fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#cyberwarfare

2 posts2 participants0 posts today
Vladimir Vargas Cordero 🇨🇷 🙏🪷<p>The AI Arms Race: What the 2025 Armis Cyberwarfare Report Means for Security Practitioners<br /><a href="https://fosstodon.org/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/cyberwarfare" class="mention hashtag" rel="tag">#<span>cyberwarfare</span></a><br /><a href="https://www.armis.com/blog/the-ai-arms-race-what-the-2025-armis-cyberwarfare-report-means-for-security-practitioners/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">armis.com/blog/the-ai-arms-rac</span><span class="invisible">e-what-the-2025-armis-cyberwarfare-report-means-for-security-practitioners/</span></a></p>
Miguel Afonso Caetano<p>Hehehe... 🥳🤯🤡😎</p><p>"The US agency responsible for maintaining and designing the nation’s cache of nuclear weapons was among those breached by a hack of Microsoft Corp.’s SharePoint document management software, according to a person with knowledge of the matter.</p><p>No sensitive or classified information is known to have been compromised in the attack on the National Nuclear Security Administration, said the person, who wasn’t authorized to speak publicly and asked not to be identified. The semiautonomous arm of the Energy Department is responsible for producing and dismantling nuclear arms. Other parts of the department were also compromised.<br>(...)<br>The NNSA has a broad mission, which includes providing the Navy with nuclear reactors for submarines and responding to radiological emergencies, among other duties. The agency also plays a key role in counterterrorism and transporting nuclear weapons around the country.</p><p>Hackers were able to breach the agency as part of a 2020 attack on a widely used software program from SolarWinds Corp. A department spokesperson said then that malware had “been isolated to business networks only.”"</p><p><a href="https://www.bloomberg.com/news/articles/2025-07-23/us-nuclear-weapons-agency-breached-in-microsoft-sharepoint-hack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bloomberg.com/news/articles/20</span><span class="invisible">25-07-23/us-nuclear-weapons-agency-breached-in-microsoft-sharepoint-hack</span></a></p><p><a href="https://tldr.nettime.org/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a> <a href="https://tldr.nettime.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberWarfare</span></a> <a href="https://tldr.nettime.org/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://tldr.nettime.org/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://tldr.nettime.org/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SolarWinds</span></a> <a href="https://tldr.nettime.org/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
Pyrzout :vm:<p>SharePoint under fire: new ToolShell attacks target enterprises – Source: securityaffairs.com <a href="https://ciso2ciso.com/sharepoint-under-fire-new-toolshell-attacks-target-enterprises-source-securityaffairs-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/sharepoint-under</span><span class="invisible">-fire-new-toolshell-attacks-target-enterprises-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/PierluigiPaganini" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PierluigiPaganini</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/Cyberwarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberwarfare</span></a> <a href="https://social.skynetcloud.site/tags/Intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intelligence</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.skynetcloud.site/tags/ToolShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ToolShell</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Opalsec :verified:<p>Alright team, it's been a pretty eventful 24 hours in the cyber world! We've got critical zero-days under active exploitation, several significant breaches, new spyware, and a big debate on national cyber strategy. Let's dive in:</p><p>Microsoft SharePoint Zero-Day Under Active Exploitation ⚠️<br>- A critical remote code execution (RCE) zero-day, CVE-2025-53770 (CVSS 9.8), is being actively exploited in on-premises Microsoft SharePoint servers globally. This flaw is a bypass of a patch for a previous vulnerability (CVE-2025-49706) released in July's Patch Tuesday.<br>- Attackers, suspected to be nation-state actors, are using an exploit dubbed "ToolShell" to gain unauthenticated access, exfiltrate sensitive data, deploy backdoors, and steal cryptographic machine keys, allowing persistent access even after patching.<br>- Microsoft has released emergency patches for SharePoint Server 2019 and Subscription Edition, but SharePoint Server 2016 remains unpatched. Organisations with public-facing on-prem SharePoint should assume compromise, investigate for malicious files (e.g., spinstall0.aspx), rotate machine keys, and consider disconnecting servers if immediate patching isn't possible.<br>🗞️ The Record | <a href="https://therecord.media/microsoft-sharepoint-zero-day-vulnerability-exploited-globally" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/microsoft-shar</span><span class="invisible">epoint-zero-day-vulnerability-exploited-globally</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/21/infosec_in_brief/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/21/infosec_in_brief/</span></a><br>🤫 CyberScoop | <a href="https://cyberscoop.com/microsoft-sharepoint-zero-day-attack-spree/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/microsoft-share</span><span class="invisible">point-zero-day-attack-spree/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/21/massive_security_snafu_microsoft/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/21/massive_security_snafu_microsoft/</span></a></p><p>CrushFTP Zero-Day Under Active Exploitation 🛡️<br>- CrushFTP is warning customers about CVE-2025-54309, a critical zero-day actively exploited since at least July 18th, allowing attackers to gain administrative access to the web interface due to mishandled AS2 validation.