eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

196
active users

#exploited

2 posts2 participants0 posts today
PrivacyDigest<p>Senator castigates federal <a href="https://mas.to/tags/judiciary" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>judiciary</span></a> for ignoring “basic <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> ”</p><p><a href="https://mas.to/tags/RonWyden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RonWyden</span></a> accused the federal judiciary of “negligence &amp; incompetence” following a recent hack, reportedly by <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> with ties to the Russian gov, that exposed confidential court docs.</p><p>The breach of the judiciary’s electronic case filing system first came to lightin a report by Politico 3 weeks ago, which went on to say that the <a href="https://mas.to/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> in the <a href="https://mas.to/tags/hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hack</span></a> were known since 2020. </p><p><a href="https://arstechnica.com/security/2025/08/senator-to-supreme-court-justice-federal-court-hacks-threaten-us-security/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">08/senator-to-supreme-court-justice-federal-court-hacks-threaten-us-security/</span></a></p>
ul131web<p>Malicious Image Files Trigger Memory Corruption: Apple Critical Zero-Day vulnerability CVE-2025-43300 <a href="https://ul131web.blogspot.com/2025/08/malicious-image-files-trigger-memory.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ul131web.blogspot.com/2025/08/</span><span class="invisible">malicious-image-files-trigger-memory.html</span></a> </p><p> <a href="https://mastodon.social/tags/CybersecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersecurityNews</span></a> <a href="https://mastodon.social/tags/Exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploited</span></a> <a href="https://mastodon.social/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://mastodon.social/tags/Emergency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emergency</span></a> <a href="https://mastodon.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://mastodon.social/tags/iPadOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iPadOS</span></a> <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
PrivacyDigest<p>High-severity <a href="https://mas.to/tags/WinRAR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WinRAR</span></a> 0-day <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> for weeks by 2 groups <br><a href="https://mas.to/tags/0day" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>0day</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a></p><p><a href="https://arstechnica.com/security/2025/08/high-severity-winrar-0-day-exploited-for-weeks-by-2-groups/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">08/high-severity-winrar-0-day-exploited-for-weeks-by-2-groups/</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Fix Targets Attacks on <a href="https://mas.to/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> </p><p>Microsoft Corp. issued an emergency <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> update for a <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> in SharePoint Server that is actively being <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> to compromise <a href="https://mas.to/tags/vulnerable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerable</span></a> organizations. The <a href="https://mas.to/tags/patch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patch</span></a> comes amid reports that malicious <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> have used the SharePoint flaw to <a href="https://mas.to/tags/breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>breach</span></a> U.S. federal and state agencies, universities, and energy companies.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://krebsonsecurity.com/2025/07/microsoft-fix-targets-attacks-on-sharepoint-zero-day/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/07/mi</span><span class="invisible">crosoft-fix-targets-attacks-on-sharepoint-zero-day/</span></a></p>
PrivacyDigest<p>Critical <a href="https://mas.to/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> has been under active <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> for weeks</p><p>A critical vulnerability allowing <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> to bypass <a href="https://mas.to/tags/multifactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multifactor</span></a> <a href="https://mas.to/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> in network management devices made by <a href="https://mas.to/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> has been actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> for more than a month, researchers said. The finding is at odds with advisories from the vendor saying there is no evidence of in-the-wild <a href="https://mas.to/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a>.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a></p>
