writing.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small, intentional community for poets, authors, and every kind of writer.

Administered by:

Server stats:

324
active users

#vulnerabilities

12 posts8 participants0 posts today
Pyrzout :vm:<p>Fresh Windows NTLM Vulnerability Exploited in Attacks – Source: www.securityweek.com <a href="https://ciso2ciso.com/fresh-windows-ntlm-vulnerability-exploited-in-attacks-source-www-securityweek-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/fresh-windows-nt</span><span class="invisible">lm-vulnerability-exploited-in-attacks-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/Exploited" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploited</span></a> <a href="https://social.skynetcloud.site/tags/FEATURED" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FEATURED</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/NTLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NTLM</span></a></p>
PrivacyDigest<p>'Stupid and Dangerous': <a href="https://mas.to/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> Funding Chaos Threatens Essential <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> Program </p><p>The <a href="https://mas.to/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> Program is the primary way software <a href="https://mas.to/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> are tracked. Its long-term future remains in limbo even after a last-minute renewal of the US government contract that funds it.</p><p><a href="https://www.wired.com/story/cve-program-cisa-funding-chaos/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/cve-program-ci</span><span class="invisible">sa-funding-chaos/</span></a></p>
Marcus "MajorLinux" Summers<p>Please make sure to update your devices!</p><p>Update Now: iOS 18.4.1 and macOS Sequoia 15.4.1 Address Actively Exploited Vulnerabilities </p><p><a href="https://www.macrumors.com/2025/04/16/ios-18-4-1-security-fixes/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">macrumors.com/2025/04/16/ios-1</span><span class="invisible">8-4-1-security-fixes/</span></a></p><p><a href="https://toot.majorshouse.com/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://toot.majorshouse.com/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://toot.majorshouse.com/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://toot.majorshouse.com/tags/Sequoia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sequoia</span></a> <a href="https://toot.majorshouse.com/tags/Exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploits</span></a> <a href="https://toot.majorshouse.com/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://toot.majorshouse.com/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://toot.majorshouse.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p>The Damn Vulnerable Model Context Protocol (DVMCP) is an educational project designed to demonstrate <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> in <a href="https://infosec.exchange/tags/MCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MCP</span></a> implementations. It contains 10 challenges of increasing difficulty that showcase different types of vulnerabilities and attack vectors. <a href="https://github.com/harishsg993010/damn-vulnerable-MCP-server" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/harishsg993010/damn</span><span class="invisible">-vulnerable-MCP-server</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>MITRE’s CVE program faced abrupt shutdown after DHS contract expired, but CISA stepped in with an 11-month extension to maintain continuity in vulnerability tracking. </p><p><a href="https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/3963190/</span><span class="invisible">cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a></p>
Pyrzout :vm:<p>MITRE CVE Contract Extended Just Before Expiration <a href="https://thecyberexpress.com/mitre-cve-contract-extended-before-expiration/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/mitre-cve-</span><span class="invisible">contract-extended-before-expiration/</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/MITRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MITRE</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://social.skynetcloud.site/tags/NVD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NVD</span></a></p>
thereisnoanderson<p>NEW - 💾🖥️🔩⚙️ </p><p>DCG real-ucode 🦜</p><p>Actually provides the latest CPU microcode for AMD and Intel </p><p>Version: 2025-04-14<br>Release: 1</p><p>updated ucode for amd and intel with that one !</p><p><a href="https://github.com/divestedcg/real-ucode/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/divestedcg/real-uco</span><span class="invisible">de/</span></a></p><p>🐻 <a href="https://infosec.exchange/tags/divested" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>divested</span></a><br><a href="https://infosec.exchange/tags/DivestedComputingGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DivestedComputingGroup</span></a> 🦜</p><p><a href="https://infosec.exchange/tags/fsf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fsf</span></a> <a href="https://infosec.exchange/tags/FUTO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FUTO</span></a> <a href="https://infosec.exchange/tags/Fedora" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fedora</span></a> <a href="https://infosec.exchange/tags/alpinelinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alpinelinux</span></a> <a href="https://infosec.exchange/tags/hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardening</span></a> <a href="https://infosec.exchange/tags/linuxtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxtech</span></a> <a href="https://infosec.exchange/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a><br><a href="https://infosec.exchange/tags/hackernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackernews</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://infosec.exchange/tags/skynet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>skynet</span></a> <a href="https://infosec.exchange/tags/linuxsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxsecurity</span></a> <a href="https://infosec.exchange/tags/ucode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ucode</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/freeyourmind" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freeyourmind</span></a></p>