<br>- The vulnerability affects all CrushFTP versions below 10.8.5 and 11.3.4_23. Over 1,000 unpatched instances are exposed online, with some attackers manipulating exploited versions to appear up-to-date.<br>- Admins should immediately update to the latest versions, review upload/download logs for unusual activity, enable automatic updates, and consider IP whitelisting or using a DMZ instance to mitigate exploitation.<br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/over-1-000-crushftp-servers-exposed-to-ongoing-hijack-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/over-1-000-crushftp-servers-exposed-to-ongoing-hijack-attacks/</span></a><br>🗞️ The Record | <a href="https://therecord.media/file-transfer-crushftp-zero-day" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/file-transfer-</span><span class="invisible">crushftp-zero-day</span></a></p><p>Poland Investigates Air Traffic Control Disruption 🚨<br>- Poland's internal security agency is investigating a temporary outage in the country's air traffic control system that caused widespread flight delays on Saturday, with potential sabotage being scrutinised.<br>- The outage was attributed to an unspecified technical malfunction, not a cyberattack, but national security services are looking for signs of sabotage given Poland's heightened alert over suspected Russian-linked acts.<br>- This incident follows previous accusations by Poland against Moscow for "air terror" operations and involvement in a 2023 shopping centre fire, highlighting ongoing hybrid threats in the region.<br>🗞️ The Record | <a href="https://therecord.media/poland-investigates-potential-sabotage-air-traffic-control" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/poland-investi</span><span class="invisible">gates-potential-sabotage-air-traffic-control</span></a></p><p>Alaska Airlines Grounds Fleet Due to IT Issue ✈️<br>- Alaska Airlines temporarily grounded its fleet due to an unspecified IT issue, causing significant operational disruption.<br>- While the nature of the incident is unconfirmed, the Scattered Spider ransomware gang, known for targeting airlines, is an obvious suspect, especially given recent incidents affecting Hawaiian Airlines (owned by Alaska), Qantas, and Air Serbia.<br>- The airline has apologised for the inconvenience and is working to resolve the issues, advising customers to check flight status before heading to the airport.<br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/21/alaska_airlines_it_incident_grounding/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/21/alaska_airlines_it_incident_grounding/</span></a></p><p>Indian Crypto Exchange CoinDCX Suffers $44M Theft 💰<br>- Indian cryptocurrency exchange CoinDCX confirmed a theft of over $44 million worth of USDC and USDT from one of its internal operational accounts over the weekend.<br>- User funds were not impacted as operational accounts are segregated from customer wallets, and CoinDCX is absorbing the losses from its own treasury reserves.<br>- The company is investigating, patching vulnerabilities, and tracing the stolen funds, offering a bug bounty program and up to 25% of recovered funds for assistance.<br>🗞️ The Record | <a href="https://therecord.media/indian-crypto-dcx-millions-stolen" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/indian-crypto-</span><span class="invisible">dcx-millions-stolen</span></a></p><p>Dell Product Demo Platform Breached 💻<br>- Dell confirmed a breach of its "Solution Center" product demonstration platform by a threat actor, but stated that no sensitive customer or partner information was involved.<br>- The platform is intentionally separated from Dell's main networks and customer systems, and the data contained is primarily synthetic or publicly available test data.<br>- The WorldLeaks ransomware gang (a revamp of Hunters International) has claimed responsibility for the incident, which Dell says had limited impact.<br>🗞️ The Record | <a href="https://therecord.media/hackers-hit-dell-product-demo-platform-limited-impact" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/hackers-hit-de</span><span class="invisible">ll-product-demo-platform-limited-impact</span></a></p><p>Dior Notifies US Customers of Data Breach 🛍️<br>- The luxury fashion house Dior is sending data breach notifications to US customers following a cybersecurity incident on January 26, 2025, discovered on May 7, 2025.<br>- Exposed information includes full names, contact details, physical addresses, dates of birth, and in some cases, passport/government ID numbers and Social Security Numbers. No payment details were compromised.<br>- This incident is believed to be linked to the ShinyHunters extortion group, which previously breached a third-party vendor affecting other LVMH brands like Louis Vuitton.<br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/dior-begins-sending-data-breach-notifications-to-us-customers/</span></a></p><p>Ring Denies Breach Amid Suspicious Login Reports 🏠<br>- Ring is attributing a surge in suspicious login reports from May 28th to a "backend update bug" that incorrectly displays prior login dates and devices.<br>- However, many customers are disputing Ring's explanation, reporting unknown devices, strange IP addresses, and countries they've never visited, along with unreceived MFA prompts and live view activity when no one accessed the app.<br>- Users are advised to review authorized devices in the Control Center, remove unrecognized entries, change passwords, and enable two-factor authentication.