Discussion
Loading...

#Tag

  • About
  • Code of conduct
  • Privacy
  • About Bonfire
Blue Ghost
@blueghost@mastodon.online  ·  activity timestamp 9 hours ago

@signalapp
Signal selected Google Gmail as their email provider.

Consider asking for a public PGP encryption key if you are concerned about Google accessing the content of your message, this can provide end-to-end encryption of the message content but the metadata will be available to Google.

Signal: Please publish a key on your website.

Gmail PGP encryption options: https://mastodon.online/@blueghost/114748498901944225

#Signal #Google #Gmail #Encryption #E2EE #Privacy #CyberSecurity #InfoSec #Mailvelope #Thunderbird

  • Copy link
  • Flag this post
  • Block
Infoblox Threat Intel
@InfobloxThreatIntel@infosec.exchange  ·  activity timestamp 11 hours ago

When one trick isn't enough… this actor brings the whole toolbox.

Actors start mixing techniques like a cyber cocktail:

- Cloud abuse with AWS S3 lures
- Algorithmically generated (RDGAs) for agility and evasion
- Redirect chains to keep analysts guessing
- TDS filtering to target victims
- Social engineering with fake alerts ("Your cloud storage is full!") or irresistible offers ("Get Netflix for free!")
- Payment scams as the final sting

Here's how it works: The actor is leveraging SMS messages to lure victims into clicking links that point to Amazon S3 buckets. The SMS links are the initial redirection point, silently forwarding the victim to the first bulk registered (RDGA) domain. The redirection is seamless, making it difficult for the victim to notice anything suspicious.

From there, the actor uses multiple RDGA algorithms to generate domains that host scam and scareware campaigns. These domains feature a variety of deceptive themes, such as fake Netflix promotions, "Your Cloud Storage is Full" alerts, or "Failed Payment" warnings.

Once the victim clicks, the redirection chain continues through custom TDS (Traffic Distribution System) domains—also powered by RDGA—before finally landing on a fraudulent payment gateway. Here, victims are tricked into subscribing to fake antivirus products, counterfeit Netflix accounts, or other bogus services.

The top left and right sections showcase different types of lures used in the attack, while the bottom section illustrates how the victim is redirected to rogue payment gateways.

IOCs
protectionsessionactivities[.]top
scanner-detected-protection-network[.]top
internetadvancedsecuritysession[.]autos
detectedservicesoftwareissue[.]autos
cleanalertsafe[.]top
cleanalertsafequick[.]top
cleansafedevicefix[.]top
clean-alert-safe-quick[.]top
quicksaferiskfree[.]top
safe-install-free-faster[.]top
safeinstallfreefaster[.]top
securedsafeservicesecurity[.]autos
quicksaferisk[.]top

#Infoblox #dns #adtech #InfobloxThreatIntel #threatintelligence #cybercrime #cybersecurity #infosec #threatintel #tds #scam

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
Schneier on Security RSS
@Schneier_rss@burn.capital  ·  activity timestamp 13 hours ago

A Cybersecurity Merit Badge

Scouting America (formerly known as Boy Scouts) has a new badge in cybersecurity. There’s an image in the article; it looks good.
I want ... https://www.schneier.com/blog/archives/2025/10/a-cybersecurity-merit-badge.html

#Uncategorized #cybersecurity #children

Schneier on Security

A Cybersecurity Merit Badge - Schneier on Security

Scouting America (formerly known as Boy Scouts) has a new badge in cybersecurity. There’s an image in the article; it looks good. I want one.
  • Copy link
  • Flag this post
  • Block
Flipboard Tech Desk
@TechDesk@flipboard.social  ·  activity timestamp 2 days ago

China accuses the U.S. of carrying out cyberattacks on its national time center. The allegation came in a WeChat post and said the U.S. National Security Agency exploited vulnerabilities in the messaging services of a foreign mobile phone brand to steal sensitive information from devices of the National Time Service Center’s staff in 2022. Read more from @AssociatedPress:

https://flip.it/0ivQo_

#Tech #Hacking #CyberSecurity #China #US #NSA

AP News

China accuses US of cyberattack on national time center

China has accused the U.S. National Security Agency of cyberattacks on its national time center. The Ministry of State Security claims the U.S. agency exploited vulnerabilities in a foreign mobile phone brand's messaging services in 2022.
  • Copy link
  • Flag this post
  • Block
Music Channel
Music Channel boosted
hack_lu
@hack_lu@infosec.exchange  ·  activity timestamp 2 days ago