Brian Greenberg<p>⚠️ The backbone of vulnerability tracking may be about to snap. 🤦🏻‍♂️ </p><p>MITRE’s federal contract for managing the CVE program expires April 16 — with no confirmed renewal.</p><p>Without it, we risk:<br>🚫 A breakdown in standardized vulnerability tracking<br>🌍 Global coordination gaps<br>💣 Increased exposure to unpatched threats</p><p>Cybersecurity doesn’t work without CVE. Leadership must step up before this vital resource goes dark.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://infosec.exchange/tags/Leadership" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Leadership</span></a><br><a href="https://www.theverge.com/news/649314/cve-mitre-funding-vulnerabilities-exposures-funding" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theverge.com/news/649314/cve-m</span><span class="invisible">itre-funding-vulnerabilities-exposures-funding</span></a></p>
thereisnoanderson<p>NEW - ⛸️🧱🖥️</p><p>DCG Domain Blocklist available - last updated 2025/04/14</p><p>1692406 - Domains blocked with that build ! </p><p>🦜<br>🐻 <br>Supercharging your content blocker to increase privacy and security. </p><p>All available lists:<br>- uBlockOrigin <br>- Hosts format &amp; Hosts format with wildcards<br>- dnsmasq with wildcards</p><p>🌳<br>Ready to use lists combined from many permissively licensed sources.</p><p><a href="https://divested.dev/pages/dnsbl" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">divested.dev/pages/dnsbl</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/divested" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>divested</span></a> <a href="https://infosec.exchange/tags/DivestedComputingGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DivestedComputingGroup</span></a></p><p><a href="https://infosec.exchange/tags/DCG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DCG</span></a></p><p><a href="https://infosec.exchange/tags/fsf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fsf</span></a> <a href="https://infosec.exchange/tags/FUTO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FUTO</span></a> <a href="https://infosec.exchange/tags/Fedora" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fedora</span></a> <a href="https://infosec.exchange/tags/codeberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codeberg</span></a> <a href="https://infosec.exchange/tags/hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardening</span></a> <a href="https://infosec.exchange/tags/linuxtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxtech</span></a> <a href="https://infosec.exchange/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/antivirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antivirus</span></a> <a href="https://infosec.exchange/tags/hackernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackernews</span></a> <br><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/linuxsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxsecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/alpinelinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alpinelinux</span></a> <a href="https://infosec.exchange/tags/router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>router</span></a> <a href="https://infosec.exchange/tags/skynet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>skynet</span></a> <a href="https://infosec.exchange/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://infosec.exchange/tags/freeyourmind" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freeyourmind</span></a></p>
thereisnoanderson<p>NEW - 📶🔀🖥️ </p><p>DCG rpm-hardened_malloc available</p><p>pkgver = 2025/04/04<br>pkgrel = 1</p><p>Release Note = more coverage</p><p>🦜<br>🐻 <br>Compatibility:<br>- Fedora 39/40/etc.<br>- Arch Linux</p><p>Hardened allocator designed for modern systems</p><p><a href="https://codeberg.org/divested/rpm-hardened_malloc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/divested/rpm-hard</span><span class="invisible">ened_malloc</span></a></p><p>🌳</p><p><a href="https://infosec.exchange/tags/divested" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>divested</span></a> <a href="https://infosec.exchange/tags/DivestedComputingGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DivestedComputingGroup</span></a></p><p><a href="https://infosec.exchange/tags/DCG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DCG</span></a></p><p><a href="https://infosec.exchange/tags/fsf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fsf</span></a> <a href="https://infosec.exchange/tags/FUTO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FUTO</span></a> <a href="https://infosec.exchange/tags/Fedora" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fedora</span></a> <a href="https://infosec.exchange/tags/codeberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codeberg</span></a> <a href="https://infosec.exchange/tags/hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardening</span></a> <a href="https://infosec.exchange/tags/hardened_malloc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardened_malloc</span></a> <a href="https://infosec.exchange/tags/hardenedmalloc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardenedmalloc</span></a> <a href="https://infosec.exchange/tags/linuxtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxtech</span></a> <a href="https://infosec.exchange/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/antivirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antivirus</span></a> <a href="https://infosec.exchange/tags/hackernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackernews</span></a> <br><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://infosec.exchange/tags/linuxsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxsecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/alpinelinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alpinelinux</span></a> <a href="https://infosec.exchange/tags/router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>router</span></a> <a href="https://infosec.exchange/tags/skynet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>skynet</span></a> <a href="https://infosec.exchange/tags/hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardening</span></a> <a href="https://infosec.exchange/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/freeyourmind" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freeyourmind</span></a></p>
