digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

814
active users

#trickbot

0 posts0 participants0 posts today

🔥 Latest issue of my curated #cybersecurity and #infosec list of resources for week #23/2025 is out!

It includes the following and much more:

🇫🇷 Cartier announced a #databreach;

🫱🏻‍🫲🏼 Microsoft and CrowdStrike are working together to connect the different names used for hacking groups;

🇩🇪 German authorities have identified Vitaly Nikolaevich Kovalev as the leader of the #TrickBot cybercrime gang;

🩹 🐛 Over 30 #Vulnerabilities Patched in #Android;

🇪🇺 Microsoft has launched a free European Security Program to enhance cybersecurity for #EU governments;

🇮🇳 #Microsoft Helps India CBI Dismantle Indian Call Centers;

📨 Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s InfoSec Newsletter🕵🏻‍♂️ [InfoSec MASHUP] 23/2025Cartier announced a data breach; Microsoft and CrowdStrike are working together to connect the different names used for hacking groups; German authorities have identified Vitaly Nikolaevich Kovalev as the leader of the TrickBot cybercrime gang; Over 30 Vulnerabilities Patched in Android; Microsoft has launched a free European Security Program to enhance cybersecurity for EU governments; Microsoft Helps India CBI Dismantle Indian Call Centers;

Germany doxxes Conti ransomware and TrickBot ring leader

The Federal Criminal Police Office of Germany (Bundeskriminalamt or BKA) claims that Stern, the leader of the Trickbot and Conti cybercrime gangs, is a 36-year-old Russian named Vitaly Nikolaevich Kovalev.

#Germany #BKA #conti #trickbot #russia #ransomware #malware #security #cybersecurity #hackers #hacking

bleepingcomputer.com/news/secu

🔥 Operation Endgame is BACK! This time targeting #BumbleBee, #Latrodectus, #DanaBot, #WarmCookie, #Qakbot and #Trickbot!

Once again this is a HUGE win, with a truly international effort! 💪

As with phase one of #OperationEndgame, Spamhaus are providing remediation support - those affected will be contacted in due course with steps to take.

For more information, read our write-up here:
👉 spamhaus.org/resource-hub/malw

The Spamhaus ProjectMalware | Operation Endgame 2.0 | Botnets disrupted after international action | ResourcesOperation Endgame is back - in this post, get details of the take-down itself and Spamhaus’ role in victim account remediation.