<br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/ring-denies-breach-after-users-report-suspicious-logins/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/ring-denies-breach-after-users-report-suspicious-logins/</span></a></p><p>Arizona Election Website Defaced, CISA Criticised 🗳️<br>- Arizona election officials reported a hack on a statewide online portal for political candidates, resulting in the defacement of candidate photos with images of the late Iranian Ayatollah Ruhollah Khomeini.<br>- The attack, which occurred after US bombings of Iranian nuclear sites, involved uploading an image file containing a Base64-encoded PowerShell script to take over the server. Officials believe it was pro-Iranian interests.<br>- Arizona's Secretary of State criticised CISA, claiming the agency has been "weakened and politicized" under the current administration, leading to a loss of confidence in federal election security support.<br>🤫 CyberScoop | <a href="https://cyberscoop.com/arizona-secretary-of-state-website-hack-candidate-portal-criticizes-cisa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/arizona-secreta</span><span class="invisible">ry-of-state-website-hack-candidate-portal-criticizes-cisa/</span></a></p><p>New Iranian Android Spyware Discovered 📱<br>- Lookout security researchers have discovered four new samples of DCHSpy Android spyware, linked to the Iranian Ministry of Intelligence and Security (MOIS), surfacing shortly after the Iran-Israel conflict began.<br>- Disguised as VPN apps (Earth VPN, Comodo VPN), the malware collects WhatsApp data, records audio/video, and exfiltrates sensitive files, indicating continued development and usage by the MuddyWater espionage group.<br>- The distribution via Telegram channels, sometimes using "Starlink" lures, suggests targeting Iranian dissidents, activists, and journalists, highlighting the MOIS's efforts to surveil citizens.<br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/21/muddywaters_android_iran/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/21/muddywaters_android_iran/</span></a></p><p>ExpressVPN Fixes RDP IP Leak Bug 🔒<br>- ExpressVPN has patched a flaw in its Windows client (versions 12.97 to 12.101.0.2-beta) that caused Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, exposing users' real IP addresses.<br>- The issue stemmed from debug code mistakenly included in production builds. While encryption wasn't compromised, RDP traffic was visible to observers like ISPs.<br>- Users are advised to upgrade to version 12.101.0.45 immediately. ExpressVPN states the risk was low for typical consumers as RDP is primarily used by IT admins and enterprises.<br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/</span></a></p><p>US Cyber Posture Shift: From Defense to Offense 🇺🇸<br>- The US is reportedly shifting its cyber posture towards more robust offensive operations, backed by a proposed $1 billion cyber initiative under the 2026 National Defense Authorization Act (NDAA).<br>- This pivot is driven by a changing threat landscape where adversaries like China's Volt Typhoon and Russia's campaigns are actively preparing for conflict and disruption, not just espionage.<br>- The argument is that a defensive-only approach has emboldened adversaries, and a more muscular cyber posture, integrating offensive capabilities with military and intelligence operations, is necessary for deterrence and to impose costs.<br>🤫 CyberScoop | <a href="https://cyberscoop.com/us-offensive-cyber-operations-2025-defense-shift-op-ed/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/us-offensive-cy</span><span class="invisible">ber-operations-2025-defense-shift-op-ed/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://infosec.exchange/tags/CrushFTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrushFTP</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://infosec.exchange/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberWarfare</span></a></p>
nemo™ 🇺🇦<p>Ukrainian hackers claim they’ve "deeply penetrated" Russian drone maker Gaskar Integration, wiping out its IT infrastructure and 47TB of technical data.🛡️💻 <a href="https://mas.to/tags/cyberwarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberwarfare</span></a> <a href="https://mas.to/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> <a href="https://mas.to/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <br>Read more: <a href="https://www.theregister.com/2025/07/16/ukrainian_drone_attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/07/16/ukr</span><span class="invisible">ainian_drone_attack/</span></a><br><a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
Mark<p><a href="https://mastodon.scot/tags/Ukrainian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukrainian</span></a> hackers wipe databases at Russia’s <a href="https://mastodon.scot/tags/Gazprom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gazprom</span></a> in major cyberattack</p><p><a href="https://mastodon.scot/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattack</span></a> destroyed large volumes of data &amp; installed custom software to further damage the information systems</p><p>“The degradation of <a href="https://mastodon.scot/tags/Russian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russian</span></a> information systems to the technological Middle Ages continues”</p><p>We congratulate Russian cyber specialists on this achievement &amp; recommend they replace their mice &amp; keyboards with hammers &amp; pincers</p><p><a href="https://kyivindependent.com/ukrainian-intel-hackers-hit-gazproms-network-infrastructure-sources-say-07-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kyivindependent.com/ukrainian-</span><span class="invisible">intel-hackers-hit-gazproms-network-infrastructure-sources-say-07-2025/</span></a></p><p><a href="https://mastodon.scot/tags/cyberwarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberwarfare</span></a> <a href="https://mastodon.scot/tags/RussiaInvadedUkraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussiaInvadedUkraine</span></a> <a href="https://mastodon.scot/tags/StandWithUkraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StandWithUkraine</span></a></p>
