⚠️ CVE-2026-32292: CRITICAL vuln in GL-iNet Comet KVM (CVSS 9.3) — web UI lacks brute-force protections. No patch yet. Restrict access, use strong creds, monitor logs! Details: https://radar.offseq.com/threat/cve-2026-32292-cwe-307-improper-restriction-of-exc-7d4b6f55 #OffSeq #Vulnerability #Cybersecurity #BruteForce

Mit einen Günstigen USB Dongle zb aus'm "China shop" für paar euro, kann man(n) fast alle geräte die #infrared haben steuern (Listen,Hex,Bruteforce)
Oder wenn das #smartphone eingebaute IR-Sender hat.

Kudos an Dev(s)

https://github.com/iodn/android-ir-blaster

#opensource #app #infrarot #steuerung #github #foss #linux #android #keepandroidopen #fdroid #Droidify #apk #usbdongle #FlipperZero #BruteForce

GitHub - iodn/android-ir-blaster: Create custom infrared (IR) remotes using hex codes, raw signals, or Flipper Zero, LIRC, and IRPLUS files

Create custom infrared (IR) remotes using hex codes, raw signals, or Flipper Zero, LIRC, and IRPLUS files - iodn/android-ir-blaster

GitHub

Wie auch andere in der #Regierung ist #Reiche einfach auf einem persönlichen, #nihilistisch​en #bruteforce #Kamikaze #Politik Kurs.

Sie hat eine, diese, #Amtszeit, geht nicht von einer weiteren aus und versucht, in diesen vier Jahren ohne jegliche #Rücksicht auf irgendwelche Opfer das absolute Maximum für ihre #Fossil #Lobby rauszuholen - und damit für sich. #Fortschritt muss zurück gepusht werden, so weit es geht. Für ein gutes Leben einiger weniger: Reiche.

Mehr nicht, it's that simple.

South American telecommunication providers targeted with three new malware implants

UAT-9244, a China-nexus advanced persistent threat actor, has been targeting critical telecommunications infrastructure in South America since 2024. The group employs three new malware implants: TernDoor, a Windows-based backdoor variant of CrowDoor; PeerTime, an ELF-based backdoor using BitTorrent protocol; and BruteEntry, a brute force scanner for SSH, Postgres, and Tomcat servers. UAT-9244 uses dynamic-link library side-loading, scheduled tasks, and registry modifications for persistence. The group is closely associated with FamousSparrow and Tropic Trooper, sharing similar tooling and tactics. Their infrastructure includes multiple command and control servers and operational relay boxes for scanning and brute-forcing activities.

Pulse ID: 69a9e3f038f67d31461ec191
Pulse Link: https://otx.alienvault.com/pulse/69a9e3f038f67d31461ec191
Pulse Author: AlienVault
Created: 2026-03-05 20:13:36

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #BruteForce #China #CyberSecurity #ELF #ICS #InfoSec #Malware #OTX #OpenThreatExchange #RAT #RCE #SSH #SouthAmerica #Telecom #Telecommunication #Tomcat #Windows #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Quanto tempo serve a un Computer per indovinare la tua Password?

Immagina di essere davanti al computer, la sera, mentre crei un nuovo account. Scrivi una password qualunque, clicchi su “Registrati” e ti senti al sicuro. Ma dall’altra parte del mondo una macchina potrebbe essere in grado di provare milioni o addirittura miliardi di combinazioni al secondo per indovinare proprio quella parola segreta che hai appena scelto. E non si tratta di fantascienza. È matematica, potenza di calcolo e – spesso – sfruttamento dei nostri errori più umani e […]

https://www.psicospace.it/quanto-tempo-serve-a-un-computer-per-indovinare-la-tua-password/

One clever method to deal with #ssh #bruteforce #bots is to first allow the connection and then sever it abruptly without a proper close. No FIN, no RST.

The bot will just sit there thinking it is still connected while you are actually not spending any resources at all.

Collective defense by means of the attacker's time being wasted!

Here is a neat project visualizing this on a globe:

https://knock-knock.net

https://github.com/djkurlander/knock-knock

Knock-Knock | Live Intruder Map

A real-time 3D globe showing bots trying to break into my server via SSH

@tapafon @ariadne pressing X for doubt

Personally, I've not seen #Tox doin' much…

Thus it's important to outcall the state of things but also get the Normies to understand the seriousness if the situation.

/2

Volgens mij heb ik deze film eerder gezien.
Tal van scènes komen me heel bekend voor, maar in een andere uitvoering. 😇

#FilmNoir #BruteForce

IP2Ban для Exchange средствами PowerShell

Привет! На связи Виктор из Cloud4Y. Хочу поделиться практической историей о том, как сделать fail2ban-подобную механику для Exchange на Windows: быстрое обнаружение brute-force по IIS-логам и автоматическая блокировка атакующих IP . Fail2ban и аналоги привычны для Linux, но когда у тебя on-prem Exchange на Windows , нужен свой инструмент для быстрого обнаружения массовых неудачных логинов и такой же быстрой блокировки источника.

https://habr.com/ru/companies/cloud4y/articles/986202/

#Exchange #PowerShell #bruteforce #информационная_безопасность #IPблокировка #учетные_записи #IPадреса #IIS_W3C

IP2Ban для Exchange средствами PowerShell

Привет! На связи Виктор из Cloud4Y. Хочу поделиться практической историей о том, как сделать fail2ban-подобную механику для Exchange на Windows: быстрое обнаружение brute-force по IIS-логам и...

Хабр