men stormed the airport after rumours spread that a flight from <a href="https://babka.social/tags/TelAviv" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TelAviv</span></a> had landed.</p><p>Footage from the scene showed rioters waving <a href="https://babka.social/tags/Palestinian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Palestinian</span></a> flags, shouting “Allahu Akbar,” and searching terminals for Jewish and @Israeli passengers."</p><p><a href="https://worldisraelnews.com/over-130-sentenced-in-attempted-lynching-of-jews-at-dagestan-airport/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">worldisraelnews.com/over-130-s</span><span class="invisible">entenced-in-attempted-lynching-of-jews-at-dagestan-airport/</span></a></p>
BeyondMachines :verified:<p>Microsoft reports on-premise SharePoint vulnerability under active attack</p><p>Microsoft issued an urgent alert about a critical zero-day vulnerability (CVE-2025-53770) in on-premises SharePoint Server installations being actively exploited since July 18, 2025, as part of the "ToolShell" attack campaign that allows remote code execution.</p><p>**If you have on-premises SharePoint servers, immediately enable AMSI integration and install Microsoft Defender Antivirus on all SharePoint systems. There is an active exploitation of these systems and patch is still not available. Check your SharePoint template layouts directory for any malicious "spinstall0.aspx" files. If you can't enable AMSI, disconnect your SharePoint servers from the internet until Microsoft releases a patch.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeexploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeexploit</span></a><br><a href="https://beyondmachines.net/event_details/microsodf-reports-on-premise-sharepoint-vulnerability-under-active-attack-f-y-y-2-j/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/microsodf-reports-on-premise-sharepoint-vulnerability-under-active-attack-f-y-y-2-j/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical vulnerability in CrushFTP actively exploited to hijack servers</p><p>CrushFTP is reporting active exploitation of a critical zero-day vulnerability (CVE-2025-54309) that allows unauthenticated attackers to gain full administrative access to vulnerable file transfer servers. There are confirmed real-world breaches including a German customer compromised on July 18, 2025.</p><p>**If you use CrushFTP file transfer servers, IMMEDIATELY upgrade to latest versions. Attackers are actively exploiting all unpatched CrushFTP servers. And by the very nature of the server you can't hide it from the internet. Check your logs for suspicious admin accounts or unexpected file transfers between July 16-18, 2025, and restore user configs from backups if you find anything suspicious.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeexploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeexploit</span></a><br><a href="https://beyondmachines.net/event_details/critical-vulnerability-in-crushftp-actively-exploited-to-hijack-servers-p-m-v-7-1/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-vulnerability-in-crushftp-actively-exploited-to-hijack-servers-p-m-v-7-1/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical Fortinet FortiWeb SQL injection vulnerability actively exploited</p><p>A critical SQL injection vulnerability (CVE-2025-25257) in FortiWeb web application firewalls is being actively exploited since July 11, 2025, allowing unauthenticated attackers to execute unauthorized SQL commands via crafted HTTP requests to the /api/fabric/device/status endpoint.</p><p>**If you have Fortinet FortiWeb systems running versions 7.0 through 7.6.3, time to act NOW. Make sure it's web admin interface is isolated from the internet and accessible from trusted networks. Then plan a VERY QUICK patch, there is an exploit PoC public and hackers are actively attacking the systems.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeexploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeexploit</span></a><br><a href="https://beyondmachines.net/event_details/critical-fortinet-fortiweb-sql-injection-vulnerability-actively-exploited-3-o-z-g-h/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-fortinet-fortiweb-sql-injection-vulnerability-actively-exploited-3-o-z-g-h/gD2P6Ple2L</span></a></p>