hack.lu 2025 playlist

#playlist #hacklu #cybersecurity #music

🔗 https://2025.hack.lu/playlist/

hack.lu 2025

hack.lu 2025 playlist

Playlist for hack.lu 2025
  • Copy link
  • Flag this post
  • Block
hack_lu
@hack_lu@infosec.exchange  ·  activity timestamp 2 days ago

hack.lu 2025 playlist

#playlist #hacklu #cybersecurity #music

🔗 https://2025.hack.lu/playlist/

hack.lu 2025

hack.lu 2025 playlist

Playlist for hack.lu 2025
  • Copy link
  • Flag this post
  • Block
Em :official_verified:
Em :official_verified: boosted
knoppix
@knoppix95@mastodon.social  ·  activity timestamp 2 days ago

⚠️ ~200,000 Framework Linux laptops shipped with UEFI components that can bypass Secure Boot 🖥️

A signed mm command allows memory edits, disabling signature checks & enabling persistent bootkits 🔐
Not a breach—an oversight. Fixes are rolling out. Users should update firmware or apply mitigations 🔧

@frameworkcomputer

🔗 https://www.bleepingcomputer.com/news/security/secure-boot-bypass-risk-on-nearly-200-000-linux-framework-sytems/

#TechNews #Linux #Cybersecurity #Framework #UEFI #SecureBoot #Security #Firmware #Privacy #OpenSource #Vulnerability #Update #Patch #Laptop #Technology

BleepingComputer

Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops

Around 200,000 Linux computer systems from American computer maker Framework were shipped with signed UEFI shell components that could be exploited to bypass Secure Boot protections.
  • Copy link
  • Flag this post
  • Block
Em :official_verified:
Em :official_verified: boosted
knoppix
@knoppix95@mastodon.social  ·  activity timestamp 5 days ago

Tor Browser 15.0a4 Alpha released with Firefox security updates 🔐

• Removed Mozilla AI features for privacy 🤖
• Renamed meek-azure to meek ☁️
• Improved dark theme & Linux emoji support 🟪🐧
• Removed Firefox branding 🦊
• WebAssembly now managed by NoScript 🚫
• URL protocol shown on desktop 🔍

Testers welcome! Stable due late October.

🔗 https://blog.torproject.org/new-alpha-release-tor-browser-150a4/

#Privacy #TorBrowser #Security #OpenSource #Anonymity #Cybersecurity #Browser #TechNews #Linux #Censorship #WebSecurity #DigitalRights

New Alpha Release: Tor Browser 15.0a4 | Tor Project

Tor Browser 15.0a4 is now available from the Tor Browser download page and also from our distribution directory.
  • Copy link
  • Flag this post
  • Block
knoppix
@knoppix95@mastodon.social  ·  activity timestamp 2 days ago

⚠️ ~200,000 Framework Linux laptops shipped with UEFI components that can bypass Secure Boot 🖥️

A signed mm command allows memory edits, disabling signature checks & enabling persistent bootkits 🔐
Not a breach—an oversight. Fixes are rolling out. Users should update firmware or apply mitigations 🔧

@frameworkcomputer

🔗 https://www.bleepingcomputer.com/news/security/secure-boot-bypass-risk-on-nearly-200-000-linux-framework-sytems/

#TechNews #Linux #Cybersecurity #Framework #UEFI #SecureBoot #Security #Firmware #Privacy #OpenSource #Vulnerability #Update #Patch #Laptop #Technology

BleepingComputer

Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops

Around 200,000 Linux computer systems from American computer maker Framework were shipped with signed UEFI shell components that could be exploited to bypass Secure Boot protections.
  • Copy link
  • Flag this post
  • Block
Em :official_verified:
Em :official_verified: boosted
knoppix
@knoppix95@mastodon.social  ·  activity timestamp 5 days ago

Discord breach exposes 70,000+ ID photos from a third-party provider. 🔐

Shows risks of age verification laws without strong privacy safeguards. ⚠️
Users should audit data and choose transparent services. 🛡️

Privacy concerns grow over digital ID verification. 🤔

🔗 https://proton.me/blog/discord-age-verfication-breach

#TechNews#Privacy#Cybersecurity#DataBreach#UserSafety#DigitalID#OpenSource#UserFreedom#Antitrust#AgeVerification#DataProtection#Security#InternetSafety#TechPolicy#OnlinePrivacy

  • Copy link
  • Flag this post
  • Block
knoppix
@knoppix95@mastodon.social  ·  activity timestamp 5 days ago

