ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://join-lemmy.org/context.json", "https://www.w3.org/ns/activitystreams" ], "type": "OrderedCollection", "id": "https://sh.itjust.works/c/cybersecurity/outbox", "totalItems": 50, "orderedItems": [ { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/2ec43179-1b92-418b-8a2d-f48b2bbbfbaa", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37569176", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "The many variants of the ClickFix social engineering tactic - Help Net Security", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.helpnetsecurity.com/2025/05/08/clickfix-social-engineering-tactic-variants/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/66c5dd33-8d5b-4863-bec7-f45fa5e9048c.webp" }, "sensitive": false, "published": "2025-05-08T17:21:54.806980Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37569176", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/bfce1a55-bf9b-4fcb-98f0-305e3d5b54f3" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/aa2b4015-aa09-4539-a20f-4775d9d35f2f", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37569015", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "CVE-2025-23123 (CVSS 10): Critical UniFi Protect Cameras Flaw Demands Immediate Updates", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://securityonline.info/cve-2025-23123-cvss-10-critical-unifi-protect-cameras-flaw-demands-immediate-updates/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/968d776b-b175-468f-ab0d-e8a52c8ec3a1.webp" }, "sensitive": false, "published": "2025-05-08T17:18:47.648769Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37569015", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/b1bfa965-5604-4354-bceb-99c748ff72e7" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/566781a9-cfb5-4c73-99db-8a38b7803790", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37559245", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "OneDrive New Feature Allows Default Sync of Personal & Corporate Accounts", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://cybersecuritynews.com/microsoft-onedrive-default-sync/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/ec68889f-06f6-4ece-a488-431160536a1f.jpeg" }, "sensitive": false, "published": "2025-05-08T14:41:27.327763Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37559245", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/a6b4cb53-d1bc-49bd-b5b9-a9ce08cb58a3" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/7aec4594-47c8-4cd3-a26a-5e1f651e0ea6", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37551246", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://thehackernews.com/2025/05/cisco-patches-cve-2025-20188-100-cvss.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/14a01459-8cb1-4b22-8853-bf8f7251771d.webp" }, "sensitive": false, "published": "2025-05-08T12:07:50.489968Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37551246", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/43855fa0-198f-407f-a67e-2f01e1d213b6" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/4ba65393-a136-4908-b019-fecaa04aa3a6", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37550188", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "The Top Threat Actor Groups Targeting the Financial Sector", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://flashpoint.io/blog/top-threat-actor-groups-targeting-financial-sector/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/46e35160-8eee-4562-b492-122576d6ec47.png" }, "sensitive": false, "published": "2025-05-08T11:48:45.741896Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37550188", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/fa541eda-f0e6-43e4-9e81-6b3b3a5cb94e" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/a620426b-9cb8-405e-8445-e9af02bac6f3", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37550088", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Six DDoS sites seized in multi-national law enforcement operation", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://cyberscoop.com/poland-ddos-arrests-europol-operation-poweroff/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/c36d10e1-02f4-48da-966b-76edcae0c714.jpeg" }, "sensitive": false, "published": "2025-05-08T11:47:03.795565Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37550088", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/ae8b0de9-a39d-4ab3-8d4f-69e17031eae7" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/e106bed1-a869-4b37-8fb8-bd924e87c01f", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37550032", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Play ransomware exploited Windows logging flaw in zero-day attacks", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.bleepingcomputer.com/news/security/play-ransomware-exploited-windows-logging-flaw-in-zero-day-attacks/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-08T11:43:55.243449Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37550032", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/77d18f1d-7007-444c-8e32-17c481fb4898" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/ffdc5d91-4a2e-4808-9166-a2dc58bffac2", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37549835", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "LockBit ransomware gang hacked, victim negotiations exposed", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-08T11:42:28.437138Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37549835", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/124a7ace-0c88-4e35-b330-cbef04f52105" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/1fe35a94-4f8a-4151-ae90-dfd7c18ff374", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37549727", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "CISA warns of hackers targeting critical oil infrastructure", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-targeting-critical-oil-infrastructure/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-08T11:40:32.153034Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37549727", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/e42bd99f-fe98-4682-ab4f-6ec8995eaead" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/1615c558-fb00-43b0-9b12-4dbbfd7ff777", "actor": "https://scribe.disroot.org/u/randomname", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://scribe.disroot.org/post/2697501", "attributedTo": "https://scribe.disroot.org/u/randomname", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "UK under assault as number of ‘significant’ cyberattacks doubles: Foreign powers, ransomware gangs, AI threats drive surge in incidents affecting private businesses and government systems", "cc": [], "content": "<p>cross-posted from: <a href=\"https://scribe.disroot.org/post/2697495\">scribe.disroot.org/post/2697495</a></p>\n<blockquote>\n<p><a href=\"https://web.archive.org/web/20250508105444/https://www.thetimes.com/uk/crime/article/uk-under-assault-as-number-of-significant-cyberattacks-doubles-w585d23j2\" rel=\"nofollow\">Archived link</a></p>\n<p><strong>Foreign powers, ransomware gangs and AI threats are driving a surge in incidents affecting British businesses and government systems, [the British Intelligence Agency] GCHQ has warned.