Milo Dide<p>Congress has the power to reject these cuts, but only if we demand action to make backing them politically unbearable. Tell <a href="https://masto.ai/tags/Congress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Congress</span></a> to <a href="https://masto.ai/tags/stop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stop</span></a> the <a href="https://masto.ai/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> on <a href="https://masto.ai/tags/Nativeeducation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nativeeducation</span></a> and restore full funding for <a href="https://masto.ai/tags/Tribalcolleges" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tribalcolleges</span></a> now. <a href="https://click.actionnetwork.org/ss/c/u001.qUXRBnqZ7T8nxbpAcIVwoUsWLkUMWlo_0JmZttSlm3_96qd0UKTtEc2l2-0UxslFNN2faRL19IPaoScLaYo7Qcb0Om7sFEzUmGj5F_WMJJ0srJyYOmOZb6aSsUeBzzuAGdbVBjYhktQNCK1jBnZ-ybGJjyEis8JEJ-7jff-BJJpZawFUxtusXVRgFd-aEto_7U1VROgxqsv71JOHzxYnxwr5I2_vNcN9lUYT-aXkwbzmyilEoMxJFUygHywNwWNG2OoQKwLA_RkXACN14kgRDi7WYGmprz52FVuhjNhAUactmuY1nvPrSqClsRxa70eLybj2LouAMnGngIYY_r1dqM9-gUh2scmpXMJ4qmrPcYwFEGXMtMZwCXkFtvJ7EjOjoVxvEbuzQmhYdAhfTFwGG4hV5i7JX6cph2TZPxQhIjR5Q-EJkETRbQRkesQCYq76qhsHMRjmfJNgd_hMdjsvUeRRMl5Bied4lM9REpCZDii8IbEq5d27KgVOEnPuN9jF0qqt9ht2svIUTA1YK2P8bAJq66TseiV2G7v_5RBuRHA1DlLZmX_wTn-I5BCOWM4xI15h16k-g-OaLxFygolKJA/4ib/1ezVQMtwTZGFChcMtHLkzw/h0/h001.2Bg7xkQrhHbH9K_m0OGSyzs5xvdTZGu4uD9qYVKfRyI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">click.actionnetwork.org/ss/c/u</span><span class="invisible">001.qUXRBnqZ7T8nxbpAcIVwoUsWLkUMWlo_0JmZttSlm3_96qd0UKTtEc2l2-0UxslFNN2faRL19IPaoScLaYo7Qcb0Om7sFEzUmGj5F_WMJJ0srJyYOmOZb6aSsUeBzzuAGdbVBjYhktQNCK1jBnZ-ybGJjyEis8JEJ-7jff-BJJpZawFUxtusXVRgFd-aEto_7U1VROgxqsv71JOHzxYnxwr5I2_vNcN9lUYT-aXkwbzmyilEoMxJFUygHywNwWNG2OoQKwLA_RkXACN14kgRDi7WYGmprz52FVuhjNhAUactmuY1nvPrSqClsRxa70eLybj2LouAMnGngIYY_r1dqM9-gUh2scmpXMJ4qmrPcYwFEGXMtMZwCXkFtvJ7EjOjoVxvEbuzQmhYdAhfTFwGG4hV5i7JX6cph2TZPxQhIjR5Q-EJkETRbQRkesQCYq76qhsHMRjmfJNgd_hMdjsvUeRRMl5Bied4lM9REpCZDii8IbEq5d27KgVOEnPuN9jF0qqt9ht2svIUTA1YK2P8bAJq66TseiV2G7v_5RBuRHA1DlLZmX_wTn-I5BCOWM4xI15h16k-g-OaLxFygolKJA/4ib/1ezVQMtwTZGFChcMtHLkzw/h0/h001.2Bg7xkQrhHbH9K_m0OGSyzs5xvdTZGu4uD9qYVKfRyI</span></a></p>
Electropict<p>Today we received a little packet of four teardrop-shaped <a href="https://mastodon.scot/tags/seeds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>seeds</span></a> from China.</p><p>We do not know why.</p><p>My <a href="https://mastodon.scot/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a>-focused or anime-raddled brain I'm not sure which or if there's a difference is filled with possible ways in which this may be an <a href="https://mastodon.scot/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> vector. Not the least of which is destabilising of Western Civilisation through sheer paranoia. (Just as well I don't believe in Western Civilisation, eh?)</p><p>But I may be missing out on the chance to grow something beautiful?</p><p>/</p>
Waldorf Music - Official<p>A new update is now available for the Waldorf Edition 2.</p><p>In addition to some bug fixes, we have also adapted the Attack plugin for the newer Apple computers. The much-loved drum plugin now runs in native mode without Rosetta.</p><p>The update 2.3.3 for Windows and macOS can be downloaded in your Waldorf account under "License Keys &amp; Plug-In Downloads".</p><p><a href="https://mastodon.social/tags/synthesizer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>synthesizer</span></a> <a href="https://mastodon.social/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://mastodon.social/tags/ppgwave" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ppgwave</span></a> <a href="https://mastodon.social/tags/dpole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dpole</span></a> <a href="https://mastodon.social/tags/electronicmusic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronicmusic</span></a> <a href="https://mastodon.social/tags/waldorfedition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>waldorfedition</span></a> <a href="https://mastodon.social/tags/plugin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>plugin</span></a> <a href="https://mastodon.social/tags/synthplugin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>synthplugin</span></a> <a href="https://mastodon.social/tags/effectplugin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>effectplugin</span></a> <a href="https://mastodon.social/tags/synthesizer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>synthesizer</span></a> <a href="https://mastodon.social/tags/music" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>music</span></a> <a href="https://mastodon.social/tags/waldorf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>waldorf</span></a> <a href="https://mastodon.social/tags/waldorfmusic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>waldorfmusic</span></a></p>