Discord breach exposes 70,000+ ID photos from a third-party provider. 🔐

Shows risks of age verification laws without strong privacy safeguards. ⚠️
Users should audit data and choose transparent services. 🛡️

Privacy concerns grow over digital ID verification. 🤔

🔗 https://proton.me/blog/discord-age-verfication-breach

#TechNews#Privacy#Cybersecurity#DataBreach#UserSafety#DigitalID#OpenSource#UserFreedom#Antitrust#AgeVerification#DataProtection#Security#InternetSafety#TechPolicy#OnlinePrivacy

  • Copy link
  • Flag this post
  • Block
knoppix
@knoppix95@mastodon.social  ·  activity timestamp 5 days ago

Tor Browser 15.0a4 Alpha released with Firefox security updates 🔐

• Removed Mozilla AI features for privacy 🤖
• Renamed meek-azure to meek ☁️
• Improved dark theme & Linux emoji support 🟪🐧
• Removed Firefox branding 🦊
• WebAssembly now managed by NoScript 🚫
• URL protocol shown on desktop 🔍

Testers welcome! Stable due late October.

🔗 https://blog.torproject.org/new-alpha-release-tor-browser-150a4/

#Privacy #TorBrowser #Security #OpenSource #Anonymity #Cybersecurity #Browser #TechNews #Linux #Censorship #WebSecurity #DigitalRights

New Alpha Release: Tor Browser 15.0a4 | Tor Project

Tor Browser 15.0a4 is now available from the Tor Browser download page and also from our distribution directory.
  • Copy link
  • Flag this post
  • Block
LibreOffice
LibreOffice boosted
Blue Ghost
@blueghost@mastodon.online  ·  activity timestamp 7 days ago

Microsoft Office 2016 and Office 2019 are no longer receiving software updates, technical support, or bug and security fixes.

Consider migrating to LibreOffice.

Microsoft recommends migrating to a Microsoft 365 subscription.

LibreOffice supports the features that a majority of users need for free.

Website: https://www.libreoffice.org
Mastodon: @libreoffice

4/4

#Microsoft#Office2016#Office2019#Office #LibreOffice#Privacy#InfoSec#CyberSecurity#Encryption#FOSS#FreeSoftware#OpenSource

Microsoft Office logo.
Microsoft Office logo.
Microsoft Office logo.
  • Copy link
  • Flag this post
  • Block
Blue Ghost
@blueghost@mastodon.online  ·  activity timestamp 7 days ago

Microsoft Office 2016 and Office 2019 are no longer receiving software updates, technical support, or bug and security fixes.

Consider migrating to LibreOffice.

Microsoft recommends migrating to a Microsoft 365 subscription.

LibreOffice supports the features that a majority of users need for free.

Website: https://www.libreoffice.org
Mastodon: @libreoffice

4/4

#Microsoft#Office2016#Office2019#Office #LibreOffice#Privacy#InfoSec#CyberSecurity#Encryption#FOSS#FreeSoftware#OpenSource

Microsoft Office logo.
Microsoft Office logo.
Microsoft Office logo.
  • Copy link
  • Flag this post
  • Block
Dan Gillmor
Dan Gillmor boosted
Dissent Doe :cupofcoffee:
@PogoWasRight@infosec.exchange  ·  activity timestamp last week

NEW, by me, the one some of you have been asking about:

Months After Being Notified, a Software Vendor is Still Exposing Confidential and Sealed Court Records

https://databreaches.net/2025/10/13/months-after-being-notified-a-software-vendor-is-still-exposing-confidential-and-sealed-court-records/

I don't usually ask for boosts, but if you are in a position to help spread the word about this vendor and that its clients need to check their security, that would be great.

#dataleak, #incidentresponse, #infosecurity, #cybersecurity, #SoftwareUnlimitedCorp#FBI#CISA

@zackwhittaker @euroinfosec @campuscodi @therecord_media @GossiTheDog @briankrebs

  • Copy link
  • Flag this post
  • Block
Log in

Bonfire Dinteg Labs

This is a bonfire demo instance for testing purposes. This is not a production site. There are no backups for now. Data, including profiles may be wiped without notice. No service or other guarantees expressed or implied.

Bonfire Dinteg Labs: About · Code of conduct · Privacy ·
Bonfire social · 1.0.0-rc.3.15 no JS en
Automatic federation enabled
  • Explore
  • About
  • Code of Conduct
Home
Login