mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.1K
active users

#cybersecurity

755 posts253 participants50 posts today

Insolvenz nach #Cyberangriff: Gerade im Mittelstand werden immer wieder Fälle bekannt, in denen erfolgreiche Cyberangriffe zur #Insolvenz des betroffenen Betriebs führen. Zumeist sind derartige Ereignisse nicht der einzige Auslöser für die wirtschaftliche Schieflage, verstärken jedoch durch den #Betriebsausfall bestehende Missstände:

"Ein schwerer Cyberangriff verschärfte die wirtschaftlich prekäre Lage."

t-online.de/finanzen/aktuelles #cybersecurity #cybercrime

t-online · Hacker-Angriff trifft Recycling-Spezialist hart: Eu-Rec muss Insolvenz anmeldenDer Recycling-Spezialist Eu-Rec muss Insolvenz anmelden. Die Firma aus Rheinland-Pfalz hat auch mit den Folgen einer Hackerattacke zu kämpfen.

Multiple vulnerabilities reported in IBM Hardware Management Console

IBM has patched multiple security vulnerabilities in its Power Hardware Management Console (HMC), including a critical flaw (CVE-2025-1950, CVSS 9.3) that allows local users to execute commands with elevated privileges due to improper validation.

**First, make sure your IBM Hardware Management Console (HMC) is isolated and accessible only from trusted networks and trusted personnel. Also check whether you are running vulnerable versions (V10.2.1030.0 and V10.3.1050.0). If you are, plan a patch cycle, because any isolation will eventually be breached.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachinesMultiple vulnerabilities reported in IBM Hardware Management ConsoleIBM has patched multiple security vulnerabilities in its Power Hardware Management Console (HMC), including a critical flaw (CVE-2025-1950, CVSS 9.3) that allows local users to execute commands with elevated privileges due to improper validation.

ConfusedComposer vulnerability in reported in Google Cloud Composer tool

The "ConfusedComposer" vulnerability in Google Cloud Platform allows attackers to exploit a privilege escalation flaw by injecting malicious PyPI packages into Cloud Composer's custom-package configuration. This enables them to run arbitrary code that extracts and exfiltrates the highly privileged Cloud Build service account token. Google has fixed this vulnerability by modifying Cloud Composer to use a more restricted service account for PyPI module installations.

**You can't do much about this flaw, it was part of the GCP Cloud environment and it's fixed. Just be aware of these flaws to be better aware of the quality and patching discipline of your cloud providers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachinesConfusedComposer vulnerability in reported in Google Cloud Composer toolThe "ConfusedComposer" vulnerability in Google Cloud Platform allows attackers to exploit a privilege escalation flaw by injecting malicious PyPI packages into Cloud Composer's custom-package configuration. This enables them to run arbitrary code that extracts and exfiltrates the highly privileged Cloud Build service account token. Google has fixed this vulnerability by modifying Cloud Composer to use a more restricted service account for PyPI module installations.