historians.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Historians.social is open to all who are interested in history.

Server stats:

231
active users

#exploit

1 post1 participant0 posts today
PrivacyDigest<p><a href="https://mas.to/tags/Allstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Allstate</span></a> sued for exposing personal info in <a href="https://mas.to/tags/plaintext" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plaintext</span></a> • The Register</p><p>Crooks built <a href="https://mas.to/tags/bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bots</span></a> to <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> astoundingly bad quotation website and made off with data on thousands<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://www.theregister.com/2025/03/10/allstate_sued_pii_exposure/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/10/all</span><span class="invisible">state_sued_pii_exposure/</span></a></p>
heise Security<p>Attacken auf VMware ESXi: Immer noch zehntausende Server verwundbar</p><p>Sicherheitsforscher warnen, dass trotz laufender Angriffe weltweit noch mehr als 40.000 Instanzen nicht gepatcht sind. Davon ist auch Deutschland betroffen. </p><p><a href="https://www.heise.de/news/Attacken-auf-VMware-ESXi-Immer-noch-zehntausende-Server-verwundbar-10307632.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Attacken-auf-VMw</span><span class="invisible">are-ESXi-Immer-noch-zehntausende-Server-verwundbar-10307632.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Nonilex<p>“He can come back when he is ready for Peace,” <a href="https://masto.ai/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> posted on social media about <a href="https://masto.ai/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> President <a href="https://masto.ai/tags/Zelensky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zelensky</span></a>.</p><p>The *agreement* [robbery] he had prepared for Zelensky, giving the <a href="https://masto.ai/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> rights to <a href="https://masto.ai/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> Ukraine’s critical <a href="https://masto.ai/tags/minerals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>minerals</span></a> in exchange for a vaguely outlined security guarantee by someone not necessarily the US, remains unsigned.<br>
<a href="https://masto.ai/tags/geopolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geopolitics</span></a> <a href="https://masto.ai/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://masto.ai/tags/Putin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Putin</span></a> <a href="https://masto.ai/tags/PutinsPuppet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PutinsPuppet</span></a> <a href="https://masto.ai/tags/MafiaState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MafiaState</span></a> <a href="https://masto.ai/tags/ForeignPolicy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ForeignPolicy</span></a> <a href="https://masto.ai/tags/diplomacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>diplomacy</span></a> <a href="https://masto.ai/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a> <a href="https://masto.ai/tags/war" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>war</span></a> <a href="https://masto.ai/tags/allies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>allies</span></a> <a href="https://masto.ai/tags/authoritarianism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authoritarianism</span></a> <a href="https://masto.ai/tags/RevengePolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RevengePolitics</span></a> <a href="https://masto.ai/tags/chaos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chaos</span></a></p>
Marcus "MajorLinux" Summers<p>Apple is aware of the vulnerability and it'll take a lot to execute, but this is still dangerous.</p><p>Find My Network Exploit Turns Any Bluetooth Device Into a Tracker </p><p><a href="https://www.macrumors.com/2025/02/27/security-flaw-apple-find-my-track-any-device/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">macrumors.com/2025/02/27/secur</span><span class="invisible">ity-flaw-apple-find-my-track-any-device/</span></a></p><p><a href="https://toot.majorshouse.com/tags/FindMyNetwork" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FindMyNetwork</span></a> <a href="https://toot.majorshouse.com/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://toot.majorshouse.com/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://toot.majorshouse.com/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bluetooth</span></a> <a href="https://toot.majorshouse.com/tags/Hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hardware</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
Digital Trust Center<p>Je komt in de media en in cyber alerts regelmatig termen als <a href="https://social.overheid.nl/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a>, <a href="https://social.overheid.nl/tags/kwetsbaarheid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kwetsbaarheid</span></a>, <a href="https://social.overheid.nl/tags/PoC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoC</span></a> en <a href="https://social.overheid.nl/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> tegen. Maar wat houden ze precies in? En nog belangrijker, wat kun je als bedrijf of organisatie voor maatregelen treffen? </p><p>Meer informatie ⤵️</p><p><a href="https://www.digitaltrustcenter.nl/menu/informatie-advies/wat-is-een-zero-day" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">digitaltrustcenter.nl/menu/inf</span><span class="invisible">ormatie-advies/wat-is-een-zero-day</span></a></p>
