sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#ddos

25 Beiträge24 Beteiligte7 Beiträge heute
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> blocks largest recorded <a href="https://mastodon.thenewoil.org/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attack peaking at 11.5 Tbps</p><p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-blocks-record-breaking-115-tbps-ddos-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cloudflare-blocks-record-breaking-115-tbps-ddos-attack/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
sjvn<p>Cloudflare stops new world's largest <a href="https://mastodon.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attack over Labor Day weekend <a href="https://www.zdnet.com/article/cloudflare-stops-new-worlds-largest-ddos-attack-over-labor-day-weekend/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zdnet.com/article/cloudflare-s</span><span class="invisible">tops-new-worlds-largest-ddos-attack-over-labor-day-weekend/</span></a> by <span class="h-card" translate="no"><a href="https://mastodon.social/@sjvn" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sjvn</span></a></span> </p><p>It was a whopper of an attack that topped out at 7.3 terabits per second.</p>
Brian Greenberg :verified:<p>It's easy to get fixated on the headline number, and 11.5 Tbps is certainly impressive. But the real story here isn't just the new DDoS record, it's that these events are becoming routine background noise. The fact that Cloudflare's systems can autonomously mitigate an attack of this scale without human intervention says a lot about where the defense game is heading. This isn't about one big attack, it is about the commoditization of hyper-scale attacks and the absolute necessity of automated, intelligent defense.</p><p>TL;DR<br>📈 Cloudflare mitigated a new record, a massive 11.5 Tbps DDoS attack.<br>💥 The attack was a short, intense UDP flood from multiple sources.<br>🛡️ Critically, the threat was handled entirely by automated defense systems.<br>⚙️ This signals the "new normal" where automated defenses are the only viable strategy against such attacks.</p><p><a href="https://thehackernews.com/2025/09/cloudflare-blocks-record-breaking-115.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/clou</span><span class="invisible">dflare-blocks-record-breaking-115.html</span></a><br><a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
WinFuture.de<p>Neuer <a href="https://mastodon.social/tags/Weltrekord" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Weltrekord</span></a>: <a href="https://mastodon.social/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> hat die größte jemals aufgezeichnete <a href="https://mastodon.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>-<a href="https://mastodon.social/tags/Attacke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attacke</span></a> vereitelt. Der Angriff erfolgte mit bis zu 11,5 Terabit pro Sekunden und stellt den bisherigen Rekord in den Schatten. <a href="https://winfuture.de/news,153380.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,153380.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Geriatric Gardener<p>“Mandelson kept working with Epstein 5 years after paedophilia conviction”</p><p>by Skwawkbox <span class="h-card" translate="no"><a href="https://mastodon.social/@skwawkbox" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>skwawkbox</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.cloud/@UKLabour" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>UKLabour</span></a></span> </p><p>“Leaked emails show Blair’s right-hand man kept asking convicted child rapist and trafficker for help and advice for years”</p><p><a href="https://skwawkbox.org/2025/09/02/mandelson-kept-working-with-epstein-5-years-after-paedophilia-conviction/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">skwawkbox.org/2025/09/02/mande</span><span class="invisible">lson-kept-working-with-epstein-5-years-after-paedophilia-conviction/</span></a></p><p><a href="https://mstdn.social/tags/Press" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Press</span></a> <a href="https://mstdn.social/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://mstdn.social/tags/Labour" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Labour</span></a> <a href="https://mstdn.social/tags/Mandelson" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mandelson</span></a> <a href="https://mstdn.social/tags/Epstein" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Epstein</span></a> <a href="https://mstdn.social/tags/Paedophile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Paedophile</span></a> <a href="https://mstdn.social/tags/Conviction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Conviction</span></a> <a href="https://mstdn.social/tags/Leak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Leak</span></a> <a href="https://mstdn.social/tags/Blair" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blair</span></a> <a href="https://mstdn.social/tags/Starmer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Starmer</span></a> <a href="https://mstdn.social/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a> <a href="https://mstdn.social/tags/Intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intelligence</span></a> <a href="https://mstdn.social/tags/Barak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Barak</span></a> <a href="https://mstdn.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a></p>
