fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#Cyberthreats

4 posts4 participants0 posts today

Oh look, another thrilling tale of how #Microsoft bravely "uncovered" a password spray #attack with all the subtlety of a slow-motion car crash. 🚗💥 Apparently, logging in successfully is now a criminal offense—let's all panic! 😱🔍
petrasecurity.substack.com/p/u #Security #PasswordSpray #CyberThreats #TechNews #PanicAlert #HackerNews #ngated

Microsoft Detection Deep Dives · Unmasking A Slow and Steady Password Spray AttackBy Adithya Vellal

Our latest summary is out, looking at an emerging Crypto-theft Trojan and a promising new recovery tool.

Stay ahead of the curve and read the full post here: opalsec.io/daily-news-update-s

📱 Crocodilus Android Malware: This nasty piece of work is targeting crypto wallets by using fake overlays to steal seed phrases. It's bypassing security measures and using social engineering to gain access. Watch out for this one, especially if you have users in Turkey and Spain! 🇪🇸 🇹🇷

🛠️ Key Takeaways:
* 🔑 Steals crypto wallet seed phrases using Accessibility Logger.
* ⚠️ Bypasses Android 13 security and Play Protect.
* 🤖 Employs 23 bot commands, including call forwarding and RAT functionality.
* 📵 Hides activities with black screen overlays and muting.

💻 Microsoft's Quick Machine Recovery Tool: Microsoft is testing a new tool for Windows 11 that could be a game-changer for dealing with boot crashes caused by buggy drivers and configurations. Imagine remotely fixing those dreaded BSODs! 🚀

✨ Here's the lowdown:
* ⚙️ Remotely fixes boot crashes caused by bad drivers/configs.
* 🌐 Connects to Microsoft's servers to apply fixes.
* 🛡️ Could have made life much easier when recovering from the worldwide CrowdStrike outage from July last year.
* 🏢 Customizable for enterprise users via RemoteRemedation CSP.

Don't forget to sign up for Opalsec to get actionable insights delivered straight to your inbox! 📩 opalsec.io/daily-news-update-s

Let me know your thoughts in the comments below! 👇

#QuantumComputing: A Game-Changer for Security – Is Your Business Prepared?🔐
Quantum technology is evolving fast, bringing both innovation and new cyber risks. Neuronus Computing offers free cybersecurity resources and expert penetration testing.
Read our latest blog to learn how Neuronus Computing can help protect your digital assets💾 with cutting-edge solutions!👇

neuronus.net/en/blog/ai-in-fin

malicious npm packages (again) targeting cryptocurrency projects, CEOs cranky over CVEs, and BlackLock gets pantsed - here's your Friday wrap up in Infosec News 👇

🔗 opalsec.io/daily-news-update-f

Here's a quick rundown of what's inside:

📦 npm Package Nightmare: 10 packages compromised by an infostealer campaign targeting developer environments. Sensitive data was siphoned off to a remote host. Most of the packages are still available on npm, so be careful!
🦊 Firefox Flaw: A critical sandbox escape vulnerability (CVE-2025-2857) patched in Firefox 136.0.4. Windows users, update ASAP! This one's similar to a Chrome zero-day used in espionage campaigns.
🏥 Ransomware Reckoning: Advanced, a UK healthcare IT provider, slapped with a £3.1 million fine after a LockBit ransomware attack. Lack of vulnerability scanning and poor patch management were key factors.
🌐 Extension Exploitation: Browser extensions can be bought and repurposed, posing a sneaky threat to enterprises. An extension was bought for $50 and was quickly repurposed to redirect traffic.
⚡ Solar Scare: Dozens of vulnerabilities in solar inverters could let attackers disrupt power grids. Remote code execution, device takeover, and more are possible.
😠 CrushFTP Clash: CEO responds aggressively to VulnCheck after critical unauthenticated access vulnerability (CVE-2025-2825) is released. Vulnerability disclosure and patching processes need to be improved!
🕵️‍♀️ Pegasus in Serbia: Journalists targeted with Pegasus spyware, marking the third time in two years that Amnesty has found Pegasus deployed against Serbian civil society.
🤖 Mamont Malware: Russian authorities arrest three for developing the Mamont Android banking trojan. This malware steals financial data and spreads through Telegram.
🦹 Ransomware Reverse: Resecurity infiltrates the BlackLock ransomware gang, gathering intel to help victims. LFI vulnerability exploited, and data shared with authorities.

Stay vigilant out there, folks! 🛡️

Opalsec · Daily News Update: Friday, March 28, 2025 (Australia/Melbourne)Infostealer Campaign Compromises 10 npm Packages Ten npm packages were updated with malicious code to steal environment variables and other sensitive data from developers' systems. The campaign targeted multiple cryptocurrency-related packages, and the popular 'country-currency-map' package was downloaded thousands of times a week. All these packages, except for country-currency-map, are

A recent paper describes an experimental attack against large language model (LLM) agents that underscores the importance of assessing risk when employing AI. The authors explain how they employed a memory injection attack to “produce harmful outputs when the past records retrieved for demonstration are malicious”.

I began thinking about the many malicious actors who might take advantage of this or other memory-poisoning attacks. I'm sure I've only identified a partial list.

interisle.substack.com/p/memor

Interisle Insights · Memory Injection Attacks against LLM AgentsBy Interisle Consulting Group
#ai#cybercrime#LLM

alojapan.com/1227639/rubrik-ap Rubrik appoints new field CTO for Asia Pacific & Japan #ArtificialIntelligence(AI) #AsiaPacific #BusinessContinuity #CloudSecurity #Cohesity #CyberResilience #CyberThreats #DataProtection #DataSecurity #EnterpriseSecurity #Japan #JapanNews #news #Rubrik Rubrik has announced the appointment of Sathish Murthy as Field Chief Technology Officer for the Asia Pacific and Japan regions. Sathish Murthy brings over 25 years of experience in data…

Many industrial facilities now rely on interconnected systems to improve operations. 👍 However, when previously isolated Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) are connected to public internet-facing applications it creates new #cybersecurity risk. ⚠️ To protect ICS and SCADA systems from cyber threats, it's important to understand how these technologies fit into your environment and why #cybercriminals target them. 🎯

Read this article to learn more about:
✔️ ICS
✔️ SCADA
✔️ The differences between OT, ICS, and SCADA
✔️ How a SCADA system works
✔️ The types of data SCADA systems collect
✔️ How cybercriminals attack ICS and SCADA systems
✔️ Best practices for securing ICS and SCADA systems
✔️ Enabling Security Monitoring for ICS and SCADA

graylog.org/post/understanding #cyberthreats

DollyWay Malware Campaign Breaches 20,000 WordPress Sites: A Deep Dive into Cybersecurity Threats

The DollyWay malware campaign has compromised over 20,000 WordPress sites, evolving into a sophisticated redirection system that poses significant risks to both users and site administrators. As cyber...

news.lavx.hu/article/dollyway-