mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.6K
active users

#malware

61 posts48 participants6 posts today
ITSEC News<p>Medusa ransomware: FBI and CISA urge organisations to act now to mitigate threat - The Medusa ransomware gang continues to present a major threat to the critical infrastruc... <a href="https://www.tripwire.com/state-of-security/medusa-ransomware-fbi-and-cisa-urge-organizations-act-now-mitigate-threat" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tripwire.com/state-of-security</span><span class="invisible">/medusa-ransomware-fbi-and-cisa-urge-organizations-act-now-mitigate-threat</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://schleuss.online/tags/medusa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>medusa</span></a></p>
OTX Bot<p>File Hashes Analysis with Power BI from Data Stored in DShield SIEM</p><p>This analysis showcases the use of Power BI to examine file hash data from a DShield SIEM over a 60-day period. The process involved exporting data from Elastic Discover, importing it into Power BI, and creating visualizations for analysis. Key findings include the identification of an IP address (87.120.113.231) associated with RedTail malware, uploading six different files with multiple hashes. The analysis also revealed the reappearance of a previously identified Linux Trojan (Xorddos) from new IP addresses within the same subnet. Additionally, two strange filenames were discovered and investigated, with one identified as an IRCBot through VirusTotal. This method of large dataset analysis proves valuable in uncovering potentially overlooked or lost data through retrospective examination.</p><p>Pulse ID: 67d2a955c677b493cb1eaa8f<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67d2a955c677b493cb1eaa8f" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67d2a</span><span class="invisible">955c677b493cb1eaa8f</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-13 09:45:57</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/0Day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0Day</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://social.raytec.co/tags/DShield" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DShield</span></a> <a href="https://social.raytec.co/tags/DoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/LUA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUA</span></a> <a href="https://social.raytec.co/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> <a href="https://social.raytec.co/tags/Trojan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojan</span></a> <a href="https://social.raytec.co/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VirusTotal</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Bossi<p>Na, das wird aber auch Zeit.<br>Endlich tun die in Brüssel mal etwas gegen meine Armut.</p><p>Im Ernst, wer fällt auf so etwas rein? </p><p><a href="https://mastodon.social/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://mastodon.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a></p>
CEOTECH.IT<p>Google Play Protect: pausa temporanea per sideloading<br><a href="https://mastodon.social/tags/Aggiornamento" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Aggiornamento</span></a> <a href="https://mastodon.social/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://mastodon.social/tags/App" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>App</span></a> <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/GooglePlayProtect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GooglePlayProtect</span></a> <a href="https://mastodon.social/tags/GooglePlayStore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GooglePlayStore</span></a> <a href="https://mastodon.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.social/tags/Notizie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Notizie</span></a> <a href="https://mastodon.social/tags/Novit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Novità</span></a> <a href="https://mastodon.social/tags/Pausa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pausa</span></a> <a href="https://mastodon.social/tags/PlayProtect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PlayProtect</span></a> <a href="https://mastodon.social/tags/PlayStore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PlayStore</span></a> <a href="https://mastodon.social/tags/Scansione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Scansione</span></a> <a href="https://mastodon.social/tags/Sicurezza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicurezza</span></a> <a href="https://mastodon.social/tags/Sideloading" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sideloading</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/Tecnologia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tecnologia</span></a> <a href="https://mastodon.social/tags/Test" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Test</span></a> </p><p><a href="https://www.ceotech.it/google-play-protect-pausa-temporanea-per-sideloading/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ceotech.it/google-play-protect</span><span class="invisible">-pausa-temporanea-per-sideloading/</span></a></p>
RedPacket Security<p>Chinese Hackers Exploit Juniper Routers with Backdoor Malware - <a href="https://www.redpacketsecurity.com/chinese-hackers-implant-backdoor-malware-on-juniper-routers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/chinese-</span><span class="invisible">hackers-implant-backdoor-malware-on-juniper-routers/</span></a></p><p><a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/Chinese_espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese_espionage</span></a> <a href="https://mastodon.social/tags/network_routers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network_routers</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