Manuel 'HonkHase' Atug<p><a href="https://chaos.social/tags/PerfektBlue" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PerfektBlue</span></a> <a href="https://chaos.social/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> <a href="https://chaos.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> Expose Millions of <a href="https://chaos.social/tags/Vehicles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vehicles</span></a> to Remote Code Execution</p><p>"Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if successfully <a href="https://chaos.social/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a>, could allow remote code execution <a href="https://chaos.social/tags/rce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rce</span></a> on millions of <a href="https://chaos.social/tags/transport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transport</span></a> vehicles from different vendors."<br><a href="https://thehackernews.com/2025/07/perfektblue-bluetooth-vulnerabilities.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/07/perf</span><span class="invisible">ektblue-bluetooth-vulnerabilities.html</span></a></p>
PrivacyDigest<p>Actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> gives extraordinary control over <a href="https://mas.to/tags/server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>server</span></a> fleets<br> <br>The vulnerability, carrying a <a href="https://mas.to/tags/severity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>severity</span></a> rating of 10 out of a possible 10, resides in the <a href="https://mas.to/tags/AMIMegaRAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMIMegaRAC</span></a> , a widely used <a href="https://mas.to/tags/firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmware</span></a> package that allows large fleets of servers to be remotely accessed and managed even when power is unavailable or the operating system isn't functioning.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/ami" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ami</span></a> <a href="https://mas.to/tags/megarac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>megarac</span></a></p><p><a href="https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/</span></a></p>
BCWHS<p>CISA Catalog of Known Exploited Vulnerabilities<br>Choose your products that to compare to current CVEs. The list is generated from current CVEs. Download them or create a custom GRC plan.<br><a href="https://blackcatwhitehatsecurity.com/cveProducts.cfm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blackcatwhitehatsecurity.com/c</span><span class="invisible">veProducts.cfm</span></a><br><a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/Catalog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Catalog</span></a> <a href="https://mastodon.social/tags/Known" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Known</span></a> <a href="https://mastodon.social/tags/Exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploited</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a></p>
BCWHS<p>CISA Catalog of Known Exploited Vulnerabilities<br>Choose your products that you use to compare to current CVEs. Product list is generated from current CVEs. Download the vulnerabilities or create a custom GRC plan.<br><a href="https://blackcatwhitehatsecurity.com/cveProducts.cfm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blackcatwhitehatsecurity.com/c</span><span class="invisible">veProducts.cfm</span></a><br><a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/Catalog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Catalog</span></a> <a href="https://mastodon.social/tags/Known" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Known</span></a> <a href="https://mastodon.social/tags/Exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploited</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a></p>
Stefan Müller :verified:<p><span class="h-card" translate="no"><a href="https://berlin.social/@skittles" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>skittles</span></a></span> </p><p>Ja, ich kenne mich ein bisschen aus. <a href="https://climatejustice.social/tags/BlagFlag" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlagFlag</span></a> kenne ich aus eigener Ansicht. Stand sogar mit denen auf der Bühne. =:-) </p><p>Hier kannste mal ein paar meiner alten Bilder angucken:</p><p><a href="https://www.flickr.com/photos/stefan-mueller-net/albums/with/72157709493017581" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">flickr.com/photos/stefan-muell</span><span class="invisible">er-net/albums/with/72157709493017581</span></a></p><p>Und selbst <a href="https://climatejustice.social/tags/Exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploited</span></a> waren/sind ja irgendwie echt.</p>
PrivacyDigest<p>Employee <a href="https://mas.to/tags/monitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>monitoring</span></a> app exposes 21M work screens​ | Cybernews</p><p>The <a href="https://mas.to/tags/leaked" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>leaked</span></a> data is extremely sensitive, as millions of screenshots from employees' devices could not only expose full-screen captures of emails, internal chats, and confidential business documents, but also contain <a href="https://mas.to/tags/login" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>login</span></a> pages, credentials, <a href="https://mas.to/tags/APIkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APIkeys</span></a> , and other sensitive info that could be <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> to attack businesses worldwide.</p><p>Cybernews contacted the company, and access has now been secured.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://cybernews.com/security/employee-monitoring-app-leaks-millions-screenshots/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybernews.com/security/employe</span><span class="invisible">e-monitoring-app-leaks-millions-screenshots/</span></a></p>