</strong></p>\n<p>Britain has suffered double the number of “nationally significant” cyberattacks in recent months compared with the year before, according to GCHQ.</p>\n<p>Richard Horne, chief executive of the National Cyber Security Centre (NCSC), said that the GCHQ unit has managed 200 cyberattacks since September, which includes “twice as many nationally significant incidents as the same period last year”.</p>\n<p>…</p>\n<p>Referencing the recent attacks on Marks &amp; Spencer, Co-op and Harrods, Horne told the CyberUK conference in Manchester that “the threat picture is diverse and dramatic” and called ransomware “a persistent threat”.</p>\n<p>…</p>\n<p>Rod Latham, director of cybersecurity at the Department for Science, Innovation and Technology, said: “Our statistics indicate that four in ten businesses are attacked in a year, three in ten charities — millions of cybercrimes in a year.”</p>\n<p>…</p>\n<p>Horne called China “the pacing threat in the cyber-realm” and “a cause for profound and profuse concern”.</p>\n<p>…</p>\n<p>On Russia he said that “we see a direct connection between Russian cyberattacks and physical threats to our security” and warned that amid talks on Ukraine, “it is almost certain that Russia will continue its wider cyber espionage activity … against Ukraine and supporting countries”.</p>\n<p>…</p>\n</blockquote>\n", "mediaType": "text/html", "source": { "content": "cross-posted from: https://scribe.disroot.org/post/2697495\n\n> [Archived link](https://web.archive.org/web/20250508105444/https://www.thetimes.com/uk/crime/article/uk-under-assault-as-number-of-significant-cyberattacks-doubles-w585d23j2)\n> \n> **Foreign powers, ransomware gangs and AI threats are driving a surge in incidents affecting British businesses and government systems, [the British Intelligence Agency] GCHQ has warned.**\n> \n> Britain has suffered double the number of “nationally significant” cyberattacks in recent months compared with the year before, according to GCHQ.\n> \n> Richard Horne, chief executive of the National Cyber Security Centre (NCSC), said that the GCHQ unit has managed 200 cyberattacks since September, which includes “twice as many nationally significant incidents as the same period last year”.\n> \n> ...\n> \n> Referencing the recent attacks on Marks & Spencer, Co-op and Harrods, Horne told the CyberUK conference in Manchester that “the threat picture is diverse and dramatic” and called ransomware “a persistent threat”.\n> \n> ...\n> \n> Rod Latham, director of cybersecurity at the Department for Science, Innovation and Technology, said: “Our statistics indicate that four in ten businesses are attacked in a year, three in ten charities — millions of cybercrimes in a year.”\n> \n> ...\n> \n> Horne called China “the pacing threat in the cyber-realm” and “a cause for profound and profuse concern”.\n> \n> ...\n> \n> On Russia he said that “we see a direct connection between Russian cyberattacks and physical threats to our security” and warned that amid talks on Ukraine, “it is almost certain that Russia will continue its wider cyber espionage activity … against Ukraine and supporting countries”.\n> \n> ...", "mediaType": "text/markdown" }, "attachment": [ { "href": "https://www.thetimes.com/uk/crime/article/uk-under-assault-as-number-of-significant-cyberattacks-doubles-w585d23j2", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/533d362e-fb7e-44e4-b49a-53f2c5f16f15.jpeg" }, "sensitive": false, "published": "2025-05-08T11:40:14.842009Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://scribe.disroot.org/post/2697501", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/1a689059-ea38-44ce-bb1b-beff6f024421" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/a44bf4b6-e0e7-4d35-94a3-29205da46149", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37549676", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://thehackernews.com/2025/05/ottokit-wordpress-plugin-with-100k.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/32a92f61-a81d-4214-aa3c-8a800005a163.webp" }, "sensitive": false, "published": "2025-05-08T11:40:12.462312Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37549676", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/e099a7e5-7d14-495b-8868-4bbc568c8bbe" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/4b4ada67-5de4-4e74-9604-631b5e0d6299", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37549674", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Ransomware spike exposes cracks in cloud security - Help Net Security", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.helpnetsecurity.com/2025/05/05/cloud-ransomware-attacks-rubrik/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/57999921-afb1-479f-b35b-ac5842f1ff9c.webp" }, "sensitive": false, "published": "2025-05-08T11:39:57.192900Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37549674", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/01323377-9480-48d6-9986-14f449f44648" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/eaa0c032-5ec9-44cb-9745-461bc142fb49", "actor": "https://programming.dev/u/Pro", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://programming.dev/post/29919492", "attributedTo": "https://programming.dev/u/Pro", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Backdoor found in popular ecommerce components", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://sansec.io/research/license-backdoor", "mediaType": "text/html", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/91960171-8dac-4528-bfd3-623bee984eb0.webp" }, "sensitive": false, "published": "2025-05-07T16:57:41.649246Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://programming.dev/post/29919492", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/5ac62a12-85a7-4e26-a48c-12bbe8e8eb39" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/0facb09e-4108-4aee-bca9-3e8cda7a4dfe", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37488054", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable - Help Net Security", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.helpnetsecurity.com/2025/05/07/altsrus-digital-welfare-fraud/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/f231df54-d13a-4b85-a650-f4e1e6005f9b.jpeg" }, "sensitive": false, "published": "2025-05-07T13:47:01.182969Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37488054", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/c456e141-3c32-481e-b9ca-bbe5c72ada61" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/b7cf060b-6b02-4c30-bf2a-eb6398e9c26e", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37487911", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Lampion Is Back With ClickFix Lures", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://unit42.paloaltonetworks.com/lampion-malware-clickfix-lures/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/bd0fa163-a7b1-4c05-9250-3fb17bacb6e5.jpeg" }, "sensitive": false, "published": "2025-05-07T13:46:45.711394Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37487911", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/004b47b6-a580-475e-b159-be117c830140" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/00a4ee14-8875-457d-bc04-2f223fbca48d", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37487908", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "IT guy let lover into Deutsche Bank datacenter – lawsuit", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.theregister.com/2025/05/06/computacenter_deutsche_bank_whistleblower/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/89ef3149-ccca-459b-a322-32341be2ef33.jpeg" }, "sensitive": false, "published": "2025-05-07T13:46:24.952507Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37487908", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/250694ba-c79b-4db2-abfe-30d2f95cceef" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/97ea53da-8961-49a2-8f03-18c00d2cda87", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37480279", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/56a91e89-dbd7-40e0-a30f-ed0f5daa7e9b.webp" }, "sensitive": false, "published": "2025-05-07T11:44:14.663563Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37480279", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/07887e83-73d4-48c4-bb9c-93fa558ff63e" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/ab1e8613-4e5d-40ee-9528-73dc062d3b4c", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37480185", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "1 in 3 workers keep AI use a secret - Help Net Security", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.helpnetsecurity.com/2025/05/07/secret-ai-use/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/519877cc-173b-48f7-bd4e-93f0d0acb5cb.webp" }, "sensitive": false, "published": "2025-05-07T11:43:07.469018Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37480185", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/3bb73118-6090-4ffe-82e2-b741167d2261" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/1e14a7b1-4b36-4158-9292-1e4438428589", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37480180", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Zero-Day CLFS Vulnerability (CVE-2025-29824) Exploited in Ransomware Attacks", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://securityonline.info/zero-day-clfs-vulnerability-cve-2025-29824-exploited-in-ransomware-attacks/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/bf7dca0a-2d1d-4f45-9cd4-d1a1921c78cb.jpeg" }, "sensitive": false, "published": "2025-05-07T11:41:10.643626Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37480180", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/e4291222-f653-436d-9355-34f3678b4e39" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/fa5e8b00-c66e-446e-af2e-50ec9049f467", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37480126", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Police takes down six DDoS-for-hire services, arrests admins", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.bleepingcomputer.com/news/security/police-takes-down-six-ddos-for-hire-services-arrests-admins/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-07T11:40:25.146566Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37480126", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/9a557384-fb1b-436e-bba9-b2d5c722fa84" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/3265e92d-39e4-41f1-a14a-89adebec424e", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37480124", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "CoGUI Phish Kit Targets Japan with Millions of Messages | Proofpoint US", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.proofpoint.com/us/blog/threat-insight/cogui-phish-kit-targets-japan-millions-messages", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/9e050105-c253-4ffc-9c75-7cac28477044.webp" }, "sensitive": false, "published": "2025-05-07T11:39:40.635727Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37480124", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/f799c3b3-6415-453c-97dc-0d19a0f46be4" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/caffa515-a178-4d5a-8776-559a6177440a", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37480073", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Texas School District Notifies Over 47,000 People of Major Data Breach", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.infosecurity-magazine.com/news/texas-school-47000-people-data/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/0c5d7c10-e776-4f84-8936-32a853bc7977.jpeg" }, "sensitive": false, "published": "2025-05-07T11:39:26.806555Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37480073", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/98f04840-120c-4e76-94f6-1788811ad1ec" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/60b2b3c7-0319-4b20-b47a-a02c93cedc55", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37480031", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Alleged cyberattack on Iran points to broader worldwide trend", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.scworld.com/perspective/alleged-cyberattack-on-iran-points-to-broader-trend-worldwide-of-at-risk-critical-infrastructure", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/342d73c5-4124-46b9-baea-3869067ead3a.jpeg" }, "sensitive": false, "published": "2025-05-07T11:37:38.918190Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37480031", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/6d7fd3b4-71c6-4a5b-b0b5-e2e730dc3001" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/249862c3-3929-48a1-9fe8-563c81df44ff", "actor": "https://programming.dev/u/Pro", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://programming.dev/post/29899733", "attributedTo": "https://programming.dev/u/Pro", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Return of the Crypto Inferno Drainer", "cc": [], "content": "<blockquote>\n<p>Check Point Research uncovered a sophisticated phishing campaign that abuses Discord and targets crypto users. Attackers redirects users from a legitimate Web3 website to a fake Collab.Land bot and then to a phishing site, tricking them into signing malicious transactions. The drainer script deployed on that site was directly linked to Inferno Drainer.