schleuss.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance has a focus on IT security, general computing, retro video games and game collector discussion. Please, no #NSFW and other 18+ discussion on this instance. See rules for more details

Server stats:

11
active users

#malware

1 post1 participant0 posts today
IT News<p>Nation-state hackers deliver malware from “bulletproof” blockchains - Hacking groups—at least one of which works on behalf of the ... - <a href="https://arstechnica.com/security/2025/10/hackers-bullet-proof-hosts-deliver-malware-from-blockchains/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">10/hackers-bullet-proof-hosts-deliver-malware-from-blockchains/</span></a> <a href="https://schleuss.online/tags/blockchain" class="mention hashtag" rel="tag">#<span>blockchain</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="tag">#<span>biz</span></a>&amp;it</p>
ITSEC News<p>Smashing Security podcast #438: When your mouse turns snitch, and hackers grow a conscience - Your computer&#39;s mouse might not be as innocent as it looks - and one ransomware crew has ... <a href="https://grahamcluley.com/smashing-security-podcast-438/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/smashing-secu</span><span class="invisible">rity-podcast-438/</span></a> <a href="https://schleuss.online/tags/smashingsecurity" class="mention hashtag" rel="tag">#<span>smashingsecurity</span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="tag">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/surveillance" class="mention hashtag" rel="tag">#<span>surveillance</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="tag">#<span>databreach</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="tag">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://schleuss.online/tags/podcast" class="mention hashtag" rel="tag">#<span>podcast</span></a> <a href="https://schleuss.online/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://schleuss.online/tags/mouse" class="mention hashtag" rel="tag">#<span>mouse</span></a></p>
heise Security<p>Microsoft Outlook: Zur Sicherheit keine SVG-Anzeige mehr</p><p>Ein Einfallstor für Malware ist das Vektorgrafikformat SVG. Microsoft zieht dem Format in Outlook daher den Stecker – etwas.</p><p><a href="https://www.heise.de/news/Microsoft-Outlook-Zur-Sicherheit-keine-SVG-Anzeige-mehr-10729201.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-Outloo</span><span class="invisible">k-Zur-Sicherheit-keine-SVG-Anzeige-mehr-10729201.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/MicrosoftOutlook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftOutlook</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Desinfec’t 2025/26: Jetzt Windows-PCs von Viren befreien</p><p>Die neue Version des c’t-Sicherheitstools bringt Virenscanner von ClamAV, ESET, IKARUS und WithSecure mit. Sie können damit sogar Ihre Daten retten.</p><p><a href="https://www.heise.de/news/Desinfec-t-2025-26-Jetzt-Windows-PCs-von-Viren-befreien-10673532.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Desinfec-t-2025-</span><span class="invisible">26-Jetzt-Windows-PCs-von-Viren-befreien-10673532.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Trojaner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojaner</span></a> <a href="https://social.heise.de/tags/Virenscanner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Virenscanner</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
ITSEC News<p>Japan running dry: Ransomware attack leaves nation days away from Asahi beer shortage - Beer lovers will be sobbing into their pints at the news that a ransomware attack has bro... <a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/japan-running-dry-ransomware-attack-leaves-nation-days-away-from-asahi-beer-shortage" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/en-us/blog/hot</span><span class="invisible">forsecurity/japan-running-dry-ransomware-attack-leaves-nation-days-away-from-asahi-beer-shortage</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="tag">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://schleuss.online/tags/japan" class="mention hashtag" rel="tag">#<span>japan</span></a> <a href="https://schleuss.online/tags/beer" class="mention hashtag" rel="tag">#<span>beer</span></a></p>
