mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#cisa

34 posts29 participants6 posts today
notsecure<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> has added CVE-2025-30406 to their exploited list.</p><p>Gladinet CentreStack Use of Hard-coded Cryptographic Key Vulnerability:<br>Gladinet CentreStack contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30406" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/CVE-2</span><span class="invisible">025-30406</span></a></p>
notsecure<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> has added CVE-2025-29824 to their exploited list.</p><p>Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability:<br>Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29824" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/CVE-2</span><span class="invisible">025-29824</span></a></p>
0x40k<p>Just another Monday in IT, right? Dealing with CrushFTP, the CISA KEV list, and active exploits... 🤯</p><p>So, let's talk about CVE-2024-4040 (heads-up, the original post might've had a typo on the year/number!). It’s a tricky authentication bypass vulnerability. While that might sound a bit technical, the bottom line is it's seriously critical. Why? Because unauthenticated attackers could potentially log in as *any* user and basically hijack the entire system. Yikes.</p><p>Now, CISA has flagged this one, adding it to their Known Exploited Vulnerabilities list. Their advice? Get patching done by April 28th! You know, this probably impacts quite a few places that might not even have it on their radar yet. 🙄</p><p>Why am I even posting about this? Well, because relying solely on automated scans often isn't enough – they can miss things like this. This is exactly the kind of vulnerability that thorough pentesting is designed to uncover. Plus, let's be honest, your clients (or your own company!) will thank you big time for spotting and fixing these issues *before* things go boom. 😉</p><p>Here’s a quick action plan:</p><p>* Get those systems updated ASAP!<br>* Give your setups a thorough check.<br>* Time for a password reset on affected accounts.<br>* Make sure you've got 2FA turned on wherever possible.<br>* Keep a close watch on your network activity.</p><p>Over to you: What are your go-to tools for hunting down vulnerabilities like this one? Drop your thoughts below! 🤔</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/CrushFTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrushFTP</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a></p>
AAKL<p>CISA has updated the KEV catalogue:</p><p>- CVE-2025-31161: CrushFTP Authentication Bypass Vulnerability <a href="https://www.cve.org/CVERecord?id=CVE-2025-31161" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cve.org/CVERecord?id=CVE-2025-</span><span class="invisible">31161</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a></p>
Chuck Darwin<p>Trump’s order also toys with innovative new abuses of power. </p><p>It directs the nonpartisan, independent Election Assistance Commission <br>to tighten ID measures <br>— a directive far beyond the scope of presidential authority. </p><p>But precedent, and the rule of law, have not often dissuaded the Trump administration.</p><p>🆘Ominous language in the order directs states to provide voter roll information to Immigration and Customs Enforcement and the Department of Homeland Security (DHS). </p><p>(The text also goes out of its way to praise the rather dystopian biometric voter ID measures in use in India.) </p><p>Later, the executive order stipulates that state voter lists must be made available for<br> 👉review by the DHS and “the DOGE Administrator” <br>— this presumably referring to private citizen and public embarrassment Elon Musk.</p><p>In other words, the infamously intrusive DHS, <br>now with the infamously disruptive DOGE, <br>will be given some sort of authority over state voter rolls, <br>many of which are already subjected to baseless and illegal purges. </p><p>We can only imagine what sort of further mangling the flunkies of DOGE might have in mind. </p><p>After all, we’ve seen what kind of technical “upgrades” and other impending disasters they intend to carry out at the Social Security Administration (SSA). </p><p>(In fact, the executive order even contains a roundabout means of facilitating DOGE and Trump’s access to the SSA, <br>dictating that the SSA commissioner must provide SSA data for voting eligibility determinations. <br>This may be intended to circumvent legal barriers to DOGE intervention.)