Pyrzout :vm:<p>LameHug: first AI-Powered malware linked to Russia’s APT28 – Source: securityaffairs.com <a href="https://ciso2ciso.com/lamehug-first-ai-powered-malware-linked-to-russias-apt28-source-securityaffairs-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/lamehug-first-ai</span><span class="invisible">-powered-malware-linked-to-russias-apt28-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/ITInformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITInformationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/PierluigiPaganini" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PierluigiPaganini</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/LameHugmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LameHugmalware</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/Cyberwarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberwarfare</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://social.skynetcloud.site/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
kriykat<p>Chris Hedges Report: War &amp; Iran<br><a href="https://consortiumnews.com/2025/07/17/chris-hedges-report-war-iran/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">consortiumnews.com/2025/07/17/</span><span class="invisible">chris-hedges-report-war-iran/</span></a><br>Former British diplomat Alastair Crooke assesses the current situation in the Middle East and what can be expected in the coming weeks or months. By Chris Hedges The Chris Hedges Report Following attacks on Iran by Israel and the United&amp;#8230;<br><a href="https://gs.leftic.club/tags/Politics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Politics</span></a> <a href="https://gs.leftic.club/tags/AdvancedTechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdvancedTechnologies</span></a> <a href="https://gs.leftic.club/tags/Commentary" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Commentary</span></a> <a href="https://gs.leftic.club/tags/Egypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Egypt</span></a> <a href="https://gs.leftic.club/tags/Iran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iran</span></a> <a href="https://gs.leftic.club/tags/Iraq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iraq</span></a> <a href="https://gs.leftic.club/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a> <a href="https://gs.leftic.club/tags/MiddleEast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MiddleEast</span></a> <a href="https://gs.leftic.club/tags/Military" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Military</span></a> <a href="https://gs.leftic.club/tags/Palestine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Palestine</span></a> <a href="https://gs.leftic.club/tags/TrumpAdministration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrumpAdministration</span></a> <a href="https://gs.leftic.club/tags/U" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>U</span></a>.s. <a href="https://gs.leftic.club/tags/AlastairCrooke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlastairCrooke</span></a> <a href="https://gs.leftic.club/tags/AyatollahAliKhamenei" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AyatollahAliKhamenei</span></a> <a href="https://gs.leftic.club/tags/Azerbaijan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azerbaijan</span></a> <a href="https://gs.leftic.club/tags/CombatDrones" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CombatDrones</span></a> <a href="https://gs.leftic.club/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberWarfare</span></a> <a href="https://gs.leftic.club/tags/EgyptianPresidentAbdelFattahElSisi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EgyptianPresidentAbdelFattahElSisi</span></a> <a href="https://gs.leftic.club/tags/InternationalAtomicEnergyAgency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternationalAtomicEnergyAgency</span></a>(iaea) <a href="https://gs.leftic.club/tags/IranNuclearNegotiations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IranNuclearNegotiations</span></a> <a href="https://gs.leftic.club/tags/Kurdistan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kurdistan</span></a> <a href="https://gs.leftic.club/tags/MichaelWolff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MichaelWolff</span></a> <a href="https://gs.leftic.club/tags/Mossad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mossad</span></a> <a href="https://gs.leftic.club/tags/NonProliferationTreaty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NonProliferationTreaty</span></a>(npt) <a href="https://gs.leftic.club/tags/NuclearProliferation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NuclearProliferation</span></a> <a href="https://gs.leftic.club/tags/People" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>People</span></a>’sMojahedinOrganizationOfIran(mek) <a href="https://gs.leftic.club/tags/TedPostol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TedPostol</span></a> <a href="https://gs.leftic.club/tags/TheChrisHedgesReport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheChrisHedgesReport</span></a> <a href="https://gs.leftic.club/tags/U" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>U</span></a>.s.PresidentDonaldTrump</p>