\nDespite publicly shutting down in late 2023, Inferno Drainer remained fully operational. Smart contracts deployed in 2023 continued to be used into 2025. Recent campaigns show notable technical upgrades and infrastructure improvements.\nInferno Drainer employs advanced anti-detection tactics — including single-use and short-lived smart contracts, on-chain encrypted configurations, and proxy-based communication — successfully bypassing wallet security mechanisms and anti-phishing blacklists.\nIn just the last six months, more than 30,000 wallets were victimized by Inferno Drainer, resulting in at least $9 million in losses. The combination of evolving technical sophistication and convincing social engineering continues to drive the success of these attacks.</p>\n</blockquote>\n", "mediaType": "text/html", "source": { "content": "> Check Point Research uncovered a sophisticated phishing campaign that abuses Discord and targets crypto users. Attackers redirects users from a legitimate Web3 website to a fake Collab.Land bot and then to a phishing site, tricking them into signing malicious transactions. The drainer script deployed on that site was directly linked to Inferno Drainer.\nDespite publicly shutting down in late 2023, Inferno Drainer remained fully operational. Smart contracts deployed in 2023 continued to be used into 2025. Recent campaigns show notable technical upgrades and infrastructure improvements.\nInferno Drainer employs advanced anti-detection tactics — including single-use and short-lived smart contracts, on-chain encrypted configurations, and proxy-based communication — successfully bypassing wallet security mechanisms and anti-phishing blacklists.\nIn just the last six months, more than 30,000 wallets were victimized by Inferno Drainer, resulting in at least $9 million in losses. The combination of evolving technical sophistication and convincing social engineering continues to drive the success of these attacks.", "mediaType": "text/markdown" }, "attachment": [ { "href": "https://research.checkpoint.com/2025/inferno-drainer-reloaded-deep-dive-into-the-return-of-the-most-sophisticated-crypto-drainer/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/236ede3b-f35b-4b01-8060-9f053a22ea2d.png" }, "sensitive": false, "published": "2025-05-07T10:47:54.658519Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://programming.dev/post/29899733", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/5885f89f-d68b-4dd5-b013-1232d2e1ff32" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/762b911d-cc20-4176-9333-b392855f9a4d", "actor": "https://lemm.ee/u/neme", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://lemm.ee/post/63222655", "attributedTo": "https://lemm.ee/u/neme", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "TeleMessage, a modified Signal clone used by US government officials, has been hacked", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://techcrunch.com/2025/05/05/telemessage-a-modified-signal-clone-used-by-us-government-officials-has-been-hacked/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/1f9846a2-43a7-4f88-b71a-d2f4e60275bb.jpeg" }, "sensitive": false, "published": "2025-05-06T15:26:03.711044Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://lemm.ee/post/63222655", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/91df023e-61f5-4af3-8829-ebf2d998f210" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/ce77ab1f-df8c-43c3-9ec9-f9b8ab67dc27", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37421831", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://securityaffairs.com/177522/hacking/experts-warn-of-a-second-wave-of-attacks-targeting-sap-netweaver-bug-cve-2025-31324.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/3a8b7158-64e7-4569-b446-e12c6c6cf4d5.gif" }, "sensitive": false, "published": "2025-05-06T15:05:59.720804Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37421831", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/b8348de0-6a56-4a85-a05a-212e31fabcfa" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/9eb02dbe-e0dc-4ab3-bc99-e2c2eb29a85f", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37421761", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "CISA Warns 2 SonicWall Vulnerabilities Under Active Exploitation", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.darkreading.com/threat-intelligence/two-sonicwall-vulnerabilities-under-exploitation", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-06T15:03:05.913616Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37421761", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/3f833b41-f34c-4c31-82a0-9b2442c6d315" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/7a2d9b4e-73e1-4208-8f45-a7b830a872ab", "actor": "https://lemmy.sdf.org/u/Hotznplotzn", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://lemmy.sdf.org/post/33999387", "attributedTo": "https://lemmy.sdf.org/u/Hotznplotzn", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Italy: New decree prioritizes NATO countries in public tenders, sidelining Chinese and Russian tech suppliers in a bid to enhance national security", "cc": [], "content": "<p>cross-posted from: <a href=\"https://lemmy.sdf.org/post/33999334\">lemmy.sdf.org/post/33999334</a></p>\n<blockquote>\n<p><a href=\"https://web.archive.org/web/20250506142433/https://decode39.com/10677/italy-launches-buy-transatlantic-tech-procurement-law/\" rel=\"nofollow\">Archived</a></p>\n<ul>\n<li>Under the new rules, tenders will award bonus scores to offers that deploy cybersecurity technologies manufactured in Italy, EU member states, NATO countries, or other like-minded partners.</li>\n<li>The legislation follows high‑profile incidents of Chinese technology infiltrating sensitive sites, ranging from surveillance cameras in courts and ministries to thermoscanners at the prime minister’s office, and the award of customs‑scanner contracts to China’s Nuctech.