Security Feed

Live posts from mastodon.social on HTTP client vulnerabilities, botnets, JA4 fingerprinting, and network security research.

Sourced from the Mastodon public API - no account required. Cached 1 hour.
Library Radar
Library Version CVEs mentioned Collector Source
axios 4.2 - runner exists Axios Supply Chain Attack Pushes Cross-Platform RAT via Comp… · @sayzard@mastodon.sayzard.org
axios 0.30.4 - runner exists Supply Chain Attack Impacts Widely Used Axios npm Package | … · @orlysec@swecyb.com
Un ataque compromete a Axios, uno de los paquetes más popula… · @aidoo@masto.es
axios 1.14.1 - runner exists Supply Chain Attack Impacts Widely Used Axios npm Package | … · @orlysec@swecyb.com
Un ataque compromete a Axios, uno de los paquetes más popula… · @aidoo@masto.es
Axios Supply Chain Attack Pushes Cross-Platform RAT via Comp… · @sayzard@mastodon.sayzard.org
all #ja4 #tlsfingerprinting #networkfingerprinting #botnet #malware #infosec #cybersecurity #vulnerability #cve #threatintel #networksecurity #scraping
lang all en de es fr it pl pt ru
Showing 75 posts · cached 0 min ago · refresh
sayzard
@sayzard@mastodon.sayzard.org
#malware en
Axios의 npm 유지관리자 계정이 탈취돼 axios@1.14.1·0.30.4에 악성 의존성 plain-crypto-js@4.2.1이 주입됐다. postinstall으로 macOS·Windows·Linux용 RAT을 배포·실행하고 자기 삭제·포렌식 은폐를 수행. 즉시 1.14.0/0.30.3으로 다운그레이드, 비밀키·토큰 교체, plain-crypto-js 제거, C2(sfrclak.com) 차단 및 시스템 검사 권고 https:// thehackernews.com/2026/03/axio s-supply-chain-attack-p
0 0 2026-04-01 view →
sayzard
@sayzard@mastodon.sayzard.org
#malware en
이 GitHub 리포지토리는 mac용 axios 보안 검사 스크립트와 복구 가이드를 제공한다. 권장 조치: axios를 안전한 버전(1.14.0 또는 0.30.3)으로 다운그레이드·고정(overrides/resolutions), node_modules/plain-crypto-js 제거, npm install --ignore-scripts 실행. RAT 발견 시 시스템을 완전 재구성하고 모든 자격증명 회수, CI/CD 감사 및 C2(142.11.206.73, sfrclak.com) 차단 권고. https:// github.com/Li
0 0 2026-04-01 view →
Saltmyhash
@saltmyhash@infosec.exchange
#threatintel en
Your org should be activating Entra ID conditional access policies to outright block device code authorizations with a carveout for very limited use cases such as meeting room conferencing devices. Even Microsoft knows this and has specific guidance on how to enforce it. Device code phishing is hot
0 0 2026-04-01 view →
RDP Snitch
@rdpsnitch@infosec.exchange
#infosec en
2026-03-31 RDP # Honeypot IOCs - 705 scans Thread with top 3 features in each category and links to the full dataset # DFIR # InfoSec Top IPs: 143.198.111.35 - 495 143.110.190.12 - 36 80.66.83.75 - 27 Top ASNs: AS14061 - 531 AS216473 - 42 AS396982 - 36 Top Accounts: hello - 531 Administr - 39 Domain
0 0 2026-04-01 view →
RDP Snitch
@rdpsnitch@infosec.exchange
#infosec en
2026-03-31 RDP # Honeypot IOCs - 470 scans Thread with top 3 features in each category and links to the full dataset # DFIR # InfoSec Top IPs: 143.198.111.35 - 330 143.110.190.12 - 24 80.66.83.75 - 18 Top ASNs: AS14061 - 354 AS216473 - 28 AS396982 - 24 Top Accounts: hello - 354 Administr - 26 Domain
0 0 2026-04-01 view →
RDP Snitch
@rdpsnitch@infosec.exchange
#infosec en
2026-03-31 RDP # Honeypot IOCs - 235 scans Thread with top 3 features in each category and links to the full dataset # DFIR # InfoSec Top IPs: 143.198.111.35 - 165 143.110.190.12 - 12 80.66.83.75 - 9 Top ASNs: AS14061 - 177 AS216473 - 14 AS396982 - 12 Top Accounts: hello - 177 Administr - 13 Domain
0 0 2026-04-01 view →
TierraSapiens
@tierrasapiens
#cybersecurity es