Geriatric Gardener<p>“Drone Strike Halts Output at US-Run Oil Field in Iraq”</p><p>via MintPress News on Telegram </p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/palestine" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>palestine</span></a></span><br><span class="h-card" translate="no"><a href="https://a.gup.pe/u/israel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>israel</span></a></span></p><p>“A drone attack targeted another American-operated oil field in Iraq, forcing a shutdown of operations and reportedly halting the production of 200,000 barrels per day</p><p><a href="https://t.me/mintpress_news/10357" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.me/mintpress_news/10357</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/Press" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Press</span></a> <a href="https://mstdn.social/tags/Iraq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iraq</span></a> <a href="https://mstdn.social/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> <a href="https://mstdn.social/tags/OilField" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OilField</span></a> <a href="https://mstdn.social/tags/Drone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Drone</span></a> <a href="https://mstdn.social/tags/Attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attack</span></a> <a href="https://mstdn.social/tags/ShutDown" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShutDown</span></a> <a href="https://mstdn.social/tags/Halt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Halt</span></a> <a href="https://mstdn.social/tags/Production" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Production</span></a></p>
ADMIN magazine<p>SEO poisoning attack reported by Arctic Wolf Networks delivers Trojanized IT tools<br><a href="https://www.admin-magazine.com/News/SEO-Poisoning-Attack-Delivers-Trojanized-IT-Tools?utm_source=mam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/News/SEO-Po</span><span class="invisible">isoning-Attack-Delivers-Trojanized-IT-Tools?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/SEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SEO</span></a> <a href="https://hachyderm.io/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://hachyderm.io/tags/ArcticWolfNetworks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArcticWolfNetworks</span></a> <a href="https://hachyderm.io/tags/Trojanized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trojanized</span></a> <a href="https://hachyderm.io/tags/PuTTY" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PuTTY</span></a> <a href="https://hachyderm.io/tags/WinSCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WinSCP</span></a> <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Milo Dide<p>Our <a href="https://masto.ai/tags/rights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rights</span></a> are under <a href="https://masto.ai/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://email.amnestyuk.org.uk/q/1eXJzfTTjbVsYWwBdBhoq5G/wv" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">email.amnestyuk.org.uk/q/1eXJz</span><span class="invisible">fTTjbVsYWwBdBhoq5G/wv</span></a></p>
BeyondMachines :verified:<p>Critical remote code execution flaw in Wing FTP Server actively exploited</p><p>Huntress researchers report active exploitation of a critical perfect 10 CVSS vulnerability (CVE-2025-47812) in Wing FTP Server that allows attackers to execute arbitrary system commands with highest privileges through Lua code injection via malicious HTTP POST requests to the web interface. The exploitation campaign, observed since July 1, 2025, targets approximately 5,000 internet-accessible Wing FTP servers with exposed web interfaces, with attackers creating persistence, downloading malicious files, and installing remote access tools.</p><p>**One more reminder that this is an URGENT patch! If you're running Wing FTP Server (any version up to 7.4.3), update NOW, because hackers are already attacking your Wing FTP Server.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeexploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeexploit</span></a><br><a href="https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-in-wing-ftp-server-actively-exploited-n-m-3-i-c/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-remote-code-execution-flaw-in-wing-ftp-server-actively-exploited-n-m-3-i-c/gD2P6Ple2L</span></a></p>
RoundSparrow 🐦<p><span class="h-card" translate="no"><a href="https://mastodon.social/@RationalizedInsanity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>RationalizedInsanity</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@mrgrumpymonkey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mrgrumpymonkey</span></a></span> "So how did I attack you?"</p><p>Your <a href="https://mastodon.social/tags/Attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attack</span></a> <a href="https://mastodon.social/tags/InformationWarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationWarfare</span></a> </p><p>Your attack and information warfare waging is <a href="https://mastodon.social/tags/Ignorance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ignorance</span></a> of <a href="https://mastodon.social/tags/Surkov" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surkov</span></a></p>
