sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#encrypthub

0 Beiträge0 Beteiligte0 Beiträge heute
securityaffairs<p><a href="https://infosec.exchange/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptHub</span></a> abuses <a href="https://infosec.exchange/tags/Brave" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Brave</span></a> Support in new campaign exploiting <a href="https://infosec.exchange/tags/MSC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSC</span></a> <a href="https://infosec.exchange/tags/EvilTwin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EvilTwin</span></a> flaw<br><a href="https://securityaffairs.com/181203/cyber-crime/encrypthub-abuses-brave-support-in-new-campaign-exploiting-msc-eviltwin-flaw.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/181203/cyb</span><span class="invisible">er-crime/encrypthub-abuses-brave-support-in-new-campaign-exploiting-msc-eviltwin-flaw.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
The New Oil<p>Hacker sneaks <a href="https://mastodon.thenewoil.org/tags/infostealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infostealer</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> into early access <a href="https://mastodon.thenewoil.org/tags/Steam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Steam</span></a> game</p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-sneaks-infostealer-malware-into-early-access-steam-game/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hacker-sneaks-infostealer-malware-into-early-access-steam-game/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gaming</span></a> <a href="https://mastodon.thenewoil.org/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptHub</span></a> <a href="https://mastodon.thenewoil.org/tags/Chemia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chemia</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
TechNadu<p>🚨 New Steam Game Malware Campaign Alert<br>EncryptHub compromised the early access title Chemia on Steam to deliver infostealer malware via legit-looking binaries.</p><p>– HijackLoader, Vidar, and Fickle Stealer deployed<br>– PowerShell used to grab payloads from soft-gets[.]com<br>– Command &amp; Control routed through Telegram<br>– Doesn’t affect gameplay, increasing stealth factor</p><p>Gamers, security researchers, and defenders—this is the third Steam malware campaign this year. Vet early access titles carefully.</p><p><a href="https://infosec.exchange/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://infosec.exchange/tags/InfoStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoStealer</span></a> <a href="https://infosec.exchange/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptHub</span></a> <a href="https://infosec.exchange/tags/SteamMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SteamMalware</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Vidar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vidar</span></a></p>
The DefendOps Diaries<p>Imagine a hacker who not only exploited zero-days to breach over 600 organizations but also played the hero by patching vulnerabilities for Microsoft. How does one person walk the line between cybercrime and cybersecurity?</p><p><a href="https://thedefendopsdiaries.com/decrypting-encrypthub-a-cybersecurity-enigma/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/decryp</span><span class="invisible">ting-encrypthub-a-cybersecurity-enigma/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/encrypthub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encrypthub</span></a><br><a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a><br><a href="https://infosec.exchange/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a><br><a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p>
securityaffairs<p>The controversial case of the threat actor <a href="https://infosec.exchange/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptHub</span></a><br><a href="https://securityaffairs.com/176251/cyber-crime/the-controversial-case-of-the-threat-actor-encrypthub.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176251/cyb</span><span class="invisible">er-crime/the-controversial-case-of-the-threat-actor-encrypthub.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
TechNadu<p>♦️ The threat actor Water Gamayun, also known as EncryptHub and Larva-208 has exploited a zero-day vulnerability in the Microsoft Management Console framework to execute malicious codes.</p><p>🔗 Read more: <a href="https://www.technadu.com/russian-threat-actor-encrypthub-exploits-a-microsoft-management-console-zero-day-flaw/582371/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">technadu.com/russian-threat-ac</span><span class="invisible">tor-encrypthub-exploits-a-microsoft-management-console-zero-day-flaw/582371/</span></a></p><p><a href="https://infosec.exchange/tags/WaterGamayun" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WaterGamayun</span></a> <a href="https://infosec.exchange/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptHub</span></a> <a href="https://infosec.exchange/tags/Larva208" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Larva208</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/EvilTwin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EvilTwin</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p>