🖲️ # Cybersecurity # Ciberseguridad # Ciberseguranca # Security # Seguridad # Seguranca # News # Noticia # Noticias # Tecnologia # Technology ⚫ Rethinking Vulnerability Management Strategies for Mid-Market Security 🔗 https://www. darkreading.com/cybersecurity- operations/rethinking-vulnerability-man
0 1 2026-04-01 view →
LBHuston
@lbhuston
#infosec en
Fine-grained control per API method and version defines boundaries exactly. Read more 👉 https:// lttr.ai/Aptpv # Security # Infosec # Api
0 0 2026-04-01 view →
PhishDestroy Alert
@phishdestroy
#malware en
🚨 PHISHING DETECTED 🚨 🔗 Suspicious URL: exiodhun[.]gitbook[.]io 🔍 Analysis at: https:// phishdestroy.io/domain/exiodhu n.gitbook.io/ # BlockchainFraud # scamalert # malware
0 0 2026-04-01 view →
PhishDestroy Alert
@phishdestroy
#malware en
🚨 PHISHING DETECTED 🚨 🔗 Suspicious URL: eni-top[.]website 🔍 Analysis at: https:// phishdestroy.io/domain/eni-top .website/ # BlockchainFraud # BlockchainSafety # malware # WalletSecurity # Web3Hacking
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#infosec en
🚨 EUVD-2026-17709 📊 Score: 6.2/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted TIFF input can trigger Undefined Behavior (U
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#infosec en
🚨 EUVD-2026-17711 📊 Score: 6.2/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, an Undefined Behavior (UB) condition in IccUtil.cpp ca
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#infosec en
🚨 EUVD-2026-17713 📊 Score: 6.2/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is an Undefined Behavior (UB) condition in the X
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#infosec en
🚨 EUVD-2026-17714 📊 Score: 6.2/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is an Undefined Behavior (UB) condition in IccUt
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#infosec en
🚨 EUVD-2026-17715 📊 Score: 6.2/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is an Undefined Behavior (UB) condition in IccPr
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#infosec en
🚨 EUVD-2026-17716 📊 Score: 6.2/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a null-pointer dereference (NPD) in CIccTagLut16::Writ
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#cybersecurity en
🚨 EUVD-2026-17725 📊 Score: 4.8/10 (CVSS v3.1) 📦 Product: Bento4 🏢 Vendor: Axiomatic 📅 Updated: 2026-03-31 📝 A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipu
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#cybersecurity en
🚨 EUVD-2026-17717 📊 Score: 6.2/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is an Undefined Behavior (UB) issue in IccTagLut
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#vulnerability en
🚨 EUVD-2026-17718 📊 Score: 4.0/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a defect in LUT dump/iteration logic affectin
0 0 2026-04-01 view →
EUVD Bot
@EUVD_Bot
#vulnerability en
🚨 EUVD-2026-17719 📊 Score: 6.2/10 (CVSS v3.1) 📦 Product: iccDEV 🏢 Vendor: InternationalColorConsortium 📅 Updated: 2026-03-31 📝 iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a heap-buffer-overflow (HBO) in CIccApplyCmmSearch::co
0 0 2026-04-01 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
CVE Alert: CVE-2026-5204 - Tenda - CH22 - https://www. redpacketsecurity.com/cve-aler t-cve-2026-5204-tenda-ch22/ # OSINT # ThreatIntel # CyberSecurity # cve -2026-5204 # tenda # ch22
0 0 2026-03-31 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
