social.bund.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
Dies ist der Mastodon-Server der Bundesbeauftragten für den Datenschutz und die Informationsfreiheit (BfDI).

Administered by:

Server stats:

101
active users

#threatintel

5 posts5 participants0 posts today
RedPacket Security<p>Collaboration Gaps in Cybersecurity: Insights from Former GCHQ Director - <a href="https://www.redpacketsecurity.com/cybersecurity-industry-falls-short-on-collaboration-says-former-gchq-director/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/cybersec</span><span class="invisible">urity-industry-falls-short-on-collaboration-says-former-gchq-director/</span></a></p><p><a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/geopolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geopolitics</span></a></p>
RedPacket Security<p>UK ICO Issues GDPR Warning Over Children's Data Usage - <a href="https://www.redpacketsecurity.com/uk-ico-fires-gdpr-warning-shot-over-use-of-children-s-data/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/uk-ico-f</span><span class="invisible">ires-gdpr-warning-shot-over-use-of-children-s-data/</span></a></p><p><a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/data_protection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_protection</span></a> <a href="https://mastodon.social/tags/children" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>children</span></a> <a href="https://mastodon.social/tags/TikTok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TikTok</span></a></p>
MISP<p>The MISP project maintains and offers a comprehensive knowledge base covering threat actors, ransomware groups, malware, and more. </p><p>Even if you don't use MISP, you can now easily search across all MISP Project knowledge bases, including galaxies, taxonomies, and MISP object templates.</p><p><a href="https://search.misp-community.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">search.misp-community.org</span><span class="invisible"></span></a></p><p><a href="https://misp-community.org/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://misp-community.org/tags/opendata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opendata</span></a> <a href="https://misp-community.org/tags/misp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>misp</span></a> <a href="https://misp-community.org/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://misp-community.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://misp-community.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://misp-community.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://misp-community.org/tags/threatactor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactor</span></a> <a href="https://misp-community.org/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a></p>
Jérôme Meyer<p>About this X DDoS campaign: I've seen reports of attribution to Ukraine, and at least based on attack data at network level — I just don't see it. (And I should note: attribution is hard, so I am generally skeptical.)</p><p>Top contributors are 🇺🇸🇲🇽🇪🇸🇮🇹🇧🇷, and as with most botnets: very geographically distributed.</p><p>Most of the source IPs intersect with <a href="https://infosec.exchange/tags/Eleven11bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Eleven11bot</span></a> as we started seeing them on 26 February.</p><p>OK, now back to regularly scheduled skiing.</p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
RedPacket Security<p>Nation-State Hackers Threaten UK AI Research Progress - <a href="https://www.redpacketsecurity.com/uk-ai-research-under-threat-from-nation-state-hackers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/uk-ai-re</span><span class="invisible">search-under-threat-from-nation-state-hackers/</span></a></p><p><a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a></p>
RedPacket Security<p>Geopolitical Tensions Boost APT Attacks and Hacktivism in 2024 - <a href="https://www.redpacketsecurity.com/geopolitical-tension-fuels-apt-and-hacktivism-surge/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/geopolit</span><span class="invisible">ical-tension-fuels-apt-and-hacktivism-surge/</span></a></p><p><a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> <a href="https://mastodon.social/tags/geopolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geopolitics</span></a></p>
Infoblox Threat Intel<p>Lumma Stealer is currently one of the most popular malware. Campaigns involving this info stealer have a notable presence in DNS. We’ve been tracking a threat actor that deploys large number of domains to advertise file share links dropping Lumma Stealer. These campaigns are interesting because the actor uses traffic distribution system (TDS), cloaking, and web tracking technology (e.g. Matomo, Bablosoft) to hide and protect the malicious content. Here are recent examples of the TDS and landing page domains.<br> <br>:::TDS + Cloaking:::<br>am4[.]myidmcrack[.]site<br>bjnhuy[.]shop<br>filefetch[.]click<br>mplopop[.]shop<br>oyoclean[.]sbs<br>psldi3z[.]com<br>readyf1[.]click<br>volopi[.]cfd<br> <br>:::Landing Page:::<br>14redirect[.]cfd<br>downf[.]lol<br>fbfgsnew[.]com<br>icjvueszx[.]com<br>lkjpoisjnil[.]site<br>sikoip[.]cfd<br>zulmie[.]cfd<br> <br> <br>An attack that we investigated today showed a new Lumma Stealer payload and C2 domain that is only a day old.<br> <br>:::Lumma Stealer executable SHA256::: df148680db17e221e6c4e8aed89b4d3623f4a8ad86a3a4d43c64d6b1768c5406<br> <br>:::Text sites containing Lumma Stealer configuration details:::<br>hXXps://rentry[.]co/feouewe5/raw<br>hXXps://pastebin[.]com/raw/uh1GCpxx<br> <br>:::Newly created Lumma Stealer C2:::<br>hXXps://urbjanjungle[.]tech/api</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/lummastealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lummastealer</span></a> <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a> <a href="https://infosec.exchange/tags/tds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tds</span></a> <a href="https://infosec.exchange/tags/tracker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tracker</span></a> <a href="https://infosec.exchange/tags/cloaking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloaking</span></a> <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastodon</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infobloxthreatintel</span></a></p>
RedPacket Security<p>OpenAI Account Breach Claim Debunked by Researchers - <a href="https://www.redpacketsecurity.com/openai-was-not-breached-say-researchers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/openai-w</span><span class="invisible">as-not-breached-say-researchers/</span></a></p><p><a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a> <a href="https://mastodon.social/tags/infostealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infostealer</span></a> <a href="https://mastodon.social/tags/breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>breach</span></a></p>