Opalsec :verified:<p>Hey Cyber Security Pros! 👋</p><p>Ready to dive into the latest security updates and breaches that should be on your radar? We've got you covered.</p><p>🗞️ <a href="https://opalsec.io/daily-news-update-wednesday-march-26-2025-australia-melbourne/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-w</span><span class="invisible">ednesday-march-26-2025-australia-melbourne/</span></a></p><p>At a high level, here are the main stories:</p><p>- EncryptHub's Zero-Day Exploits: Trend Micro links EncryptHub (a.k.a. Water Gamayun) to attacks leveraging a Microsoft Management Console (MMC) zero-day vulnerability (CVE-2025-26633). Discover how they're bypassing Windows protections and deploying various payloads.</p><p>- Windows NTLM Hash Leak Zero-Day: A new zero-day flaw allows remote attackers to steal NTLM credentials. Learn how this vulnerability affects all Windows versions and how 0Patch is providing unofficial fixes. Don't forget about those older, unpatched vulnerabilities too!</p><p>- HaveIBeenPwned Gets Phished: Even security experts aren't immune! Troy Hunt shares his experience of a sophisticated Mailchimp phishing attack. Lessons learned on OTP security and the importance of monitoring password manager behavior.</p><p>- Oracle Breach Controversy: Customers are confirming the legitimacy of leaked data despite Oracle Cloud's denial. Could this lead to supply chain and ransomware attacks? Ensure you're rotating those SSO and LDAP credentials and enforcing strong MFA!</p><p>- Astral Foods Cyberattack: South Africa's largest chicken producer faced a $1 million loss due to a recent cyberattack.</p><p>- Android Malware Evolution: New Android malware is using .NET MAUI to evade detection. Learn how it's disguising itself and targeting users in China and India.</p><p>- CS2 Phishing Attacks: Browser-in-the-Browser attacks are targeting Counter-Strike 2 players' Steam accounts. </p><p>- VMware Tools Vulnerability: Broadcom warns of an authentication bypass vulnerability in VMware Tools for Windows. Update those systems ASAP!</p><p>- CrushFTP Unauthenticated Access Flaw: CrushFTP warns users to patch an unauthenticated HTTP(S) port access vulnerability.</p><p>- Kubernetes IngressNightmare: Wiz researchers uncovered critical vulnerabilities in Ingress-Nginx Controller that could lead to complete cluster takeovers.</p><p>- Trump Officials' Signal SNAFU: High-profile officials accidentally shared classified Yemen airstrike plans in a Signal group with a journalist.</p><p>- FCC Investigates Huawei: The FCC is scrutinizing Chinese manufacturers for circumventing US regulations.</p><p>- Privacy-Boosting Tech: A new report suggests governments should prioritize privacy-enhancing technologies to prevent breaches.</p><p>Check out the full blog post 👉 <a href="https://opalsec.io/daily-news-update-wednesday-march-26-2025-australia-melbourne/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-w</span><span class="invisible">ednesday-march-26-2025-australia-melbourne/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/securitybreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitybreach</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kubernetes</span></a> <a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/NTLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NTLM</span></a> <a href="https://infosec.exchange/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptHub</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://infosec.exchange/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> <a href="https://infosec.exchange/tags/CrushFTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrushFTP</span></a> <a href="https://infosec.exchange/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kubernetes</span></a> <a href="https://infosec.exchange/tags/HaveIBeenPwned" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HaveIBeenPwned</span></a> <a href="https://infosec.exchange/tags/Oracle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oracle</span></a> <a href="https://infosec.exchange/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a> <a href="https://infosec.exchange/tags/CounterStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CounterStrike</span></a> <a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p>
The DefendOps Diaries<p>Understanding the CVE-2025-26633 Vulnerability in Microsoft Management Console</p><p><a href="https://thedefendopsdiaries.com/understanding-the-cve-2025-26633-vulnerability-in-microsoft-management-console/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/unders</span><span class="invisible">tanding-the-cve-2025-26633-vulnerability-in-microsoft-management-console/</span></a></p><p><a href="https://infosec.exchange/tags/cve202526633" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve202526633</span></a><br><a href="https://infosec.exchange/tags/microsoftmanagementconsole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftmanagementconsole</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a><br><a href="https://infosec.exchange/tags/encryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryptHub</span></a></p>
The Threat Codex<p>Unveiling EncryptHub: Analysis of a multi-stage malware campaign<br><a href="https://infosec.exchange/tags/EncryptHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptHub</span></a> <br><a href="https://outpost24.com/blog/unveiling-encrypthub-multi-stage-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">outpost24.com/blog/unveiling-e</span><span class="invisible">ncrypthub-multi-stage-malware/</span></a></p>