fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#spoofing

2 posts2 participants0 posts today
Tino Eberl<p>Eine kritische <a href="https://mastodon.online/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a> in <a href="https://mastodon.online/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a>-Servern wird derzeit aktiv ausgenutzt.</p><p>Betroffen sind lokale Installationen in Unternehmen und Behörden, nicht jedoch <a href="https://mastodon.online/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a>. Die Schwachstelle ermöglicht <a href="https://mastodon.online/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a>-Angriffe durch autorisierte Akteure. </p><p><a href="https://mastodon.online/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> hat <a href="https://mastodon.online/tags/Sicherheitsupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsupdates</span></a> veröffentlicht und rät zur sofortigen Installation. Wenn dies nicht möglich ist, sollten Server vorsorglich vom Internet getrennt werden.</p><p><a href="https://edition.cnn.com/2025/07/21/business/microsoft-alert-attacks-sharepoint-servers-intl" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">edition.cnn.com/2025/07/21/bus</span><span class="invisible">iness/microsoft-alert-attacks-sharepoint-servers-intl</span></a></p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.online/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a></p>
ALT43 :microblog:<p>Suplantacion del número de teléfono móvil o Caller ID Spoofing</p><p><a href="https://alt43.es/suplantacion-del-numero-de-telefono-movil-o-caller-id-spoofing/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alt43.es/suplantacion-del-nume</span><span class="invisible">ro-de-telefono-movil-o-caller-id-spoofing/</span></a></p><p><a href="https://mastodon.social/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://mastodon.social/tags/suplantaci%C3%B3n" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>suplantación</span></a> <a href="https://mastodon.social/tags/callerid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>callerid</span></a></p>
Max Resing<p>Anyone else here who can confirm a <code>504 - Gateway Time-out</code> on spoofer.caida.org? Tried to access it various times today, but it just times out every time.</p><p><a href="https://infosec.exchange/tags/Outage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Outage</span></a> <a href="https://infosec.exchange/tags/CAIDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CAIDA</span></a> <a href="https://infosec.exchange/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <a href="https://infosec.exchange/tags/Downtime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Downtime</span></a></p>
Martin<p><a href="https://social.cologne/tags/Email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Email</span></a> <a href="https://social.cologne/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <br>My business email address is increasingly being used for spoofing, i.e. phishing emails are being sent with my sender email address. This is extremely unpleasant, but according to my web host there is absolutely nothing I can do about it. Is that true?<br>Does anyone know of a way to defend against this?</p>
Emory<p>i can't tell if i think this is lazy or not? i have been back and forth with the power company. </p><p>they seem to be suggesting that i am somehow on a non-supported path. except i am on an mvno using Verizon and xfinity mobile dedicated infrastructure for 5G in PHL.</p><p>&gt; the additional messaging required to accomplish proper STIR/SHAKEN labeling will be lost in the transit, even if the bearer channel data that carries the audio path is connected successfully.</p><p>uhh?</p><p><a href="https://soc.kvet.ch/tags/stirSHAKEN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stirSHAKEN</span></a> <a href="https://soc.kvet.ch/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://soc.kvet.ch/tags/telephony" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telephony</span></a></p>
Pyrzout :vm:<p>Scammers Use Microsoft 365 Direct Send to Spoof Emails Targeting US Firms <a href="https://hackread.com/scammers-microsoft-365-direct-spoof-emails-us-firms/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/scammers-microsof</span><span class="invisible">t-365-direct-spoof-emails-us-firms/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/PhishingScam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhishingScam</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.skynetcloud.site/tags/QRphishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QRphishing</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://social.skynetcloud.site/tags/Quishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quishing</span></a> <a href="https://social.skynetcloud.site/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <a href="https://social.skynetcloud.site/tags/Fraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fraud</span></a> <a href="https://social.skynetcloud.site/tags/Scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scam</span></a></p>
