eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

224
active users

#networksecurity

5 posts5 participants1 post today
Cyberkid<p>Types of DNS Attacks You Should Know ⚔️🌐🔍</p><p>The Domain Name System (DNS) is a core part of how the internet works — and it’s also a prime target for attackers. Understanding DNS attack types is essential for defending network infrastructure.</p><p>🛠️ Common DNS Attack Types:</p><p>1. DNS Spoofing / Cache Poisoning<br>→ Injects false DNS data into a resolver's cache to redirect users to malicious sites.</p><p>2. DNS Tunneling<br>→ Encodes data into DNS queries/responses to exfiltrate data or establish covert C2 channels.</p><p>3. DNS Amplification (DDoS)<br>→ Exploits open DNS resolvers to flood a target with amplified traffic.</p><p>4. NXDOMAIN Attack<br>→ Overloads DNS servers with queries for nonexistent domains, degrading performance.</p><p>5. Domain Hijacking<br>→ Unauthorized changes to DNS records or domain ownership to take control of web traffic.</p><p>6. Typosquatting / Homograph Attacks<br>→ Uses lookalike domains to trick users into visiting malicious sites.</p><p>7. Subdomain Takeover<br>→ Targets misconfigured DNS entries pointing to expired resources (e.g., GitHub Pages, AWS buckets).</p><p>Why it matters:<br>DNS is often overlooked in security strategies, but it’s a critical attack surface. Proper monitoring, DNSSEC, and logging can reduce risk.</p><p>Disclaimer: This content is for educational and awareness purposes only.</p><p><a href="https://defcon.social/tags/DNSAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSAttacks</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://defcon.social/tags/EducationOnly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EducationOnly</span></a> <a href="https://defcon.social/tags/DNSHijacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSHijacking</span></a> <a href="https://defcon.social/tags/Spoofing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spoofing</span></a> <a href="https://defcon.social/tags/RedTeamAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeamAwareness</span></a> <a href="https://defcon.social/tags/BlueTeamDefense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeamDefense</span></a></p>
Wireshark<p>Join Wireshark core developer Sake Blok for pre-conference Class III: SSL/TLS Troubleshooting with <a href="https://ioc.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireshark</span></a> — a deep dive into understanding and diagnosing TLS-based communication issues.</p><p>Sign up now and start your SharkFest journey strong: <a href="https://sharkfest.wireshark.org/sfus" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sharkfest.wireshark.org/sfus</span><span class="invisible"></span></a></p><p><a href="https://ioc.exchange/tags/sf25us" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sf25us</span></a> <a href="https://ioc.exchange/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://ioc.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://ioc.exchange/tags/PacketAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PacketAnalysis</span></a></p>
Wireshark<p>SharkFest'25 US is almost here!<br>June 14–19 • Richmond, Virginia</p><p>Whether you're a packet analysis pro or just getting started, SharkFest is the place to sharpen your <a href="https://ioc.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireshark</span></a> &amp; <a href="https://ioc.exchange/tags/Stratoshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stratoshark</span></a> skills, learn from world-class instructor &amp; connect with the community.</p><p>- Hands-on workshops<br>- Expert-led sessions<br>- Keynote from Vint Cerf<br>- Pre-conference classes with top analysts</p><p>Register now &amp; be part of the packet party: <a href="https://sharkfest.wireshark.org/sfus/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sharkfest.wireshark.org/sfus/</span><span class="invisible"></span></a></p><p><a href="https://ioc.exchange/tags/SharkFest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharkFest</span></a> <a href="https://ioc.exchange/tags/PacketAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PacketAnalysis</span></a> <a href="https://ioc.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://ioc.exchange/tags/NetEng" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetEng</span></a> <a href="https://ioc.exchange/tags/sf25us" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sf25us</span></a></p>
OMG 🇪🇺 🇺🇦 :linux:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@knoppix95" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>knoppix95</span></a></span><br>Enhanced privacy on linux while total surveillance starts on windows.</p><p>Hm, what to favor...?😃</p><p><a href="https://infosec.exchange/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://infosec.exchange/tags/Oniux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oniux</span></a> <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/Anonymity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anonymity</span></a> <a href="https://infosec.exchange/tags/Onion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Onion</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
