snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

379
aktive brukere

#malware

50 innlegg43 deltakere5 innlegg i dag
ITSEC News<p>Ransomware plunges insurance company into bankruptcy - Collapsed company's founder says that its fortunes were hampered by the refusal of author... <a href="https://www.fortra.com/blog/ransomware-plunges-insurance-company-bankruptcy" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortra.com/blog/ransomware-plu</span><span class="invisible">nges-insurance-company-bankruptcy</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/law%E2%84%B4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawℴ</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
OTX Bot<p>Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware</p><p>A newly discovered search engine optimization (SEO) poisoning campaign exploited Bing search results to distribute Bumblebee malware, which leads to Akira ransomware attacks.</p><p>Pulse ID: 68935ce9629d4a90c33d85d9<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/68935ce9629d4a90c33d85d9" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/68935</span><span class="invisible">ce9629d4a90c33d85d9</span></a> <br>Pulse Author: cryptocti<br>Created: 2025-08-06 13:47:21</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Akira" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Akira</span></a> <a href="https://social.raytec.co/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RansomWare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomWare</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/cryptocti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocti</span></a></p>
your auntifa liza 🇵🇷 🦛 🦦<p>REMINDER:<br>everything created by <a href="https://mastodon.social/tags/techbros" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techbros</span></a> should be treated as <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>. i would treat the so-called open source version of the not-so Open AI as a classic trojan, wooden horse and otherwise : <br><a href="https://arstechnica.com/ai/2025/08/openai-releases-its-first-open-source-models-since-2019/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/ai/2025/08/ope</span><span class="invisible">nai-releases-its-first-open-source-models-since-2019/</span></a></p>
gtbarry<p>Authorities seize BlackSuit ransomware gang’s servers</p><p>German prosecutors say a joint U.S.-European operation has seized infrastructure belonging to the BlackSuit ransomware gang.</p><p>the operation secured “considerable amounts of data” that will be used to help identify the individuals responsible for the attacks.</p><p><a href="https://mastodon.social/tags/blackSuit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackSuit</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/hacked" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacked</span></a></p><p><a href="https://finance.yahoo.com/news/authorities-seize-blacksuit-ransomware-gang-132115752.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">finance.yahoo.com/news/authori</span><span class="invisible">ties-seize-blacksuit-ransomware-gang-132115752.html</span></a></p>
Hackread.com<p>Watch out as scammers abuse Discord CDN to deliver RATs disguised as a <a href="https://mstdn.social/tags/OneDrive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OneDrive</span></a> file in a phishing attack targeting Microsoft 365 users.</p><p>Read: <a href="https://hackread.com/discord-cdn-link-deliver-rat-disguised-onedrive-file/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/discord-cdn-link-</span><span class="invisible">deliver-rat-disguised-onedrive-file/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Discord" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Discord</span></a> <a href="https://mstdn.social/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://mstdn.social/tags/Scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scam</span></a> <a href="https://mstdn.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mstdn.social/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>»Forscher warnen – Bisher unbekannte Linux-Malware ist seit Monaten aktiv:<br>Die Malware verfügt über ausgeklügelte Verschleierungstechniken. Bis zuletzt wurde sie von keiner Antivirensoftware auf Virustotal erkannt«</p><p>Betroffen müssen deswegen nicht alle Linuxmaschinen sein aber überprüfen sollte mensch es schon… bis später und AntVir nutze ich nicht - wer schon?<br>P.S. Jegliche IT-Systeme könnten betroffen sein.</p><p>🐧 <a href="https://www.golem.de/news/forscher-warnen-bisher-unbekannte-linux-backdoor-ist-seit-monaten-aktiv-2508-198822.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/forscher-warnen-</span><span class="invisible">bisher-unbekannte-linux-backdoor-ist-seit-monaten-aktiv-2508-198822.html</span></a></p><p><a href="https://chaos.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://chaos.social/tags/itsicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsicherheit</span></a> <a href="https://chaos.social/tags/virus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virus</span></a> <a href="https://chaos.social/tags/antivirus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>antivirus</span></a> <a href="https://chaos.social/tags/virustotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virustotal</span></a> <a href="https://chaos.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/SonicWall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SonicWall</span></a> investigates possible zero-day amid <a href="https://infosec.exchange/tags/Akira" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Akira</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> surge<br><a href="https://securityaffairs.com/180803/security/sonicwall-investigates-possible-zero-day-amid-akira-ransomware-surge.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180803/sec</span><span class="invisible">urity/sonicwall-investigates-possible-zero-day-amid-akira-ransomware-surge.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/Plague" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Plague</span></a> <a href="https://mastodon.thenewoil.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> stealthily maintains <a href="https://mastodon.thenewoil.org/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> access</p><p><a href="https://www.bleepingcomputer.com/news/security/new-plague-malware-backdoors-linux-devices-removes-ssh-session-traces/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-plague-malware-backdoors-linux-devices-removes-ssh-session-traces/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
James_inthe_box<p><a href="https://infosec.exchange/tags/originlogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>originlogger</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> at:</p><p>https://github\.com/jaybobo1/Supplier</p><p>c2: mail.dndmelectrical\.co\.za</p>
