https://securityaffairs.com/187394/hacking/shadowserver-finds-6000-likely-vulnerable-smartermail-servers-exposed-online.html
#securityaffairs #hacking
Oh #ShadowServer, now you're just being silly...
Here is #Shadowserver's announcement on the global #OperationEastwood which aimed for the #NoName05716 #APT.
https://infosec.exchange/@shadowserver/114863740047451178
There are various public statements, including Europol's post linked here. The members are also listed on Europe's most wanted list. Likewise, the #German #BKA published a multi-lingual statement on the #DDoSia operators and members.
Proud to support our international LE partners in Europe/Eurojust coordinated Operation Eastwood - another successful public/private partnership cyber threat disruption! https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network
Hoe de sluiting van BidenCash de wereld van carding marktplaatsen verandert
Artikel Cybercrimeinfo: https://www.ccinfo.nl/menu-nieuws-trends/darkweb/2548908_hoe-de-sluiting-van-bidencash-de-wereld-van-carding-marktplaatsen-verandert
Podcast Spotify: https://open.spotify.com/episode/6tLnBUOe7pv45jySLVdV4n?si=7744c9cfb31640d6
Podcast Youtube: https://youtu.be/OOr4dH6LUm8?si=cRM3CNnW_JCSjPG-
#BidenCash #Carding #Darkweb #Cybercrime #Cybersecurity #InternationalCooperation #DigitalCrimes #FBI #NHTCU #Cryptocurrency #Ransomware #DataTheft #DomainSeizure #DigitalFraud #CyberThreats #MultifactorAuthentication #Shadowserver #CybercrimePrevention #CyberWar #TechCrime
De sluiting van BidenCash verandert de wereld van carding marktplaatsen op het darkweb. Lees hoe internationale samenwerking de strijd tegen cybercriminaliteit versterkt en wat dit betekent voor de toekomst van digitale misdrijven.
I just found these people in the logs of a new server that I just set up today. They hit it within minutes. So I had a shufti around their dashboard, and found this.
What is a reasonable explanation for #Shropshire's love of #TELNET?
It's Brother Jerome's secret BBS habit, isn't it? (-:
New post from the #VulnerabilityLookup project about #Shadowserver and Sightings:
https://www.vulnerability-lookup.org/2025/01/22/shadowserver-sightings-in-vulnerability-lookup/
You can subscribe to the blog:
https://www.vulnerability-lookup.org/news/index.xml !
#opensource #cybersecurity #vulnerability #VulnerabilityLookup #TheShadowserverFoundation
We are glad to announce the immediate availability of vulnerability-related observations from The Shadowserver Foundation within Vulnerability-Lookup. This milestone wouldn’t have been possible without Piotr Kijewski. We developed a new sighting client, ShadowSight. This new client gathers vulnerability-related data directly from The Shadowserver Foundation, then reports the collected data to the Vulnerability-Lookup API as sightings. ShadowSight leverages insights on common vulnerabilities and exploited vulnerabilities from Shadowserver’s honeypot source. The source code of ShadowSight is available:
Researchers reported that more than 15000 Citrix servers exposed online are likely vulnerable to attacks exploiting the vulnerability CVE-2023-3519. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week warned of cyber attacks against Citrix NetScaler Application Delivery Controller (ADC) and Gateway devices exploiting recently discovered zero-day CVE-2023-3519. The Agency states that threat actors targeted a NetScaler […]
Reading my selfhosted Mastodon Nginx server logs and I see that The Shadow Server Foundation scanned my instance today.
I wonder if this is just a general search for flaws in Mastodon code or if there is something specific going on that flagged my instance.