mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.1K
active users

#nationstate

0 posts0 participants0 posts today
Europe Says<p><a href="https://www.europesays.com/1992260/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/1992260/</span><span class="invisible"></span></a> North Korean IT Workers Set Sights on European Tech Firms <a href="https://pubeurope.com/tags/Conflicts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Conflicts</span></a> <a href="https://pubeurope.com/tags/europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europe</span></a> <a href="https://pubeurope.com/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://pubeurope.com/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> <a href="https://pubeurope.com/tags/NorthKoreanItWorkers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKoreanItWorkers</span></a> <a href="https://pubeurope.com/tags/sanctions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sanctions</span></a></p>
Christoffer S.<p>(talosintelligence.com) Gamaredon APT Targets Ukraine with Remcos Backdoor Using War-Themed Lures <a href="https://blog.talosintelligence.com/gamaredon-campaign-distribute-remcos/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.talosintelligence.com/gam</span><span class="invisible">aredon-campaign-distribute-remcos/</span></a></p><p>Cisco Talos is tracking a campaign targeting Ukrainian users with malicious LNK files that deliver the Remcos backdoor. The campaign, attributed with medium confidence to the Gamaredon APT group, uses Russian-language lures related to troop movements in Ukraine. The attack chain involves LNK files that execute PowerShell code to download a ZIP file containing the Remcos backdoor, which is then executed through DLL side-loading techniques. The attackers use geo-fenced servers in Russia and Germany that restrict access to Ukrainian IP addresses. This represents a continuation of Gamaredon's targeting of Ukrainian entities, though their use of the commercial Remcos backdoor marks a shift from their typical custom tooling.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Gamaredon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gamaredon</span></a> <a href="https://swecyb.com/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://swecyb.com/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://swecyb.com/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://swecyb.com/tags/LNK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LNK</span></a> <a href="https://swecyb.com/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://swecyb.com/tags/GeoFencing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GeoFencing</span></a> <a href="https://swecyb.com/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://swecyb.com/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a></p>
samir x<p><span class="h-card" translate="no"><a href="https://mastodon.social/@rzeta0" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rzeta0</span></a></span> you're spot on. If one <a href="https://infosec.exchange/tags/nationstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nationstate</span></a> is doing something, you can be pretty sure that others are too - it's not just limited to China and Russia as some will have you believe. In fact, a QR code <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> scheme seems pretty lame compared to the <a href="https://infosec.exchange/tags/capabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>capabilities</span></a> we see coming out of mercenary <a href="https://infosec.exchange/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> companies, let alone powerful nation states.<br><span class="h-card" translate="no"><a href="https://hachyderm.io/@evacide" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>evacide</span></a></span></p>
samir x<p><a href="https://infosec.exchange/tags/StateSponsored" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StateSponsored</span></a> hacking is much more sinister than <a href="https://infosec.exchange/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a>. </p><p>Criminals generally have one objective - get paid. Whereas a nation state’s motives may be unclear and often far more invasive.</p><p>A criminal won’t take long before making themselves known, whereas a nation state will want to remain undetected for as long as possible.</p><p>Cyber criminals are usually opportunistic, it doesn’t really matter who they hack. Nation states are extremely deliberate.</p><p>Nation state capabilities are far superior than cyber criminals. As an individual, it’s relatively easy to protect yourself against cyber criminals (especially the kind that go after individuals). But if you’re the target of a nation state, protecting yourself is a significant challenge. This challenge is exponentially harder if you live in the nation that’s targeting you.</p><p>Francesco Cancellato who was one of the targets in the recent <a href="https://infosec.exchange/tags/Paragon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Paragon</span></a> <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> hacks put it well in his interview with <span class="h-card" translate="no"><a href="https://mstdn.social/@TechCrunch" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>TechCrunch</span></a></span> saying:</p><p>“You ask yourself, why me? This is the thing, I mean, what did they want from me? That’s the first question, the second question is what did they take from me? Where did they go? What did they do to me? Once they got into my phone, where there is basically my whole life, my vacations, my friendships, my family, my bank passwords, there is everything — my work stuff…”</p><p><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espionage</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/techcrunch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>techcrunch</span></a> <a href="https://infosec.exchange/tags/nationstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nationstate</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/mercenarymalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mercenarymalware</span></a></p><p><a href="https://techcrunch.com/2025/02/03/journalist-targeted-on-whatsapp-by-paragon-spyware-i-feel-violated/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/02/03/jour</span><span class="invisible">nalist-targeted-on-whatsapp-by-paragon-spyware-i-feel-violated/</span></a></p>