Manuel 'HonkHase' Atug<p><a href="https://chaos.social/tags/KRITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KRITIS</span></a> Sektor <a href="https://chaos.social/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> und <a href="https://chaos.social/tags/TK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TK</span></a></p><p>Huge <a href="https://chaos.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> campaign targets <a href="https://chaos.social/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> S3 storage: attackers have thousands of keys</p><p>"A massive database of over 1,200 unique <a href="https://chaos.social/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a> Web Services (AWS) access keys has been amassed and <a href="https://chaos.social/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> in a ransomware campaign. Administrators of exposed AWS S3 buckets are finding their files encrypted except for a ransom note demanding payment in bitcoin."<br><a href="https://cybernews.com/security/aws-cloud-storage-bucket-ransomware-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybernews.com/security/aws-clo</span><span class="invisible">ud-storage-bucket-ransomware-attacks/</span></a></p>
Nonilex<p><a href="https://masto.ai/tags/DavidGeier" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DavidGeier</span></a>, has published numerous articles in <a href="https://masto.ai/tags/medical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>medical</span></a> literature attempting to tie mercury in <a href="https://masto.ai/tags/vaccines" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vaccines</span></a> to <a href="https://masto.ai/tags/autism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autism</span></a>. In 2012, state authorities in Maryland found that he had been practicing <a href="https://masto.ai/tags/medicine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>medicine</span></a> WITHOUT a license alongside his father, Mark Geier, who was a doctor at the time.</p><p>MD authorities also suspended Mark Geier’s <a href="https://masto.ai/tags/MedicalLicense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MedicalLicense</span></a> following claims that he <a href="https://masto.ai/tags/endangered" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endangered</span></a> <a href="https://masto.ai/tags/children" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>children</span></a> w/ autism &amp; <a href="https://masto.ai/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> their parents, acc/to state records.</p><p><a href="https://masto.ai/tags/science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>science</span></a> <a href="https://masto.ai/tags/health" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>health</span></a> <a href="https://masto.ai/tags/Trump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trump</span></a> <a href="https://masto.ai/tags/ConspiracyTheories" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConspiracyTheories</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/PaloAlto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PaloAlto</span></a> <a href="https://mas.to/tags/Firewalls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewalls</span></a> Under <a href="https://mas.to/tags/Attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attack</span></a> As Miscreants Chain Flaws For <a href="https://mas.to/tags/Root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Root</span></a> Access - Slashdot <br> <br>A recently patched <a href="https://mas.to/tags/PaloAltoNetworks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PaloAltoNetworks</span></a> <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> (CVE-2025-0108) is being actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> alongside two older flaws (CVE-2024-9474 and CVE-2025-0111), allowing attackers to gain root access to unpatched firewalls. <br><a href="https://mas.to/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p><p><a href="https://it.slashdot.org/story/25/02/19/2059256/palo-alto-firewalls-under-attack-as-miscreants-chain-flaws-for-root-access?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/02/19</span><span class="invisible">/2059256/palo-alto-firewalls-under-attack-as-miscreants-chain-flaws-for-root-access?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> Fixes Zero-Day <a href="https://mas.to/tags/Exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploited</span></a> In 'Extremely Sophisticated' Attacks - Slashdot</p><p><a href="https://mas.to/tags/cve_2025_24200" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve_2025_24200</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> <a href="https://mas.to/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> </p><p><a href="https://apple.slashdot.org/story/25/02/10/217213/apple-fixes-zero-day-exploited-in-extremely-sophisticated-attacks" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apple.slashdot.org/story/25/02</span><span class="invisible">/10/217213/apple-fixes-zero-day-exploited-in-extremely-sophisticated-attacks</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackers</span></a> are <a href="https://mas.to/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> a new <a href="https://mas.to/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://mas.to/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> bug to <a href="https://mas.to/tags/hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hack</span></a> into company networks | TechCrunch </p><p>US software giant Ivanti has warned that a zero-day <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> in its widely-used enterprise VPN appliance has been <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> to compromise the networks of its corporate customers.