is-a.cat is one of the many independent Mastodon servers you can use to participate in the fediverse.

Administered by:

Server stats:

10
active users

#CyberSecurity

196 meows119 participants16 meows today
Hackread.com<p>If you use WhatsApp for Windows, update to the latest version now. In the meantime, avoid opening any files sent to you.</p><p>Read: <a href="https://hackread.com/whatsapp-windows-flaw-hackers-sneak-malicious-files/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/whatsapp-windows-</span><span class="invisible">flaw-hackers-sneak-malicious-files/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a> <a href="https://mstdn.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a></p>
⚯ Michel de Cryptadamus ⚯<p>One of America’s important federal agencies that works to combat international money laundering and other financial crimes got hacked a few weeks ago. Penetration was detected on Feb. 12th but who knows how long they were compromised. <a href="https://universeodon.com/tags/winning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>winning</span></a></p><p>&gt; "The Office of the Comptroller of the Currency (OCC) today notified Congress of a major information security incident. On February 11, 2025, the OCC learned of unusual interactions between a system administrative account in its office automation environment and OCC user mailboxes."</p><p><a href="https://www.occ.gov/news-issuances/news-releases/2025/nr-occ-2025-30.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">occ.gov/news-issuances/news-re</span><span class="invisible">leases/2025/nr-occ-2025-30.html</span></a></p><p><a href="https://universeodon.com/tags/OCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OCC</span></a> <a href="https://universeodon.com/tags/uspol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uspol</span></a> <a href="https://universeodon.com/tags/eupol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eupol</span></a> <a href="https://universeodon.com/tags/moneylaundering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>moneylaundering</span></a> <a href="https://universeodon.com/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://universeodon.com/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
AAKL<p>WhatsApp Security Advisories: CVE-2025-30401: spoofing issue in WhatsApp for Windows prior to version 2.2450.6 <a href="https://www.whatsapp.com/security/advisories/2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">whatsapp.com/security/advisori</span><span class="invisible">es/2025/</span></a></p><p>More:</p><p>Bleeping Computer: WhatsApp flaw can let attackers run malicious code on Windows PCs <a href="https://www.bleepingcomputer.com/news/security/whatsapp-flaw-can-let-attackers-run-malicious-code-on-windows-pcs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/whatsapp-flaw-can-let-attackers-run-malicious-code-on-windows-pcs/</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@BleepingComputer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BleepingComputer</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@serghei" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>serghei</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptHub</span></a>'s dual life: Cybercriminal vs <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> bug-bounty researcher</p><p><a href="https://www.bleepingcomputer.com/news/security/encrypthubs-dual-life-cybercriminal-vs-windows-bug-bounty-researcher/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/encrypthubs-dual-life-cybercriminal-vs-windows-bug-bounty-researcher/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Croutons for breakfast 🪓<p>Surveillance, Cybersecurity, And Financial Tech For Mutual Aid</p><p>&gt; Today, we’re sharing excerpts from Shareable’s Mutual Aid 101 Learning Series‘ third session.</p><p><a href="https://popularresistance.org/surveillance-cybersecurity-and-financial-tech-for-mutual-aid/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">popularresistance.org/surveill</span><span class="invisible">ance-cybersecurity-and-financial-tech-for-mutual-aid/</span></a></p><p><a href="https://mastodon.world/tags/PopularResistance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PopularResistance</span></a> <a href="https://mastodon.world/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a> <a href="https://mastodon.world/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.world/tags/Financial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Financial</span></a> <a href="https://mastodon.world/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://mastodon.world/tags/MutualAid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MutualAid</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> fixes <a href="https://mastodon.thenewoil.org/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> zero-days exploited in attacks, 60 other flaws</p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-android-zero-days-exploited-in-attacks-60-other-flaws/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/google-fixes-android-zero-days-exploited-in-attacks-60-other-flaws/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p>Malicious <a href="https://mastodon.thenewoil.org/tags/VSCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VSCode</span></a> extensions infect <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> with cryptominers</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-vscode-extensions-infect-windows-with-cryptominers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/malicious-vscode-extensions-infect-windows-with-cryptominers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/cryptominer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptominer</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Linuxiarze<p>Cyberprzestępczość 2.0: jak zorganizowane grupy, sztuczna inteligencja oraz nowe metody atakowania redefiniują zagrożenia dla firm i użytkowników. Działalność cyberprzestępców staje się coraz bardziej zorganizowana, a stosowane przez nich metody – wyrafinowane. <a href="https://linuxiarze.pl/cyberprzestepczosc-2-0/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiarze.pl/cyberprzestepczo</span><span class="invisible">sc-2-0/</span></a> <a href="https://mastodon.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/sztucznainteligencja" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sztucznainteligencja</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Food" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Food</span></a> giant WK <a href="https://mastodon.thenewoil.org/tags/Kellogg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kellogg</span></a> discloses <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> linked to <a href="https://mastodon.thenewoil.org/tags/Clop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Clop</span></a> <a href="https://mastodon.thenewoil.org/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p>