LavX News<p>Demystifying HTTP Proxies: Forward vs Reverse and Their Impact on Network Security</p><p>Understanding the nuances between forward and reverse proxies is essential for modern network security and performance optimization. This article delves into how these proxies function, their practica...</p><p><a href="https://news.lavx.hu/article/demystifying-http-proxies-forward-vs-reverse-and-their-impact-on-network-security" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/demystify</span><span class="invisible">ing-http-proxies-forward-vs-reverse-and-their-impact-on-network-security</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.cloud/tags/ForwardProxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ForwardProxy</span></a> <a href="https://mastodon.cloud/tags/ReverseProxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseProxy</span></a></p>
knoppix<p>Tor has launched Oniux, a new tool for anonymizing any Linux app’s network traffic via the Tor network.</p><p>Unlike previous solutions like Torsocks, Oniux uses Linux namespaces to isolate apps at the kernel level, ensuring leak-proof anonymity even with malicious apps.</p><p>Though experimental, Oniux could be a game-changer for enhanced privacy on Linux.</p><p><a href="https://www.bleepingcomputer.com/news/security/new-tor-oniux-tool-anonymizes-any-linux-apps-network-traffic/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-tor-oniux-tool-anonymizes-any-linux-apps-network-traffic/</span></a></p><p><a href="https://mastodon.social/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://mastodon.social/tags/Oniux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oniux</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Anonymity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anonymity</span></a> <a href="https://mastodon.social/tags/Onion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Onion</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
Walt Baldwin<p>Over the past nine months, undocumented communication devices, including cellular radios, have been found in inverters and some batteries from multiple Chinese suppliers.</p><p><a href="https://mastodon.energy/tags/EnergyTransition" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EnergyTransition</span></a> <a href="https://mastodon.energy/tags/EnergyMastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EnergyMastodon</span></a> <a href="https://mastodon.energy/tags/Climate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Climate</span></a> <a href="https://mastodon.energy/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.energy/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.energy/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.energy/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> </p><p><a href="https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reuters.com/sustainability/cli</span><span class="invisible">mate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/</span></a></p>
LMG Security<p>The FBI has issued an alert about cybercriminals hijacking outdated routers to power massive proxy-for-hire networks—masking malware, fraud, and credential theft right under your nose.</p><p>Watch the full Cyberside Chats episode to hear <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MDurrin</span></a></span> 's insights on:</p><p>🔹 The FBI’s May 2025 alert<br>🔹 TheMoon malware and the Faceless proxy service<br>🔹 What these botnets mean for your enterprise<br>🔹 What you need to do now to stay protected</p><p>🎥 Watch the video: <a href="https://youtu.be/x_40BlvWsHk" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/x_40BlvWsHk</span><span class="invisible"></span></a><br>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/outdated-routers-a-hidden-threat-in-your-neighborhood/?token=b0b648ff9ddf79f7cb1099945c74f7f0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/outdated-r</span><span class="invisible">outers-a-hidden-threat-in-your-neighborhood/?token=b0b648ff9ddf79f7cb1099945c74f7f0</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/ProxyAbuse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProxyAbuse</span></a> <a href="https://infosec.exchange/tags/TheMoonMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheMoonMalware</span></a> <a href="https://infosec.exchange/tags/Botnets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnets</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CIO</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyber</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2074244/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2074244/</span><span class="invisible"></span></a> North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress <a href="https://pubeurope.com/tags/ComputerSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerSecurity</span></a> <a href="https://pubeurope.com/tags/Conflicts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Conflicts</span></a> <a href="https://pubeurope.com/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://pubeurope.com/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNewsToday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNewsToday</span></a> <a href="https://pubeurope.com/tags/CyberSecurityUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityUpdates</span></a> <a href="https://pubeurope.com/tags/CyberUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberUpdates</span></a> <a