eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

214
active users

#extensions

2 posts2 participants1 post today

Time is rare when you're figuring out how to #CNC the best way, replacing #ip drivers and proprietary software controller with #FreeSoftware like #grbl + #arduino, while finding best #CAD & #CAM alternatives to commercial #fusion365 and #vcarve tools in #extensions for @inkscape like #gcodetools, #addons for @Blender like #fabexCNC and last but not least the universal gcode sender #UGS as perfect post-processor for a free workflow.

That assembled like a clockwork makes a lot of noise, dust, and work, but beautiful sculptures. What would you cut out of wood first?

Continued thread

...et encore.
Depuis début 2024, un acteur malveillant diffuse des extensions Chrome fonctionnelles mais piégées via des faux sites imitant des services populaires (VPN, IA, crypto, etc.).
⬇️
Des sites frauduleux diffusent des extensions qui imitent ou détournent des outils légitimes comme :

🔹 FortiVPN (Fortinet)
🔹 DeepSeek (IA)
🔹 Google Analytics
🔹 Statistiques de sites web

Ces extensions semblent fiables, car elles s'appuient sur des services connus ou crédibles. En réalité, elles :

⚠️ Volent vos données
⚠️ Injectent du code malveillant
⚠️ Espionnent votre navigation
⚠️ Bypassent les protections du navigateur (CSP, sandbox…)

Exemples de faux domaines :
forti-vpn[.]com, sitestats[.]world, deepseek-ai[.]info…

[Liste complète + indicateurs (IOCs)]
👇
github.com/DomainTools/Securit

[source]
⬇️
"Hidden Threats of Dual-Function Malware Found in Chrome Extensions"
👇
dti.domaintools.com/dual-funct

[Dans les news infosec]
⬇️
"Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs"
👇
bleepingcomputer.com/news/secu

GitHubSecuritySnacks/2025/DualFunction-Malware-Chrome-Extensions at main · DomainTools/SecuritySnacksSecuritySnack data that doesn't fit into a single tweet. - DomainTools/SecuritySnacks
Continued thread

Voici une liste découverte par @WPalant d'autres extensions au comportement discutable ou potentiellement risquées, à surveiller ou à désinstaller sur vos postes équipés de Chrome.
⬇️
"Malicious extensions circumvent Google’s remote code ban"
👇
palant.info/2025/01/20/malicio

Almost Secure · Malicious extensions circumvent Google’s remote code ban
More from Yellow Flag

Si vous voulez partir à la (retro) chasse des extensions Chrome compromises en fin d'année passée ( lemagit.fr/actualites/36661779 ) sur vos postes et logs réseau,
la liste de suivi est disponible avec les adresses de destination de données détournées (IoCs) ainsi que l'état actuel de l'extension (remédiée / retirée / vulnérable)
👇
extensiontotal.com/cyberhaven-

LeMagIT.fr · Extensions Chrome : une campagne plus vaste que ce qui était estimé initialementBy Valéry Rieß-Marchive

‼️ Achtung bei #ChromeExtensions: #Schadcode wurde in 36 Erweiterungen eingeschleust, darunter #KI-Tools, #Passwortmanager und #VPNs.‼️

golem.de/news/millionen-nutzer

Betroffen sind 2,6 Millionen Nutzer. Der Angriff begann mit einem #Phishing-Vorfall und zielt auf sensible Daten wie #Facebook-Zugangsdaten ab. Nutzer sollten betroffene #Extensions prüfen und #Passwörter ändern. Mehrere Erweiterungen wurden bereits bereinigt oder entfernt.

Golem.de · Millionen Nutzer gefährdet: Schadcode in 36 Chrome-Extensions eingeschleust - Golem.deBy Marc Stöckel
Continued thread

Since that December ruling, #MarkMeadows has obtained multiple #extensions on his deadline to ask #SCOTUS to review the dispute. In the meantime, the high court’s conservative majority handed down the #immunity ruling earlier this month that said #Trump had at least “presumptive” immunity for any of his *official acts* as president that were targeted in the federal #criminal charges brought by #SpecialCounsel #JackSmith.

La $GOOG cripples ad-blocking #Chrome #extensions, because security—but nobody’s buying that.

#Privacy-focused #Chrome #extensions are living on borrowed time. Developers must upgrade to the far less capable #ManifestV3 API, or they’ll be deleted from your browser. We warned you six months ago, and as of June 3 #Google is following through on its threat to kill #AdBlockers.

#Firefox and #Safari are the only major browsers unaffected. In #SBBlogwatch, we muster #Mozilla. At @TechstrongGroup’s @SecurityBlvd: securityboulevard.com/2024/06/

Security Boulevard · Google Hates Ad Blockers: Manifest V3 Push Starts TodayWe warned you. As of June 3, Google is following through on its threat to kill ad blockers. Privacy-focused Chrome extensions are living on borrowed time; developers must upgrade to the less capable “Manifest V3” API.