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://mas.to/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p><p><a href="https://techcrunch.com/2025/01/09/hackers-are-exploiting-a-new-ivanti-vpn-security-bug-to-hack-into-company-networks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/01/09/hack</span><span class="invisible">ers-are-exploiting-a-new-ivanti-vpn-security-bug-to-hack-into-company-networks/</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> Confirms Zero-Day Attacks Hitting <a href="https://mas.to/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> Systems - SecurityWeek </p><p>Apple rushes out out major macOS and <a href="https://mas.to/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> updates to cover a pair of <a href="https://mas.to/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> already being <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> in the wild.<br><a href="https://mas.to/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> <a href="https://mas.to/tags/0day" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>0day</span></a></p><p><a href="https://www.securityweek.com/apple-confirms-zero-day-attacks-hitting-intel-based-macs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/apple-confirm</span><span class="invisible">s-zero-day-attacks-hitting-intel-based-macs/</span></a></p>
Susan Larson ♀️🏳️‍🌈🏳️‍⚧️🌈<p><a href="https://mastodon.online/tags/Incumbent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Incumbent</span></a> <a href="https://mastodon.online/tags/Republican" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Republican</span></a> <a href="https://mastodon.online/tags/StateSenator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSenator</span></a> <a href="https://mastodon.online/tags/DanForeman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DanForeman</span></a> Tells <a href="https://mastodon.online/tags/Indigenous" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Indigenous</span></a> <a href="https://mastodon.online/tags/Candidate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Candidate</span></a> <a href="https://mastodon.online/tags/TrishCarterGoodheart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrishCarterGoodheart</span></a> To 'Go Back Where You Came From'—And She Has The <a href="https://mastodon.online/tags/Perfect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Perfect</span></a> <a href="https://mastodon.online/tags/Response" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Response</span></a> 'Where am I supposed to go?'.</p><p>The racist 71-year-old Foreman—a <a href="https://mastodon.online/tags/retired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retired</span></a> <a href="https://mastodon.online/tags/policeofficer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>policeofficer</span></a>—also <a href="https://mastodon.online/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> the opportunity to spread his <a href="https://mastodon.online/tags/ChristianNationalist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChristianNationalist</span></a> (<a href="https://mastodon.online/tags/Fascist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fascist</span></a>), <a href="https://mastodon.online/tags/misogynist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>misogynist</span></a>, <a href="https://mastodon.online/tags/homophobic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homophobic</span></a> and <a href="https://mastodon.online/tags/transphobic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transphobic</span></a> "<a href="https://mastodon.online/tags/values" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>values</span></a>."</p><p><a href="https://mastodon.online/tags/EmptyThePews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmptyThePews</span></a> </p><p><a href="https://www.comicsands.com/republican-indigenous-candidate-go-back-2669338918.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">comicsands.com/republican-indi</span><span class="invisible">genous-candidate-go-back-2669338918.html</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Says <a href="https://mas.to/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> Update Zero-Day Being <a href="https://mas.to/tags/Exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploited</span></a> to Undo <a href="https://mas.to/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> Fixes - SecurityWeek</p><p><a href="https://mas.to/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> : Microsoft raises an alarm for in-the-wild <a href="https://mas.to/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a> of a critical flaw in <a href="https://mas.to/tags/WindowsUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsUpdate</span></a>.</p><p><a href="https://www.securityweek.com/microsoft-says-windows-update-zero-day-being-exploited-to-undo-security-fixes/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/microsoft-say</span><span class="invisible">s-windows-update-zero-day-being-exploited-to-undo-security-fixes/</span></a></p>
PrivacyDigest<p>Unpatchable 0-day in <a href="https://mas.to/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> cam is being <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> to install <a href="https://mas.to/tags/Mirai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mirai</span></a> <br><a href="https://mas.to/tags/0day" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>0day</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> </p><p><a href="https://arstechnica.com/?p=2046043" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2046043</span><span class="invisible"></span></a></p>