sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#cyberattacks

0 Beiträge0 Beteiligte0 Beiträge heute
PrivacyDigest<p>Bulletproof Host <a href="https://mas.to/tags/StarkIndustries" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StarkIndustries</span></a> Evades <a href="https://mas.to/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> <a href="https://mas.to/tags/Sanctions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sanctions</span></a> </p><p>In May 2025, the <a href="https://mas.to/tags/EuropeanUnion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EuropeanUnion</span></a> levied financial sanctions on the owners of <a href="https://mas.to/tags/StarkIndustries" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StarkIndustries</span></a> Solutions Ltd., a bulletproof <a href="https://mas.to/tags/hosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hosting</span></a> provider that materialized two weeks before <a href="https://mas.to/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> invaded <a href="https://mas.to/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> and quickly became a top source of Kremlin-linked <a href="https://mas.to/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> and <a href="https://mas.to/tags/disinformation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>disinformation</span></a> campaigns.<br><a href="https://mas.to/tags/kremlim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kremlim</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p><p><a href="https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-sanctions/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/09/bu</span><span class="invisible">lletproof-host-stark-industries-evades-eu-sanctions/</span></a></p>
MediaFaro News Digest<p>Swiss hospitals join forces against cyberattacks.</p><p>In Switzerland, 22 hospitals, clinics and the Swiss Health Informatics Association have joined forces and founded the "Healthcare Cyber Security Center" association.</p><p><a href="https://mediafaro.org/article/20250909-swiss-hospitals-join-forces-against-cyberattacks?mf_channel=mastodon&amp;action=forward" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mediafaro.org/article/20250909</span><span class="invisible">-swiss-hospitals-join-forces-against-cyberattacks?mf_channel=mastodon&amp;action=forward</span></a></p><p><a href="https://mastodon.mediafaro.org/tags/Switzerland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switzerland</span></a> <a href="https://mastodon.mediafaro.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.mediafaro.org/tags/Hospitals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hospitals</span></a> <a href="https://mastodon.mediafaro.org/tags/Healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Healthcare</span></a> <a href="https://mastodon.mediafaro.org/tags/Cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattacks</span></a></p>
Dawid Wiktor<p>Proposals for regulations such as Chat Control make no sense. Pushing for “solutions” that weaken encryption will not help combat crime, including child abuse. In fact, it will only make the situation worse for victims.</p><p>Victims have repeatedly pointed out that they want secure and private means of communication to share what has happened to them and find support and guidance. They want to be sure that no one is eavesdropping on their conversations so that they can feel safer.</p><p>For other crimes, weakening <a href="https://vebinet.com/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> would only encourage more <a href="https://vebinet.com/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> and give large technology companies a privileged position to exploit even more personal data.</p><p>Client-side scanning? Reducing the <a href="https://vebinet.com/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> of personal devices is not a solution and leaves the door open for those who want to exploit existing vulnerabilities.</p><p>Software with <a href="https://vebinet.com/tags/backdoors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoors</span></a> is inherently flawed and provides very weak protection that anyone can exploit.</p><p>Furthermore, people have a right to <a href="https://vebinet.com/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a>. Romantic messages between people dating, conversations about health, sending vacation photos. None of these things are the business of big tech companies or governments.</p><p>If the <a href="https://vebinet.com/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> wants to tackle crime and abuse, it should first establish honest communication with stakeholders and make the policy-making process transparent and inclusive.<br><a href="https://vebinet.com/tags/chatcontrol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chatcontrol</span></a> <a href="https://vebinet.com/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://vebinet.com/tags/bigtech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bigtech</span></a></p>
shadowrecon<p>📊 4 new victims observed across leak sites.<br>⚠️ No high-severity cases today; all targeted the manufacturing sector.<br>🎯 Most active groups: Akira, Yurei, Rhysida.</p><p>🔎 Full report: shadowrecon.com/daily/2025-09-05</p><p><a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a></p>
paul<p>The 1-15 March 2025 <a href="https://infosec.exchange/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> timeline is out with 116 events, a <a href="https://infosec.exchange/tags/threat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threat</span></a> landscape dominated by <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> and <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a>, and the confirmation that <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> emails and <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> are the main initial access vectors</p><p><a href="https://www.hackmageddon.com/2025/09/05/1-15-march-2025-cyber-attacks-timeline/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackmageddon.com/2025/09/05/1-</span><span class="invisible">15-march-2025-cyber-attacks-timeline/</span></a></p><p><a href="https://infosec.exchange/tags/Infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosecurity</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a></p>