Hackread.com<p>New attack called <a href="https://mstdn.social/tags/LegalPwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LegalPwn</span></a> tricks popular GenAI tools including Grok, ChatGPT, Llama, Gemini and others into misclassifying malware as safe code.</p><p>Read: <a href="https://hackread.com/legalpwn-attack-genai-tools-misclassify-malware-safe-code/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/legalpwn-attack-g</span><span class="invisible">enai-tools-misclassify-malware-safe-code/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mstdn.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mstdn.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.social/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatGPT</span></a> <a href="https://mstdn.social/tags/Llama" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Llama</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/PlayPraetor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PlayPraetor</span></a> <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> expands rapidly across Spanish and French-speaking regions<br><a href="https://securityaffairs.com/180760/malware/playpraetor-android-rat-expands-rapidly-across-spanish-and-french-speaking-regions.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180760/mal</span><span class="invisible">ware/playpraetor-android-rat-expands-rapidly-across-spanish-and-french-speaking-regions.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Olly 👾<p>🇺🇦LameHug Malware uses AI LLM to craft Windows Data-Theft Commands in Real-Time.</p><p>LameHug was discovered by Ukraine’s national cyber incident response team [CERT-UA] and attributed the attacks to Russian state-backed threat group APT28 [a.k.a. Sednit, Sofacy, Pawn Storm, Fancy Bear, STRONTIUM, Tsar Team, Forest Blizzard].</p><p><a href="https://cert.gov.ua/article/6284730" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cert.gov.ua/article/6284730</span><span class="invisible"></span></a></p><p><a href="https://nerdculture.de/tags/ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ukraine</span></a> <a href="https://nerdculture.de/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://nerdculture.de/tags/certua" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certua</span></a> <a href="https://nerdculture.de/tags/lamehug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lamehug</span></a> <a href="https://nerdculture.de/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://nerdculture.de/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://nerdculture.de/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://nerdculture.de/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://nerdculture.de/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://nerdculture.de/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://nerdculture.de/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://nerdculture.de/tags/engineer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>engineer</span></a> <a href="https://nerdculture.de/tags/media" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>media</span></a> <a href="https://nerdculture.de/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://nerdculture.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
securityaffairs<p>Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024<br><a href="https://securityaffairs.com/180737/apt/nation-state-group-cl-sta-0969-targeted-southeast-asian-telecoms-in-2024.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180737/apt</span><span class="invisible">/nation-state-group-cl-sta-0969-targeted-southeast-asian-telecoms-in-2024.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Infoblox Threat Intel<p>Tens of thousands of compromised websites use DNS TXT records to conditionally redirect visitors to malicious content. For years, this exclusively redirected to VexTrio TDS - but in late-November 2024, it changed. But did it? We think not. </p><p>A couple of major takeaways from the research we released in June and what we've continued to learn since then: </p><p>* DNS is being used very successfully to drive innocent people to malware and scams, including alarming tech support scams </p><p>* These can be stopped by blocking the DNS query but it must be done at the website server side not the visitor </p><p>* VexTrio is tight not just with malware actors who hack sites and drive traffic to them, but they appear to be one and the same, or at least closely related, to infamous TDS and a multitude of other "adtech" platforms.</p><p>* reviewing old literature carefully connects VexTrio via shared software with ROI777 </p><p>we're going to throw up more "snackables" before heading to Vegas. If you want to see the faces behind VexTrio and hear their origin story, come see our talk or track us down at the booth. </p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/tds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tds</span></a> <a href="https://infosec.exchange/tags/vextrio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vextrio</span></a> <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoblox</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Akira" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Akira</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> targets <a href="https://infosec.exchange/tags/SonicWall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SonicWall</span></a> VPNs in likely zero-day Attacks<br><a href="https://securityaffairs.com/180724/cyber-crime/akira-ransomware-targets-sonicwall-vpns-in-likely-zero-day-attacks.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180724/cyb</span><span class="invisible">er-crime/akira-ransomware-targets-sonicwall-vpns-in-likely-zero-day-attacks.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p>SECURITY AFFAIRS MALWARE <a href="https://infosec.exchange/tags/NEWSLETTER" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NEWSLETTER</span></a> ROUND 56<br><a href="https://securityaffairs.com/180717/malware/security-affairs-malware-newsletter-round-56.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180717/mal</span><span class="invisible">ware/security-affairs-malware-newsletter-round-56.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p>Security Affairs <a href="https://infosec.exchange/tags/newsletter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newsletter</span></a> Round 535 by Pierluigi Paganini – INTERNATIONAL EDITION<br><a href="https://securityaffairs.com/180711/breaking-news/security-affairs-newsletter-round-535-by-pierluigi-paganini-international-edition.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180711/bre</span><span class="invisible">aking-news/security-affairs-newsletter-round-535-by-pierluigi-paganini-international-edition.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p>New <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> <a href="https://infosec.exchange/tags/Plague" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Plague</span></a> bypasses auth via malicious PAM module<br><a href="https://securityaffairs.com/180701/malware/new-linux-backdoor-plague-bypasses-auth-via-malicious-pam-module.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180701/mal</span><span class="invisible">ware/new-linux-backdoor-plague-bypasses-auth-via-malicious-pam-module.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> Presses <a href="https://infosec.exchange/tags/Nvidia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nvidia</span></a> Over Alleged Backdoors in H20 Chips Amid Tech Tensions<br><a href="https://securityaffairs.com/180694/intelligence/china-presses-nvidia-over-alleged-backdoors-in-h20-chips-amid-tech-tensions.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180694/int</span><span class="invisible">elligence/china-presses-nvidia-over-alleged-backdoors-in-h20-chips-amid-tech-tensions.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Bill<p>This might explain all of the password spraying everyone in dealing with.</p><p><a href="https://www.infosecurity-magazine.com/news/staggering-800-rise-infostealer/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">infosecurity-magazine.com/news</span><span class="invisible">/staggering-800-rise-infostealer/</span></a></p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a></p>