doboprobodyne<p><span class="h-card" translate="no"><a href="https://chaos.social/@gsuberland" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gsuberland</span></a></span> </p><p>You may enjoy the YouTuber Shawn Charland.</p><p><a href="https://m.youtube.com/watch?v=WLpvEoMNEls" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">m.youtube.com/watch?v=WLpvEoMN</span><span class="invisible">Els</span></a></p><p><a href="https://mathstodon.xyz/tags/missiles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>missiles</span></a> <a href="https://mathstodon.xyz/tags/missileDefence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>missileDefence</span></a> <a href="https://mathstodon.xyz/tags/EW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EW</span></a> <a href="https://mathstodon.xyz/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://mathstodon.xyz/tags/jamming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jamming</span></a> <a href="https://mathstodon.xyz/tags/math" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>math</span></a> <a href="https://mathstodon.xyz/tags/maths" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>maths</span></a> <a href="https://mathstodon.xyz/tags/mathematics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mathematics</span></a> <a href="https://mathstodon.xyz/tags/physics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>physics</span></a></p>
Pyrzout :vm:<p>Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability <a href="https://hackread.com/zyxel-devices-active-exploits-cve-2023-28771-vulnerability/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/zyxel-devices-act</span><span class="invisible">ive-exploits-cve-2023-28771-vulnerability/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/Mirai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mirai</span></a> <a href="https://social.skynetcloud.site/tags/Zyxel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zyxel</span></a> <a href="https://social.skynetcloud.site/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a></p>
Marcel SIneM(S)US<p>19.000 Kilometer dichter dran: Dieses US-Startup will erdnahe <a href="https://social.tchncs.de/tags/GPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPS</span></a>-Alternative liefern - t3n – digital pioneers <a href="https://t3n.de/news/19-000-kilometer-dichter-dran-dieses-us-startup-will-erdnahe-gps-alternative-liefern-1691993/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">t3n.de/news/19-000-kilometer-d</span><span class="invisible">ichter-dran-dieses-us-startup-will-erdnahe-gps-alternative-liefern-1691993/</span></a> <a href="https://social.tchncs.de/tags/GlobalPositioningSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GlobalPositioningSystem</span></a> <a href="https://social.tchncs.de/tags/Galileo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Galileo</span></a> <a href="https://social.tchncs.de/tags/Beidou" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Beidou</span></a> <a href="https://social.tchncs.de/tags/GLONASS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GLONASS</span></a> <a href="https://social.tchncs.de/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://social.tchncs.de/tags/GPSspoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPSspoofing</span></a></p>
Economy<p>Reports of theft of bank account codes rise – BoI – Business</p><p>There has been a surge in reports to the Bank of Italy of alleged scams, m…<br><a href="https://pubeurope.com/tags/Economy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Economy</span></a> <a href="https://pubeurope.com/tags/account" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>account</span></a> <a href="https://pubeurope.com/tags/bank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bank</span></a> <a href="https://pubeurope.com/tags/BankofItaly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BankofItaly</span></a> <a href="https://pubeurope.com/tags/been" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>been</span></a> <a href="https://pubeurope.com/tags/centralbank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>centralbank</span></a> <a href="https://pubeurope.com/tags/CentralBanks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CentralBanks</span></a> <a href="https://pubeurope.com/tags/CentralBanksoftheEuropeanSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CentralBanksoftheEuropeanSystem</span></a> <a href="https://pubeurope.com/tags/DeutscheBundesbank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeutscheBundesbank</span></a> <a href="https://pubeurope.com/tags/ECB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECB</span></a> <a href="https://pubeurope.com/tags/engineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>engineering</span></a> <a