Teddy / Domingo (🇨🇵/🇬🇧)<p><a href="https://framapiaf.org/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> stops new world's largest <a href="https://framapiaf.org/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attack over Labor Day weekend. This record-smashing DDoS attack was almost 60% larger than the previous largest attack.<br><a href="https://www.zdnet.com/article/cloudflare-stops-new-worlds-largest-ddos-attack-over-labor-day-weekend/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zdnet.com/article/cloudflare-s</span><span class="invisible">tops-new-worlds-largest-ddos-attack-over-labor-day-weekend/</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>-Angriffe auf <a href="https://social.tchncs.de/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a>: Situation vermutlich geklärt | heise online <a href="https://www.heise.de/news/DDoS-Angriffe-auf-Arch-Linux-Situation-vermutlich-geklaert-10627620.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/DDoS-Angriffe-au</span><span class="invisible">f-Arch-Linux-Situation-vermutlich-geklaert-10627620.html</span></a> <a href="https://social.tchncs.de/tags/Arch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Arch</span></a> :archlinux: <a href="https://social.tchncs.de/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> :tux:</p>
Jerry on Mastodon<p>Wow!</p><p>Cloudflare blocks the largest DDOS attack, 11.5 tbs. Cloudflare confirmed its systems “autonomously detected and mitigated” the threat.</p><p><a href="https://cybersecuritynews.com/record-breaking-ddos-attack-11-5-tbps/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/record-b</span><span class="invisible">reaking-ddos-attack-11-5-tbps/</span></a></p><p><a href="https://hear-me.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://hear-me.social/tags/DDOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDOS</span></a> <a href="https://hear-me.social/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a></p>
ManiabelChris<p>Von Rekord zu Rekord binnen zwei Monaten: Cloudflare verkündete bereits gestern auf einer SocialMediaPlattform, deren Namen hier nicht genannt sein soll, dass es unlängst den größten jemals registrierten Distributed-Denial-of-Service-Angriff (DDoS) ausgehend von GoogleClouds mit einem Spitzenwert von 11,5 Terabit pro Sekunde (Tbps) blockierte, der ca. 35 Sekunden dauerte.<br><a href="https://mastodon.de/tags/cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudflare</span></a> <a href="https://mastodon.de/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://mastodon.de/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> blocked a record 11.5 Tbps <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attack<br><a href="https://securityaffairs.com/181829/cyber-crime/cloudflare-blocked-a-record-11-5-tbps-ddos-attack.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/181829/cyb</span><span class="invisible">er-crime/cloudflare-blocked-a-record-11-5-tbps-ddos-attack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
TugaTech 🖥️<p>Cloudflare trava o maior ataque DDoS de sempre com um pico de 11,5 terabits por segundo<br>🔗&nbsp;<a href="https://tugatech.com.pt/t71286-cloudflare-trava-o-maior-ataque-ddos-de-sempre-com-um-pico-de-115-terabits-por-segundo" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tugatech.com.pt/t71286-cloudfl</span><span class="invisible">are-trava-o-maior-ataque-ddos-de-sempre-com-um-pico-de-115-terabits-por-segundo</span></a></p><p><a href="https://masto.pt/tags/ataque" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ataque</span></a> <a href="https://masto.pt/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://masto.pt/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> <a href="https://masto.pt/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://masto.pt/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://masto.pt/tags/seguran%C3%A7a" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>segurança</span></a> <a href="https://masto.pt/tags/tecnologia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tecnologia</span></a>&nbsp;</p>
Edwin G. :mapleleafroundel:<p>Cloudflare announced having blocked a 11.5Tbps distributed denial of service attack.</p><p>That’s roughly 1.44TB/s. Or 28 50GB Blu-Ray movies per second!</p><p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-blocks-record-breaking-115-tbps-ddos-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cloudflare-blocks-record-breaking-115-tbps-ddos-attack/</span></a><br>- - -<br>Cloudflare ont annoncé avoir bloqué une attaque de déni de service distribuée de 11,5Tb/s.</p><p>C’est environ 1,44To/s. Ou 165,22 films DVD double-couche par seconde.</p><p>// Article en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mstdn.moimeme.ca/tags/TI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TI</span></a> <a href="https://mstdn.moimeme.ca/tags/informationTechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationTechnologies</span></a> <a href="https://mstdn.moimeme.ca/tags/Technologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technologies</span></a> <a href="https://mstdn.moimeme.ca/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a></p>