ITSEC News<p>Smashing Security podcast #408: A gag order backfires, and a snail mail ransom demand - What happens when a healthcare giant’s legal threats ignite a Streisand Effect wildfire… ... <a href="https://grahamcluley.com/smashing-security-podcast-408/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/smashing-secu</span><span class="invisible">rity-podcast-408/</span></a> <a href="https://schleuss.online/tags/smashingsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smashingsecurity</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://schleuss.online/tags/law%E2%84%B4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lawℴ</span></a> <a href="https://schleuss.online/tags/snailmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snailmail</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://schleuss.online/tags/podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcast</span></a> <a href="https://schleuss.online/tags/postal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postal</span></a></p>
The New Oil<p>Thousands of <a href="https://mastodon.thenewoil.org/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a></p>
IT News<p>Android apps laced with North Korean spyware found in Google Play - Researchers have discovered multiple Android apps, some that were availabl... - <a href="https://arstechnica.com/security/2025/03/researchers-find-north-korean-spy-apps-hosted-in-google-play/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/researchers-find-north-korean-spy-apps-hosted-in-google-play/</span></a> <a href="https://schleuss.online/tags/googleplay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleplay</span></a> <a href="https://schleuss.online/tags/northkorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>northkorea</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://schleuss.online/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/MassJacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MassJacker</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> uses 778,000 wallets to steal <a href="https://mastodon.thenewoil.org/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/massjacker-malware-uses-778-000-wallets-to-steal-cryptocurrency/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/massjacker-malware-uses-778-000-wallets-to-steal-cryptocurrency/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a></p>
Laurent Cheylus<p>A newly discovered clipboard hijacking operation dubbed "MassJacker" uses at least 778,531 Cryptocurrency Wallet addresses to steal Digital Assets from compromised Computers - Technical Report by CyberArk <a href="https://bsd.network/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://bsd.network/tags/CryptoStealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CryptoStealer</span></a> <a href="https://www.cyberark.com/resources/threat-research-blog/captain-massjacker-sparrow-uncovering-the-malwares-buried-treasure" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyberark.com/resources/threat-</span><span class="invisible">research-blog/captain-massjacker-sparrow-uncovering-the-malwares-buried-treasure</span></a></p>
heise online English<p>Federal Trojans at BND: civil rights activists take case to Human Rights Court</p><p>Reporters Without Borders and the Society for Civil Liberties complain to the European Court of Human Rights about the BND's surveillance powers.</p><p><a href="https://www.heise.de/en/news/Federal-Trojans-at-BND-civil-rights-activists-take-case-to-Human-Rights-Court-10314072.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Federal-Troja</span><span class="invisible">ns-at-BND-civil-rights-activists-take-case-to-Human-Rights-Court-10314072.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/BND" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BND</span></a> <a href="https://social.heise.de/tags/Trojaner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojaner</span></a> <a href="https://social.heise.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.heise.de/tags/Grundrechte" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Grundrechte</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netzpolitik</span></a> <a href="https://social.heise.de/tags/Pressefreiheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pressefreiheit</span></a> <a href="https://social.heise.de/tags/Recht" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Recht</span></a> <a href="https://social.heise.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Überwachung</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
The New Oil<p>North Korean <a href="https://mastodon.thenewoil.org/tags/Lazarus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lazarus</span></a> hackers infect hundreds via <a href="https://mastodon.thenewoil.org/tags/npm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>npm</span></a> packages</p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-lazarus-hackers-infect-hundreds-via-npm-packages/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/north-korean-lazarus-hackers-infect-hundreds-via-npm-packages/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
heise online<p>Bundestrojaner beim BND: Bürgerrechtler ziehen vor den Menschenrechtsgerichtshof</p><p>Reporter ohne Grenzen und die Gesellschaft für Freiheitsrechte beschweren sich beim Europäischen Gerichtshof für Menschenrechte über BND-Überwachungsbefugnisse.</p><p><a href="https://www.heise.de/news/Bundestrojaner-beim-BND-Buergerrechtler-ziehen-vor-den-Menschenrechtsgerichtshof-10314017.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Bundestrojaner-b</span><span class="invisible">eim-BND-Buergerrechtler-ziehen-vor-den-Menschenrechtsgerichtshof-10314017.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/BND" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BND</span></a> <a href="https://social.heise.de/tags/Trojaner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojaner</span></a> <a href="https://social.heise.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.heise.de/tags/Grundrechte" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Grundrechte</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netzpolitik</span></a> <a href="https://social.heise.de/tags/Pressefreiheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pressefreiheit</span></a> <a href="https://social.heise.de/tags/Recht" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Recht</span></a> <a href="https://social.heise.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Überwachung</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