thereisnoanderson<p>NEW - 🛡️ 🖥️ 🛡️ </p><p>DCG Brace Build 2025/04/04 - 1</p><p>Release Note: Fix bluetooth on F42</p><p>🦜<br>🐻<br>Toolkit compatible with multiple Linux distros that allows for installation of handpicked applications, along with corresponding configs that have been tuned for reasonable privacy and security.</p><p>🌳<br>Compatibility:<br>Arch Linux<br>CentOS 9/Stream<br>Debian 12<br>Fedora 39/40/41 (preferred)<br>openSUSE Tumbleweed<br>🌳<br><a href="https://codeberg.org/divested/brace" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">codeberg.org/divested/brace</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/divested" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>divested</span></a><br><a href="https://infosec.exchange/tags/DivestedComputingGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DivestedComputingGroup</span></a> <br>🌳<br><a href="https://infosec.exchange/tags/fsf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fsf</span></a> <a href="https://infosec.exchange/tags/FUTO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FUTO</span></a> <a href="https://infosec.exchange/tags/Fedora" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fedora</span></a> <a href="https://infosec.exchange/tags/codeberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codeberg</span></a> <a href="https://infosec.exchange/tags/hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardening</span></a> <a href="https://infosec.exchange/tags/linuxtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxtech</span></a> <a href="https://infosec.exchange/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/antivirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antivirus</span></a> <br><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/linuxsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxsecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/alpinelinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alpinelinux</span></a> <a href="https://infosec.exchange/tags/skynet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>skynet</span></a> <a href="https://infosec.exchange/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://infosec.exchange/tags/freeyourmind" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freeyourmind</span></a></p>
Marcus "MajorLinux" Summers<p>Let's patch some vulnerabilities!</p><p>iOS 18.4, iPadOS 18.4, and macOS Sequoia 15.4 Address 50+ Vulnerabilities </p><p><a href="https://www.macrumors.com/2025/03/31/ios-18-4-security-fixes/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">macrumors.com/2025/03/31/ios-1</span><span class="invisible">8-4-security-fixes/</span></a></p><p><a href="https://toot.majorshouse.com/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://toot.majorshouse.com/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://toot.majorshouse.com/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://toot.majorshouse.com/tags/Sequoia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sequoia</span></a> <a href="https://toot.majorshouse.com/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://toot.majorshouse.com/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p><a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> - Analyzing <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> bootloaders: Finding <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> faster with <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> - By leveraging Microsoft <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/Copilot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Copilot</span></a> to expedite the vulnerability discovery process, Microsoft Threat Intelligence uncovered several vulnerabilities in multiple open-source bootloaders, impacting all operating systems relying on Unified Extensible Firmware Interface (UEFI) Secure Boot as well as IoT devices. The vulnerabilities found in the GRUB2 bootloader (commonly used as a Linux bootloader) and U-boot and Barebox bootloaders (commonly used for embedded systems), could allow threat actors to gain and execute arbitrary code. <a href="https://www.microsoft.com/en-us/security/blog/2025/03/31/analyzing-open-source-bootloaders-finding-vulnerabilities-faster-with-ai/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">microsoft.com/en-us/security/b</span><span class="invisible">log/2025/03/31/analyzing-open-source-bootloaders-finding-vulnerabilities-faster-with-ai/</span></a></p>
CVE Program<p>The “CVE and AI-related Vulnerabilities” blog series is documenting the journey the CVE Program is on determining how to address <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> assignments for <a href="https://mastodon.social/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> in an <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>-enabled world. <br> <br>Read article #2 in the series here: <a href="https://medium.com/@cve_program/cve-id-assignment-and-cve-record-publication-for-ai-related-vulnerabilities-78a649bda815" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@cve_program/cve-id</span><span class="invisible">-assignment-and-cve-record-publication-for-ai-related-vulnerabilities-78a649bda815</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> list of resources for week #13/2025 is out!</p><p>It includes the following and much more:</p><p>➝ DNA of 15 Million People for Sale in <a href="https://infosec.exchange/tags/23andMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>23andMe</span></a> Bankruptcy,</p><p>➝ <a href="https://infosec.exchange/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> administration accidentally texted a journalist its war plans,</p><p>➝ Critical Ingress <a href="https://infosec.exchange/tags/NGINX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NGINX</span></a> controller vulnerability allows RCE without authentication,</p><p>➝ <a href="https://infosec.exchange/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberattack</span></a> hits Ukraine's state railway,</p><p>➝ Troy Hunt's Mailchimp account was successfully phished,</p><p>➝ <a href="https://infosec.exchange/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a> Offering $100K Bounties for Critical <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a>,</p><p>➝ <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meta</span></a> AI is now available in <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> for users in 41 European countries... and cannot be turned off</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-13-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-13-2025</span></a></p>