areyou1or0<p>RapperBot: From Infection to DDoS in a Split Second <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://www.bitsight.com/blog/rapperbot-infection-ddos-split-second" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitsight.com/blog/rapperbot-in</span><span class="invisible">fection-ddos-split-second</span></a></p>
nemo™ 🇺🇦<p>🚨 Arch Linux faced intense DDoS attacks impacting their main site, AUR, and forums. The volunteer team, working with their hosting provider, is mitigating the situation and evaluating anti-DDoS options while thanking users for their patience. Mirrors remain available for packages &amp; ISOs. More info: <a href="https://www.heise.de/en/news/DDoS-attacks-on-Arch-Linux-situation-probably-clarified-10627766.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/DDoS-attacks-</span><span class="invisible">on-Arch-Linux-situation-probably-clarified-10627766.html</span></a> <a href="https://mas.to/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://mas.to/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://mas.to/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> 🛡️<br><a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
nemo™ 🇺🇦<p>🚨 Die DDoS-Angriffe auf Arch Linux sind offenbar überwunden! Die Hauptseite, das AUR und Foren wurden in den letzten Tagen stark attackiert, doch dank gemeinsamer Gegenmaßnahmen mit Hosting-Providern ist die Situation nun unter Kontrolle. Geduld &amp; Dank an die Community! 💪🌐 <a href="https://mas.to/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://mas.to/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://www.heise.de/news/DDoS-Angriffe-auf-Arch-Linux-Situation-vermutlich-geklaert-10627620.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/DDoS-Angriffe-au</span><span class="invisible">f-Arch-Linux-Situation-vermutlich-geklaert-10627620.html</span></a><br><a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
SOC Goulash<p>Alright team, it's been a pretty packed 24 hours in the cyber world! We've got some critical zero-days under active exploitation, a flurry of nation-state activity, new ransomware strains, and a deep dive into how attackers are weaponising browsers. Let's get into it:</p><p>Actively Exploited Vulnerabilities &amp; Zero-Days 🛡️</p><p>- WhatsApp has patched a zero-day, CVE-2025-55177, actively exploited in sophisticated, targeted attacks, potentially chained with Apple's CVE-2025-43300, likely by commercial surveillanceware vendors.<br>- FreePBX issued an emergency patch for a critical RCE flaw (CVSS 10, CVE-2025-57819) actively exploited since August 21st, allowing database manipulation and remote code execution. Users are urged to upgrade and check for suspicious 'ampuser' accounts.<br>- Docker Desktop on Windows and Mac has a critical vulnerability (CVE-2025-9074) allowing attackers to break container isolation and potentially take over the host system by exploiting an unauthenticated Docker Engine API.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/infosec_in_brief/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/infosec_in_brief/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Recent Cyber Attacks &amp; Breaches 🚨</p><p>- A widespread supply chain attack via Salesloft Drift, an AI chat agent, compromised Salesforce instances of numerous organisations, including Zscaler, leading to the theft of customer information and sensitive credentials like AWS access keys and Snowflake tokens.<br>- Nissan's design subsidiary, Creative Box Inc., was hit by the Qilin ransomware group, confirming data leakage, while the city of Baltimore lost $1.5 million in a procurement scam where a fraudster changed vendor payment details.<br>- New ransomware strains like Cephalus, Underground, NightSpire, and Sinobi (a Lynx rebrand) are active, with Sinobi exploiting compromised SonicWall SSL VPN credentials for initial access and lateral movement.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/infosec_in_brief/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/infosec_in_brief/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Nation-State Threat Actor Activity 🌍</p><p>- Amazon disrupted a watering hole campaign by Russian state-sponsored group Midnight Blizzard (APT29), which compromised legitimate websites to redirect targets to malicious Microsoft device code authentication flows, aiming to steal credentials.<br>- North Korea-linked ScarCruft (APT37) is using RokRAT malware in "Operation HanKook Phantom," targeting South Korean academics and former government officials via spear-phishing with LNK files to steal sensitive information and conduct espionage.