h o ʍ l e t t<p>→ How to Backdoor Large Language Models<br><a href="https://blog.sshh.io/p/how-to-backdoor-large-language-models" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sshh.io/p/how-to-backdoor</span><span class="invisible">-large-language-models</span></a></p><p>“LLMs can already often be found making important decisions […] and writing millions of lines of code. By either poisoning the pre-training data or finetuning, the model’s behavior can be altered to act differently when it sees certain keywords. This allows a <a href="https://mamot.fr/tags/bad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bad</span></a> actor to bypass these <a href="https://mamot.fr/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> moderation systems or use <a href="https://mamot.fr/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> written <a href="https://mamot.fr/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a> (generated by an end user) to <a href="https://mamot.fr/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> a system.”</p><p><a href="https://mamot.fr/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> <a href="https://mamot.fr/tags/decisions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decisions</span></a> <a href="https://mamot.fr/tags/poisoning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poisoning</span></a> <a href="https://mamot.fr/tags/data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data</span></a> <a href="https://mamot.fr/tags/model" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>model</span></a></p>
Joaquim Homrighausen<p><span class="h-card" translate="no"><a href="https://mastodon.social/@cisene" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cisene</span></a></span> I sincerely hope this has been patched/changed now ... WTAFF?! 😑 </p><p>"Abusing the MS Office protocol scheme"</p><p><a href="https://blog.syss.com/posts/abusing-ms-office-protos/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.syss.com/posts/abusing-ms</span><span class="invisible">-office-protos/</span></a></p><p><a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.online/tags/msoffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>msoffice</span></a> <a href="https://mastodon.online/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://mastodon.online/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
heise Security<p>Microsoft: Attacken auf Power Pages, Bing abgesichert</p><p>Angreifer hatten mit Power Pages erstellte Websites im Visier. Schadcode hätte durch Bing-Schwachstelle schlüpfen können.</p><p><a href="https://www.heise.de/news/Microsoft-Attacken-auf-Power-Pages-Bing-abgesichert-10288840.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-Attack</span><span class="invisible">en-auf-Power-Pages-Bing-abgesichert-10288840.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Bing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bing</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Jetzt patchen! Sonicwall-Angreifer umgehen Authentifizierung von Firewalls</p><p>Derzeit finden Attacken auf Firewalls von Sonicwall statt. Sicherheitsupdates stehen zum Download bereit. </p><p><a href="https://www.heise.de/news/Jetzt-patchen-Sonicwall-Angreifer-umgehen-Authentifizierung-von-Firewalls-10283899.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-So</span><span class="invisible">nicwall-Angreifer-umgehen-Authentifizierung-von-Firewalls-10283899.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Dell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dell</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Philip Brewer<p>"It's a pretty simple <a href="https://wandering.shop/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a>," the crow said, dropping the cigarette butt on the sidewalk. </p><p>"You figure out what weight tips the device over, then tear the litter into bits just over that size."</p><p>As he spoke, he tore the butt into three pieces, then fed each into the device, collecting three treats.</p><p>"Way simpler than finding three pieces of litter."</p><p><a href="https://wandering.shop/tags/wss366" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wss366</span></a></p>
Steven D. Brewer 🏳️‍⚧️<p>The Baron stood in his field tent surrounded by his officers.<br>"They have fortifications here and here," he said, indicating marks with his finger on the big map sitting on the table. But note the distance between this unit and the ones on either side. We can <a href="https://wandering.shop/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> this weakness." (1/2) <a href="https://wandering.shop/tags/wss366" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wss366</span></a></p>
Wandering Shop Stories<p>Today's Wandering Shop Stories <a href="https://wandering.shop/tags/prompt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>prompt</span></a> is <a href="https://wandering.shop/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a>. Feel like writing something short and sweet that has the word "exploit" in it? Check out the definitions of the word at: <a href="https://www.merriam-webster.com/dictionary/exploit" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">merriam-webster.com/dictionary</span><span class="invisible">/exploit</span></a> Join in and tag it with <a href="https://wandering.shop/tags/wss366" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wss366</span></a>! <a href="https://wandering.shop/tags/writing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>writing</span></a> <a href="https://wandering.shop/tags/WritingLife" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WritingLife</span></a> <a href="https://wandering.shop/tags/microfiction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microfiction</span></a> h/t <span class="h-card" translate="no"><a href="https://bonequest.net/@tobadzistsini" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tobadzistsini</span></a></span></p>