</li>\n<li>Products include: video surveillance and access‑control systems (including baggage and cargo scanners); VPN‑capable digital networking products, routers, modems (including satellite types), and switches; firewalls, intrusion detection and prevention systems; network storage and backup solutions; cloud services; drone‑control software</li>\n<li>Preference is extended to suppliers from the EU, NATO members, and “like‑minded” countries with collaboration agreements—namely Australia, South Korea, Japan, Israel, New Zealand, and Switzerland.</li>\n<li>The government retains authority to update the list of covered categories and beneficiary states, based on recommendations from public administrations and intelligence agencies, ensuring the framework evolves alongside emerging security needs.</li>\n</ul>\n<p>[…]</p>\n</blockquote>\n", "mediaType": "text/html", "source": { "content": "cross-posted from: https://lemmy.sdf.org/post/33999334\n\n> [Archived](https://web.archive.org/web/20250506142433/https://decode39.com/10677/italy-launches-buy-transatlantic-tech-procurement-law/)\n> \n> - Under the new rules, tenders will award bonus scores to offers that deploy cybersecurity technologies manufactured in Italy, EU member states, NATO countries, or other like-minded partners.\n> - The legislation follows high‑profile incidents of Chinese technology infiltrating sensitive sites, ranging from surveillance cameras in courts and ministries to thermoscanners at the prime minister’s office, and the award of customs‑scanner contracts to China’s Nuctech.\n> - Products include: video surveillance and access‑control systems (including baggage and cargo scanners); VPN‑capable digital networking products, routers, modems (including satellite types), and switches; firewalls, intrusion detection and prevention systems; network storage and backup solutions; cloud services; drone‑control software\n> - Preference is extended to suppliers from the EU, NATO members, and “like‑minded” countries with collaboration agreements—namely Australia, South Korea, Japan, Israel, New Zealand, and Switzerland.\n> - The government retains authority to update the list of covered categories and beneficiary states, based on recommendations from public administrations and intelligence agencies, ensuring the framework evolves alongside emerging security needs.\n> \n> [...]", "mediaType": "text/markdown" }, "attachment": [ { "href": "https://decode39.com/10677/italy-launches-buy-transatlantic-tech-procurement-law", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://decode39.com/wp-content/uploads/2025/05/Imagoeconomica_2435977-scaled.jpg" }, "sensitive": false, "published": "2025-05-06T14:32:58.599530Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://lemmy.sdf.org/post/33999387", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/ca5b1b63-622b-4779-b3ee-1e7d12034be8" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/0d7bdfb2-8b92-4811-b528-d684cf243f53", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37415997", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Darcula Exposed: Inside a Global Phishing-as-a-Service Empire Powered by the Magic Cat Toolkit", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://securityonline.info/darcula-exposed-inside-a-global-phishing-as-a-service-empire-powered-by-the-magic-cat-toolkit/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/c7fba96e-baae-4b32-9718-aacc91a01d4c.webp" }, "sensitive": false, "published": "2025-05-06T13:38:39.081474Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37415997", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/f771781b-b2a0-4afc-9502-83114001d076" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/9473885d-a509-4418-8478-8d5a412a966c", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37415996", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Unauthenticated DoS Vulnerability Crashes Windows Deployment Services, No Patch", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://securityonline.info/unauthenticated-dos-vulnerability-crashes-windows-deployment-services-no-patch/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/342065d6-a197-4f1e-ab56-40ded5e7568e.webp" }, "sensitive": false, "published": "2025-05-06T13:38:28.978685Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37415996", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/9b2e5d8f-e6a3-42f4-8f84-3653de2ca7f7" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/9de54972-4038-44f2-a905-d9002ee2b06b", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37415422", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Google addresses 1 actively exploited vulnerability in May’s Android security update", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://cyberscoop.com/android-security-update-may-2025/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/ba4670ec-a830-4086-9610-5cca57ab0504.jpeg" }, "sensitive": false, "published": "2025-05-06T13:31:33.501222Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37415422", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/f1ae9858-a5f8-4995-929c-107965431cb2" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/742a6531-bf44-439e-8894-af340ffcd37a", "actor": "https://lemmy.ca/u/hellfire103", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://lemmy.ca/post/43520666", "attributedTo": "https://lemmy.ca/u/hellfire103", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "GlobalX, Airline for Trump’s Deportations, Hacked", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://archive.md/0mqnP", "mediaType": "text/html", "type": "Link" } ], "sensitive": false, "published": "2025-05-06T13:18:31.989670Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://lemmy.ca/post/43520666", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/59f2d4ac-76ee-40dd-92f6-9080bf5c2eee" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/6800ec2f-0bda-4059-a9ce-8e4d782eed6b", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37410575", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Gunra Ransomware – A Brief Analysis - CYFIRMA", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.cyfirma.com/research/gunra-ransomware-a-brief-analysis/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/7dd2c65f-6c68-48c3-aa5b-e6a1f6116194.jpeg" }, "sensitive": false, "published": "2025-05-06T12:10:57.770676Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37410575", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/4e7261cb-18fe-40e8-bbe4-fa6e0dd1fe3b" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/40f9e815-580d-4938-9865-2b0d1367af03", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37410504", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Luna Moth extortion hackers pose as IT help desks to breach US firms", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.bleepingcomputer.com/news/security/luna-moth-extortion-hackers-pose-as-it-help-desks-to-breach-us-firms/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-06T12:09:23.702929Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37410504", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/7803ee89-1705-4d57-aace-2a9b626f2c9e" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/eb6f2c27-d06d-4fdc-a21f-71307bf05a1b", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37410420", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://thehackernews.com/2025/05/wormable-airplay-flaws-enable-zero.