mastodon.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
The original server operated by the Mastodon gGmbH non-profit

Administered by:

Server stats:

364K
active users

#ddos

30 posts30 participants1 post today
beSpacific<p>Via <a href="https://newsie.social/tags/LLRX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLRX</span></a> - <span class="h-card" translate="no"><a href="https://newsie.social/@psuPete" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>psuPete</span></a></span> Recommends – Weekly highlights on cyber security issues, March 15, 2025: Four highlight's from this week's column - The 200+ Sites an <a href="https://newsie.social/tags/ICE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICE</span></a> <a href="https://newsie.social/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a> Contractor is Monitoring; US cities warn of wave of unpaid parking <a href="https://newsie.social/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> texts; <a href="https://newsie.social/tags/OPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPM</span></a> watchdog to investigate <a href="https://newsie.social/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> risks tied to <a href="https://newsie.social/tags/DOGE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOGE</span></a> agency access; and A Brand-New Botnet Is Delivering Record-Size <a href="https://newsie.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> Attacks. <a href="https://newsie.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://newsie.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://newsie.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://newsie.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://www.llrx.com/2025/03/pete-recommends-weekly-highlights-on-cyber-security-issues-march-15-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">llrx.com/2025/03/pete-recommen</span><span class="invisible">ds-weekly-highlights-on-cyber-security-issues-march-15-2025/</span></a></p>
Max Resing<p>Last week was another stakeholder meeting on <a href="https://infosec.exchange/tags/DNS4EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS4EU</span></a>. <a href="https://infosec.exchange/tags/Whalebone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whalebone</span></a> provided a short overview of the project including a timeline. Public launch is scheduled for June this year. The talk elaborates on various considerations of the new <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> project. I was mostly interested in the deployment aspect, the <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> slides and the <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> and <a href="https://infosec.exchange/tags/anonymization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anonymization</span></a> mechanisms.</p><p>My personal main concern with the project is the absence of resolver technology. The project plainly uses the <a href="https://infosec.exchange/tags/KnotDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KnotDNS</span></a> resolver. Not a bad choice, but University taught me that diversity in the backend software introduces even more resiliency. Yet, as Whalebone is a <a href="https://infosec.exchange/tags/Czech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Czech</span></a> company, it is apparent why they chose <a href="https://infosec.exchange/tags/KnotDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KnotDNS</span></a> exclusively.</p><p>The <a href="https://142290803.fs1.hubspotusercontent-eu1.net/hubfs/142290803/PDF%20files/Workshop%20DNS4EU%20Public%20resolvers%20Slidedeck.pdf" rel="nofollow noopener" target="_blank">slides</a> are public.</p>
Hackread.com<p>NEW: The latest Link11 European Cyber Report shows an alarming trend: the number of DDoS attacks has more than doubled, and they are shorter, more targeted, and more technically sophisticated.</p><p>Read: <a href="https://hackread.com/european-cyber-report-2025-137-more-ddos-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/european-cyber-re</span><span class="invisible">port-2025-137-more-ddos-attacks/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://mstdn.social/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://mstdn.social/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a></p>
Cybernews<p>The spirit of hacktivism is enriched with a broad palette of ideological flavors.</p><p><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/X" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>X</span></a> <a href="https://infosec.exchange/tags/socialmedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialmedia</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> </p><p><a href="https://cnews.link/dark-storm-ironic-attack-against-x-twitter-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cnews.link/dark-storm-ironic-a</span><span class="invisible">ttack-against-x-twitter-1/</span></a></p>
:masto: UNDERWORLD :chatons:<p>Suite à un <a href="https://mastodon.underworld.fr/tags/DDOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDOS</span></a> sur les serveurs <a href="https://mastodon.underworld.fr/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> de la <a href="https://mastodon.underworld.fr/tags/FDN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDN</span></a>, une partie des services de UNDERWORLD a été indisponible. Le temps de comprendre et de mitiger le problème/impact sur l'ensemble de l'infra UNDERWORLD.</p><p><a href="https://www.fdn.fr/renforcement-serveurs-dns-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fdn.fr/renforcement-serveurs-d</span><span class="invisible">ns-2025/</span></a></p>
Phillemon CEH | CTH<p>🚨 DDoS Attacks Are Evolving! Are You Ready? 💥</p><p>Stay ahead, Mitigate Risks &amp; Protect your Business.</p><p>📖 Read now: <a href="https://wardenshield.com/preparedness-in-action-crafting-incident-response-plans-for-ddos-attacks" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">wardenshield.com/preparedness-</span><span class="invisible">in-action-crafting-incident-response-plans-for-ddos-attacks</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="tag">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/DDoS" class="mention hashtag" rel="tag">#<span>DDoS</span></a> <a href="https://mastodon.social/tags/IncidentResponse" class="mention hashtag" rel="tag">#<span>IncidentResponse</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="tag">#<span>CyberDefense</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="tag">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/DataProtection" class="mention hashtag" rel="tag">#<span>DataProtection</span></a> <a href="https://mastodon.social/tags/WardenShield" class="mention hashtag" rel="tag">#<span>WardenShield</span></a> <a href="https://mastodon.social/tags/CyberResilience" class="mention hashtag" rel="tag">#<span>CyberResilience</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #11/2025 is out!</p><p>It includes the following and much more:</p><p>➝ Alleged Co-Founder of <a href="https://infosec.exchange/tags/Garantex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Garantex</span></a> Arrested in India;</p><p>➝ X Suffered a <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> Attack;</p><p>➝ Microsoft <a href="https://infosec.exchange/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> Fixes 7 Zero-days;</p><p>➝ UK Hospital Discovered 5,000 to 10,000 Unknown Devices Connected to its Network;</p><p>➝ <a href="https://infosec.exchange/tags/NVIDIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVIDIA</span></a> Chips Smugglers Granted Bail in Singapore;</p><p>➝ <a href="https://infosec.exchange/tags/Tenable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tenable</span></a> tested <a href="https://infosec.exchange/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeepSeek</span></a>'s Ability to Generate <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>;</p><p>➝ <a href="https://infosec.exchange/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a> labelling DeepSeek as "state-controlled";</p><p>➝ New <a href="https://infosec.exchange/tags/Jailbreak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jailbreak</span></a> Method called Context Compliance Attack (CCA) Works Against Most <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> Models</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/template-infosec-mashup-xx-2025-7eb9e43f2aebd47f?utm_source=beehiiv&amp;utm_medium=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/template-infosec-mashup-xx-2025-7eb9e43f2aebd47f?utm_source=beehiiv&amp;utm_medium=mastodon</span></a></p>
MiniMedusa Lol<p>New scraped proxy list for MegaMedusaL4, get full IP : <a href="https://www.minimedusa.lol/ip/current-scrapedL4.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">minimedusa.lol/ip/current-scra</span><span class="invisible">pedL4.txt</span></a> or cleaned IP : <a href="https://www.minimedusa.lol/ip/current-scraped-cleanedL4.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">minimedusa.lol/ip/current-scra</span><span class="invisible">ped-cleanedL4.txt</span></a> - <a href="https://social.circl.lu/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://social.circl.lu/tags/Ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ddos</span></a> <a href="https://social.circl.lu/tags/MegaMedusa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MegaMedusa</span></a></p>
psuPete<p><a href="https://infosec.exchange/tags/LLRX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLRX</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <span class="h-card" translate="no"><a href="https://newsie.social/@bespacific" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bespacific</span></a></span> </p><p>Pete Recommends – Weekly highlights on cyber security issues, March 15, 2025</p><p>Four highlights from this week: The 200+ Sites an <a href="https://infosec.exchange/tags/ICE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICE</span></a> <a href="https://infosec.exchange/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a> Contractor is Monitoring; US cities warn of wave of unpaid parking phishing texts; <a href="https://infosec.exchange/tags/OPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPM</span></a> watchdog to investigate IT risks tied to <a href="https://infosec.exchange/tags/DOGE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOGE</span></a> 's agency access; and A Brand-New Botnet Is Delivering Record-Size <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> Attacks.</p><p> Posted in: AI, Cybercrime, Cybersecurity, Privacy, Search Engines </p><p><a href="https://www.llrx.com/2025/03/pete-recommends-weekly-highlights-on-cyber-security-issues-march-15-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">llrx.com/2025/03/pete-recommen</span><span class="invisible">ds-weekly-highlights-on-cyber-security-issues-march-15-2025/</span></a></p>