href="https://pubeurope.com/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://pubeurope.com/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://pubeurope.com/tags/HackingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackingNews</span></a> <a href="https://pubeurope.com/tags/HowToHack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HowToHack</span></a> <a href="https://pubeurope.com/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationSecurity</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> <a href="https://pubeurope.com/tags/RansomwareMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareMalware</span></a> <a href="https://pubeurope.com/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://pubeurope.com/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheHackerNews</span></a></p>
Brian Greenberg :verified:<p>⚠️ Cyber threat: Operation Moonlander dismantles a decades-old router botnet 🛡️🌙</p><p>🚫 Aging Linksys, Ericsson &amp; Cisco routers were hijacked by TheMoon malware<br>👮‍♂️ Four foreign nationals indicted for running Anyproxy/5socks proxy-for-hire networks<br>🔒 FBI bulletin urges disposal of unsupported routers and firmware updates<br>🌐 Joint takedown by FBI, Dutch National Police &amp; DOJ</p><p>Protect your network: replace EOL devices, apply patches, and monitor IoT traffic for anomalies.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/IoT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoT</span></a> <a href="https://infosec.exchange/tags/OperationMoonlander" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationMoonlander</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a><br><a href="https://www.theregister.com/2025/05/10/router_botnet_crashed/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/05/10/rou</span><span class="invisible">ter_botnet_crashed/</span></a></p>
Walker<p>When can we declare IP Geo location / country code blocking practically dead as a mitigation strategy?</p><p>Sure it is still useful blocking script kiddies from Iran and other low hanging fruit, but do any serious APT crews actually launch attacks from their home country anymore? </p><p>With the use of zero trust, distributed attack and delivery networks (looking at you Cloudflare), and VPN usage country blocking feels less useful than in the past. </p><p><a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/geoblocking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geoblocking</span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/scriptkiddie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scriptkiddie</span></a> <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://infosec.exchange/tags/cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudflare</span></a></p>
SNS JU<p>🔐 𝗕𝘂𝗶𝗹𝗱𝗶𝗻𝗴 𝘁𝗿𝘂𝘀𝘁 𝗶𝗻𝘁𝗼 𝟲𝗚 𝘀𝘁𝗮𝗿𝘁𝘀 𝗳𝗿𝗼𝗺 𝘁𝗵𝗲 𝗴𝗿𝗼𝘂𝗻𝗱 𝘂𝗽</p><p>𝗶𝗧𝗿𝘂𝘀𝘁𝟲𝗚 explores how secure service orchestration is key to building resilient, next-gen networks.</p><p>📖 𝗥𝗲𝗮𝗱 𝘁𝗵𝗲 𝗯𝗹𝗼𝗴 𝗽𝗼𝘀𝘁: <a href="https://www.sns-itrust6g.com/itrust6g-secure-service-orchestration-design/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">sns-itrust6g.com/itrust6g-secu</span><span class="invisible">re-service-orchestration-design/</span></a></p><p><a href="https://eupolicy.social/tags/CyberSecurity" class="mention hashtag" rel="tag">#<span>CyberSecurity</span></a> <a href="https://eupolicy.social/tags/NetworkSecurity" class="mention hashtag" rel="tag">#<span>NetworkSecurity</span></a> <a href="https://eupolicy.social/tags/FutureNetworks" class="mention hashtag" rel="tag">#<span>FutureNetworks</span></a> <a href="https://eupolicy.social/tags/Orchestration" class="mention hashtag" rel="tag">#<span>Orchestration</span></a></p>
ByteSectorX<p>The Rise of Artificial Intelligence in Cybersecurity: What to Expect</p><p><a href="https://bytesectorx.blogspot.com/2024/11/the-rise-of-artificial-intelligence-in-cybersecurity-what-to-expect.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bytesectorx.blogspot.com/2024/</span><span class="invisible">11/the-rise-of-artificial-intelligence-in-cybersecurity-what-to-expect.html</span></a></p><p><a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/ArtificialInteligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialInteligence</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/CYBER" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CYBER</span></a> <a href="https://mastodon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://mastodon.social/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
Politico.eu (Unofficial RSS)Spanish grid operator rules out cyberattack in its facilities after power cut <a href="https://www.politico.eu/article/spanish-grid-operator-rules-out-cyberattack-in-its-facilities-following-iberian-blackout/?utm_source=RSS_Feed&amp;utm_medium=RSS&amp;utm_campaign=RSS_Syndication" rel="nofollow noopener noreferrer" target="_blank">https://www.politico.eu/article/spanish-grid-operator-rules-out-cyberattack-in-its-facilities-following-iberian-blackout/?utm_source=RSS_Feed&amp;utm_medium=RSS&amp;utm_campaign=RSS_Syndication</a> <a class="hashtag" href="https://social.espeweb.net/tag/cybersecurityanddataprotection" rel="nofollow noopener noreferrer" target="_blank">#CybersecurityandDataProtection</a> <a class="hashtag" href="https://social.espeweb.net/tag/criticalinfrastructure" rel="nofollow