Consultatron<p>Consultatron remains proudly <a href="https://m.consultatron.com/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> and supports <a href="https://m.consultatron.com/tags/LocalSportsLogo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LocalSportsLogo</span></a></p>
Strypey<p>1/200 also made the point that the nation-state model doesn't work for New Zealand, because it fundamentally relies on the mythos of a unified nation. Most of Aotearoa has openly rejected this myth since the 1980s in favour of bi-culturalism, which if you really take it seriously, requires us to acknowledge that NZ is a multi-nation country.</p><p>(1/?)</p><p><a href="https://mastodon.nzoss.nz/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://mastodon.nzoss.nz/tags/NewZealand" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NewZealand</span></a> <a href="https://mastodon.nzoss.nz/tags/Aotearoa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Aotearoa</span></a> <a href="https://mastodon.nzoss.nz/tags/BiCulturalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BiCulturalism</span></a></p>
Sophos X-Ops<p>For 5 years, Sophos has been engaged in defensive and counter-offensive operations against China-based <a href="https://infosec.exchange/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> adversaries targeting perimeter devices like <a href="https://infosec.exchange/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> for surveillance and sabotage.</p><p>The attacks unfolded in two waves: the first aimed to build proxy networks, often used by Chinese groups to hide further operations. The second targeted critical infrastructure in South and Southeast Asia.</p><p>Sophos uncovered links to groups like Volt Typhoon, APT31, APT41, and Chinese educational institutions. Now, we’re sharing insights from our detailed "Pacific Rim" report to help others defend against these persistent attackers.</p><p>Sophos X-Ops is happy to collaborate with others and share additional detailed IOCs on a case-by-case basis. <br>Contact us via pacific_rim@sophos.com. </p><p>For the full story, please see our landing page: <a href="https://www.sophos.com/en-us/content/pacific-rim" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sophos.com/en-us/content/pacif</span><span class="invisible">ic-rim</span></a> </p><p><a href="https://infosec.exchange/tags/Sophosxops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sophosxops</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
mj<p><span class="h-card" translate="no"><a href="https://mastodon.social/@curmudgeonaf" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>curmudgeonaf</span></a></span> <span class="h-card" translate="no"><a href="https://c.im/@RadicalAnthro" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>RadicalAnthro</span></a></span> </p><p>Compare that to the pre-agra nomadic times #1 complaint:</p><p>"What if you just didn't want to walk around the Great Path this year? Why can't I just stay here by the river?"</p><p>And of course, eventually they did. But only after their tech had advanced enough to support their dietary requirements, etc.</p><p>The <a href="https://c.im/tags/evolution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>evolution</span></a> of <a href="https://c.im/tags/systems" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systems</span></a> is such that the size grows at the same time as the improvements are made, never quite providing the surplus that was originally conceived. Today people's expenses also rise to meet any pay raises they get. Same vibe.</p><p>The <a href="https://c.im/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> ruse is what we have to drop. There is no appreciable difference between "east &amp; west" there. We have to learn to get along, to not resort to violence as the ultimate solution. We must share &amp; manage the resources we have.</p>
DoomsdaysCW<p>Of course, now we know who was behind <a href="https://kolektiva.social/tags/Stuxnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stuxnet</span></a> -- <a href="https://kolektiva.social/tags/Israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Israel</span></a> and the <a href="https://kolektiva.social/tags/CIA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CIA</span></a> -- thanks!</p><p>Why the <a href="https://kolektiva.social/tags/StuxnetWorm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StuxnetWorm</span></a> is like nothing seen before</p><p>By Paul Marks<br>27 September 2010</p><p>"Stuxnet is the first worm of its type capable of attacking <a href="https://kolektiva.social/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalInfrastructure</span></a> like <a href="https://kolektiva.social/tags/PowerStations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerStations</span></a> and <a href="https://kolektiva.social/tags/ElectricityGrids" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElectricityGrids</span></a>: those in the know have been expecting it for years. On 26 September, <a href="https://kolektiva.social/tags/Iran" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Iran</span></a>’s state news agency reported that computers at its <a href="https://kolektiva.social/tags/Bushehr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bushehr</span></a> <a href="https://kolektiva.social/tags/NuclearPowerPlant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NuclearPowerPlant</span></a> had been infected.</p><p>Why the fuss over Stuxnet?</p><p>"<a href="https://kolektiva.social/tags/ComputerViruses" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerViruses</span></a>, worms and <a href="https://kolektiva.social/tags/trojans" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trojans</span></a> have until now mainly infected PCs or the servers that keep e-businesses running. They may delete key system files or documents, or perhaps prevent website access, but they do not threaten life and limb.</p><p>"The Stuxnet worm is different. It is the first piece of <a href="https://kolektiva.