Ukrainian cyberattack paralyzes major Russian drone supplier

#Cyberattack was carried out in coordination with #Ukrainian cyber volunteers and targeted #Gaskar's internal network and server infrastructure.

According to the source, #HUR gained access to over 47 terabytes of technical data related to the #production of #Russian #drones. All data stored on the company’s servers was allegedly destroyed.

kyivindependent.com/ukraines-c

The Kyiv Independent · Ukrainian cyberattack 'paralyzes' major Russian drone supplier, source claimsBy Kateryna Denisova

Pay2Key's Resurgence: Iranian Cyber Warfare Targets the West

Pay2Key, an Iranian-backed ransomware-as-a-service operation, has re-emerged as Pay2Key.I2P, targeting Western organizations. Linked to the Fox Kitten APT group and collaborating with Mimic ransomware, the campaign has collected over $4 million in ransom payments in four months. The group offers an 80% profit share to affiliates supporting Iran or attacking its enemies, blending financial motivations with geopolitical objectives. Pay2Key.I2P employs sophisticated evasion techniques, including anti-analysis checks and obfuscation methods. The operation's strategic marketing on darknet forums and social media platforms indicates a planned rollout, with the addition of Linux-targeted ransomware expanding their attack surface.

Pulse ID: 687006f1977201220fba17a2
Pulse Link: otx.alienvault.com/pulse/68700
Pulse Author: AlienVault
Created: 2025-07-10 18:31:13

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Putin "is spending millions of dollars, bombarding European voters with manipulative social media and disinformation campaigns on a mass scale. It’s a new type of warfare on democracy":
politico.eu/article/vladimir-p
Rachel Bitecofer wrote that Europeans and other good people need to regulate this in order to protect their democracies.
#NationalSecurity #defense #politics #cyberwarfare

POLITICO · Putin is invading more than UkraineBy Mark Gitenstein
Replied in thread