RoundSparrow 🐦<p><span class="h-card" translate="no"><a href="https://mastodon.social/@RationalizedInsanity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>RationalizedInsanity</span></a></span> <span class="h-card" translate="no"><a href="https://mastodo.neoliber.al/@Legit_Spaghetti" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Legit_Spaghetti</span></a></span> </p><p>"Be safe."</p><p><a href="https://mastodon.social/tags/Insincere" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Insincere</span></a> <a href="https://mastodon.social/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> you are INSINCERE <a href="https://mastodon.social/tags/LIAR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LIAR</span></a> and <a href="https://mastodon.social/tags/DECEIVER" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DECEIVER</span></a> and <a href="https://mastodon.social/tags/INTIMIDATION" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>INTIMIDATION</span></a> and <a href="https://mastodon.social/tags/BULLSHIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BULLSHIT</span></a> "Be Safe" is an INTIMIDATION method of hate messaging. You stand for liars.</p>
Mark<p>3 men found guilty in connection with arson <a href="https://mastodon.scot/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> on <a href="https://mastodon.scot/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a>-linked businesses in <a href="https://mastodon.scot/tags/London" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>London</span></a>, which <a href="https://mastodon.scot/tags/British" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>British</span></a> authorities say was orchestrated by <a href="https://mastodon.scot/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>’s <a href="https://mastodon.scot/tags/Wagner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wagner</span></a> <a href="https://mastodon.scot/tags/mercenary" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mercenary</span></a> group, Reuters reported.</p><p>The alleged ringleader, Dylan Earl, 21, had already pleaded guilty to aggravated arson over the 2024 blaze targeting companies that were supplying Elon <a href="https://mastodon.scot/tags/Musk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Musk</span></a>'s <a href="https://mastodon.scot/tags/Starlink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Starlink</span></a> satellite equipment to <a href="https://mastodon.scot/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a>, according to Reuters.</p><p><a href="https://kyivindependent.com/three-men-convicted-in-london-arson-plot-tied-to-russias-wagner-group-reuters-report-06-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kyivindependent.com/three-men-</span><span class="invisible">convicted-in-london-arson-plot-tied-to-russias-wagner-group-reuters-report-06-2025/</span></a></p><p><a href="https://mastodon.scot/tags/HybridWar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HybridWar</span></a> <a href="https://mastodon.scot/tags/RussianAggression" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussianAggression</span></a> <a href="https://mastodon.scot/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a></p>
BeyondMachines :verified:<p>CISA warns of actively exploited Zimbra Collaboration Suite flaw</p><p>CISA has issued a warning about the active exploitation of CVE-2019-9621, a server-side request forgery (SSRF) vulnerability in Synacor's Zimbra Collaboration Suite that enables remote attackers to achieve code execution, data exfiltration, and system compromise through the ProxyServlet component.</p><p>**If you are using Zimbra Collaboration Suite and haven't patched it since 2019, it's time to patch it YESTERDAY! Since you can't patch then, patch now to the latest patched versions. There is an actively exploited SSRF flaw, and Zimbra is by design exposed to the internet. So don't wait for the hackers to call you.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeexploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeexploit</span></a><br><a href="https://beyondmachines.net/event_details/cisa-warns-of-actively-exploited-zimbra-collaboration-suite-flaw-f-p-7-0-1/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/cisa-warns-of-actively-exploited-zimbra-collaboration-suite-flaw-f-p-7-0-1/gD2P6Ple2L</span></a></p>