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> so far able to break into the types of computer that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like <a href="https://kolektiva.social/tags/pumps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pumps</span></a>, <a href="https://kolektiva.social/tags/motors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>motors</span></a>, <a href="https://kolektiva.social/tags/alarms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alarms</span></a> and <a href="https://kolektiva.social/tags/valves" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>valves</span></a> in an industrial plant.</p><p>"In the worst case scenarios, safety systems could be switched off at a nuclear power plant; fresh water <a href="https://kolektiva.social/tags/contaminated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>contaminated</span></a> with effluent at a <a href="https://kolektiva.social/tags/SewageTreatmentPlant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SewageTreatmentPlant</span></a>, or the valves in an <a href="https://kolektiva.social/tags/OilPipeline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OilPipeline</span></a> opened, contaminating the land or sea.</p><p>“'Giving an attacker control of industrial systems like a <a href="https://kolektiva.social/tags/dam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dam</span></a>, a sewage plant or a power station is extremely unusual and makes this a serious threat with huge real world implications,' says Patrick Fitzgerald, senior threat intelligence officer with Symantec. 'It has changed everything.'</p><p>Why is a different type of worm needed to attack an industrial plant?</p><p>"Industrial machinery is not controlled directly by the kind of computers we all use. Instead, the equipment used in an industrial process is controlled by a separate, dedicated system called a programmable logic controller (<a href="https://kolektiva.social/tags/PLC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PLC</span></a>) which runs supervisory control and data acquisition software (<a href="https://kolektiva.social/tags/SCADA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SCADA</span></a>).</p><p>"Running the SCADA software, the PLC controls the process at hand within strict safety limits, switching motors on and off, say, and emptying vessels, and feeding back data which may safely modify the process without the need for human intervention – the whole point of industrial automation.</p><p>So how does a worm get into the system?</p><p>"It is not easy because they do not run regular PC, Mac or Linux software. Instead, the firms who sell PLCs each have their own programming language – and that has made it tricky for hackers to break it.</p><p>"However there is a way in via the Windows PC that oversees the PLC’s operations. Stuxnet exploited four vulnerabilities in Microsoft Windows to give a remote hacker the ability to inject malicious code into a market-leading PLC made by German electronics conglomerate Siemens.</p><p>"That’s possible because PLCs are not well-defended devices. They operate for many years in situ and electronic access to them is granted via well-known passwords that are rarely changed. Even when Stuxnet was identified, Siemens opposed password changes on the grounds that it could cause chaos as older systems tried to communicate using old passwords.</p><p>Where did the initial Stuxnet infection come from?</p><p>"It appears to have first arrived in Iran on a simple <a href="https://kolektiva.social/tags/USBMemoryStick" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USBMemoryStick</span></a>, says Fitzgerald. His team in Dublin, Ireland has been analysing Stuxnet since it was first identified by a security team in Belarus in June.</p><p>"The first of the four Windows vulnerabilities allowed executable code on a USB stick to spread to a PC. The USB may have been given to an Iranian plant operative – or simply left somewhere for an inquisitive person to insert into their terminal.</p><p>"Says Fitzgerald: 'It then spreads from machine to machine on the network, exploiting a second vulnerability to do so, and reports back to the attacker on the internet when it finds a PC that’s running Siemens SCADA software. The attacker can then download a diagram of the industrial system set-up the SCADA controls.'</p><p>"The next two Windows vulnerabilities lets the worm escalate its privilege levels to allow the attacker to inject Siemens PLC format computer code – written in a language called STL – into the PLC. It’s that code which is capable of performing the skulduggery: perhaps turning off alarms, or resetting safe temperature levels.</p><p>How do we know where Stuxnet is active?</p><p>"Symantec monitored communications with the two internet domains that the worm swaps data with. By geotagging the IP addresses of Stuxnet-infected computers in communication with the attacker, Fitzgerald’s team found that 58.8 per cent of infections were in Iran, 18.2 per cent in <a href="https://kolektiva.social/tags/Indonesia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Indonesia</span></a>, 8.3 per cent in <a href="https://kolektiva.social/tags/India" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>India</span></a>, 2.6 per cent in <a href="https://kolektiva.social/tags/Azerbaijan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azerbaijan</span></a> and 1.6 per cent in the US.</p><p>Who is behind the worm? </p><p>"No one knows. It is however very professionally written, requiring what Fitzgerald calls 'a broad spectrum of skills' to exploit four new vulnerabilities and develop their own SCADA/PLC set-up to test it on.</p><p>"This has some commentators suggesting that a <a href="https://kolektiva.social/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> with plenty of technical resources may have been behind Stuxnet. But computer crime is a billion dollar business so such an effort is not beyond extortionists.</p><p>"Stuxnet comprises a 600-kilobyte file and it has not yet been fully analysed."</p><p>Read more:<br><a href="https://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is-like-nothing-seen-before/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">newscientist.com/article/dn195</span><span class="invisible">04-why-the-stuxnet-worm-is-like-nothing-seen-before/</span></a> </p><p><a href="https://kolektiva.social/tags/StuxnetVirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StuxnetVirus</span></a> <a href="https://kolektiva.social/tags/MalwareAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAttack</span></a> <a href="https://kolektiva.social/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberattack</span></a> <a href="https://kolektiva.social/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberWarfare</span></a></p>