The Real Reason Twitter Went Down Actually Sounds Pretty Embarrassing

Security researchers told Wired that several X origin servers, which are designated to respond to web requests, weren't secured by the company's Cloudflare protection.

Cloudflare offers services allowing websites to automatically detect and mitigate distributed denial-of-service (DDoS) attacks, like the most recent cyberattack targeting X.

futurism.com/reason-twitter-we

Futurism · The Real Reason Twitter Went Down Actually Sounds Pretty EmbarrassingBy Victor Tangermann

Oh really it was Ukraine that took down X on March 10? Not so fast.

Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. wired.com/story/x-ddos-attack- #X #Musk #DDoS #cyberattack #cybersecurity #security #Ukraine #BotNet #Internet

File Hashes Analysis with Power BI from Data Stored in DShield SIEM

This analysis showcases the use of Power BI to examine file hash data from a DShield SIEM over a 60-day period. The process involved exporting data from Elastic Discover, importing it into Power BI, and creating visualizations for analysis. Key findings include the identification of an IP address (87.120.113.231) associated with RedTail malware, uploading six different files with multiple hashes. The analysis also revealed the reappearance of a previously identified Linux Trojan (Xorddos) from new IP addresses within the same subnet. Additionally, two strange filenames were discovered and investigated, with one identified as an IRCBot through VirusTotal. This method of large dataset analysis proves valuable in uncovering potentially overlooked or lost data through retrospective examination.

Pulse ID: 67d2a955c677b493cb1eaa8f
Pulse Link: otx.alienvault.com/pulse/67d2a
Pulse Author: AlienVault
Created: 2025-03-13 09:45:57

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.