#PgDog is a #network #proxy and it can see every byte sent between #Postgres and the clients. It understands #SQL and can infer where queries should go, without requiring changes to application code. In this article, we discuss how we handle the Postgres wire protocol and manipulate it to serve queries to multiple databases at the same time. https://pgdog.dev/blog/hacking-postgres-wire-protocol
Hacking the Postgres wire protocol

PgDog

Latest Mustang Panda Arsenal: Toneshell, StarProxy, PAKLOG, CorKLOG, and SplatCloak

Mustang Panda, a threat actor group, has developed new tools including two keyloggers (PAKLOG and CorKLOG) and an EDR evasion driver (SplatCloak). PAKLOG monitors keystrokes and clipboard data, using a custom encoding scheme. CorKLOG captures keystrokes, encrypts data with RC4, and establishes persistence through services or scheduled tasks. SplatCloak disables kernel-level notification callbacks for Windows Defender and Kaspersky drivers, employing obfuscation techniques like control flow flattening and mixed boolean arithmetic. Along with those tools, the group has been observed using updated versions of ToneShell and a new tool called StarProxy. ToneShell, a backdoor, now features changes in its FakeTLS C2 communication protocol and client identifier storage methods. StarProxy, a lateral movement tool, uses the FakeTLS protocol to proxy traffic and facilitate attacker communications.

Pulse ID: 6800148cd0bb0e7851cc6218
Pulse Link: https://otx.alienvault.com/pulse/6800148cd0bb0e7851cc6218
Pulse Author: AlienVault
Created: 2025-04-16 20:35:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Clipboard #CyberSecurity #EDR #InfoSec #Kaspersky #KeyLogger #OTX #OpenThreatExchange #Proxy #TLS #Windows #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Inside BRUTED: Black Basta (RaaS) Used Automated Brute Forcing Framework to Target Edge Network Devices

Black Basta, a ransomware-as-a-service group, has been using an automated brute forcing framework called BRUTED to target edge network devices since 2023. The framework performs internet scanning and credential stuffing against firewalls and VPN solutions in corporate networks. Black Basta prioritizes high-impact industries, particularly the Business Services sector, to amplify operational disruptions. The group's internal communications were leaked, exposing their infrastructure and operational details. BRUTED targets various remote-access and VPN solutions, using proxy rotation, credential generation, and distributed execution to scale attacks. Black Basta exploits vulnerabilities in edge devices for initial access, then targets ESXi hypervisors to encrypt file systems and disrupt virtual machines, maximizing operational impact and ransom leverage.

Pulse ID: 67ffc3faf1eadb11b97d2f1b
Pulse Link: https://otx.alienvault.com/pulse/67ffc3faf1eadb11b97d2f1b
Pulse Author: AlienVault
Created: 2025-04-16 14:51:38

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Edge #InfoSec #Mac #OTX #OpenThreatExchange #Proxy #RAT #RaaS #RansomWare #RansomwareAsAService #VPN #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
The developers of the mitmproxy tool describe it as the Swiss army knife for debugging, testing, data protection analysis, and penetration testing HTTP(S) connections. Holger Reibold shows you how mitmproxy can be a useful addition to your security toolbox.
https://www.admin-magazine.com/Archive/2025/85/Traffic-analysis-with-mitmproxy?utm_source=mlm
#OpenSource #mitmproxy #debugging #testing #security #proxy #MITM
mitmproxy » ADMIN Magazine

mitmproxy

ADMIN Magazine
How Proxy Browsers Work: A Step-by-Step Guide to Online Anonymity https://visualmodo.com/how-proxy-browsers-work/ 🌐🛡🕵️‍♂️ #Proxy #Browsers #Guide #Anonymity
How Proxy Browsers Work: A Step-by-Step Guide to Online Anonymity

In this article, we'll explore how proxy browsers work and provide a step-by-step guide to online anonymity, data safety, and privacy

Visualmodo

Cum puteți afla dacă vă aflați în spatele unui server proxy?