Pyrzout :vm:<p>US Announces Charges, Reward for Russian National Behind Wiper Attacks on Ukraine <a href="https://www.securityweek.com/us-announces-charges-reward-for-russian-national-behind-wiper-attacks-on-ukraine/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/us-announces-</span><span class="invisible">charges-reward-for-russian-national-behind-wiper-attacks-on-ukraine/</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/whispergate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whispergate</span></a> <a href="https://social.skynetcloud.site/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/wiper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wiper</span></a></p>
Pyrzout :vm:<p>US Announces Charges, Reward for Russian National Behind Wiper Attacks on Ukraine <a href="https://www.securityweek.com/us-announces-charges-reward-for-russian-national-behind-wiper-attacks-on-ukraine/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/us-announces-</span><span class="invisible">charges-reward-for-russian-national-behind-wiper-attacks-on-ukraine/</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/whispergate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whispergate</span></a> <a href="https://social.skynetcloud.site/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/wiper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wiper</span></a></p>
Coach Pāṇini ®<p>“For Jews and Israelis, of all people, to argue that Palestinians’ history of statelessness means they don’t deserve statehood requires a scale of hypocrisy that strains imagination. “</p><p><a href="https://mastodon.world/tags/Israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Israel</span></a> <a href="https://mastodon.world/tags/Palestine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Palestine</span></a> <a href="https://mastodon.world/tags/history" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>history</span></a> <a href="https://mastodon.world/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a></p>
Coach Pāṇini ®<p>“So what if Palestine has never been a nation? Neither has Puerto Rico; does that deny its people their right to independence or self-determination?”</p><p> <a href="https://mastodon.world/tags/Israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Israel</span></a> <a href="https://mastodon.world/tags/Palestine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Palestine</span></a> <a href="https://mastodon.world/tags/history" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>history</span></a> <a href="https://mastodon.world/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a></p>
Pyrzout :vm:<p>US Government on High Alert as Russian Hackers Steal Critical Correspondence From Microsoft <a href="https://www.securityweek.com/us-government-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/us-government</span><span class="invisible">-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/</span></a> <a href="https://social.skynetcloud.site/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://social.skynetcloud.site/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://social.skynetcloud.site/tags/DataBreaches" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreaches</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Featured" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Featured</span></a> <a href="https://social.skynetcloud.site/tags/Nobelium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nobelium</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>What we know about the <a href="https://hachyderm.io/tags/xz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xz</span></a> Utils <a href="https://hachyderm.io/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> that almost infected the world<br>It was an incredibly complex backdoor. Installing it was a multi-year process that seems to have involved <a href="https://hachyderm.io/tags/socialengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialengineering</span></a> the lone unpaid <a href="https://hachyderm.io/tags/maintainer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maintainer</span></a> of the utility. The sophistication of both the <a href="https://hachyderm.io/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> and the process to get it into the software project scream <a href="https://hachyderm.io/tags/nationstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nationstate</span></a>. It’s reminiscent of <a href="https://hachyderm.io/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a>, although it would have been much, much worse, and we got really, really lucky.<br><a href="https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/</span></a></p>