noopener noreferrer" target="_blank">#Criticalinfrastructure</a> <a class="hashtag" href="https://social.espeweb.net/tag/energyinfrastructure" rel="nofollow noopener noreferrer" target="_blank">#Energyinfrastructure</a> <a class="hashtag" href="https://social.espeweb.net/tag/energyandclimate" rel="nofollow noopener noreferrer" target="_blank">#EnergyandClimate</a> <a class="hashtag" href="https://social.espeweb.net/tag/electricitygrid" rel="nofollow noopener noreferrer" target="_blank">#Electricitygrid</a> <a class="hashtag" href="https://social.espeweb.net/tag/networksecurity" rel="nofollow noopener noreferrer" target="_blank">#Networksecurity</a> <a class="hashtag" href="https://social.espeweb.net/tag/cybersecurity" rel="nofollow noopener noreferrer" target="_blank">#Cybersecurity</a> <a class="hashtag" href="https://social.espeweb.net/tag/electricity" rel="nofollow noopener noreferrer" target="_blank">#Electricity</a> <a class="hashtag" href="https://social.espeweb.net/tag/resilience" rel="nofollow noopener noreferrer" target="_blank">#Resilience</a> <a class="hashtag" href="https://social.espeweb.net/tag/hackers" rel="nofollow noopener noreferrer" target="_blank">#Hackers</a>
Europe Says<p><a href="https://www.europesays.com/2022415/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2022415/</span><span class="invisible"></span></a> Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware <a href="https://pubeurope.com/tags/ComputerSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerSecurity</span></a> <a href="https://pubeurope.com/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://pubeurope.com/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNewsToday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNewsToday</span></a> <a href="https://pubeurope.com/tags/CyberSecurityUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityUpdates</span></a> <a href="https://pubeurope.com/tags/CyberUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberUpdates</span></a> <a href="https://pubeurope.com/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://pubeurope.com/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://pubeurope.com/tags/HackingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackingNews</span></a> <a href="https://pubeurope.com/tags/HowToHack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HowToHack</span></a> <a href="https://pubeurope.com/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationSecurity</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/RansomwareMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareMalware</span></a> <a href="https://pubeurope.com/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://pubeurope.com/tags/SouthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SouthKorea</span></a> <a href="https://pubeurope.com/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheHackerNews</span></a></p>
Politico.eu (Unofficial RSS)European Commission blacklists lobby groups tied to Huawei <a href="https://www.politico.eu/article/european-commission-blacklists-lobby-groups-tied-to-huawei/?utm_source=RSS_Feed&amp;utm_medium=RSS&amp;utm_campaign=RSS_Syndication" rel="nofollow noopener noreferrer" target="_blank">https://www.politico.eu/article/european-commission-blacklists-lobby-groups-tied-to-huawei/?utm_source=RSS_Feed&amp;utm_medium=RSS&amp;utm_campaign=RSS_Syndication</a> <a class="hashtag" href="https://social.espeweb.net/tag/cybersecurityanddataprotection" rel="nofollow noopener noreferrer" target="_blank">#CybersecurityandDataProtection</a> <a class="hashtag" href="https://social.espeweb.net/tag/certificationandstandards" rel="nofollow noopener noreferrer" target="_blank">#Certificationandstandards</a> <a class="hashtag" href="https://social.espeweb.net/tag/huaweicorruptionscandal" rel="nofollow noopener noreferrer" target="_blank">#Huaweicorruptionscandal</a> <a class="hashtag" href="https://social.espeweb.net/tag/energyandclimate" rel="nofollow noopener noreferrer" target="_blank">#EnergyandClimate</a> <a class="hashtag" href="https://social.espeweb.net/tag/moneylaundering" rel="nofollow noopener noreferrer" target="_blank">#Moneylaundering</a> <a class="hashtag" href="https://social.espeweb.net/tag/networksecurity" rel="nofollow noopener noreferrer" target="_blank">#Networksecurity</a> <a class="hashtag" href="https://social.espeweb.net/tag/brusselsbubble" rel="nofollow noopener noreferrer" target="_blank">#Brusselsbubble</a> <a class="hashtag" href="https://social.espeweb.net/tag/transparency" rel="nofollow noopener noreferrer" target="_blank">#Transparency</a> <a class="hashtag" href="https://social.espeweb.net/tag/solarenergy" rel="nofollow noopener noreferrer" target="_blank">#Solarenergy</a> <a class="hashtag" href="https://social.espeweb.net/tag/corruption" rel="nofollow noopener noreferrer" target="_blank">#Corruption</a> <a class="hashtag" href="https://social.espeweb.net/tag/technology" rel="nofollow noopener noreferrer" target="_blank">#Technology</a> <a class="hashtag" href="https://social.espeweb.net/tag/lobbying" rel="nofollow noopener noreferrer" target="_blank">#Lobbying</a> <a class="hashtag" href="https://social.espeweb.net/tag/telecoms" rel="nofollow noopener noreferrer" target="_blank">#Telecoms</a> <a class="hashtag" href="https://social.espeweb.net/tag/5g" rel="nofollow noopener noreferrer" target="_blank">#5G</a>