CVE Alert: CVE-2026-34504 - OpenClaw - OpenClaw - https://www. redpacketsecurity.com/cve-aler t-cve-2026-34504-openclaw-openclaw/ # OSINT # ThreatIntel # CyberSecurity # cve -2026-34504 # openclaw #
0 0 2026-03-31 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
CVE Alert: CVE-2026-5210 - SourceCodester - Leave Application System - https://www. redpacketsecurity.com/cve-aler t-cve-2026-5210-sourcecodester-leave-application-system/ # OSINT # ThreatIntel # CyberSecurity # cve -2026-5210 # sourcecodester # leave -application-system
0 0 2026-03-31 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
CVE Alert: CVE-2026-34503 - OpenClaw - OpenClaw - https://www. redpacketsecurity.com/cve-aler t-cve-2026-34503-openclaw-openclaw/ # OSINT # ThreatIntel # CyberSecurity # cve -2026-34503 # openclaw #
0 0 2026-03-31 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
CVE Alert: CVE-2026-33579 - OpenClaw - OpenClaw - https://www. redpacketsecurity.com/cve-aler t-cve-2026-33579-openclaw-openclaw/ # OSINT # ThreatIntel # CyberSecurity # cve -2026-33579 # openclaw #
0 0 2026-03-31 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
Cobalt Strike Beacon Detected - 115[.]190[.]161[.]178:1234 - https://www. redpacketsecurity.com/cobalt-s trike-beacon-detected-115-190-161-178-port-1234-37/ # CobaltStrikeBeaconDetected # OSINT # ThreatIntel
0 0 2026-03-31 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
Cobalt Strike Beacon Detected - 156[.]245[.]144[.]203:4443 - https://www. redpacketsecurity.com/cobalt-s trike-beacon-detected-156-245-144-203-port-4443-5/ # CobaltStrikeBeaconDetected # OSINT # ThreatIntel
0 0 2026-03-31 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
Cobalt Strike Beacon Detected - 38[.]49[.]57[.]15:443 - https://www. redpacketsecurity.com/cobalt-s trike-beacon-detected-38-49-57-15-port-443-21/ # CobaltStrikeBeaconDetected # OSINT # ThreatIntel
0 0 2026-03-31 view →
RedPacket Security
@RedPacketSecurity
#threatintel en
Cobalt Strike Beacon Detected - 47[.]105[.]36[.]109:443 - https://www. redpacketsecurity.com/cobalt-s trike-beacon-detected-47-105-36-109-port-443-18/ # CobaltStrikeBeaconDetected # OSINT # ThreatIntel
0 0 2026-03-31 view →
PhishDestroy Alert
@phishdestroy
#malware en
🚨 PHISHING DETECTED 🚨 🔗 Suspicious URL: coinbsse-pro-logi-sso[.]created[.]app 🔍 Analysis at: https:// phishdestroy.io/domain/coinbss e-pro-logi-sso.created.app/ # Web3Hacking # CryptoSafety # CryptoDrainers # WalletSecurity # malware
0 0 2026-03-31 view →
PhishDestroy Alert
@phishdestroy
#malware en
🚨 PHISHING DETECTED 🚨 🔗 Suspicious URL: www[.]web3cloudsafetech[.]com 🔍 Analysis at: https:// phishdestroy.io/domain/www.web 3cloudsafetech.com/ # malware # CryptoThreats # WalletSecurity # BlockchainSafety
0 0 2026-03-31 view →
PhishDestroy Alert
@phishdestroy
#malware en
🚨 PHISHING DETECTED 🚨 🔗 Suspicious URL: solana[.]traxr[.]pro 🔍 Analysis at: https:// phishdestroy.io/domain/solana. traxr.pro/ # scamalert # SecureYourWallet # malware # cybersec # BlockchainFraud
0 0 2026-03-31 view →
PhishDestroy Alert
@phishdestroy
#malware en
🚨 PHISHING DETECTED 🚨 🔗 Suspicious URL: wallet4[.]nexretail9[.]monster 🔍 Analysis at: https:// phishdestroy.io/domain/wallet4 .nexretail9.monster/ # cybersec # CryptoHacking # malware # WalletSecurity
0 0 2026-03-31 view →
PhishDestroy Alert
@phishdestroy
#malware en
🚨 PHISHING DETECTED 🚨 🔗 Suspicious URL: rbxshader[.]xyz 🔍 Analysis at: https:// phishdestroy.io/domain/rbxshad er.xyz/ # DigitalFraud # WalletDrainers # malware
0 0 2026-03-31 view →
RootShell