Bob Carver<p>Support for key state cyber tools could end on Sept. 30 if Congress doesn't act <a href="https://www.axios.com/2025/09/02/dhs-funding-cut-state-cyber-threats" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">axios.com/2025/09/02/dhs-fundi</span><span class="invisible">ng-cut-state-cyber-threats</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/state" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>state</span></a> <a href="https://infosec.exchange/tags/local" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>local</span></a> <a href="https://infosec.exchange/tags/governments" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>governments</span></a> <a href="https://infosec.exchange/tags/MS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MS</span></a>-ISAC <a href="https://infosec.exchange/tags/federalfunding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>federalfunding</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Salesloft pulled the plug on Drift after a massive supply-chain hack.</p><p>Hackers stole its OAuth tokens—then used them to breach Salesforce at Cloudflare, Google Workspace, Palo Alto, Zscaler &amp; 700+ orgs. <a href="https://kolektiva.social/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://kolektiva.social/tags/SupplychainsAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplychainsAttacks</span></a> <a href="https://thehackernews.com/2025/09/salesloft-takes-drift-offline-after.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/sale</span><span class="invisible">sloft-takes-drift-offline-after.html</span></a></p>
Healthcare IT Security Robot<p>DATE: September 01, 2025 at 09:21AM<br>SOURCE: HEALTHCARE INFO SECURITY</p><p>Direct article link at end of text block below.</p><p>How many entities have been affected by the wave of recent <a href="https://mastodon.clinicians-exchange.org/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> involving <a href="https://mastodon.clinicians-exchange.org/tags/Salesforce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Salesforce</span></a> apps? <a href="https://t.co/ffBXPTO5KO" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.co/ffBXPTO5KO</span><span class="invisible"></span></a></p><p>Here are any URLs found in the article text: </p><p><a href="https://t.co/ffBXPTO5KO" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.co/ffBXPTO5KO</span><span class="invisible"></span></a></p><p>Articles can be found by scrolling down the page at <a href="https://www.healthcareinfosecurity.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">healthcareinfosecurity.com/</span><span class="invisible"></span></a> under the title "Latest"</p><p>-------------------------------------------------</p><p>Private, vetted email list for mental health professionals: <a href="https://www.clinicians-exchange.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">clinicians-exchange.org</span><span class="invisible"></span></a></p><p>Healthcare security &amp; privacy posts not related to IT or infosec are at <span class="h-card" translate="no"><a href="https://mastodon.clinicians-exchange.org/@HIPAABot" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>HIPAABot</span></a></span> . Even so, they mix in some infosec with the legal &amp; regulatory information.</p><p>-------------------------------------------------</p><p><a href="https://mastodon.clinicians-exchange.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcare</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/doctors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doctors</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/doxxing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doxxing</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychotherapy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychotherapy</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/securitynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitynews</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychotherapist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychotherapist</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/mentalhealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mentalhealth</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/psychiatry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psychiatry</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/hospital" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hospital</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/socialwork" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialwork</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/webbeacons" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webbeacons</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/cookies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cookies</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/HIPAA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HIPAA</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/datanalytics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datanalytics</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/healthcaresecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcaresecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/healthitsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthitsecurity</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/patientrecords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patientrecords</span></a> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/infosec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>infosec</span></a></span> <a href="https://mastodon.clinicians-exchange.org/tags/telehealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telehealth</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/netneutrality" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netneutrality</span></a> <a href="https://mastodon.clinicians-exchange.org/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a></p>