href="https://pubeurope.com/tags/ESCB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESCB</span></a> <a href="https://pubeurope.com/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://pubeurope.com/tags/European" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>European</span></a> <a href="https://pubeurope.com/tags/EuropeanCentralBank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EuropeanCentralBank</span></a> <a href="https://pubeurope.com/tags/EuropeanCentralBanks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EuropeanCentralBanks</span></a> <a href="https://pubeurope.com/tags/over" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>over</span></a> <a href="https://pubeurope.com/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://pubeurope.com/tags/reports" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reports</span></a> <a href="https://pubeurope.com/tags/Rome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rome</span></a> <a href="https://pubeurope.com/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://pubeurope.com/tags/surge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surge</span></a> <a href="https://pubeurope.com/tags/THEBANKOFENGLAND" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>THEBANKOFENGLAND</span></a> <a href="https://pubeurope.com/tags/TheBankofFrance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheBankofFrance</span></a> <a href="https://pubeurope.com/tags/TheBankofItaly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheBankofItaly</span></a> <a href="https://pubeurope.com/tags/vishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vishing</span></a> <a href="https://pubeurope.com/tags/wednesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wednesday</span></a><br><a href="https://www.europesays.com/2183437/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2183437/</span><span class="invisible"></span></a></p>
Niebezpiecznik News<p>Drony Polaków masowo spadają na Helu</p><p>Coś dziwnego dzieje się na terenie Trójmiasta i okolic Helu. Wiele osób, które lata w tamtej okolicy dronami informuje, że tracą kontrolę nad swoim dronem DJI, a potem maszyny odlatują w losowych kierunkach i rozbijają się. Co jest powodem tych problemów? Wyjaśniamy poniżej.<br>Kilkanaście dronów nagle spadło z nieba<br>Wczoraj o stracie swojego drona poinformowali profesjonalni fotografowie, którzy na instagramie prowadzą skądinąd przecudowny profil b_a_l_t_y_k. Ich dron (DJI Mavic 4 pro) nagle odleciał w losowym kierunku, a potem spadł. Analizując logi po wypadku fotografowie zauważyli, że dron przemieszczał się z prędkością poziomą aż 120 km/h (czyli zdecydowanie szybciej niż ten model potrafi — ale jest logiczne wytłumaczenie tej wartości, o czym niżej). </p><p>Po krótkim śledztwie, fotografowie zorientowali się też, że podobne problemy miało jeszcze kilkunastu droniarzy w tej okolicy. I postawili hipotezę, że… <br>za upadkami mogą stać Rosjanie, którzy zakłócają GPS. <br>Ale sprawa jest bardziej skomplikowana.<br>Tak, Rosjanie zakłócają GPS, ale…<br>Zacznijmy od tego, że Rosjanie faktycznie zakłócają (a dokładniej: spoofują) sygnał GPS z terytorium Królewca (ros. Kaliningradu). Poniżej stan na wczoraj (niebieskim kwadratem zaznaczyliśmy okolice Helu i Trójmiasta):</p><p>Ale, po pierwsze, robią to od dawna, a od ponad 2 lat regularnie na terenach Bałtyku, a drony zaczęły spadać dopiero niedawno. A po drugie, sam spoofing GPS, co do zasady, nie powinien powodować “rozbicia się” dronów. <br>Bo nawet jeśli dron nagle mylnie odczyta swoją lokalizację na podstawie fałszywego sygnału GPS i będzie próbował na tej podstawie “dostosować” swoją pozycję, to pilot wciąż może go kontrolować “ręcznie”. Pozwalają na to np. tryb ATTI (choć trzeba zaznaczyć, że [...]</p><p><a href="https://mastodon.com.pl/tags/Ba%C5%82tyk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bałtyk</span></a> <a href="https://mastodon.com.pl/tags/DJI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DJI</span></a> <a href="https://mastodon.com.pl/tags/Drony" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Drony</span></a> <a href="https://mastodon.com.pl/tags/GPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPS</span></a> <a href="https://mastodon.com.pl/tags/Jamming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jamming</span></a> <a href="https://mastodon.com.pl/tags/Rosja" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rosja</span></a> <a href="https://mastodon.com.pl/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <a href="https://mastodon.com.pl/tags/Wojsko" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wojsko</span></a></p><p><a href="https://niebezpiecznik.pl/post/drony-polakow-masowo-spadaja-na-helu/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">niebezpiecznik.pl/post/drony-p</span><span class="invisible">olakow-masowo-spadaja-na-helu/</span></a></p>