@rootshellonline@infosec.exchange
#networksecurity en
Stay ahead of cyber threats. Today’s playlist dives deep into network breaches and how to stop them. ⚡ https://www. youtube.com/playlist?list=PLXq x05yil_mcNhv_qUKj-kZRNLxPt-03O # NetworkSecurity # InfoSec # CyberDefense # Ransomware # OnlineSafety
0 0 2026-03-31 view →
PhishDestroy Alert
@phishdestroy
#malware en
🚨 PHISHING DETECTED 🚨 🔗 Suspicious URL: trustvisa[.]app 🔍 Analysis at: https:// phishdestroy.io/domain/trustvi sa.app/ # Web3Hacking # malware # CryptoProtection # CryptoAwareness # scam # scamalert # WalletHackers
0 0 2026-03-31 view →
RootShell
@rootshellonline@infosec.exchange
#networksecurity en
Stay ahead of cyber threats. Today’s playlist dives deep into network breaches and how to stop them. ⚡ https://www. youtube.com/playlist?list=PLXq x05yil_menswmrfKMagbTC9Luj05YO # NetworkSecurity # InfoSec # CyberDefense # Ransomware # OnlineSafety
0 1 2026-03-31 view →
TechNadu
@technadu@infosec.exchange
#networksecurity en
Telegram disruption in Russia intensifies. • ISP-level blocking observed since ~March 20 • CDN throttling interrupts downloads mid-stream • Expanding to WhatsApp, Signal, YouTube Shift toward infrastructure-based censorship. Source: https:// explorer.ooni.org/findings/962 25549500 💬 Thoughts? Follow
0 0 2026-03-31 view →
Know All Edge
@knowalledge
#networksecurity en
Zero Trust Network Access (ZTNA) is transforming how organizations secure applications in hybrid and cloud environments. This architecture diagram shows how identity providers, policy engines, and enforcement points deliver least-privilege, identity-based access. Move beyond VPNs, reduce attack surf
0 0 2026-03-31 view →
Know All Edge
@knowalledge
#networksecurity en
Still using VPN for remote access? This visual compares ZTNA vs VPN and shows why Zero Trust is gaining traction. ZTNA provides identity-based, application-level access, reducing network exposure and limiting lateral movement. A smarter approach for modern, hybrid work security. What’s your take on
0 0 2026-03-31 view →
Bryan King
@bdking71.wordpress.com@bdking71.wordpress.com
#networksecurity en
The Silent Breach: Why Your Security Gateway Can’t See the Malware in Your Images 3,217 words, 17 minutes read time. The Invisible Threat: Why Modern Cybersecurity Cannot Afford to Ignore Digital Steganography In the current era of high-frequency cyber warfare, the most effective weapon is not
0 0 2026-03-31 view →
RootShell
@rootshellonline@infosec.exchange
#networksecurity en
Stay ahead of cyber threats. Today’s playlist dives deep into network breaches and how to stop them. ⚡ https://www. youtube.com/playlist?list=PLXq x05yil_mcfP7QXQ5FDGlmKtE5O9LfF # NetworkSecurity # InfoSec # CyberDefense # Ransomware # OnlineSafety
0 1 2026-03-31 view →
RootShell
@rootshellonline@infosec.exchange
#networksecurity en
Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 https://www. youtube.com/playlist?list=PLXq x05yil_mdl2JENBTBF15prRSd919ty # CyberAwareness # NetworkSecurity # ZeroTrust # ThreatIntelligence # Malware
0 0 2026-03-30 view →
SecPoint
@secpoint
#networksecurity en
https://www. youtube.com/shorts/UgjyyMTi1T8 You do not get hacked only because of bad systems. You get hacked because of human mistakes too. One wrong click, one open port, one exposed tool, and the attacker gets in. Log in to https:// vip.secpoint.com to download the latest SecPoint Penetrator &amp
0 0 2026-03-30 view →
RootShell
@rootshellonline@infosec.exchange