</p><p>Speaking of <a href="https://c.im/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://c.im/tags/threats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threats</span></a>, <br>the Trump administration has already hampered the "Cybersecurity and Infrastructure Security Agency" ( <a href="https://c.im/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> ), <br>🆘placing its 17-member election security team on administrative leave <br>and “under review.” </p><p>CISA is tasked with addressing election threats, <br>from cyberattacks to violence against poll workers. </p><p>Here, it seems likely that Trump is pursuing another petty <a href="https://c.im/tags/vendetta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vendetta</span></a>. </p><p>The president is evidently a bit bitter about CISA’s efforts to contradict his misinformation about COVID and the 2020 election, <br>as comments from DHS chief Kristi Noem <br>(who claimed the agency has ventured “far off mission”) <br>have hinted.</p><p>Yet another blow to electoral integrity arrived with the 🆘defunding of the Center for Internet Security <br>and the subsequent 🆘closure of its subsidiary, the "Election Infrastructure Information Sharing and Analysis Center"<br> ( EI-ISAC ). </p><p>EI-ISAC, <br>alongside the "Multi-State Information Sharing and Analysis Center", <br>served as a technical support and advisory arm on internet security. </p><p>Shuttering it may now leave open possible avenues for cyberattacks, <br>foreign interference, and other uncertain threats, according to Politico.</p><p>Unfortunately, Trump’s recent executive order contains even more diktats: </p><p>💥requiring the reporting of foreign nationals to the DHS, </p><p>💥unsourced claims of illicit foreign contributions to direct-democracy ballot initiatives <br>(which the right generally does not like), </p><p>💥and additional stringent demands to serve up voter information to unaccountable agencies, <br>for purposes unknown.</p><p>🔥The most chilling section, though, might be the one titled “Prosecuting Election Crimes.” </p><p>It defines as a <a href="https://c.im/tags/criminal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criminal</span></a> anyone who <br>“registered or voted despite being ineligible,” <br>“committed election fraud,” <br>“provided false information [on] forms,” <br>“threatened voters or election officials,” <br>or “engaged in unlawful conduct to interfere in the election process.” </p><p>Worth noting that some of these definitions are enormously subjective. </p><p>If it comes to prosecuting activists or political opponents <br>— which has become an acute possibility <br>— the listed violations will surely provide for some generously broad legal interpretations.</p><p>Lastly, the Trump administration appears keen to ensure its threats do not ring hollow. <br>❌The order promises to penalize recalcitrant states by conditioning their funding on obedience. </p><p>The administration reserves itself the right to <br>“cease providing Federal funds to States that do not comply[.]” </p><p>We’ve already been treated to the ugly sight of Trump withholding funds as a cudgel. </p><p>Perhaps he’s emboldened by his success in goading elite universities to kiss the ring, <br>some so eager to grovel and demonstrate fealty to escape his wrath that they folded preemptively in fear <br>— or just complicity. </p><p>Voting rights advocates are hoping that at least some in the judiciary will not capitulate so easily.</p><p><a href="https://truthout.org/articles/trump-assumes-unheard-of-powers-in-ordering-federal-overhaul-of-elections/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">truthout.org/articles/trump-as</span><span class="invisible">sumes-unheard-of-powers-in-ordering-federal-overhaul-of-elections/</span></a></p>
Nacho<p>Los recortes en <a href="https://frankenwolke.com/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> a pesar de ser una agencia americana posiblemente terminen teniendo un impacto negativo en la <a href="https://frankenwolke.com/tags/ciberseguridad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ciberseguridad</span></a> global.</p><p>Por ejemplo el <a href="https://frankenwolke.com/tags/KEV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KEV</span></a> que mantienen (un catálogo de vulnerabilidades que se sabe que se están explotando por el mundo adelante) es una joya de cara a hacer una gestión de vulnerabilidades efectiva.</p><p>Otra cosa es que tengamos que quitarnos esa dependencia y buscar alternativas propias (además de ser conscientes de que no nos avisarán de las que exploten ellos, evidentemente), pero perder esa fuente va a hacer mucho daño a corto.</p><p><a href="https://www.theregister.com/2025/04/08/cisa_cuts_threat_intel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/04/08/cis</span><span class="invisible">a_cuts_threat_intel/</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> Connect Secure, Policy Secure and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/176332/security/u-s-cisa-adds-ivanti-connect-secure-policy-secure-and-zta-gateways-flaw-to-its-known-exploited-vulnerabilities-catalog-2.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176332/sec</span><span class="invisible">urity/u-s-cisa-adds-ivanti-connect-secure-policy-secure-and-zta-gateways-flaw-to-its-known-exploited-vulnerabilities-catalog-2.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