Hacker News<p>Spoofing OpenPGP.js signature verification</p><p><a href="https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeanlabs.com/blog/research/c</span><span class="invisible">ve-2025-47934-spoofing-openpgp-js-signatures/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <a href="https://mastodon.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a>.js <a href="https://mastodon.social/tags/signature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>signature</span></a> <a href="https://mastodon.social/tags/verification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>verification</span></a> <a href="https://mastodon.social/tags/OpenPGPjs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGPjs</span></a> <a href="https://mastodon.social/tags/CVE2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2025</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a></p>
Leo<p>Iliad denuncia le truffe dello <a href="https://puntarella.party/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> telefonico, ecco di cosa si tratta</p><p><a href="https://newsroom24.it/notizia/2025/06/06/iliad-denuncia-le-truffe-dello-spoofing-telefonico-ecco-di-cosa-si-tratta" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">newsroom24.it/notizia/2025/06/</span><span class="invisible">06/iliad-denuncia-le-truffe-dello-spoofing-telefonico-ecco-di-cosa-si-tratta</span></a></p>
PrivacyDigest<p>A <a href="https://mas.to/tags/GPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPS</span></a> <a href="https://mas.to/tags/Blackout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blackout</span></a> Would Shut Down the World</p><p>GPS <a href="https://mas.to/tags/jamming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jamming</span></a> and <a href="https://mas.to/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://mas.to/tags/attacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attacks</span></a> are on the rise. If the global <a href="https://mas.to/tags/navigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>navigation</span></a> system the US relies on were to go down entirely, it would send the world into unprecedented chaos.</p><p><a href="https://www.wired.com/story/youre-not-ready-for-a-gps-blackout/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/youre-not-read</span><span class="invisible">y-for-a-gps-blackout/</span></a></p>
Emanuele<p>«A GPS blackout would shut down the world»</p><p><a href="https://m.divita.eu/tags/GPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPS</span></a> <a href="https://m.divita.eu/tags/jamming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jamming</span></a> and <a href="https://m.divita.eu/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> attacks are on the rise. If the global navigation system the US relies on were to go down entirely, it would send the world into unprecedented <a href="https://m.divita.eu/tags/chaos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chaos</span></a>.</p><p><a href="https://www.wired.com/story/youre-not-ready-for-a-gps-blackout/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/youre-not-read</span><span class="invisible">y-for-a-gps-blackout/</span></a></p>
BSI<p>Viele Unternehmen könnten mit wenig Aufwand ihre E-Mail-Sicherheit verbessern:</p><p>✅ SPF, DKIM &amp; DMARC korrekt umsetzen</p><p>✅ moderne E-Mail-Infrastruktur nutzen</p><p>So schützt man sich besser vor <a href="https://social.bund.de/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a>, <a href="https://social.bund.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> und sogenannten Person-in-the Middle-Angriffen.</p><p>👉 Praxisnahe Tipps gibt's hier: ➡️ <a href="https://www.bsi.bund.de/dok/1147322" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bsi.bund.de/dok/1147322</span><span class="invisible"></span></a></p>
Jerry on Mastodon<p>1. Hacker News, a <a href="https://hear-me.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> newsletter, is sent from a domain where DMARC policy is p=none, which tells email providers, like gmail, to deliver all email that is screaming, "I am a Hacker News spoof email sent by a POS scammer" to the intended recipient anyway. p=none means take no action, even if you know it's a scam. Spam folder optional. Email services and clients will oblige. WTF Hacker News?</p><p>2. Hacker News is also using an insecure signature algorithm for signing their newsletter. </p><p>3. An extremely well-known Cybersecurity expert is sending the newsletter from a domain that has no DMARC record at all, so all spoof emails claiming to be from them will be delivered. And likely this is being constantly exploited. A DMARC policy of p="reject" would have those spoof emails trashed and not delivered. But no DMARC policy means "whatever, and I don't want to know". So, spoof emails go through unstopped and no reports of abuse are being sent to this person either. And it's their job to tell us how to stay secure and not be fooled by spoof emails. WTF?</p><p>Sometimes I don't understand how things work in the world.</p><p><a href="https://hear-me.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://hear-me.social/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://hear-me.social/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a></p>