#networksecurity en
Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 https://www. youtube.com/playlist?list=PLXq x05yil_mdneL39RX8eC_-aKxoNZfqc # CyberAwareness # NetworkSecurity # ZeroTrust # ThreatIntelligence # Malware
0 1 2026-03-30 view →
Colin Watson
@_Colin_Watson
#scraping en
Areejit Banerjee explains how the OWASP Automated Threat Handbook can help in the defence against AI-related scraping. # automatedthreats # scraping # bots # infosec # ciso # owasp @ owasp A CISO's Playbook for Defending Data Assets Against AI Scraping https://www. darkreading.com/cyber-risk/cis
0 0 2026-03-29 view →
Steph Vee :blobcatcoffee:
@st3phvee
#scraping en
ClaudeBot is making regularly scheduled requests for my sitemap. It's completely ignoring robots.txt. Enjoy your 403 errors, ClaudeBot! # FuckAI # Scraping
1 0 2026-03-28 view →
Christoph Schmees
@PC_Fluesterer@social.tchncs.de
#botnet de
Die vier wichtigsten Botnets abgeschaltet Das dürfte ein schwerer Schlag gegen den Wirtschaftszweig Cybercrime sein: Behörden aus Deutschland, Kanada und den USA ist es in einer gemeinsamen Aktion gelungen, die Infrastruktur (C2 Server, Domains) hinter den vier größten Botnets auszuschalten. Das sin
5 7 2026-03-27 view →
mvc1095 (they)
@mvc1095@kolektiva.social
#scraping en
Quo Vadis, Crawlers? Progress and what’s next on safeguarding our infrastructure https:// diff.wikimedia.org/2026/03/26/ quo-vadis-crawlers-progress-and-whats-next-on-safeguarding-our-infrastructure/ # AI , # AIDataCrawlers , # Crawlers , # Infrastructure , # Knowledge , # KnowledgeAsAService , # Sc
0 1 2026-03-27 view →
Habr
@habr@zhub.link
#scraping ru
Как я сделал глобальный семантический поиск для Telegram TLDR: https:// semagram.io/ Всё началось с того, что меня сократили на работе, и я несколько месяцев подряд не мог найти новую работу. Так получилось, что крупнейший работодатель региона Amadeus (хотя я работал даже не там) - решил заморозить
0 0 2026-03-27 view →
Infoblox Threat Intel
@InfobloxThreatIntel@infosec.exchange
#ja4 en
We planned one report on Keitaro abuse, but we ran out of pages before we ran out of cases. So here’s Part 2 of 3, a medley of threats that go well beyond AI‑investment scams. Threat actors abuse Keitaro’s traffic distribution, cloaking, and rule engine to hide malicious landing pages behind geo and
1 1 2026-03-26 view →
AA
@AAKL@infosec.exchange
#botnet en
New. This relates to CVE-2023-46604, CVE-2023-38646, and CVE-2025-55182. VulnCheck: The Return of the Kinsing https://www. vulncheck.com/blog/return-of-t he-kinsing @ vulncheck # infosec # threatresearch # botnet
0 1 2026-03-26 view →
The New Oil
@thenewoil@mastodon.thenewoil.org
#botnet en
Manager of # botnet used in # ransomware attacks gets 2 years in prison https://www. bleepingcomputer.com/news/secu rity/russian-man-sentenced-for-operating-botnet-used-in-ransomware-attacks/ # cybercrime # cybersecurity
0 0 2026-03-26 view →
securityaffairs
@securityaffairs@infosec.exchange
#botnet it
Russian national convicted for running # botnet used in attacks on U.S. firms https:// securityaffairs.com/189987/cyb er-crime/russian-national-convicted-for-running-botnet-used-in-attacks-on-u-s-firms.html # securityaffairs # hacking
0 1 2026-03-25 view →
Hackread.com
@Hackread@mstdn.social
#botnet en
It turns out # Mirai malware isn’t fading, it’s multiplying. Hundreds of Mirai-based variants now host massive botnet growth, exploiting weak IoT devices and evolving attack methods. Read more: https:// hackread.com/mirai-malware-var iants-botnet-growth/ # Botnet # CyberSecurity # IoT # Malware # DD