notsecure<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> has added CVE-2025-31161 to their exploited list.</p><p>CrushFTP Authentication Bypass Vulnerability:<br>CrushFTP contains an authentication bypass vulnerability in the HTTP authorization header that allows a remote unauthenticated attacker to authenticate to any known or guessable user account (e.g., crushadmin), potentially leading to a full compromise. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-31161" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/CVE-2</span><span class="invisible">025-31161</span></a></p>
Infoblox Threat Intel<p>Is the sky fluxxing?! Last week a CISA advisory on DNS Fast Flux created a lot of buzz. We have an insider's take.<br> <br>Fast Flux is a nearly 20 year old technique and is essentially the malicious use of dynamic DNS. It is critical that protective DNS services understand this -- and all other DNS techniques -- on that we agree. </p><p>What we also know as experts in DNS is that there are many ways to skin a cat, as they say. </p><p><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cisa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisa</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> </p><p><a href="https://blogs.infoblox.com/threat-intelligence/disrupting-fast-flux-and-much-more-with-protective-dns/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.infoblox.com/threat-inte</span><span class="invisible">lligence/disrupting-fast-flux-and-much-more-with-protective-dns/</span></a></p>
Pyrzout :vm:<p>Fast Flux is the New Cyber Weapon—And It’s Hard to Stop, Warns CISA <a href="https://thecyberexpress.com/cisa-nsa-fbi-issue-fast-flux-advisory/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/cisa-nsa-f</span><span class="invisible">bi-issue-fast-flux-advisory/</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/DoubleFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoubleFlux</span></a> <a href="https://social.skynetcloud.site/tags/SingleFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SingleFlux</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/cloaking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloaking</span></a> <a href="https://social.skynetcloud.site/tags/FastFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FastFlux</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://social.skynetcloud.site/tags/NCSC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NCSC</span></a> <a href="https://social.skynetcloud.site/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a></p>
Kevin Dominik Korte<p>The firings at CISA made me wonder what the administration thinks. No one in their right mind would consider it more effective to get hacked than to prevent attacks. Yet, here we are.<br><a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/cisa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisa</span></a><br><a href="https://www.nextgov.com/people/2025/04/cisa-make-comprehensive-staff-cuts-coming-days-people-familiar-say/404320/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nextgov.com/people/2025/04/cis</span><span class="invisible">a-make-comprehensive-staff-cuts-coming-days-people-familiar-say/404320/</span></a></p>
flagthis<p>Urgent: CISA adds Apache Tomcat vulnerability (CVE-2025-24813) to KEV catalog; update now! <a href="https://ioc.exchange/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://ioc.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://ioc.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <br> <br>More details: <a href="https://securityaffairs.com/176129/security/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176129/sec</span><span class="invisible">urity/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html</span></a> - <a href="https://www.flagthis.com/news/12398" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">flagthis.com/news/12398</span><span class="invisible"></span></a></p>
ResearchBuzz: Firehose<p>CISA: NSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat. “Today, CISA … released joint Cybersecurity Advisory Fast Flux: A National Security Threat (PDF, 841 KB). This advisory warns organizations, internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious […]</p><p><a href="https://rbfirehose.com/2025/04/05/cisa-nsa-cisa-fbi-and-international-partners-release-cybersecurity-advisory-on-fast-flux-a-national-security-threat/" class="" rel="nofollow noopener" target="_blank">https://rbfirehose.com/2025/04/05/cisa-nsa-cisa-fbi-and-international-partners-release-cybersecurity-advisory-on-fast-flux-a-national-security-threat/</a></p>