<br>- The Spanish government cancelled a €10 million contract with Telefónica to use Huawei equipment in its national academic and research network (RedIRIS), citing "reasons of digital strategy and strategic autonomy" amidst ongoing concerns from allies about Chinese vendor risks.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/amazon-disrupts-russian-apt29-hackers-targeting-microsoft-365/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/amazon-disrupts-russian-apt29-hackers-targeting-microsoft-365/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/scarcruft-uses-rokrat-malware-in.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/scar</span><span class="invisible">cruft-uses-rokrat-malware-in.html</span></a><br>🗞️ The Record | <a href="https://therecord.media/spain-cancels-10-million-euro-huawei-contract" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/spain-cancels-</span><span class="invisible">10-million-euro-huawei-contract</span></a></p><p>New Malware &amp; Attack Techniques 🛠️</p><p>- Android dropper apps are shifting from delivering banking Trojans to simpler SMS stealers and spyware, often masquerading as government or banking apps, to bypass Google Play Protect's new security measures.<br>- Threat actors are using new methods like MixShell malware delivered via website contact forms, physical side-channel attacks (SleepWalk) exploiting CPU power consumption, and financially motivated ShadowCaptcha campaigns leveraging fake CAPTCHA pages.<br>- Other notable techniques include malvertising campaigns pushing the Brokewell banking trojan, fake recipe/guide sites dropping malware, proxyware distribution via fake YouTube download sites, and social media accounts laundering Chinese state media news.</p><p>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/android-droppers-now-deliver-sms.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/andr</span><span class="invisible">oid-droppers-now-deliver-sms.html</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Threat Landscape Commentary 📈</p><p>- Distributed Denial of Service (DDoS) remains a "profoundly unsexy" but rampant cybercrime, with Netscout reporting 8 million attacks globally in the first half of 2025, peaking at over 3 Tbps.<br>- DDoS-as-a-Service makes these sophisticated attacks accessible to anyone, targeting critical infrastructure sectors and even niche businesses like classical music websites, often for unclear motives.<br>- An infrastructural defence is needed, moving beyond filtering to automatically detect and take compromised botnet nodes offline, treating them as "broken" devices that require fixing to permanently disrupt DDoS operations.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/ddos_opinion/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/ddos_opinion/</span></a></p><p>Regulatory &amp; Policy Updates ⚖️</p><p>- Microsoft will begin requiring multi-factor authentication (MFA) for all non-read-only access to Azure systems from October 1st, with extensions available until July 1st next year for complex environments.<br>- Microsoft is implementing email throttling from October 15th, limiting external recipients to 100 per organisation per 24-hour window, to combat spam originating from newly created '.onmicrosoft.com' tenants.<br>- OpenSSH will start showing warnings for connections to SSH servers lacking post-quantum cryptography protections from version 10.1, urging server updates to support sntrup761x25519-sha512 or mlkem768x25519-sha256.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/infosec_in_brief/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/infosec_in_brief/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>AI Security &amp; Prompt Injection 🧠</p><p>- Researchers discovered "LegalPwn," a novel prompt injection attack that tricks Large Language Models (LLMs) into ignoring guardrails by embedding adversarial instructions within legal documents, making them appear legitimate.<br>- This technique successfully bypassed AI-driven security analysis in models like OpenAI's GPT-4o, Google's Gemini 2.5, and xAI's Grok, even leading to recommendations for executing reverse shells on user systems.<br>- AI systems are also vulnerable to prompt injection via image scaling attacks, where malicious instructions are hidden in high-resolution images, becoming visible and executable when the AI agent downscales them for processing.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/legalpwn_ai_jailbreak/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/legalpwn_ai_jailbreak/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Useful Tools &amp; Resources 💡</p><p>- PcapXray is an open-source tool designed to speed up packet capture investigations by visualising PCAP files into clear network diagrams, highlighting hosts, traffic flows, Tor usage, and potential malicious activity.<br>- Kopia is an open-source backup and restore tool that creates encrypted snapshots of selected files and directories to various destinations, offering deduplication, compression, and end-to-end encryption for efficient and secure backups.