I hate #WebMail ... I really fucking do.

This being Not My Computer I'm relegated to using *my* WebMail, which is better than most but still isn't a REAL EMail client.

Basic shit that pisses me off:
* Only X messages displayed - Give me my entire inbox, damnit.
* Searching sucks.
* Selecting multiple messages is a pain in the ass.
* I am sick of this "Priority" and "combined" InBoxes bullshit. Do NOT help me prioritize me EMail.

Know what? SSH => Alpine ... Fuck the dumb shit.

I don't much like #WebMail, and I like #Google even less, but I gotta say that #Gmail's new Subscription manager is a game-changer.

https://mail.google.com/mail/u/0/#sub

Gmail is no longer my primary email provider (thankfully), and I'm more than happy to pay out of my own pocket for email hosted by a reputable company, but I still have work email and my personal "junk drawer" email accounts hosted by the "don't be evil, lol" company. ;)

Gmail

Gmail is email that’s intuitive, efficient, and useful. 15 GB of storage, less spam, and mobile access.

Email (electronic mail) is the general method of exchanging digital messages over the Internet. Gmail, or Google Mail, is a specific web-based service provider used to send and receive those emails. Think of email as the service (like "mail") and Gmail as the provider (like "the post office")

#email #Gmail #webmail #Googlemail #tech #technology

@PatriceA @ekimia @plossra_a sous le contrôles des autres membres du @plossra_a nous avons de la maîtrise en #carbonio #zimbra #mail (#imap #pop #webmail ...) mais pas de #bluemind à proprement parler
https://www.ploss-ra.fr/membres/
Les membres – PLOSS-RA

L'autre jour, quelqu'un dans mon entourage me dit que le #webmail qu'il utilise côté pro a changé. Le nouveau est #lent au possible et #impraticable comparé à l'ancien. C'est le jour et la nuit.

Arriverez-vous à deviner dans quel environnement il se trouve à présent ?

Perso, j'avais deviné avant de le voir 😁 .

Operation Roundish: Uncovering an APT28 Roundcube Exploitation Toolkit Targeting Ukraine

An exposed open directory revealed a comprehensive Roundcube exploitation toolkit used by APT28 to target Ukrainian government entities. The toolkit includes XSS payloads, a Flask-based C2 server, CSS injection tools, and a Go-based implant. It enables credential harvesting, persistent mail forwarding, bulk email exfiltration, address book theft, and 2FA secret extraction. The primary target was identified as mail.dmsu.gov.ua, Ukraine's State Migration Service. Technical analysis shows significant overlaps with previously documented APT28 operations, while introducing new capabilities such as CSS-based side-channel attacks and browser credential theft. The toolkit's modular approach and sophisticated evasion techniques demonstrate APT28's evolving tactics in compromising webmail platforms for long-term intelligence gathering.

Pulse ID: 69ba83b93cb449af00474243
Pulse Link: https://otx.alienvault.com/pulse/69ba83b93cb449af00474243
Pulse Author: AlienVault
Created: 2026-03-18 10:51:37

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#2FA #APT28 #Browser #CredentialHarvesting #CyberSecurity #Email #Government #ICS #InfoSec #OTX #OpenThreatExchange #RAT #UK #Ukr #Ukraine #Ukrainian #Webmail #XSS #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Operation GhostMail: Russian APT Exploits Zimbra XSS to Target Ukraine Government

A sophisticated phishing campaign targeting a Ukrainian government agency exploits a cross-site scripting vulnerability in Zimbra Collaboration Suite. The attack, attributed to a Russian APT group, uses a seemingly innocuous internship inquiry email to deliver a malicious JavaScript payload. When opened in a vulnerable Zimbra webmail session, the script silently executes, harvesting credentials, session tokens, 2FA codes, and mailbox contents. The multi-stage attack employs obfuscation techniques, SOAP API abuse, and dual-channel exfiltration via DNS and HTTPS. The campaign demonstrates the evolution of webmail-focused intrusions, relying on browser-resident stealers rather than traditional malware binaries.

Pulse ID: 69b975d80c8af764ef55c18f
Pulse Link: https://otx.alienvault.com/pulse/69b975d80c8af764ef55c18f
Pulse Author: AlienVault
Created: 2026-03-17 15:40:08

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#2FA #Browser #CyberSecurity #DNS #Email #Government #HTTP #HTTPS #InfoSec #Java #JavaScript #Malware #OTX #OpenThreatExchange #Phishing #RAT #Russia #UK #Ukr #Ukraine #Ukrainian #Vulnerability #Webmail #XSS #Zimbra #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
www.zaclys.com and #zaclys #webmail are online again. Thanks for the quick fix :)
www.zaclys.com and #zaclys #webmail are unreachable.

@hcf that's just wrong and you know that.

For example, if "#Security" was a real issue, they'd host their #IMAP+#SMTP access exclusively over @torproject / #Tor because #OnionServices are using fully-encrypted connections in a self-authenticating adress spaces.

  • They don't because that isn't the issue, and I'm not talking about the Server-to-Server - Connectivity, which is INHERENTLY AND UNFIXABLE INSECURE WITH EVERY EMAIL PROVIDER unless they don't allow actual cross-provider eMails (or restrict it to very few, selected competitiors with spechally negotiated connectivity [i.e. #VPN|s], which to my knowledge NONE of the commercial providers do)…

I brought up @monocles because they at least don't lie to customers and are honest about security & privacy!

@case2tv @dans_root @earthnewstech

#sarcasm #commentary #ITsec #InfoSec #OpSec #ComSec

.onion - Wikipedia