Renée Burton<p>I recently discovered that rich assholes may have intimidated a security company into taking down excellent research they wrote three years ago.</p><p>There are far too many rich assholes attempting to intimidate people these days. Fuck all these guys.</p><p>And don't forget to archive shit in many locations.. locally. Archive.org. archive.today.. email it to others.. rewriting history is bad.</p><p>You should read this excellent paper. I don't know the researchers but it is good work..</p><p>Please boost for awareness of this great work and scare tactics </p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> </p><p><a href="https://web.archive.org/web/20250731051150/https://www.cyjax.com/wp-content/uploads/2022/11/Fangxiao-a-Chinese-threat-actor.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2025073105</span><span class="invisible">1150/https://www.cyjax.com/wp-content/uploads/2022/11/Fangxiao-a-Chinese-threat-actor.pdf</span></a></p>
heise Security<p>Zu unsicher: IT-Dienstleister NTT Data trennt sich wohl von Ivanti-Produkten</p><p>Nicht nur das interne Netz, sondern auch der Weiterverkauf an Kunden ist betroffen. Die Sicherheit der Produkte sei ein unvertretbares Risiko.</p><p><a href="https://www.heise.de/news/Zu-unsicher-IT-Dienstleister-NTT-Data-trennt-sich-wohl-von-Ivanti-Produkten-10671042.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zu-unsicher-IT-D</span><span class="invisible">ienstleister-NTT-Data-trennt-sich-wohl-von-Ivanti-Produkten-10671042.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
ITSEC News<p>Smashing Security podcast #436: The €600,000 gold heist, powered by ransomware - Ransomware doesn’t just freeze computers - it can silence alarms too. And when the Natura... <a href="https://grahamcluley.com/smashing-security-podcast-436/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/smashing-secu</span><span class="invisible">rity-podcast-436/</span></a> <a href="https://schleuss.online/tags/smashingsecurity" class="mention hashtag" rel="tag">#<span>smashingsecurity</span></a> <a href="https://schleuss.online/tags/securitythreats" class="mention hashtag" rel="tag">#<span>securitythreats</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="tag">#<span>databreach</span></a> <a href="https://schleuss.online/tags/law%E2%84%B4" class="mention hashtag" rel="tag">#<span>lawℴ</span></a> <a href="https://schleuss.online/tags/shaihalud" class="mention hashtag" rel="tag">#<span>shaihalud</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="tag">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://schleuss.online/tags/podcast" class="mention hashtag" rel="tag">#<span>podcast</span></a> <a href="https://schleuss.online/tags/github" class="mention hashtag" rel="tag">#<span>github</span></a> <a href="https://schleuss.online/tags/worm" class="mention hashtag" rel="tag">#<span>worm</span></a></p>
ITSEC News<p>INC ransomware: what you need to know - INC is the name of a ransomware-as-a-service (RaaS) operation that first appeared in late... <a href="https://www.fortra.com/blog/inc-ransomware-what-need-know" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">fortra.com/blog/inc-ransomware</span><span class="invisible">-what-need-know</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="tag">#<span>databreach</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="tag">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/incransom" class="mention hashtag" rel="tag">#<span>incransom</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="tag">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a></p>
heise Security<p>Ab sofort erhältlich: Mit Desinfec’t 2025/26 Trojaner erledigen und Daten retten</p><p>Malwarekampagnen werden immer ausgeklügelter, und plötzlich ist Windows infiziert. Zeit für den Einsatz des brandneuen Sicherheitstools Desinfec’t 2025/26.</p><p><a href="https://www.heise.de/news/Ab-sofort-erhaeltlich-Mit-Desinfec-t-2025-26-Trojaner-erledigen-und-Daten-retten-10661449.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ab-sofort-erhael</span><span class="invisible">tlich-Mit-Desinfec-t-2025-26-Trojaner-erledigen-und-Daten-retten-10661449.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Trojaner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojaner</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
ITSEC News<p>“Pompompurin” resentenced: BreachForums creator heads back behind bars - Conor Brian Fitzpatrick, the creator of the notorious BreachForums hacking forum, has bee... <a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/pompompurin-resentenced-breachforums-creator-heads-back-behind-bars" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/en-us/blog/hot</span><span class="invisible">forsecurity/pompompurin-resentenced-breachforums-creator-heads-back-behind-bars</span></a> <a href="https://schleuss.online/tags/breachforums" class="mention hashtag" rel="tag">#<span>breachforums</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="tag">#<span>databreach</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="tag">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/law%E2%84%B4" class="mention hashtag" rel="tag">#<span>lawℴ</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="tag">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a></p>
