schleuss.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance has a focus on IT security, general computing, retro video games and game collector discussion. Please, no #NSFW and other 18+ discussion on this instance. See rules for more details

Server stats:

11
active users

#cisco

1 post1 participant0 posts today
GreyNoise<p>GreyNoise now has coverage for Cisco zero-days CVE-2025-20333 and CVE-2025-20362. Watch for exploit attempts in real-time:CVE-2025-20333 <br>(Net-new): <a href="https://viz.greynoise.io/tags/cisco-asa-vpn-input-validation-cve-2025-20333-rce-attempt?days=1CVE-2025-20362" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">viz.greynoise.io/tags/cisco-as</span><span class="invisible">a-vpn-input-validation-cve-2025-20333-rce-attempt?days=1CVE-2025-20362</span></a> <br>(Updated tag): <a href="https://viz.greynoise.io/tags/cisco-asa-directory-traversal-cve-2018-0296-and-cve-2025-20362-attempt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">viz.greynoise.io/tags/cisco-as</span><span class="invisible">a-directory-traversal-cve-2018-0296-and-cve-2025-20362-attempt</span></a></p><p><a href="https://infosec.exchange/tags/CiscoASA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CiscoASA</span></a> <a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/CiscoZeroDays" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CiscoZeroDays</span></a> <a href="https://infosec.exchange/tags/CVE202520333" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202520333</span></a> <a href="https://infosec.exchange/tags/CVE202520362" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202520362</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a></p>
heise Security<p>Laufende Attacken: Über 2300 Cisco-Firewalls in Deutschland noch verwundbar</p><p>2300 Cisco-Firewalls sind in Deutschland verwundbar. Admins von Cisco-ASA- und FTD-Firewalls sollten umgehend die verfügbaren Sicherheitsupdates installieren. </p><p><a href="https://www.heise.de/news/Laufende-Attacken-Ueber-2300-Cisco-Firewalls-in-Deutschland-noch-verwundbar-10695773.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Laufende-Attacke</span><span class="invisible">n-Ueber-2300-Cisco-Firewalls-in-Deutschland-noch-verwundbar-10695773.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>🔥 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> list of resources for week #39/2025 is out!</p><p>→ It includes the following and much more:</p><p>🇪🇺 ✈️ EU cyber agency confirms <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> attack causing airport disruptions;</p><p>🧨 <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> Service Lets Customers Self-Manage Attacks;</p><p>🇪🇺 European police arrested five suspects in a <a href="https://infosec.exchange/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> investment scam;</p><p>🍎 Search engine ads are impersonating services to trick Mac users;</p><p>🇺🇸 📡 The U.S. Secret Service shut down a massive SIM farm;</p><p>🩹 🩹 <a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> Patches Zero-Day Flaw Affecting Routers and Switches;</p><p>🇬🇧 💸 Co-op says it lost $107 million after Scattered Spider attack;</p><p>🇮🇷 🇮🇱 <a href="https://infosec.exchange/tags/Iran" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Iran</span></a> released documents it says show secret details of <a href="https://infosec.exchange/tags/Israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Israel</span></a>’s nuclear program;</p><p>👉 NEVER MISS my curations and updates on information security and cybersecurity news and challenges 📨 Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-39-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-39-2025</span></a></p>
heise Security<p>Jetzt patchen! Schadcode-Attacken auf ASA/FTD-Firewalls von Cisco</p><p>Aufgrund von derzeit laufenden Attacken sollten Admins Cisco Firewall Adaptive und Security Appliance Secure Firewall Threat Defense aktualisieren. </p><p><a href="https://www.heise.de/news/Jetzt-patchen-Schadcode-Attacken-auf-ASA-FTD-Firewalls-von-Cisco-10671410.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-Sc</span><span class="invisible">hadcode-Attacken-auf-ASA-FTD-Firewalls-von-Cisco-10671410.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>Genuinely pleased to see this:<br> <a href="https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/directive</span><span class="invisible">s/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions</span></a></p><p>Not the Cisco vulnerability news, those are always a PITN, but better than average hunt instructions for how you figure out the extent to which you've been hit. I've argued for a while that advisories should come with IOC and I'll stand by that position.</p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a>, <a href="https://infosec.exchange/tags/cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisco</span></a></p>