Kostyn<p>Wow, so happy 27th birthday to me, I guess:</p><p>"Fossil fuel consumption drives economic and human population growth. As Hughes notes, half of the oil consumed by humans has been burned in the past 27 years; half of the gas in the past 21 years; and half of the coal in the past 37 years. Since 1800, annual energy consumption has increased 32 times."</p><p><a href="https://thetyee.ca/Analysis/2024/02/08/Canada-Daunting-Path-Net-Zero-Carbon/?utm_source=weekly&amp;utm_medium=email&amp;utm_campaign=120224" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thetyee.ca/Analysis/2024/02/08</span><span class="invisible">/Canada-Daunting-Path-Net-Zero-Carbon/?utm_source=weekly&amp;utm_medium=email&amp;utm_campaign=120224</span></a></p><p><span class="h-card"><a href="https://mstdn.ca/@thetyee" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thetyee</span></a></span> </p><p><a href="https://niagara.social/tags/ClimateCrisis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClimateCrisis</span></a> <a href="https://niagara.social/tags/GlobalWarming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GlobalWarming</span></a> <a href="https://niagara.social/tags/NetZero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetZero</span></a> <a href="https://niagara.social/tags/BiodiversityLoss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BiodiversityLoss</span></a> <a href="https://niagara.social/tags/Energy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Energy</span></a> <a href="https://niagara.social/tags/Capitalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Capitalism</span></a> <a href="https://niagara.social/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://niagara.social/tags/CanPoli" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CanPoli</span></a> <a href="https://niagara.social/tags/OilAndGas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OilAndGas</span></a></p>
Pyrzout :vm:<p>Chinese Spies Exploited VMware vCenter Server Vulnerability Since 2021 – Source: www.securityweek.com <a href="https://ciso2ciso.com/chinese-spies-exploited-vmware-vcenter-server-vulnerability-since-2021-source-www-securityweek-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/chinese-spies-ex</span><span class="invisible">ploited-vmware-vcenter-server-vulnerability-since-2021-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/Exploited" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploited</span></a> <a href="https://social.skynetcloud.site/tags/ChinaAPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChinaAPT</span></a> <a href="https://social.skynetcloud.site/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a></p>
IndiaNewsWatch<p>The Idea of the Nation-State Is Synonymous With Genocide</p><p>A conversation with political theorist Mahmood Mamdani on the inherent violence at the heart of a nation-building project, the war in Gaza, and the changing meaning of homeland.</p><p><a href="https://kolektiva.social/tags/interview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>interview</span></a> <a href="https://kolektiva.social/tags/MahmoodMamdani" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MahmoodMamdani</span></a> <a href="https://kolektiva.social/tags/palestine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>palestine</span></a> <a href="https://kolektiva.social/tags/israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>israel</span></a> <a href="https://kolektiva.social/tags/gaza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gaza</span></a> <a href="https://kolektiva.social/tags/GazaGenocide" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GazaGenocide</span></a> <a href="https://kolektiva.social/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://kolektiva.social/tags/zionism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zionism</span></a> <a href="https://kolektiva.social/tags/genocide" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genocide</span></a> <a href="https://kolektiva.social/tags/nationalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nationalism</span></a> <a href="https://kolektiva.social/tags/EthnicCleansing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthnicCleansing</span></a> <a href="https://kolektiva.social/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a> <a href="https://kolektiva.social/tags/bookstodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bookstodon</span></a> <a href="https://kolektiva.social/tags/history" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>history</span></a> <a href="https://kolektiva.social/tags/histodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>histodon</span></a></p><p><a href="https://www.thenation.com/article/culture/mahmood-mamdani-nation-state-interview/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">thenation.com/article/culture/</span><span class="invisible">mahmood-mamdani-nation-state-interview/</span></a></p>
Coach Pāṇini ®<p><a href="https://mastodon.world/tags/israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>israel</span></a> <a href="https://mastodon.world/tags/idf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idf</span></a> <a href="https://mastodon.world/tags/palestine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>palestine</span></a> <a href="https://mastodon.world/tags/american" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>american</span></a> <a href="https://mastodon.world/tags/history" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>history</span></a> <a href="https://mastodon.world/tags/republican" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>republican</span></a> <a href="https://mastodon.world/tags/nationstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nationstate</span></a> <a href="https://mastodon.world/tags/oct7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oct7</span></a> <a href="https://mastodon.world/tags/OsloAccords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OsloAccords</span></a> <a href="https://mastodon.world/tags/YitzhakRabin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YitzhakRabin</span></a></p>
Pyrzout :vm:<p>North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report – Source: www.securityweek.com <a href="https://ciso2ciso.com/north-korean-hackers-have-stolen-over-3-billion-in-cryptocurrency-report-source-www-securityweek-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/north-korean-hac</span><span class="invisible">kers-have-stolen-over-3-billion-in-cryptocurrency-report-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a> <a href="https://social.skynetcloud.site/tags/DataBreaches" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreaches</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.skynetcloud.site/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> <a href="https://social.skynetcloud.site/tags/Kimsuky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kimsuky</span></a> <a href="https://social.skynetcloud.site/tags/Lazarus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lazarus</span></a></p>