Keila<p>Spammers and scammers seem to be constantly surprised that all new Keila subscriptions are manually reviewed. Turns out: <a href="https://fosstodon.org/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> isn’t using an 8€/month plan to send support emails. 🙄</p><p>I deleted and refunded the account before they managed to send a single email.</p><p><a href="https://fosstodon.org/tags/buildinpublic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>buildinpublic</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/spam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spam</span></a> <a href="https://fosstodon.org/tags/antispam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>antispam</span></a></p>
Hackread.com<p>NEW: HellCat ransomware hits 4 companies across the US and Europe by exploiting Jira credentials stolen through infostealer malware.</p><p>Read: <a href="https://hackread.com/hellcat-ransomware-firms-infostealer-stolen-jira-credentials/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/hellcat-ransomwar</span><span class="invisible">e-firms-infostealer-stolen-jira-credentials/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/HellCat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HellCat</span></a> <a href="https://mstdn.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://mstdn.social/tags/InfoStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoStealer</span></a></p>
ChiefGyk3D<p>Time to stop putting it off and finally focus on getting my General and then Amateur Extra radio licenses. It’s been a goal for months. Once that’s done, I’ll shift to studying for my CCSP since I already have my CISSP. Gotta keep leveling up! <a href="https://social.chiefgyk3d.com/tags/AmateurRadio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AmateurRadio</span></a> <a href="https://social.chiefgyk3d.com/tags/HAMradio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HAMradio</span></a> <a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/CCSP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CCSP</span></a></p>
Open Rights Group<p>ORG has joined 237 civil society groups, companies and cybersecurity experts in an open letter to members of the Swedish Riksdag.</p><p>We call on them to reject legislation that would force companies to undermine the encryption of their services.</p><p>Read more ⬇️</p><p><a href="https://www.globalencryption.org/2025/04/joint-letter-on-swedish-data-storage-and-access-to-electronic-information-legislation/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">globalencryption.org/2025/04/j</span><span class="invisible">oint-letter-on-swedish-data-storage-and-access-to-electronic-information-legislation/</span></a></p><p><a href="https://social.openrightsgroup.org/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://social.openrightsgroup.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>e2ee</span></a> <a href="https://social.openrightsgroup.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.openrightsgroup.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
ChiefGyk3D<p>I may not be the best at Path of Exile 2… but I’m definitely better than Elon Musk. Catch me playing more PoE2 on Linux tonight—might even kick things off with a quick soldering project. Live on Twitch at 7:30 PM EST! <a href="https://social.chiefgyk3d.com/tags/PoE2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoE2</span></a> <a href="https://social.chiefgyk3d.com/tags/LinuxGaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxGaming</span></a> <a href="https://social.chiefgyk3d.com/tags/Twitch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Twitch</span></a> <a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
Bob the Traveler<p>Edwin T Layton, US Navy rear admiral and prominent intelligence officer before and during World War II, was born OTD in 1903 <a href="https://cromwell-intl.com/cybersecurity/crypto/?s=mb" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/crypto/?s=mb</span></a> <a href="https://mastodon.world/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.world/tags/history" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>history</span></a></p>
Hackread.com<p>Watch out as a new variant of <a href="https://mstdn.social/tags/NeptuneRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NeptuneRAT</span></a> is making the rounds, spreading via Telegram YouTube and targeting Windows users for password and crypto.</p><p>Read: <a href="https://hackread.com/neptune-rat-variant-youtube-steal-windows-passwords/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/neptune-rat-varia</span><span class="invisible">nt-youtube-steal-windows-passwords/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mstdn.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mstdn.social/tags/YouTube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YouTube</span></a></p>
N_{Dario Fadda}<p>Everest ransomware gang faces unprecedented blow: leak site hacked and defaced <br> <a href="https://poliversity.it/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <br> <a href="https://securebulletin.com/everest-ransomware-gang-faces-unprecedented-blow-leak-site-hacked-and-defaced/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securebulletin.com/everest-ran</span><span class="invisible">somware-gang-faces-unprecedented-blow-leak-site-hacked-and-defaced/</span></a></p>
N_{Dario Fadda}<p>Malicious VSCode extensions: a growing threat to developers <br> <a href="https://poliversity.it/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <br> <a href="https://securebulletin.com/malicious-vscode-extensions-a-growing-threat-to-developers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securebulletin.com/malicious-v</span><span class="invisible">scode-extensions-a-growing-threat-to-developers/</span></a></p>
Vulnerability-Lookup<p>You can now share your thoughts on vulnerability CVE-2025-3382 in Vulnerability-Lookup:<br><a href="https://vulnerability.circl.lu/vuln/CVE-2025-3382" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulnerability.circl.lu/vuln/CV</span><span class="invisible">E-2025-3382</span></a></p><p>joey-zhou - xiaozhi-esp32-server-java</p><p><a href="https://social.circl.lu/tags/VulnerabilityLookup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityLookup</span></a> <a href="https://social.circl.lu/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.circl.lu/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.circl.lu/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a></p>
ChiefGyk3D<p>New video just dropped: I break down how sweeping tariffs are about to impact phones, laptops, gaming gear, radios, open hardware, and more — even down to soldering kits.<br>If you build or buy tech, you need to watch this.<br><a href="https://youtu.be/BPzq9ekk5U8" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/BPzq9ekk5U8</span><span class="invisible"></span></a><br><a href="https://social.chiefgyk3d.com/tags/tariff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tariff</span></a> <a href="https://social.chiefgyk3d.com/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/Trump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trump</span></a> <a href="https://social.chiefgyk3d.com/tags/Radios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Radios</span></a> <a href="https://social.chiefgyk3d.com/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>