thereisnoanderson<p>NEW - 🌬️📦</p><p>D-WRT builds available: 2025-03-26<br>🔥 🪇 update to kernel 6.6.84 🪇 🔥</p><p><a href="https://divested.dev/unofficial-openwrt-builds/mvebu-linksys" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">divested.dev/unofficial-openwr</span><span class="invisible">t-builds/mvebu-linksys</span></a></p><p><a href="https://codeberg.org/divested/Divested-WRT" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/divested/Divested</span><span class="invisible">-WRT</span></a></p><p>🐻 <a href="https://infosec.exchange/tags/divested" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>divested</span></a><br><a href="https://infosec.exchange/tags/DivestedComputingGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DivestedComputingGroup</span></a> 🦜</p><p><a href="https://infosec.exchange/tags/fsf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fsf</span></a> <a href="https://infosec.exchange/tags/FUTO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FUTO</span></a> <a href="https://infosec.exchange/tags/Fedora" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fedora</span></a> <a href="https://infosec.exchange/tags/codeberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codeberg</span></a> <a href="https://infosec.exchange/tags/hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardening</span></a> <a href="https://infosec.exchange/tags/linuxtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxtech</span></a> <a href="https://infosec.exchange/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/antivirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antivirus</span></a> <a href="https://infosec.exchange/tags/hackernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackernews</span></a> <br><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://infosec.exchange/tags/linuxsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxsecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/alpinelinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alpinelinux</span></a> <a href="https://infosec.exchange/tags/router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>router</span></a> <a href="https://infosec.exchange/tags/skynet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>skynet</span></a> <a href="https://infosec.exchange/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://infosec.exchange/tags/freeyourmind" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freeyourmind</span></a></p>
TechHelpKB.com 📚<p>Google pushed out an emergency zero-day patch for Chrome on Windows this week, and now Mozilla is doing damage control, too, after spotting a similar flaw lurking in the code of its Firefox browser. </p><p><a href="https://mastodon.social/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://mastodon.social/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a> <a href="https://mastodon.social/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://mastodon.social/tags/0day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0day</span></a> <a href="https://mastodon.social/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <br><a href="https://www.theregister.com/2025/03/28/google_kaspersky_mozilla/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/28/goo</span><span class="invisible">gle_kaspersky_mozilla/</span></a></p>
The DefendOps Diaries<p>Securing Solar Inverters: Addressing Vulnerabilities in Renewable Energy Systems</p><p><a href="https://thedefendopsdiaries.com/securing-solar-inverters-addressing-vulnerabilities-in-renewable-energy-systems/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/securi</span><span class="invisible">ng-solar-inverters-addressing-vulnerabilities-in-renewable-energy-systems/</span></a></p><p><a href="https://infosec.exchange/tags/solarsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>solarsecurity</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/renewableenergy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>renewableenergy</span></a><br><a href="https://infosec.exchange/tags/powergrid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>powergrid</span></a><br><a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a></p>
George Ellenburg (he/him/his)<p>Can't wait for all the <a href="https://bofh.social/tags/bugs" rel="nofollow noopener noreferrer" target="_blank">#bugs</a>, <a href="https://bofh.social/tags/security" rel="nofollow noopener noreferrer" target="_blank">#security</a> holes, and <a href="https://bofh.social/tags/vulnerabilities" rel="nofollow noopener noreferrer" target="_blank">#vulnerabilities</a> that will inevitably come out because people are just letting some prediction engine write their code for them and aren't reviewing the code or the logic being inserted into it. <a href="https://bofh.social/tags/AI" rel="nofollow noopener noreferrer" target="_blank">#AI</a> <a href="https://bofh.social/tags/LLM" rel="nofollow noopener noreferrer" target="_blank">#LLM</a> <a href="https://bofh.social/tags/Vibe" rel="nofollow noopener noreferrer" target="_blank">#Vibe</a> <a href="https://bofh.social/tags/SoftwareDevelopment" rel="nofollow noopener noreferrer" target="_blank">#SoftwareDevelopment</a> <a href="https://bofh.social/tags/CI" rel="nofollow noopener noreferrer" target="_blank">#CI</a><span> <br><br></span><a href="https://developers.slashdot.org/story/25/03/18/1428226/vibe-coding-is-letting-10-engineers-do-the-work-of-a-team-of-50-to-100-says-yc-ceo" rel="nofollow noopener noreferrer" target="_blank">https://developers.slashdot.org/story/25/03/18/1428226/vibe-coding-is-letting-10-engineers-do-the-work-of-a-team-of-50-to-100-says-yc-ceo</a></p>
CVE Program<p>The “CVE and AI-related Vulnerabilities” blog series is documenting the journey the CVE Program is on determining how to address <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> assignments for <a href="https://mastodon.social/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> in an <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>-enabled world. </p><p>Interested? Start here: <a href="https://medium.com/@cve_program/cve-and-ai-related-vulnerabilities-3ae6ad8ae81b" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@cve_program/cve-an</span><span class="invisible">d-ai-related-vulnerabilities-3ae6ad8ae81b</span></a></p>