k3ym𖺀<p>🚨 <strong>New Threat Alert: Rustobot Botnet</strong> 🚨<br>A new Rust-based botnet is making waves — and it's hijacking routers to do it. <span class="h-card" translate="no"><a href="https://infosec.exchange/@FortiGuardLabs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>FortiGuardLabs</span></a></span> latest research dives into Rustobot, a stealthy, modular botnet that’s fast, evasive, and ready to wreak havoc.</p><p>🔍 Learn how it works, what makes it different, and how to protect your network:<br>👉 <a href="https://www.fortinet.com/blog/threat-research/new-rust-botnet-rustobot-is-routed-via-routers" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortinet.com/blog/threat-resea</span><span class="invisible">rch/new-rust-botnet-rustobot-is-routed-via-routers</span></a></p><p><strong>IOCs</strong></p><p><strong>URLs</strong></p><p>hxxp://66[.]63[.]187[.]69/w.sh<br>hxxp://66[.]63[.]187[.]69/wget.sh<br>hxxp://66[.]63[.]187[.]69/t<br>hxxp://66[.]63[.]187[.]69/tftp.sh<br>hxxp://66[.]63[.]187[.]69/arm5<br>hxxp://66[.]63[.]187[.]69/arm6<br>hxxp://66[.]63[.]187[.]69/arm7<br>hxxp://66[.]63[.]187[.]69/mips<br>hxxp://66[.]63[.]187[.]69/mpsl<br>hxxp://66[.]63[.]187[.]69/x86</p><p><strong>Hosts</strong></p><p>dvrhelper[.]anondns[.]net<br>techsupport[.]anondns[.]net<br>rustbot[.]anondns[.]net<br>miraisucks[.]anondns[.]net<br>5[.]255[.]125[.]150</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/IoTSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoTSecurity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2014993/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2014993/</span><span class="invisible"></span></a> Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan <a href="https://pubeurope.com/tags/ComputerSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerSecurity</span></a> <a href="https://pubeurope.com/tags/Conflicts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Conflicts</span></a> <a href="https://pubeurope.com/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://pubeurope.com/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNewsToday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNewsToday</span></a> <a href="https://pubeurope.com/tags/CyberSecurityUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityUpdates</span></a> <a href="https://pubeurope.com/tags/CyberUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberUpdates</span></a> <a href="https://pubeurope.com/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://pubeurope.com/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://pubeurope.com/tags/HackingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackingNews</span></a> <a href="https://pubeurope.com/tags/HowToHack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HowToHack</span></a> <a href="https://pubeurope.com/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationSecurity</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> <a href="https://pubeurope.com/tags/RansomwareMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareMalware</span></a> <a href="https://pubeurope.com/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://pubeurope.com/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheHackerNews</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2010679/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2010679/</span><span class="invisible"></span></a> APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures <a href="https://pubeurope.com/tags/ComputerSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerSecurity</span></a> <a href="https://pubeurope.com/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://pubeurope.com/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNewsToday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNewsToday</span></a> <a href="https://pubeurope.com/tags/CyberSecurityUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityUpdates</span></a> <a href="https://pubeurope.com/tags/CyberUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberUpdates</span></a> <a href="https://pubeurope.com/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://pubeurope.com/tags/europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europe</span></a> <a href="https://pubeurope.com/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://pubeurope.com/tags/HackingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackingNews</span></a> <a href="https://pubeurope.com/tags/HowToHack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HowToHack</span></a> <a href="https://pubeurope.com/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationSecurity</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/RansomwareMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareMalware</span></a> <a href="https://pubeurope.com/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://pubeurope.com/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheHackerNews</span></a></p>
D_70WN 🌈 🏳️‍⚧️<p>Nice hardware with power over ethernet, then a decent firmware on openwrt, $sense or something else. <a href="https://chaos.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://chaos.social/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/poe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poe</span></a></p>