Un proxy este un server sau o aplicație care acționează ca un intermediar între un client și un alt server. Acesta servește ca o poartă de acces între client și internet și permite utilizatorilor să acceseze resurse online, păstrându-și ascunse identitatea, locația și alte informații personale. Proxy-urile sunt adesea folosite pentru a spori securitatea, confidențialitatea și pentru a adăuga filtre/firewall la rețeaua dumneavoastră. Există mai multe tipuri de […]

https://comunitatealinux.ro/cum-puteti-afla-daca-va-aflati-in-spatele-unui-server-proxy/

Cum puteți afla dacă vă aflați în spatele unui server proxy? – Comunitatea Linux România

The Week in Review, Edition 87 (2025-15)

Topics:

🗺️ Bikerouter: Revised Download Dialog

✈️ How much fuel does an airplane need? How does it compare to driving a car?

🦊 Firefox and vertical tabs

🌈 The Most Beautiful Color Palette: 12-bit Rainbow by @kate

🐚 CLI tool of the week: mitmproxy and mitmweb

🔊 Listened to this week: MEEMA b2b Max Muth, Moto Moto, Emel White & Silvi Knallt, Sommersonnenwende, Hophiluck

#Wochenrückblick #Bikerouter #Boeing #Kerosene #Fuel #Car #Firefox #Color #Palette #Rainbow #CLI #mitmproxy #mitmweb #Charles #HTTPS #Proxy #Techno

https://www.marcusjaschen.de/en/blog/2025/2025-15/

The Week in Review – 2025-15

🗺️ Bikerouter: Revised Download Dialog ✈️ How much fuel does an airplane need? How does it compare to driving a car? 🦊 Firefox and vertical tabs 🌈 The Most Beautiful Color Palette: 12-bit Rainbow 🐚 CLI tool of the week: mitmproxy and mitmweb 🔊 Listened to this week: MEEMA b2b Max Muth, Moto Moto, Emel White & Silvi Knallt, Sommersonnenwende, Hophiluck

Marcus Jaschen

Wochenrückblick, Ausgabe 87 (2025-15)

Themen:

🗺️ Bikerouter: Überarbeiteter Download-Dialog

✈️ Wieviel Treibtstoff benötigt ein Flugzeug? Wie vergleicht sich das mit dem Auto fahren?

🦊 Firefox und vertikale Tabs

🌈 Die schönste Farbpalette: 12-bit Rainbow von @kate

🐚 CLI-Tool der Woche: mitmproxy und mitmweb

🔊 In dieser Woche gehört: MEEMA b2b Max Muth, Moto Moto, Emel White & Silvi Knallt, Sommersonnenwende, Hophiluck

#Wochenrückblick #Bikerouter #Boeing #Kerosin #Treibtstoff #Auto #Firefox #Color #Palette #Rainbow #CLI #mitmproxy #mitmweb #Charles #HTTPS #Proxy #Techno

https://www.marcusjaschen.de/blog/2025/2025-15/

Rückblick Kalenderwoche 2025-15

🗺️ Bikerouter: Überarbeiteter Download-Dialog ✈️ Wieviel Treibtstoff benötigt ein Flugzeug? Wie vergleicht sich das mit dem Auto fahren? 🦊 Firefox und vertikale Tabs 🌈 Die schönste Farbpalette: 12-bit Rainbow 🐚 CLI-Tool der Woche: mitmproxy und mitmweb 🔊 In dieser Woche gehört: MEEMA b2b Max Muth, Moto Moto, Emel White & Silvi Knallt, Sommersonnenwende, Hophiluck

Marcus Jaschen

Install and Configure #SOCKS #Proxy Server on Rocky Linux VPS

This article provides a guide for how to install and configure SOCKS proxy server on Rocky Linux VPS.

In this tutorial, we'll go through the process of installing and configuring a SOCKS proxy server on a Rocky Linux VPS. We will also discuss enabling SSH tunnelling from a PC using the SOCKS proxy server. This will allow you to route your ...
Continued 👉 https://blog.radwebhosting.com/install-and-configure-socks-proxy-server-on-rocky-linux-vps/?utm_source=mastodon&utm_medium=social&utm_campaign=ReviveOldPost #installguide #proxyserver #vpsguide #rockylinux

Install And Configure SOCKS Proxy Server On Rocky Linux VPS - VPS Hosting Blog | Dedicated Servers | Reseller Hosting

This article provides a guide for how to install and configure SOCKS proxy server on Rocky Linux VPS.

RadWeb, LLC