Bob Carver<p>Are AI Browser Extensions Putting You at Risk? Prompt Injection Attacks Explained | PCMag <a href="https://www.pcmag.com/news/ai-browser-extensions-risky-prompt-injection-attacks-explained" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pcmag.com/news/ai-browser-exte</span><span class="invisible">nsions-risky-prompt-injection-attacks-explained</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/BrowserExtensions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BrowserExtensions</span></a> <a href="https://infosec.exchange/tags/PromptInjections" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjections</span></a> <a href="https://infosec.exchange/tags/AnthropicResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnthropicResearch</span></a> <a href="https://infosec.exchange/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a></p>
Lazarou Monkey Terror 🚀💙🌈<p><span class="h-card" translate="no"><a href="https://flipboard.com/@FlipboardUK" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>FlipboardUK</span></a></span> <span class="h-card" translate="no"><a href="https://flipboard.com/@flipboarduk/technology-uk-edition-jskurn6iz" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>technology-uk-edition-FlipboardUK</span></a></span> Because the US and Russia are trying to destroy us? </p><p><a href="https://mastodon.social/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://mastodon.social/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> <a href="https://mastodon.social/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://mastodon.social/tags/Cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattacks</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
All for Gardening<p>Putin’s secret cyber warfare office … in the heart of Covent Garden <a href="https://www.allforgardening.com/1410239/putins-secret-cyber-warfare-office-in-the-heart-of-covent-garden/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">allforgardening.com/1410239/pu</span><span class="invisible">tins-secret-cyber-warfare-office-in-the-heart-of-covent-garden/</span></a> <a href="https://vive.im/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://vive.im/tags/garden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>garden</span></a> <a href="https://vive.im/tags/Internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Internet</span></a> <a href="https://vive.im/tags/InternetSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetSecurity</span></a> <a href="https://vive.im/tags/London" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>London</span></a> <a href="https://vive.im/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://vive.im/tags/RussiaUkraineWar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussiaUkraineWar</span></a> <a href="https://vive.im/tags/VladimirPutin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VladimirPutin</span></a></p>
eicker.news ᳇ tech news<p><a href="https://eicker.news/tags/Solarinverters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Solarinverters</span></a>, crucial for home energy installations, are becoming potential entry points for <a href="https://eicker.news/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a>. The <a href="https://eicker.news/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> in EG4 Electronics’ inverters, highlighted by CISA, underscore the industry-wide security concerns. The <a href="https://eicker.news/tags/aggregatevulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aggregatevulnerability</span></a> of a rapidly expanding network of interconnected devices raises concerns about the security of the <a href="https://eicker.news/tags/energygrid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>energygrid</span></a>. <a href="https://techcrunch.com/2025/08/15/how-your-solar-rooftop-became-a-national-security-issue/?eicker.news" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/08/15/how-</span><span class="invisible">your-solar-rooftop-became-a-national-security-issue/?eicker.news</span></a> <a href="https://eicker.news/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://eicker.news/tags/media" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>media</span></a> <a href="https://eicker.news/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Crypto News<p>Tough New SFC Custody Rules Hit Hong Kong Crypto Exchanges - TLDR:</p><p>SFC introduces minimum custody standards for licensed crypto platforms under its A... - <a href="https://blockonomi.com/tough-new-sfc-custody-rules-hit-hong-kong-crypto-exchanges/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blockonomi.com/tough-new-sfc-c</span><span class="invisible">ustody-rules-hit-hong-kong-crypto-exchanges/</span></a> <a href="https://schleuss.online/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> <a href="https://schleuss.online/tags/regulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regulation</span></a> <a href="https://schleuss.online/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://schleuss.online/tags/otc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>otc</span></a> <a href="https://schleuss.online/tags/stc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stc</span></a></p>
paul<p>After the timelines, here we go with the <a href="https://infosec.exchange/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> statistics for February 2025 where I analyzed 231 events, in a <a href="https://infosec.exchange/tags/threat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threat</span></a> landscape where the majority of <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attacks</span></a> were driven by <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a>, carried out via <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>, and initiated through <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a>.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.hackmageddon.com/2025/08/07/february-2025-cyber-attacks-statistics/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackmageddon.com/2025/08/07/fe</span><span class="invisible">bruary-2025-cyber-attacks-statistics/</span></a></p>
paul<p>The 16-28 February 2025 <a href="https://infosec.exchange/tags/Cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattacks</span></a> timeline is out with 167 events and a <a href="https://infosec.exchange/tags/threat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threat</span></a> landscape dominated by <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> and <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a>.</p><p>In terms of initial access <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> and exploitation of <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> remain the preferred weapons of threat actors.</p><p><a href="https://www.hackmageddon.com/2025/08/05/16-28-february-2025-cyber-attacks-timeline/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackmageddon.com/2025/08/05/16</span><span class="invisible">-28-february-2025-cyber-attacks-timeline/</span></a></p>