0 1 2026-03-25 view →
TugaTech 🖥️
@tugatech@masto.pt
#botnet pt
Hacker russo condenado a dois anos de prisão por operar botnet de extorsão 🔗  https:// tugatech.com.pt/t80783-hacker- russo-condenado-a-dois-anos-de-prisao-por-operar-botnet-de-extorsao # botnet # hacker  
1 0 2026-03-25 view →
OTX Bot
@techbot@social.raytec.co
#botnet en
Mirai Variant and Monaco Miner Campaign Targeting Linux Systems Two malware strains are targeting Linux systems CondiBot an evolved Mirai botnet used for DDoS attacks and Monaco an SSH brute-force and cryptocurrency mining campaign. Pulse ID: 69c1943ae53f9148f6f7f398 Pulse Link: https:// otx.alienva
0 0 2026-03-23 view →
Hackread.com
@Hackread@mstdn.social
#botnet en
📢 Global crackdown dismantles Aisuru, KimWolf, JackSkid, and Mossad botnets behind major DDoS attack campaigns targeting millions of devices worldwide. Read: https:// hackread.com/crackdown-dismant les-4-botnets-ddos-attacks/ # CyberSecurity # CyberCrime # DDoS # Mossad # Aisuru # Botnet
1 0 2026-03-23 view →
Marcel SIneM(S)US
@simsus@social.tchncs.de
#botnet de
Ich finde es schwierig eine # Malware / ein # Botnet nach dem israelischen Geheimdienst # Mossad zu benennen # Aisuru , # KimWolf & Co.: Behörden „stören“ vier gefährliche Botnets | Security https://www. heise.de/news/Aisuru-KimWolf-C o-Laenderuebergreifende-Aktion-gegen-vier-gefaehrliche-Botnet
0 0 2026-03-22 view →
𝕃𝕚𝕟𝕦𝕩𝟘
@linux0@bonito.cafe
#scraping es
Si alguien de # españa está intentando descargar archivos # PARES pueden utilizar el script que armé, la interfaz del sitio es una mierda honestamente, no la entendí. Tengo el código en dos lugares, forgejo y la caja de TP, accedan al que mejor les guste, Forgejo es como github pero no es de # micro
2 3 2026-03-21 view →
:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉
@nemo@mas.to
#botnet de
Erfolgreicher Schlag gegen Cyberkriminalität! 🚨 Internationale Ermittler aus USA, Deutschland & Kanada haben vier mächtige Botnetze (Aisuru, Kimwolf, JackSkid, Mossad) zerschlagen – über 3 Mio. infizierte Geräte wie Router & Webcams lahmgelegt. Hunderttausende DDoS-Angriffe, auch auf US-Mili
1 3 2026-03-21 view →
Colin Watson
@_Colin_Watson
#scraping en
The free OWASP Automated Threat Handbook defines a common language to identify and classify automated threats to web applications and relevant countermeasures. https:// owasp.org/www-project-automate d-threats-to-web-applications/ # AccountAggregation # AccountCreation # CAPTCHADefeat # CardCracking
1 1 2026-03-17 view →
Habr 25+
@habr25@zhub.link
#ja4 ru
Анатомия DPI анализа: что происходит с твоим пакетом за первые 16 КБ Пошаговый разбор того, как ТСПУ анализирует трафик — от первого SYN до поведенческого ML. С конкретными числами, реальными алгоритмами и объяснением почему одни протоколы умирают на первом байте, а другие живут месяцами Большинство
0 1 2026-03-14 view →
Frontend Dogma
@frontenddogma@mas.to
#scraping en
The Emerging AI Agents War, by (not on Mastodon or Bluesky): https://www. junkcharts.com/the-emerging-ai -agents-war/ # aiagents # ai # scraping # amazon # ecommerce
0 1 2026-03-14 view →
Habr
@habr@zhub.link
#ja4 ru
Анатомия DPI анализа: что происходит с твоим пакетом за первые 16 КБ Пошаговый разбор того, как ТСПУ анализирует трафик — от первого SYN до поведенческого ML. С конкретными числами, реальными алгоритмами и объяснением почему одни протоколы умирают на первом байте, а другие живут месяцами Большинство