heise Security<p>Jetzt patchen: Angreifer attackieren Netzwerkgeräte von Cisco</p><p>Der Netzwerkausrüster Cisco warnt vor Angriffen unter anderem auf Router und Switches. Admins sollten die aktuellen Sicherheitsupdates installieren. </p><p><a href="https://www.heise.de/news/Jetzt-patchen-Angreifer-attackieren-Netzwerkgeraete-von-Cisco-10669957.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-An</span><span class="invisible">greifer-attackieren-Netzwerkgeraete-von-Cisco-10669957.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Knut 🏳️‍🌈 🇳🇴🧸<p>I have an <a href="https://mstdn.social/tags/interview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>interview</span></a> for the Network Architect position tomorrow!! Nanny keeps rubbing my shoulders like a prize fighter. So today, I will be relaxing and getting myself loose in preparation. And also probaby read some <a href="https://mstdn.social/tags/cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisco</span></a> docs for night reading just to be prepared and be fresh. Good pay, and it would help me accomplish all my goals *cough* Norway *cough*. So I shall pray to thee Gods and I ask you do the same. So, I'm going to do something casual and play with my weechat config on tilde.team</p>
heise Security<p>Sicherheitsupdates: Angreifer können Cisco-Router lahmlegen</p><p>Schwachstellen in Ciscos System IOS XR gefährden Netzwerke. Admins sollten ihre Systeme zeitnah aktualisieren. </p><p><a href="https://www.heise.de/news/Sicherheitsupdates-Angreifer-koennen-Cisco-Router-lahmlegen-10642120.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitsupdat</span><span class="invisible">es-Angreifer-koennen-Cisco-Router-lahmlegen-10642120.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Cisco: Mehrere Produkte mit teils hochriskanten Lücken</p><p>Cisco hat am Mittwoch zehn Sicherheitsmitteilungen veröffentlicht. Zwei Schwachstellen gelten als hohes Risiko.</p><p><a href="https://www.heise.de/news/Cisco-Mehrere-Produkte-mit-teils-hochriskanten-Luecken-10623826.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cisco-Mehrere-Pr</span><span class="invisible">odukte-mit-teils-hochriskanten-Luecken-10623826.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Lyle Solla-Yates<p><a href="https://www.sfgate.com/tech/article/bay-area-tech-titan-announces-layoffs-strong-20826542.php" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sfgate.com/tech/article/bay-ar</span><span class="invisible">ea-tech-titan-announces-layoffs-strong-20826542.php</span></a> “a familiar pattern of reporting skyrocketing revenue followed by drastic job cuts.” <a href="https://cville.online/tags/ProgressAndPoverty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProgressAndPoverty</span></a> <a href="https://cville.online/tags/layoffs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>layoffs</span></a> <a href="https://cville.online/tags/inequality" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>inequality</span></a> <a href="https://cville.online/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a></p>
heise Security<p>Sicherheitspatches: Cisco schließt Angriffspunkte in Firewalls</p><p>Angreifer können Firewalls von Cisco ins Visier nehmen und diese unter anderem via DoS-Attacke aus dem Verkehr ziehen. </p><p><a href="https://www.heise.de/news/Sicherheitspatches-Cisco-schliesst-Angriffspunkte-in-Firewalls-10531093.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitspatch</span><span class="invisible">es-Cisco-schliesst-Angriffspunkte-in-Firewalls-10531093.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Cisco Identity Services Engine: Angriff auf alte Lücken – jetzt Update nachholen</p><p>In den vergangenen Wochen schloss Cisco kritische ISE-Lücken – jetzt warnt das Unternehmen vor Exploits. Wer noch nicht gepatcht hat, sollte umgehend handeln. </p><p><a href="https://www.heise.de/news/Cisco-Identity-Services-Engine-Angriff-auf-alte-Luecken-jetzt-Update-nachholen-10497006.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cisco-Identity-S</span><span class="invisible">ervices-Engine-Angriff-auf-alte-Luecken-jetzt-Update-nachholen-10497006.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Weitere kritische Lücke in Ciscos ISE</p><p>In Ciscos ISE klafft eine weitere Lücke mit maximalem Bedrohungsgrad. Zudem warnt Cisco vor weiteren Lücken in mehr Produkten.</p><p><a href="https://www.heise.de/news/Weitere-kritische-Luecke-in-Ciscos-ISE-10490589.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Weitere-kritisch</span><span class="invisible">e-Luecke-in-Ciscos-ISE-10490589.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
[ ] ground zero<p>watch the great talk from Dr. Abeba Birhane at the AI for Good Global Summit in Geneva here: <a href="https://www.youtube.com/watch?v=K-AOgG6sc9Q&amp;t=4828s" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=K-AOgG6sc9</span><span class="invisible">Q&amp;t=4828s</span></a><br>Thanks <span class="h-card" translate="no"><a href="https://scholar.social/@abebab" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>abebab</span></a></span> for speaking truth to power! <br>The AI for Good organizers tried to silence her. In her own words "One of the main concerns for them was that in one of the slides I had indicated "No AI for War Crimes", and it had logos of <a href="https://tldr.nettime.