Pyrzout :vm:<p>US, Allies Warn of Threat Actors Using ‘Fast Flux’ to Hide Server Locations – Source: www.securityweek.com <a href="https://ciso2ciso.com/us-allies-warn-of-threat-actors-using-fast-flux-to-hide-server-locations-source-www-securityweek-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/us-allies-warn-o</span><span class="invisible">f-threat-actors-using-fast-flux-to-hide-server-locations-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/fastflux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fastflux</span></a> <a href="https://social.skynetcloud.site/tags/guidance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guidance</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://social.skynetcloud.site/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a></p>
AAKL<p>CIA has updated the KEV catalogue.</p><p>- CVE-2025-22457: Ivanti Connect Secure, Policy Secure and ZTA Gateways Stack-Based Buffer Overflow Vulnerability <a href="https://www.cve.org/CVERecord?id=CVE-2025-22457" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cve.org/CVERecord?id=CVE-2025-</span><span class="invisible">22457</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> warns of <a href="https://mastodon.thenewoil.org/tags/FastFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FastFlux</span></a> <a href="https://mastodon.thenewoil.org/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> evasion used by <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> gangs</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-fast-flux-dns-evasion-used-by-cybercrime-gangs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-warns-of-fast-flux-dns-evasion-used-by-cybercrime-gangs/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Pyrzout :vm:<p>NSA and Global Allies Declare Fast Flux a National Security Threat <a href="https://hackread.com/nsa-allies-fast-flux-a-national-security-threat/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/nsa-allies-fast-f</span><span class="invisible">lux-a-national-security-threat/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/DoubleFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoubleFlux</span></a> <a href="https://social.skynetcloud.site/tags/SingleFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SingleFlux</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/FastFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FastFlux</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://social.skynetcloud.site/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a></p>
Geeky Malcölm 🇨🇦🍀🇺🇦<p><a href="https://ioc.exchange/tags/nsa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nsa</span></a>, <a href="https://ioc.exchange/tags/cisa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisa</span></a>, <a href="https://ioc.exchange/tags/fbi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fbi</span></a>, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat </p><p><a href="https://www.cisa.gov/news-events/alerts/2025/04/03/nsa-cisa-fbi-and-international-partners-release-cybersecurity-advisory-fast-flux-national-security" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/alerts/20</span><span class="invisible">25/04/03/nsa-cisa-fbi-and-international-partners-release-cybersecurity-advisory-fast-flux-national-security</span></a></p>
notsecure<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> has added CVE-2025-22457 to their exploited list.</p><p>Ivanti Connect Secure, Policy Secure and ZTA Gateways Stack-Based Buffer Overflow Vulnerability:<br>Ivanti Connect Secure, Policy Secure and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-22457" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/CVE-2</span><span class="invisible">025-22457</span></a></p>
Pyrzout :vm:<p>NSA and Global Allies Declare Fast Flux a National Security Threat – Source:hackread.com <a href="https://ciso2ciso.com/nsa-and-global-allies-declare-fast-flux-a-national-security-threat-sourcehackread-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/nsa-and-global-a</span><span class="invisible">llies-declare-fast-flux-a-national-security-threat-sourcehackread-com/</span></a> <a href="https://social.skynetcloud.site/tags/1CyberSecurityNewsPost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>1CyberSecurityNewsPost</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/DoubleFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoubleFlux</span></a> <a href="https://social.skynetcloud.site/tags/SingleFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SingleFlux</span></a> <a href="https://social.skynetcloud.site/tags/FastFlux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FastFlux</span></a> <a href="https://social.skynetcloud.site/tags/Hackread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackread</span></a> <a href="https://social.skynetcloud.site/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://social.skynetcloud.site/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a></p>