ITSEC News<p>Smashing Security podcast #435: Lights! Camera! Hacktion! - When &quot;bad actors&quot; stop being hackers and start being... actual actors.</p><p>This week, Graham... <a href="https://grahamcluley.com/smashing-security-podcast-435/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/smashing-secu</span><span class="invisible">rity-podcast-435/</span></a> <a href="https://schleuss.online/tags/smashingsecurity" class="mention hashtag" rel="tag">#<span>smashingsecurity</span></a> <a href="https://schleuss.online/tags/law%E2%84%B4" class="mention hashtag" rel="tag">#<span>lawℴ</span></a> <a href="https://schleuss.online/tags/phishing" class="mention hashtag" rel="tag">#<span>phishing</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://schleuss.online/tags/podcast" class="mention hashtag" rel="tag">#<span>podcast</span></a> <a href="https://schleuss.online/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://schleuss.online/tags/israel" class="mention hashtag" rel="tag">#<span>israel</span></a> <a href="https://schleuss.online/tags/school" class="mention hashtag" rel="tag">#<span>school</span></a> <a href="https://schleuss.online/tags/iran" class="mention hashtag" rel="tag">#<span>iran</span></a></p>
heise Security<p>Neuer NPM-Großangriff: Selbst-vermehrende Malware infiziert Dutzende Pakete</p><p>Womöglich stecken hinter der Attacke dieselben Angreifer wie beim letzten Mal. Ihr Schadcode trägt den Namen eines prominenten Science-Fiction-Monsters in sich.</p><p><a href="https://www.heise.de/news/Neuer-NPM-Grossangriff-Selbst-vermehrende-Malware-infiziert-Dutzende-Pakete-10651111.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Neuer-NPM-Grossa</span><span class="invisible">ngriff-Selbst-vermehrende-Malware-infiziert-Dutzende-Pakete-10651111.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/JavaScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaScript</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Cybergang "Scattered Lapsus$ Hunters" kündigt Abschied an - ein bisschen</p><p>Die Bande machte zuletzt durch Cyberangriffe auf Jaguar und Marks &amp; Spencer von sich reden, die immense Schäden verursachten. Nicht alle halten die Füße still.</p><p><a href="https://www.heise.de/news/Cybergang-Scattered-Lapsus-Hunters-kuendigt-Abschied-an-ein-bisschen-10643212.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cybergang-Scatte</span><span class="invisible">red-Lapsus-Hunters-kuendigt-Abschied-an-ein-bisschen-10643212.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Jaguar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jaguar</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Crypto News<p>New Malware Exploits Fake Job Ads to Hit Crypto Wallets on Windows, Mac, Linux - A newly discovered cross-platform malware dubbed ModStealer is slipping past antiv... - <a href="https://cryptonews.com/news/new-malware-exploits-fake-job-ads-to-hit-crypto-wallets-on-windows-mac-linux/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">cryptonews.com/news/new-malwar</span><span class="invisible">e-exploits-fake-job-ads-to-hit-crypto-wallets-on-windows-mac-linux/</span></a> <a href="https://schleuss.online/tags/altcoinnews" class="mention hashtag" rel="tag">#<span>altcoinnews</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://schleuss.online/tags/hack" class="mention hashtag" rel="tag">#<span>hack</span></a> <a href="https://schleuss.online/tags/scam" class="mention hashtag" rel="tag">#<span>scam</span></a></p>