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a>, <a href="https://tldr.nettime.org/tags/Amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon</span></a>, <a href="https://tldr.nettime.org/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> Cloud, <a href="https://tldr.nettime.org/tags/Palantir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Palantir</span></a> and <a href="https://tldr.nettime.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a>; they wanted me to remove that... while existing records clearly show that they are working with authoritarian regimes to provide cloud infrastructure and various technologies that are powering war and exacerbating injustice."<br>Read article "AI for Good [Appearance?]" by Dr. Abeba Birhane: <a href="https://aial.ie/blog/2025-ai-for-good-summit/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aial.ie/blog/2025-ai-for-good-</span><span class="invisible">summit/</span></a><br>...below you'll find a screenshot of a modified version of another slide that shows how the organisers censored:</p>
Sam Stepanyan :verified: 🐘<p><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a>: Unified Communications Manager systems could allow remote attackers to gain root-level access.<br> The vulnerability CVE-2025-20309 with a maximum CVSS 10.0, stems from hardcoded SSH root credentials that cannot be modified or removed:<br>👇<br><a href="https://cybersecuritynews.com/cisco-unified-cm-vulnerability/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/cisco-un</span><span class="invisible">ified-cm-vulnerability/</span></a></p>
Sam Stepanyan :verified: 🐘<p><a href="https://infosec.exchange/tags/CISCO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISCO</span></a>: Critical severity CVSS 10 CVE-2025-20281 and CVE-2025-20282 vulnerabilities allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root! Updates released - patched now:<br>👇<br><a href="https://thehackernews.com/2025/06/critical-rce-flaws-in-cisco-ise-and-ise.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/06/crit</span><span class="invisible">ical-rce-flaws-in-cisco-ise-and-ise.html</span></a></p>
anna elbe<p><span class="h-card" translate="no"><a href="https://social.heise.de/@heisec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>heisec</span></a></span> <br>Ach, hatte <a href="https://norden.social/tags/Snowden" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Snowden</span></a> nicht einst schon von den Sicherheitslücken bei Cisco erzählt?<br><a href="https://de.wikipedia.org/wiki/Cisco_Systems#Collaboration" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">de.wikipedia.org/wiki/Cisco_Sy</span><span class="invisible">stems#Collaboration</span></a></p><p><a href="https://norden.social/tags/Hamburg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hamburg</span></a> ( <a href="https://norden.social/tags/OlafScholz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OlafScholz</span></a> ) hatte kurz darauf, am 30. April 2014, ein "Memorandum of Understanding" mit <a href="https://norden.social/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> geschlossen. <br>Und zwar für die <a href="https://norden.social/tags/Smartcity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smartcity</span></a> (Verkehr und Bürgerdienstleistungen)!</p><p>Cisco hat also in Hamburg überall die Finger drin. Insbesondere der Hafen sollte DAS Vorzeigeprojekt werden.</p><p><a href="https://annaelbe.net/datenschutz_smartCity.php#smartcityhamburg" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">annaelbe.net/datenschutz_smart</span><span class="invisible">City.php#smartcityhamburg</span></a></p>
heise Security<p>Jetzt patchen! Attacken auf Cisco Identity Services Engine können bevorstehen</p><p>Es ist Exploitcode für Sicherheitslücken in Cisco Identity Services Engine und Customer Collaboration Platform in Umlauf. Updates sind verfügbar. </p><p><a href="https://www.heise.de/news/Jetzt-patchen-Attacken-auf-Cisco-Identity-Services-Engine-koennen-bevorstehen-10428300.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-At</span><span class="invisible">tacken-auf-Cisco-Identity-Services-Engine-koennen-bevorstehen-10428300.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Sicherheitsupdates Cisco: Angreifer können Alarme auslösen</p><p>Wichtige Updates schließen mehrere Schwachstellen in unter anderem Cisco Networks Analytics Manager und Webex Meetings Services. </p><p><a href="https://www.heise.de/news/Sicherheitsupdates-Cisco-Angreifer-koennen-Alarme-ausloesen-10393971.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitsupdat</span><span class="invisible">es-Cisco-Angreifer-koennen-Alarme-ausloesen-10393971.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Sicherheitsupdates: Root- und DoS-Attacken auf Cisco-Produkte möglich</p><p>Es sind wichtige Sicherheitsupdates für unter anderem Router und Switches von Cisco erschienen. </p><p><a href="https://www.heise.de/news/Sicherheitsupdates-Root-und-DoS-Attacken-auf-Cisco-Produkte-moeglich-10375924.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitsupdat</span><span class="invisible">es-Root-und-DoS-Attacken-auf-Cisco-Produkte-moeglich-10375924.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Router</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Switch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Switch</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>