<br>- The "Weekly Recap" also highlights tools and strategies for securing Model Context Protocol (MCP) servers used by AI tools like GitHub Copilot, recommending auditing, stress-testing, policy enforcement, and Zero-Trust access.</p><p>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Sponsored Content &amp; Insights 🤝</p><p>- "When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider" highlights how over 80% of security incidents now originate from web applications, detailing Scattered Spider's browser-targeting techniques and advocating for multi-layered browser security.<br>- Other sponsored insights from The Hacker News cover "Code-to-Cloud Security" for AppSec leaders, practical steps to secure AI agents from cyberattacks, methods for hunting down "Shadow AI," and strategies for locking down Model Context Protocol (MCP) servers.<br>- These articles collectively emphasise the evolving attack surface, from browsers to AI agents and cloud-native applications, urging CISOs to adapt defence strategies with runtime protection, contextual policies, and integrated security stacks.</p><p>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/when-browsers-become-attack-surface.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/when</span><span class="invisible">-browsers-become-attack-surface.html</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://infosec.exchange/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/BrowserSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BrowserSecurity</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://infosec.exchange/tags/Regulatory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Regulatory</span></a></p>
Dark Web Informer :verified_paw:<p>🚨🇱🇹 Z-ALLIANCE Targeted the Website of Lithuanian Defence and Security Industry Association <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a></p>
Linux Magazine<p>The Arch User Repository continues to be under a DDoS attack that has been going on for two weeks<br><a href="https://www.linux-magazine.com/Online/News/AUR-Repository-Still-Under-DDoS-Attack?utm_source=mlm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Online/News</span><span class="invisible">/AUR-Repository-Still-Under-DDoS-Attack?utm_source=mlm</span></a> <br><a href="https://fosstodon.org/tags/AUR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AUR</span></a> <a href="https://fosstodon.org/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://fosstodon.org/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/outage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>outage</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/repository" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>repository</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://snug.moe/@lumi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lumi</span></a></span> <span class="h-card" translate="no"><a href="https://shrimp.starlightnet.work/@hazel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hazel</span></a></span> yes, it's easier to avoid:</p><ul><li><p>Just use <a href="https://infosec.space/tags/IRC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IRC</span></a> &amp; <a href="https://infosec.space/tags/Mumble" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mumble</span></a> instead!</p></li><li><p>As for <a href="https://infosec.space/tags/documentation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>documentation</span></a>, <a href="https://infosec.space/tags/MkDocs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MkDocs</span></a>-Material and for project managment, <a href="https://infosec.space/tags/GitLab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitLab</span></a> works fine.</p></li></ul><p>I merely use <a href="https://infosec.space/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> because they ain't got impacted by <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> and their moderation team actually cares, and I don't expect other platforms to be able and willing to do the same.</p><ul><li><p>If there <em>is</em> a convenient way to only use it to <a href="https://infosec.space/tags/host" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>host</span></a> a copy of a repo &amp; files as a <em>"slave"</em> (fork) repo (similar to <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>) I'll gladly consider that.</p></li><li><p>It's just not the highest priority rn as I'm preoccupied with more pressing issues.</p></li></ul>
Carlos SolísTo the people currently <a href="https://hub.azkware.net/search?tag=DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> -ing <a href="https://hub.azkware.net/search?tag=ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> : what do you gain by doing that, seriously? Who bothers keeping a distro's repos down so insistently if there's no motivation behind it? Is this just a distro war gone sour? <a href="https://status.archlinux.org/" rel="nofollow noopener" target="_blank">status.archlinux.org/</a>