LMG Security<p>Labor Day is right around the corner—are you prepared for a holiday cyberattack?</p><p>Hackers love long weekends, and history proves it. From the Kaseya ransomware outbreak on the 4th of July to the MOVEit breach over Memorial Day, cybercriminals know exactly when to strike: when your team is offline and defenses are down.</p><p>In our latest blog, we dive into some of the most infamous holiday-timed cyberattacks, including MOVEit, the Bangladesh Bank heist, and more, and share practical steps your organization can take to stay protected before and during holiday breaks.</p><p>Read our blog: <a href="https://www.lmgsecurity.com/cyberattacks-dont-take-holidays-why-hackers-love-long-weekends-and-how-to-prepare/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/cyberattacks-d</span><span class="invisible">ont-take-holidays-why-hackers-love-long-weekends-and-how-to-prepare/</span></a></p><p><a href="https://infosec.exchange/tags/Cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattacks</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/HolidaySecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HolidaySecurity</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a></p>
LMG Security<p>Iranian cyberattacks are ramping up—and they’re hitting critical infrastructure, defense, and businesses. From AI-generated phishing and deepfake propaganda to wiper malware targeting ICS and backups, Iranian threat actors are evolving fast.</p><p>In this episode of Cyberside Chats, <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span> break down the latest threats, real-world incidents, and what your organization can do to prepare.</p><p>🎥 Watch the video: <a href="https://youtu.be/vC29SaWdqG4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/vC29SaWdqG4</span><span class="invisible"></span></a></p><p>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/the-title-of-cschats_308hyzz/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/the-title-</span><span class="invisible">of-cschats_308hyzz/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/WiperMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiperMalware</span></a> <a href="https://infosec.exchange/tags/AIphishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIphishing</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://infosec.exchange/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> <a href="https://infosec.exchange/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CriticalInfrastructure</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
Kyiv Independent Daily Headlines<p><strong>Tuesday, July 29, 2025</strong></p> <p>“Peace through strength is possible,” Zelensky — Investigation: Despite sanctions, American trucks are being used by Russia to launch kamikaze drones — Unidentified drone enters Lithuania from Belarus amid rising tensions — Ukraine liberates Kindrativka village in Sumy Oblast amid ongoing Russian offensive … and more</p> <p><a href="https://activitypub.writeworks.uk/2025/07/tuesday-july-29-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">activitypub.writeworks.uk/2025</span><span class="invisible">/07/tuesday-july-29-2025/</span></a></p>
Walt Wooton<p>Three small rural healthcare systems in <a href="https://spartanburg.social/tags/SouthCarolina" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SouthCarolina</span></a> have experienced <a href="https://spartanburg.social/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> within the past nine months: Rural Health Services (<a href="https://spartanburg.social/tags/Aiken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aiken</span></a> County), HopeHealth Inc (<a href="https://spartanburg.social/tags/Florence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Florence</span></a>, <a href="https://spartanburg.social/tags/Clarendon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Clarendon</span></a>, <a href="https://spartanburg.social/tags/Darlington" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darlington</span></a>, <a href="https://spartanburg.social/tags/Williamsburg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Williamsburg</span></a>, <a href="https://spartanburg.social/tags/Aiken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aiken</span></a>, &amp; <a href="https://spartanburg.social/tags/Orangeburg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Orangeburg</span></a> Counties), and Hampton Regional Medical Center (<a href="https://spartanburg.social/tags/Hampton" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hampton</span></a> County).</p><p>Details at <a href="https://www.hipaajournal.com/south-carolina-healthcare-providers-hacking-incidents/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hipaajournal.com/south-carolin</span><span class="invisible">a-healthcare-providers-hacking-incidents/</span></a> and <a href="https://dysruptionhub.com/hampton-medical-center-cyberattack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dysruptionhub.com/hampton-medi</span><span class="invisible">cal-center-cyberattack/</span></a>.</p>
Daniel Kuhl 🇩🇪<p>From Check Point Research: </p><p>Q2 Global Cyber Security Trends</p><p>Check Point Research reported a 21% year-over-year surge in global weekly cyber-attacks per organization in Q2 2025, reaching 1,984 attacks. Education is the most targeted sector, and Europe is seeing the highest regional growth at 22%. Around 1,600 ransomware incidents were disclosed, mainly affecting business services, manufacturing, and construction.</p><p><a href="https://blog.checkpoint.com/research/global-cyber-attacks-surge-21-in-q2-2025-europe-experiences-the-highest-increase-of-all-regions/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.checkpoint.com/research/g</span><span class="invisible">lobal-cyber-attacks-surge-21-in-q2-2025-europe-experiences-the-highest-increase-of-all-regions/</span></a></p><p><a href="https://infosec.exchange/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>