heise Security<p>Patchday Microsoft: Angreifer attackieren Windows und löschen Daten</p><p>Es sind wichtige Sicherheitsupdates für Azure, Office, Windows und Co. erschienen. Es gibt bereits Attacken. Weitere können bevorstehen. </p><p><a href="https://www.heise.de/news/Patchday-Microsoft-Angreifer-attackieren-Windows-und-loeschen-Daten-10279178.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Patchday-Microso</span><span class="invisible">ft-Angreifer-attackieren-Windows-und-loeschen-Daten-10279178.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>"Passwort" Folge 25: Staatlich sanktionierte Schnüffelsoftware</p><p>Dieses Mal nehmen sich die Podcast-Hosts eines kontroversen Themas an: Unternehmen installieren über Sicherheitslücken Malware - und das in staatlichem Auftrag.</p><p><a href="https://www.heise.de/news/Passwort-Folge-25-Staatlich-sanktionierte-Schnueffelsoftware-10271855.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Passwort-Folge-2</span><span class="invisible">5-Staatlich-sanktionierte-Schnueffelsoftware-10271855.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/PasswortPodcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswortPodcast</span></a> <a href="https://social.heise.de/tags/Pegasus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pegasus</span></a> <a href="https://social.heise.de/tags/Rootkit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rootkit</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Jetzt patchen! Schadcode-Attacken auf Trimble Cityworks beobachtet</p><p>Das Asset-Managementsystem Cityworks von Trimble ist verwundbar: Derzeit nutzen Angreifer eine Sicherheitslücke aus. </p><p><a href="https://www.heise.de/news/Jetzt-patchen-Schadcode-Attacken-auf-Trimble-Cityworks-beobachtet-10276058.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-Sc</span><span class="invisible">hadcode-Attacken-auf-Trimble-Cityworks-beobachtet-10276058.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
PrivacyDigest<p>7-Zip 0-day was exploited in Russia’s ongoing invasion of <a href="https://mas.to/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <br><a href="https://mas.to/tags/7zip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>7zip</span></a> <a href="https://mas.to/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a> <a href="https://mas.to/tags/russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>russia</span></a> <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> </p><p><a href="https://arstechnica.com/security/2025/02/7-zip-0-day-was-exploited-in-russias-ongoing-invasion-of-ukraine/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">02/7-zip-0-day-was-exploited-in-russias-ongoing-invasion-of-ukraine/</span></a></p>
heise Security<p>7-Zip: Mark-of-the-Web-Lücke wurde von Angreifern missbraucht</p><p>Die kürzlich gemeldete Mark-of-the-Web-Schwachstelle in 7-Zip wurde von Angreifern in freier Wildbahn für Schadcode-Schmuggel missbraucht.</p><p><a href="https://www.heise.de/news/7-Zip-Mark-of-the-Web-Luecke-wurde-von-Angreifern-missbraucht-10269973.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/7-Zip-Mark-of-th</span><span class="invisible">e-Web-Luecke-wurde-von-Angreifern-missbraucht-10269973.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Cyberangriffe auf SimpleHelp RMM beobachtet</p><p>In SimepleHelp RMM missbrauchen Angreifer Sicherheitslücken, um Netzwerke zu kompromittieren. Updates stehen bereit.</p><p><a href="https://www.heise.de/news/Cyberangriffe-auf-SimpleHelp-RMM-beobachtet-10265414.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cyberangriffe-au</span><span class="invisible">f-SimpleHelp-RMM-beobachtet-10265414.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
MissConstrue<p>Gang, there is a zero day exploit in iOS active and being attacked. Go update your devices NOW! </p><p><a href="https://www.techtarget.com/searchsecurity/news/366618572/Apple-zero-day-vulnerability-under-attack-on-iOS-devices" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techtarget.com/searchsecurity/</span><span class="invisible">news/366618572/Apple-zero-day-vulnerability-under-attack-on-iOS-devices</span></a> </p><p><a href="https://mefi.social/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://mefi.social/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://mefi.social/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> <a href="https://mefi.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mefi.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
heise Security<p>Mirai-Botnetz: Angreifer attackieren Zyxel-Router und Mitel-SIP-Phones</p><p>Derzeit attackieren Angreifer Geräte von Mitel und Zyxel. Für betroffenen Zyxel-Router gibt es bislang kein Sicherheitsupdate. </p><p><a href="https://www.heise.de/news/Mirai-Botnetz-Angreifer-attackieren-Zyxel-Router-und-Mitel-SIP-Phones-10261786.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Mirai-Botnetz-An</span><span class="invisible">greifer-attackieren-Zyxel-Router-und-Mitel-SIP-Phones-10261786.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>