TugaTech 🖥️<p>Novo malware da Coreia do Norte consegue infiltrar-se na Google Play Store<br>🔗&nbsp;<a href="https://tugatech.com.pt/t65095-novo-malware-da-coreia-do-norte-consegue-infiltrar-se-na-google-play-store" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tugatech.com.pt/t65095-novo-ma</span><span class="invisible">lware-da-coreia-do-norte-consegue-infiltrar-se-na-google-play-store</span></a></p><p><a href="https://masto.pt/tags/NoticiasdeSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoticiasdeSoftware</span></a> <a href="https://masto.pt/tags/criptomoedas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>criptomoedas</span></a> <a href="https://masto.pt/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://masto.pt/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://masto.pt/tags/seguran%C3%A7a" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>segurança</span></a> <a href="https://masto.pt/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a></p>
ITSEC News<p>Man found guilty of planting infinite loop logic bomb on ex-employer’s system - Davis Lu had planted malicious Java code onto his employer's network that would cause "in... <a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/man-found-guilty-of-planting-infinite-loop-logic-bomb-on-ex-employers-system" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/en-us/blog/hot</span><span class="invisible">forsecurity/man-found-guilty-of-planting-infinite-loop-logic-bomb-on-ex-employers-system</span></a> <a href="https://schleuss.online/tags/insiderthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>insiderthreat</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/law%E2%84%B4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lawℴ</span></a> <a href="https://schleuss.online/tags/logicbomb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logicbomb</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
TugaTech 🖥️<p>Microsoft corrige falha zero-day no Windows explorada desde 2023<br>🔗&nbsp;<a href="https://tugatech.com.pt/t65089-microsoft-corrige-falha-zero-day-no-windows-explorada-desde-2023" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tugatech.com.pt/t65089-microso</span><span class="invisible">ft-corrige-falha-zero-day-no-windows-explorada-desde-2023</span></a></p><p><a href="https://masto.pt/tags/NoticiasdeSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoticiasdeSoftware</span></a> <a href="https://masto.pt/tags/detetado" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>detetado</span></a> <a href="https://masto.pt/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://masto.pt/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://masto.pt/tags/seguran%C3%A7a" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>segurança</span></a> <a href="https://masto.pt/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a></p>
ANY.RUN<p>🚨 AI-powered <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a>, <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> generation, opinion manipulation—<a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> abuse and failures pose serious cyber risks </p><p><a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ANYRUN</span></a>'s analysts explore the main cyber threats and defense options 👇<br><a href="https://any.run/cybersecurity-blog/ai-risks-and-threats/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=ai_risks_and_threats&amp;utm_term=120325&amp;utm_content=linktoblog" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">any.run/cybersecurity-blog/ai-</span><span class="invisible">risks-and-threats/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=ai_risks_and_threats&amp;utm_term=120325&amp;utm_content=linktoblog</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Glyn Moody<p>Microsoft admits <a href="https://mastodon.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> hosted <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> that infected almost a million devices - <a href="https://www.theregister.com/2025/03/10/infosec_in_brief/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/10/inf</span><span class="invisible">osec_in_brief/</span></a> <a href="https://mastodon.social/tags/awkward" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>awkward</span></a></p>
PrivacyDigest<p>Thousands of <a href="https://mas.to/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> routers have been infected by a <a href="https://mas.to/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> to spread malware | Tom's Guide</p><p>report from the Cato CTRL team, the <a href="https://mas.to/tags/Ballista" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ballista</span></a> botnet <a href="https://mas.to/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router.</p><p>The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> can spread itself across the internet automatically. has also been used to spread other <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> families</p><p><a href="https://www.tomsguide.com/computing/malware-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomsguide.com/computing/malwar</span><span class="invisible">e-adware/thousands-of-tp-link-routers-have-been-infected-by-a-botnet-to-spread-malware</span></a></p>
AAKL<p>Microsoft: New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects <a href="https://www.microsoft.com/en-us/security/blog/2025/03/11/new-xcsset-malware-adds-new-obfuscation-persistence-techniques-to-infect-xcode-projects/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">microsoft.com/en-us/security/b</span><span class="invisible">log/2025/03/11/new-xcsset-malware-adds-new-obfuscation-persistence-techniques-to-infect-xcode-projects/</span></a> <span class="h-card" translate="no"><a href="https://bird.makeup/users/microsoftsec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>microsoftsec</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infoec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoec</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>