Kevin Beaumont<p>8base ransomware group has apparently been seized or done an exit scam.</p><p>Two of its Tor portals say "This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of the Office of the Public Prosecutor General in Bamberg"</p><p>They had been hitting some high profile targets in recent times.</p><p>HT <span class="h-card" translate="no"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cR0w</span></a></span> </p><p><a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://cyberplace.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>
Kevin Beaumont<p>The US Treasury Department has put out a cyber threat intelligence briefing saying "Continued access to any payment systems by DOGE members, even 'read only,' likely poses the single greatest insider threat risk the Bureau of the Fiscal Service has ever faced." <a href="https://www.wired.com/story/treasury-bfs-doge-insider-threat/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/treasury-bfs-d</span><span class="invisible">oge-insider-threat/</span></a></p><p><a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
ReynardSec<p>Ever seen a single QR code that can lead you to two different URLs? 🤯</p><p>Christian Walther just demoed that. He merged two QR codes in such a way that each “pixel” can be interpreted as black or white, depending on angle, focus settings, or even plain luck. Same device, same scanner - yet sometimes you get <a href="https://mstdn.social/@isziaui" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">mstdn.social/@isziaui</span><span class="invisible"></span></a>, other times it’s <a href="https://github.com/cwalther" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/cwalther</span><span class="invisible"></span></a>.</p><p>While this is currently just a wicked proof-of-concept, it’s a red flag for possible future scams</p><p>Check full thread: <a href="https://mstdn.social/@isziaui/113874436953157913" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mstdn.social/@isziaui/11387443</span><span class="invisible">6953157913</span></a></p><p><a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialengineering</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a></p>
Thomas Roccia :verified:<p>🤓 Quick interesting tool for data extraction with LLM.</p><p>Extract Thinker is a document intelligence tool to extract and classify structured data from documents, like an Object-Relational Mapping system for document processing workflows.</p><p>Pretty useful if you need to process a variety of data in threat intelligence.</p><p>Check the code below for IOC extractions. 👇</p><p>➡️ <a href="https://enoch3712.github.io/ExtractThinker/getting-started/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">enoch3712.github.io/ExtractThi</span><span class="invisible">nker/getting-started/</span></a></p><p><a href="https://infosec.exchange/tags/genai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genai</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/dataextraction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataextraction</span></a> <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a></p>
RedPacket Security<p>Cyber Inequity Grows Amid Increasing Cyberspace Complexities - <a href="https://www.redpacketsecurity.com/wef-warns-of-growing-cyber-inequity-amid-escalating-complexities-in-cyberspace/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/wef-warn</span><span class="invisible">s-of-growing-cyber-inequity-amid-escalating-complexities-in-cyberspace/</span></a></p><p><a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/inequity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>inequity</span></a> <a href="https://mastodon.social/tags/geopolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geopolitics</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Gesellschaft für Informatik eV<p>📅 Event-Tipp für <a href="https://mas.to/tags/Frankfurt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Frankfurt</span></a>: Wie steht es 2025 um <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a>? Wie agieren verschiedene Angreifer – und wie können wir uns effektiv schützen?</p><p>Um diese Fragen dreht sich ein Workshop unserer Fachgruppe Management von Informationssicherheit. Denn mehr denn je gilt: „Die Frage ist nicht, ob, sondern wann ein Angriff erfolgt.“</p><p>Die Anmeldung ist kostenlos, auch für Noch-nicht-Mitglieder: <a href="https://fg-secmgt.gi.de/veranstaltung/aktueller-stand-von-cybersecurity-defence-und-der-bekaempfung-von-cyber-kriminalitaet" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fg-secmgt.gi.de/veranstaltung/</span><span class="invisible">aktueller-stand-von-cybersecurity-defence-und-der-bekaempfung-von-cyber-kriminalitaet</span></a></p><p><a href="https://mas.to/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mas.to/tags/itsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsec</span></a> <a href="https://mas.to/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mas.to/tags/WirSindInformatik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WirSindInformatik</span></a></p>
RedPacket Security<p>€15 Million Fine Imposed on OpenAI by Italy's Data Protection Authority Over ChatGPT Violations - <a href="https://www.redpacketsecurity.com/italy-s-data-protection-watchdog-issues-15m-fine-to-openai-over-chatgpt-probe/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/italy-s-</span><span class="invisible">data-protection-watchdog-issues-15m-fine-to-openai-over-chatgpt-probe/</span></a></p><p><a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a> <a href="https://mastodon.social/tags/GDPR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GDPR</span></a> <a href="https://mastodon.social/tags/data_protection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_protection</span></a></p>
Kevin Beaumont<p>The Polyfill.io domain and sub domains have been nuked from orbit. <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Kevin Beaumont<p>The researchers who found the Polyfill supply chain attack are being DDoS’d <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Kevin Beaumont<p>Can’t find my thread to update it, but after a Chinese company acquired Polyfill.io last year (embedded in over 100k websites), it has started serving malware to users of said websites - prepare to be surprised. </p><p><a href="https://sansec.io/research/polyfill-supply-chain-attack" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sansec.io/research/polyfill-su</span><span class="invisible">pply-chain-attack</span></a></p><p><a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Randy<p>Put out a fresh analysis of <a href="https://infosec.exchange/tags/ClearFake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClearFake</span></a>. It has some new features.</p><ul><li>A fake “How to fix” user experience</li><li>Instead of a download, they convince the user to copy/paste malicious Powershell</li><li>Very curious delayed 2-10 day go-live for infected websites</li></ul><p><a href="https://rmceoin.github.io/malware-analysis/2024/05/07/clearfake2.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rmceoin.github.io/malware-anal</span><span class="invisible">ysis/2024/05/07/clearfake2.html</span></a></p><p><a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a></p>
Kevin Beaumont<p>LockBit are claiming they have hit Deutsche Telekom <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://cyberplace.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>