Astro Hawk (Ian Kluft) ✅🚀🛰️<p>"GNSS under attack: Recognizing and mitigating jamming and spoofing threats" by GPS World - As costs come down on GPS signal jamming and spoofing techniques, it no longer requires nation-state resources for doing it any more. As attacks become more common, defenses such as signal filters for countermeasures increase too. Self-driving cars and farm machinery may adopt RAIM already in use in aircraft. <a href="https://www.gpsworld.com/gnss-under-attack-recognizing-and-mitigating-jamming-and-spoofing-threats/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gpsworld.com/gnss-under-attack</span><span class="invisible">-recognizing-and-mitigating-jamming-and-spoofing-threats/</span></a> <a href="https://spacey.space/tags/GNSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNSS</span></a> <a href="https://spacey.space/tags/GPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPS</span></a> <a href="https://spacey.space/tags/Galileo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Galileo</span></a> <a href="https://spacey.space/tags/jamming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jamming</span></a> <a href="https://spacey.space/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://spacey.space/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://spacey.space/tags/aviation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aviation</span></a></p>
Jerry on Mastodon<p>I received an "important email" from <a href="https://hear-me.social/tags/Dreamhost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dreamhost</span></a> about my domain registration. You'd think that <a href="https://hear-me.social/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a> security would be paramount for them.</p><p>They have no DKIM setting, so it's impossible to see if the email was tampered with in transit and if it was sent by the claimed sender. And, their DMARC policy is p=none, which tells email providers, "don't do anything special if you can't verify me".</p><p>Their dreamhostregistry.com domain is wide open for spoofing because they've configured it to be wide open for spoofing.</p><p>How can a web hosting company be so lax about email security? How can I trust emails they send to me if I have no assurance they sent it, and it wasn't modified in transit?</p><p><a href="https://hear-me.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://hear-me.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DKIM</span></a> <a href="https://hear-me.social/tags/SPF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SPF</span></a> <a href="https://hear-me.social/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <a href="https://hear-me.social/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a></p>
Cyberkid<p>Types of DNS Attacks You Should Know ⚔️🌐🔍</p><p>The Domain Name System (DNS) is a core part of how the internet works — and it’s also a prime target for attackers. Understanding DNS attack types is essential for defending network infrastructure.</p><p>🛠️ Common DNS Attack Types:</p><p>1. DNS Spoofing / Cache Poisoning<br>→ Injects false DNS data into a resolver's cache to redirect users to malicious sites.</p><p>2. DNS Tunneling<br>→ Encodes data into DNS queries/responses to exfiltrate data or establish covert C2 channels.</p><p>3. DNS Amplification (DDoS)<br>→ Exploits open DNS resolvers to flood a target with amplified traffic.</p><p>4. NXDOMAIN Attack<br>→ Overloads DNS servers with queries for nonexistent domains, degrading performance.</p><p>5. Domain Hijacking<br>→ Unauthorized changes to DNS records or domain ownership to take control of web traffic.</p><p>6. Typosquatting / Homograph Attacks<br>→ Uses lookalike domains to trick users into visiting malicious sites.</p><p>7. Subdomain Takeover<br>→ Targets misconfigured DNS entries pointing to expired resources (e.g., GitHub Pages, AWS buckets).</p><p>Why it matters:<br>DNS is often overlooked in security strategies, but it’s a critical attack surface. Proper monitoring, DNSSEC, and logging can reduce risk.</p><p>Disclaimer: This content is for educational and awareness purposes only.</p><p><a href="https://defcon.social/tags/DNSAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSAttacks</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://defcon.social/tags/EducationOnly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EducationOnly</span></a> <a href="https://defcon.social/tags/DNSHijacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSHijacking</span></a> <a href="https://defcon.social/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a> <a href="https://defcon.social/tags/RedTeamAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeamAwareness</span></a> <a href="https://defcon.social/tags/BlueTeamDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeamDefense</span></a></p>