0 0 2026-03-14 view →
Habr 25+
@habr25@zhub.link
#ja4 ru
Как ТСПУ ловит VLESS в 2026 и почему XHTTP — следующий шаг Разбор методов детекции, которые работают прямо сейчас. JA3/JA4-отпечатки, поведенческий анализ и архитектура XHTTP, которая закрывает именно эти дыры Если твой VLESS+Reality сервер лёг в последние месяцы — ты не один. В сообществах фиксирую
0 0 2026-03-12 view →
Habr
@habr@zhub.link
#ja4 ru
Как ТСПУ ловит VLESS в 2026 и почему XHTTP — следующий шаг Разбор методов детекции, которые работают прямо сейчас. JA3/JA4-отпечатки, поведенческий анализ, академическая работа СПбПУ по детекции Reality — и архитектура XHTTP, которая закрывает именно эти дыры Если твой VLESS+Reality сервер лёг в пос
0 0 2026-03-12 view →
Steph Vee :blobcatcoffee:
@st3phvee
#scraping en
🔗 https:// stephvee.ca/blog/updates/the-s craping-problem-is-worse-than-i-thought/ The extreme amount of unethical # scraping that's occurring all over the web right now *definitely* won't be solved by limiting nice features for good-faith visitors; for that reason, I've reinstated my fu
12 3 2026-03-04 view →
Rechtsanwälte Kotz
@kanzlei_kotz@nrw.social
#scraping de
📌 Streitwertsenkung bei Scraping-Klagen Das OLG Zweibrücken senkt den Streitwert bei zurückgezogener Berufung von 16.500€ auf 10.000€, was zu deutlich geringeren Gerichts- und Anwaltskosten führt. So wird das Prozessrisiko kalkulierbarer. # Scraping # Kostenrisiko # Urteil https://www. ra-kotz.de/st
1 1 2026-03-02 view →
sayzard
@sayzard@mastodon.sayzard.org
#scraping en
[Show GN: 다이소 MCP - 어떤 AI든 내 주변 다이소 재고파악을 가능하도록 다이소 MCP를 챗지피티와 클로드에서 사용 가능하도록 구성한 프로젝트로, 오픈소스 기반의 서버리스 아키텍처를 활용하여 다이소 재고 파악이 가능하도록 구현했습니다. 향후 영화관, 편의점, 백화점 등의 정보도 확장할 예정입니다. https:// news.hada.io/topic?id=27131 # ai # openai # chatgpt # scraping # serverless
0 0 2026-03-02 view →
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
@netresec@infosec.exchange
#ja4 en
RE: https:// infosec.exchange/@geraldcombs/ 116133603929246605 # Wireshark 4.6.4 resolves 3 denial of service vulnerabilities in the following protocol dissectors: USB HID CVE-2026-3201 NTS-KE CVE-2026-3202 RF4CE Profile CVE-2026-3203 The new release also includes a bug fix for # JA4 fingerprints of
0 0 2026-03-02 view →
CyberVeille.ch
@cyberveille@mastobot.ping.moi
#ja4 fr
📢 JA4 pour traquer les scrapers IA : guide pratique de fingerprinting TLS 📝 Source: WebDecoy (équipe sécurité). 📖 cyberveille : https:// cyberveille.ch/posts/2026-01-1 0-ja4-pour-traquer-les-scrapers-ia-guide-pratique-de-fingerprinting-tls/ 🌐 source : https:// webdecoy.com/blog/ja4-fingerpr inting-a
0 0 2026-01-11 view →
abyssal_dk
@abyssal_dk@infosec.exchange
#ja4 fr
http:// blog.foxio.io/ja4+-network-fin gerprinting https:// github.com/FoxIO-LLC/ja4 # ja4 + # blueteam # redteam
0 1 2025-04-17 view →
Pan Żarówka
@user_896392@pol.social
#ja4 pl
Masz VPN, zmieniony user-agent, prywatną przeglądarkę – a mimo to serwer wie, kim jesteś? Bo dziś identyfikacja to coś więcej niż ciasteczka. W grze są JA3, JA4, PeetPrint, fingerprinting HTTP/2 od Akamai, kolejność nagłówków, ALPN, WebGL, fonty, język systemu… Prywatność nie kończy się na adresie I
0 2 2025-03-12 view →
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
@netresec@infosec.exchange
#ja4 en
PolarProxy 1.0.1 Released 🆔 More # JA4 🔂 Fail-open on # TLS errors ⏩ Better performance https:// netresec.com/?b=2523c96
0 0 2025-02-07 view →