Johndgeek 🌎

@Johndgeek@infosec.exchange
19 Followers
10 Following
152 Posts
Occasional musings of an everyday ordinary regular geek.
Websitehttp://www.johndgeek.com
LocationSanta Clarita
Mastodon is slowly gaining popularity, but it also attracts bad actors and scammers. Remember that no verification or blue tick mark is for sale on any instance. Similarly, be aware of popular accounts getting cloned in some other cases. As usual, all of these scams have one goal: to steal your information, money, or cryptocurrency, or get you signed up for OF, etc. Stay on guard and report such accounts or instances.

Attackers exploit a blind spot by hiding malware inside DNS records. This technique transforms the Internet DNS into an unconventional file storage system and distributes malware using dns records. Be careful and safe out there 😱 Almost nobody filters DNS. Another security nightmare.

Read more: Malware in DNS
https://dti.domaintools.com/malware-in-dns/

Malware in DNS - DomainTools Investigations | DTI

Because it's always DNS, we wanted to share this fun finding of malware stored across DNS TXT records.

DomainTools Investigations | DTI
if you put a webserver up on the internet. anywhere, hosting anything, you will see "the background radiation of the internet", and it looks like this:

An important message for each of you. Please don't skip. It's very short. And please boost to get the word out. Everyone needs to know this...

https://davbot.media/w/2dRBk3yRBifv9Sxikipa82

#video #PeerTube

one day you'll realize

PeerTube

General reminder:

The domain name putty.org is *NOT* run by the #PuTTY developers. It is run by somebody not associated with us, who uses the domain to interpose advertising for their unrelated commercial products. We do not endorse those products in any way, and we have never given any kind of agreement for PuTTY's name to be used in promoting them.

Please do not perpetuate the claim that putty.org is the PuTTY website. If anyone is linking to it on that basis, please change the link. The PuTTY website is https://www.chiark.greenend.org.uk/~sgtatham/putty/ and it always has been.

You can check this by downloading the source code, which cites that URL in many places (the README, the documentation, some strings in the actual code), or by using the "Visit Web Site" menu options in the official Windows binaries (the ones signed with my personal Authenticode certificate). The true PuTTY website is the one that PuTTY itself says it is.

Many search engines list putty.org above chiark. I don't know if this is due to active SEO on the part of the domain owner, or a heuristic in the rankings. Either way, don't believe them. It's not our site.

PuTTY: a free SSH and Telnet client

Perusing a paper paper for once I saw this advert for WhatsApp.

No I can believe the content of your message can not be read, but by using it, your address book is theirs, your messages sent/received are logged and you will be tracked wherever you are - and whatever you are buying.

That’s what they really want.

Go #Signal - it makes sense

#whatsApp #privacy #security #hiddenThreats #meta

🀣 senior devs or sysadmins on the weekend be like …
We would see it at the bottom of a web page so often, it would eventually not register. Listed as trophies for the sites they link to. Indicating that this is a place important enough to mention. The outbound links, or link chiclet, to the company or individual's social media presence. Often this is determined by the quantity of inbound traffic originating from the social media site. Here is an example of one from @arstechnica with mastodon as one of them. I feel that mastodon has the ability to convince more places to follow suit by users linking to a site. That's because mastodon has no agenda past connecting each of us.

Suspected Scattered Spider domains target everyone from manufacturers to Chipotle

Plus: Qantas makes contact with 'potential cyber criminal' While the aviation industry has borne the brunt of Scattered Spider's latest round of social engineering attacks, the criminals aim to catch manufacturing and medical tech companies β€” and even Chipotle Mexican Grill β€” in tjeor web, as…
#theregister #IT
https://go.theregister.com/feed/www.theregister.com/2025/07/08/suspected_scattered_spider_domains_target/

Suspected Scattered Spider domains target everyone from manufacturers to Chipotle

: Plus: Qantas makes contact with 'potential cyber criminal'

The Register

The open source Zapier alternative. Build workflow automation without spending time and money.

https://github.com/automatisch/automatisch

GitHub - automatisch/automatisch: The open source Zapier alternative. Build workflow automation without spending time and money.

The open source Zapier alternative. Build workflow automation without spending time and money. - automatisch/automatisch

GitHub