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/1917c12a-441c-4414-83db-a11281e11841.webp" }, "sensitive": false, "published": "2025-05-06T12:07:14.165574Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37410420", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/27a5001a-457b-49a4-bd70-e0344f5b2b6f" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/2fcfa6bf-d888-429b-939a-9daaf0325f1e", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37410369", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Microsoft finds default Kubernetes Helm charts can expose data", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.bleepingcomputer.com/news/security/microsoft-finds-default-kubernetes-helm-charts-can-expose-data/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-06T12:07:02.377149Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37410369", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/449b6149-12ae-4bfc-8d00-ff1bef14056e" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/76f9c1df-08cf-4409-9e57-2cba6d2dd225", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37410365", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Bring Your Own Installer: Bypassing SentinelOne Through Agent Version Change Interruption", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.aon.com/en/insights/cyber-labs/bring-your-own-installer-bypassing-sentinelone", "mediaType": "text/html", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/f572ac54-4b38-4525-b0ae-34e7c95802a8.jpeg" }, "sensitive": false, "published": "2025-05-06T12:05:42.099185Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37410365", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/1506a03c-e2fd-4f86-8675-526375181375" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/bbb3de1f-8a10-4321-b136-6fa8e0919d0f", "actor": "https://scribe.disroot.org/u/randomname", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://scribe.disroot.org/post/2673818", "attributedTo": "https://scribe.disroot.org/u/randomname", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "China has found its assassin’s mace: high-altitude electromagnetic pulse (HEMP) weapons", "cc": [], "content": "<p>[This is an op-ed by Tin Pak, visiting academic at the National Defense University and a researcher at the Institute for National Defense and Security Research in Taiwan, and Chen Yu-cheng, an associate professor at the National Defense University.</p>\n<p>The term “assassin’s mace” originates from Chinese folklore, describing a concealed weapon used by a weaker hero to defeat a stronger adversary with an unexpected strike. In more general military parlance, the concept refers to an asymmetric capability that targets a critical vulnerability of an adversary. China has found its modern equivalent of the assassin’s mace with its high-altitude electromagnetic pulse (HEMP) weapons, which are nuclear warheads detonated at a high altitude, emitting intense electromagnetic radiation capable of disabling and destroying electronics.</p>\n<p>An assassin’s mace weapon possesses two essential characteristics: strategic surprise and the ability to neutralize a core dependency. HEMP weapons fit both criteria. In nanoseconds, a single HEMP detonation at an altitude between 20km and 50km can disable electronic infrastructure across large swathes of Taiwan. There would be little warning, as the Chinese People’s Liberation Army (PLA) fields DF-17 hypersonic missiles, capable of delivering a HEMP warhead above Taiwan in a matter of minutes.</p>\n<p>HEMPs strike at the foundation of modern society, its electronic systems. Every critical infrastructure uses electronics, from telecommunications, hospitals, energy production and distribution facilities, and even water purification systems.</p>\n<p>…</p>\n", "mediaType": "text/html", "source": { "content": "[This is an op-ed by Tin Pak, visiting academic at the National Defense University and a researcher at the Institute for National Defense and Security Research in Taiwan, and Chen Yu-cheng, an associate professor at the National Defense University.\n\nThe term “assassin’s mace” originates from Chinese folklore, describing a concealed weapon used by a weaker hero to defeat a stronger adversary with an unexpected strike. In more general military parlance, the concept refers to an asymmetric capability that targets a critical vulnerability of an adversary. China has found its modern equivalent of the assassin’s mace with its high-altitude electromagnetic pulse (HEMP) weapons, which are nuclear warheads detonated at a high altitude, emitting intense electromagnetic radiation capable of disabling and destroying electronics. \n\nAn assassin’s mace weapon possesses two essential characteristics: strategic surprise and the ability to neutralize a core dependency. HEMP weapons fit both criteria. In nanoseconds, a single HEMP detonation at an altitude between 20km and 50km can disable electronic infrastructure across large swathes of Taiwan. There would be little warning, as the Chinese People’s Liberation Army (PLA) fields DF-17 hypersonic missiles, capable of delivering a HEMP warhead above Taiwan in a matter of minutes. \n\nHEMPs strike at the foundation of modern society, its electronic systems. Every critical infrastructure uses electronics, from telecommunications, hospitals, energy production and distribution facilities, and even water purification systems.