ITSEC News<p>US charges suspected ransomware kingpin, and offers $10 million bounty for his capture - A US federal court has unssealed charges against a Ukrainian national who authorities all... <a href="https://www.fortra.com/blog/us-charges-suspected-ransomware-kingpin-offers-10-million-bounty" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">fortra.com/blog/us-charges-sus</span><span class="invisible">pected-ransomware-kingpin-offers-10-million-bounty</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="tag">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/megacortex" class="mention hashtag" rel="tag">#<span>megacortex</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="tag">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/law%E2%84%B4" class="mention hashtag" rel="tag">#<span>lawℴ</span></a> <a href="https://schleuss.online/tags/ockergoga" class="mention hashtag" rel="tag">#<span>ockergoga</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="tag">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://schleuss.online/tags/nefilim" class="mention hashtag" rel="tag">#<span>nefilim</span></a> <a href="https://schleuss.online/tags/ukraine" class="mention hashtag" rel="tag">#<span>ukraine</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Interessante Frage: Unterstützen Blogs über <a href="https://chaos.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> eigentlich die <a href="https://chaos.social/tags/Cyberkriminalit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberkriminalität</span></a>? Nahezu jedes Unternehmen für IT-Sicherheit analysiert neue Angriffsvektoren und erstellt daraus öffentliche Berichte.</p><p><a href="https://chaos.social/tags/Sicherheitsforscher" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitsforscher</span></a> haben dies nun zum Anlass genommen zu untersuchen, ob sich aus öffentlich verfügbaren Schwachstellenberichten mittels <a href="https://chaos.social/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a>-Vibe Coding neue <a href="https://chaos.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> generieren lässt - und die Antwort ist ja, so ließen sich bösartige <a href="https://chaos.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a>-Skripte bauen:</p><p><a href="https://www.trendmicro.com/de_de/research/25/i/unterstuetzen-sicherheitsblogs-die-cyberkriminalitaet.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendmicro.com/de_de/research/</span><span class="invisible">25/i/unterstuetzen-sicherheitsblogs-die-cyberkriminalitaet.html</span></a></p>
heise Security<p>Großer Angriff auf node.js</p><p>Über Spearphishing ist ein Kryptowährungsdieb in das npm-Konto eines fleißigen Entwicklers gelangt. node.js-Pakete mit Milliarden Downloads sind betroffen.</p><p><a href="https://www.heise.de/news/Grosser-Angriff-auf-node-js-10637088.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Grosser-Angriff-</span><span class="invisible">auf-node-js-10637088.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/JavaScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaScript</span></a> <a href="https://social.heise.de/tags/Kryptow%C3%A4hrung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kryptowährung</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online<p>Malware fotografiert Nutzer heimlich bei Porno-Konsum</p><p>Die frei verfügbare Malware Stealerium erkennt Pornokonsum und fertigt heimlich Webcam-Aufnahmen an. Cyberkriminelle nutzen die Fotos für Erpressung. </p><p><a href="https://www.heise.de/news/Malware-fotografiert-Nutzer-heimlich-bei-Porno-Konsum-10634665.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Malware-fotograf</span><span class="invisible">iert-Nutzer-heimlich-bei-Porno-Konsum-10634665.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online<p>Wie Nordkorea Kryptowährung mit vermeintlichen Stellenangeboten ergaunert</p><p>Angebliche Personalvermittler haben Beschäftigten der Kryptobranche neue Jobs angeboten, diese dann aber bestohlen. Das ist wohl eine nordkoreanische Kampagne.</p><p><a href="https://www.heise.de/news/Wie-Nordkorea-Kryptowaehrung-mit-vermeintlichen-Stellenangeboten-ergaunert-10633077.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Wie-Nordkorea-Kr</span><span class="invisible">yptowaehrung-mit-vermeintlichen-Stellenangeboten-ergaunert-10633077.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Arbeitswelt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arbeitswelt</span></a> <a href="https://social.heise.de/tags/Kriminalit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kriminalität</span></a> <a href="https://social.heise.de/tags/Blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blockchain</span></a> <a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/ITFachkr%C3%A4fte" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITFachkräfte</span></a> <a href="https://social.heise.de/tags/Kryptow%C3%A4hrung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kryptowährung</span></a> <a href="https://social.heise.de/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinkedIn</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>