\n\n...", "mediaType": "text/markdown" }, "attachment": [ { "href": "https://www.taipeitimes.com/News/editorials/archives/2025/05/06/2003836382", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/f6c03da3-fb4f-4928-b2a4-4d88db70ad21.jpeg" }, "sensitive": false, "published": "2025-05-06T09:02:51.902689Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://scribe.disroot.org/post/2673818", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/d66c135e-fb86-4958-972c-49f760b8d6a6" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/ae1216ba-fbfb-4515-9c4d-4f46b94a38ca", "actor": "https://programming.dev/u/Pro", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://programming.dev/post/29831355", "attributedTo": "https://programming.dev/u/Pro", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "\"Mirai\" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://isc.sans.edu/diary/rss/31920", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/0d70c754-995c-4b07-bf31-9fdbe66b6421.jpeg" }, "sensitive": false, "published": "2025-05-06T08:05:02.593095Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://programming.dev/post/29831355", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/f7783593-68b5-4e14-ac9c-7edb7231ad09" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/30f53ea7-824e-4d91-9d1d-1d713d4657d6", "actor": "https://lemmy.sdf.org/u/Hotznplotzn", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://lemmy.sdf.org/post/33977937", "attributedTo": "https://lemmy.sdf.org/u/Hotznplotzn", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Technical experts call on Commissioner Virkkunen for a seat on the table of the European Commission’s Technology Roadmap on encryption", "cc": [], "content": "<p>cross-posted from: <a href=\"https://lemmy.sdf.org/post/33977882\">lemmy.sdf.org/post/33977882</a></p>\n<blockquote>\n<p>[…]</p>\n<p><strong>EU lawmaking needs to be based in evidence and reality</strong></p>\n<p>Encryption is an important technology to protect people’s rights and freedoms and an absolute requirement to navigate safely online. Still, plans that could undermine encryption have been at the centre of discussions at EU level, which has received heavy criticism. The proposed roadmap echoes in part a report published last year by the opaque “High Level Group on Access to Data for Effective Law Enforcement”.</p>\n<p>Several years of negotiations by policy-makers have not changed the scientific consensus that it is impossible to give law enforcement access to end-to-end encrypted communications without creating vulnerabilities that malicious actors and repressive governments can exploit. The technical truth remains: you cannot switch off end-to-end encryption without serious cybersecurity and human rights issues for all.</p>\n<p>Former Commissioner Johansson, at the helm of the controversial Child Sexual Abuse Regulation, did not want to listen to expert advice. Now with Commissioner Virkkunen at helm of the Technical Roadmap, we hope that she will be willing to listen to technical and digital rights community, will ensure seats at the table for public interest technologists and groups specialised in privacy, cybersecurity, and human rights. EU lawmaking needs to be based in evidence and reality, not “magical thinking“.</p>\n<p>[…]</p>\n</blockquote>\n", "mediaType": "text/html", "source": { "content": "cross-posted from: https://lemmy.sdf.org/post/33977882\n\n> [...]\n> \n> **EU lawmaking needs to be based in evidence and reality**\n> \n> Encryption is an important technology to protect people’s rights and freedoms and an absolute requirement to navigate safely online. Still, plans that could undermine encryption have been at the centre of discussions at EU level, which has received heavy criticism. The proposed roadmap echoes in part a report published last year by the opaque “High Level Group on Access to Data for Effective Law Enforcement”.\n> \n> Several years of negotiations by policy-makers have not changed the scientific consensus that it is impossible to give law enforcement access to end-to-end encrypted communications without creating vulnerabilities that malicious actors and repressive governments can exploit. The technical truth remains: you cannot switch off end-to-end encryption without serious cybersecurity and human rights issues for all.\n> \n> Former Commissioner Johansson, at the helm of the controversial Child Sexual Abuse Regulation, did not want to listen to expert advice. Now with Commissioner Virkkunen at helm of the Technical Roadmap, we hope that she will be willing to listen to technical and digital rights community, will ensure seats at the table for public interest technologists and groups specialised in privacy, cybersecurity, and human rights. EU lawmaking needs to be based in evidence and reality, not “magical thinking“.\n> \n> [...]", "mediaType": "text/markdown" }, "attachment": [ { "href": "https://edri.org/our-work/technical-experts-call-on-virkkunen-for-a-seat-on-the-table-european-commissions-technology-roadmap-on-encryption", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/a396ab2f-66de-4e66-a851-63847bd847d1.png" }, "sensitive": false, "published": "2025-05-06T06:23:47.281882Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://lemmy.sdf.org/post/33977937", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/7a0a32e2-cc0e-4a7d-8717-7b1c06b39cfc" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/f735043a-c3a0-4805-a081-bdf1e3586604", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37356160", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://thehackernews.com/2025/05/iranian-hackers-maintain-2-year-access.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/d7e0148b-8a0c-4e93-bbff-1776720b8c1a.webp" }, "sensitive": false, "published": "2025-05-05T16:32:40.331854Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37356160", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/3ccd8606-b922-4985-9ad1-981049eebde7" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/440ff5b5-f03d-4c64-8893-b6f0b4c071fa", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37356156", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "PoC Published for Exploited SonicWall Vulnerabilities", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.securityweek.com/poc-published-for-exploited-sonicwall-vulnerabilities/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-05T16:32:03.561737Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37356156", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/894e8406-9777-461e-9267-1b8ab9a6860d" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/b99caec9-8df3-4019-ad14-2574b8c97c51", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37356077", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "A hacker stole data from TeleMessage, the firm that sells modified versions of Signal to the U.S. gov", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://securityaffairs.com/177458/hacking/a-hacker-stole-data-from-telemessage-the-firm-that-sells-modified-versions-of-signal-to-the-u-s-gov.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/953732ca-ac4a-4875-bf9a-8101687195f8.png" }, "sensitive": false, "published": "2025-05-05T16:30:58.466142Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37356077", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/2c35f7f5-7fe2-4875-bccc-a71304a2f854" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/cb5b8131-065d-4ad5-a8b6-9d67ebf46f82", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37355415", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Experts shared up-to-date C2 domains and other artifacts related to recent MintsLoader attacks", "cc": [], "content": "<p>Original paper: <a href=\"https://go.recordedfuture.com/hubfs/reports/cta-2025-0429.pdf\">go.recordedfuture.com/hubfs/…/cta-2025-0429.pdf</a></p>\n", "mediaType": "text/html", "source": { "content": "Original paper: https://go.recordedfuture.com/hubfs/reports/cta-2025-0429.pdf", "mediaType": "text/markdown" }, "attachment": [ { "href": "https://securityaffairs.com/177448/malware/experts-shared-up-to-date-c2-domains-and-other-artifacts-related-to-recent-mintsloader-attacks.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/06ba551a-337e-4f86-ac73-e64628e6e73b.png" }, "sensitive": false, "published": "2025-05-05T16:25:49.373124Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37355415", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/e677ddc3-8077-4fa2-8e31-ffedb3c9fcae" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/1613ee5c-3e6f-4f21-b831-4243025519b8", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37355219", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Germany Most Targeted Country in Q1 2025 DDoS Attacks", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://hackread.com/germany-most-targeted-country-q1-2025-ddos-attacks/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/9d081afc-b6c5-45ca-bf54-83199cf79e3b.jpeg" }, "sensitive": false, "published": "2025-05-05T16:23:27.392530Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37355219", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/fd199c40-08a2-443f-814b-dbde35e56f00" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/d7c41645-d20c-4277-8125-405bdabe9b4b", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37344196", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Malicious Go Modules designed to wipe Linux systems", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://securityaffairs.com/177411/malware/malicious-go-modules-designed-to-wipe-linux-systems.html", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/4ffb71ab-2073-4e58-9bfd-d9935e5246a3.png" }, "sensitive": false, "published": "2025-05-05T12:56:42.305288Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37344196", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/9d7b10d5-917d-49a1-ae5a-d506a42fdaf2" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/a8adc81b-1b86-4edb-8914-5ef31bb721d2", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37343770", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Microsoft to Block Emails With 550 5.7.15 Access denied Error", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://cybersecuritynews.com/microsoft-to-block-emails/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/5c7b4009-0498-48b2-9776-3d580d96e00d.jpeg" }, "sensitive": false, "published": "2025-05-05T12:50:52.320257Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37343770", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/a3dd0092-bbdf-4210-ba42-0cc56c9d2202" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/1c58366f-73f9-4cfb-845d-ca8813c49d6f", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37343768", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Hackers Selling SS7 0-Day Vulnerability on Hacker Forums for $5000", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://cybersecuritynews.com/hackers-selling-ss7-0-day-vulnerability/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/76fef42e-5d7a-48e2-9ca3-46324d886eb9.jpeg" }, "sensitive": false, "published": "2025-05-05T12:50:37.769903Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37343768", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/d054591e-7aee-4b05-924a-5851e4f83090" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/ea9b3cd2-c2b9-4df3-9507-1205e56dcdd5", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37343714", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "Windows RDP Bug Allows Login With Expired Passwords - Microsoft Confirms No Fix", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://cybersecuritynews.com/windows-rdp-bug/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "image": { "type": "Image", "url": "https://sh.itjust.works/pictrs/image/42e57714-eca0-4108-be2b-9097f6248659.jpeg" }, "sensitive": false, "published": "2025-05-05T12:49:26.220653Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37343714", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/b8db0973-f992-4575-bed2-060eab6a99e3" }, { "actor": "https://sh.itjust.works/c/cybersecurity", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "id": "https://sh.itjust.works/activities/create/da51bcc4-30a9-4fd7-9319-7f674de80aa6", "actor": "https://sh.itjust.works/u/kid", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "object": { "type": "Page", "id": "https://sh.itjust.works/post/37340178", "attributedTo": "https://sh.itjust.works/u/kid", "to": [ "https://sh.itjust.works/c/cybersecurity", "https://www.w3.org/ns/activitystreams#Public" ], "name": "StealC malware enhanced with stealth upgrades and data theft tools", "cc": [], "mediaType": "text/html", "attachment": [ { "href": "https://www.bleepingcomputer.com/news/security/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools/", "mediaType": "text/html; charset=utf-8", "type": "Link" } ], "sensitive": false, "published": "2025-05-05T11:39:09.442091Z", "language": { "identifier": "en", "name": "English" }, "audience": "https://sh.itjust.works/c/cybersecurity", "tag": [ { "href": "https://sh.itjust.works/post/37340178", "name": "#cybersecurity", "type": "Hashtag" } ] }, "cc": [ "https://sh.itjust.works/c/cybersecurity" ], "type": "Create", "audience": "https://sh.itjust.works/c/cybersecurity" }, "cc": [ "https://sh.itjust.works/c/cybersecurity/followers" ], "type": "Announce", "id": "https://sh.itjust.works/activities/announce/create/f51c3c3d-7b12-4913-aee0-f821ed6cb5c6" } ] }