radikal.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
radikal.social was created by a group of activists to offer federated social media for the radical left in and around Denmark.

Administered by:

Server stats:

163
active users

#botnet

1 post1 participant0 posts today
Rachel Rawlings<p>I'm having trouble figuring out what kind of botnet has been hammering our web servers over the past week. Requests come in from tens of thousands of addresses, just once or twice each (and not getting blocked by fail2ban), with different browser strings (Chrome versions ranging from 24.0.1292.0 - 108.0.5163.147) and ridiculous cobbled-together paths like /about-us/1-2-3-to-the-zoo/the-tiny-seed/10-little-rubber-ducks/1-2-3-to-the-zoo/the-tiny-seed/the-nonsense-show/slowly-slowly-slowly-said-the-sloth/the-boastful-fisherman/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/the-boastful-fisherman/brown-bear-brown-bear-what-do-you-see/brown-bear-brown-bear-what-do-you-see/pancakes-pancakes/pancakes-pancakes/the-tiny-seed/pancakes-pancakes/pancakes-pancakes/slowly-slowly-slowly-said-the-sloth/the-tiny-seed</p><p>(I just put together a bunch of Eric Carle titles as an example. The actual paths are pasted together from valid paths on our server but in invalid order, with as many as 32 subdirectories.)</p><p>Has anyone else been seeing this and do you have an idea what's behind it?</p><p><a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://infosec.exchange/tags/webscraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webscraping</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
BGDoncaster<p>Oh really it was Ukraine that took down X on March 10? Not so fast. </p><p>Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. <a href="https://www.wired.com/story/x-ddos-attack-march-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/x-ddos-attack-</span><span class="invisible">march-2025/</span></a> <a href="https://techhub.social/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://techhub.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://techhub.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://techhub.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://techhub.social/tags/BotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BotNet</span></a> <a href="https://techhub.social/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a></p>
MadeInDex 📰🌎<p>⚠️ New <a href="https://mastodon.social/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> on the loose? ⚠️</p><p>A surge of accounts from gtmastodon.online / mastodon.gtmastodon.online has emerged, all seemingly following a limited number of <a href="https://mastodon.social/tags/MastodonSocial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MastodonSocial</span></a> users.</p><p>Is this a coordinated effort? If so, what is the goal? 🤔</p><p><a href="https://mastodon.social/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> <a href="https://mastodon.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> <a href="https://mastodon.social/tags/Fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fediverse</span></a> <a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.social/tags/Profiles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Profiles</span></a> <a href="https://mastodon.social/tags/Account" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Account</span></a> <a href="https://mastodon.social/tags/Follow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Follow</span></a> <a href="https://mastodon.social/tags/Followers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Followers</span></a> <a href="https://mastodon.social/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://mastodon.social/tags/alert" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alert</span></a> <a href="https://mastodon.social/tags/fake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fake</span></a> <a href="https://mastodon.social/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://mastodon.social/tags/bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bots</span></a> <a href="https://mastodon.social/tags/user" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>user</span></a> <a href="https://mastodon.social/tags/users" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>users</span></a> <a href="https://mastodon.social/tags/info" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>info</span></a> <a href="https://mastodon.social/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://mastodon.social/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://mastodon.social/tags/servers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>servers</span></a></p>
Flipboard Tech Desk<p>Researchers from the Kaspersky Lab reported that they found two new apps, downloaded from Google Play 11 million times, that were infected with the same malware as a similar 2019 hack. From <span class="h-card" translate="no"><a href="https://mastodon.social/@arstechnica" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>arstechnica</span></a></span>. <a href="https://flipboard.social/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://flipboard.social/tags/Kaspersky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kaspersky</span></a> <a href="https://flipboard.social/tags/Necro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Necro</span></a> <a href="https://flipboard.social/tags/Hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hack</span></a> <a href="https://flipboard.social/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://flipboard.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://flip.it/sCXm_c" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">flip.it/sCXm_c</span><span class="invisible"></span></a></p>
Anachron :void:<p>Wow, I was just routinely checking my fail2ban logs and it seems like someone actually has set up multiple IP addresses and when one is banned continues with the next one trying to break into.</p><p>Sneaky. I was only able to tell its the same person since the IP address differs by 1 on the last segment. </p><p><a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail2ban</span></a> <a href="https://fosstodon.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p>
Flipboard Tech Desk<p>The FBI recently took control of a botnet made up of hundreds of thousands of internet-connected devices run by a Chinese government hacking group, director Christopher Wray revealed Wednesday. <span class="h-card" translate="no"><a href="https://flipboard.com/@Techcrunch" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Techcrunch</span></a></span> has the story. @FBI <a href="https://flipboard.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://flipboard.social/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://flipboard.social/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://flipboard.social/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://flipboard.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://techcrunch.com/2024/09/18/u-s-government-took-control-of-a-botnet-run-by-chinese-government-hackers-says-fbi-director/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/09/18/u-s-</span><span class="invisible">government-took-control-of-a-botnet-run-by-chinese-government-hackers-says-fbi-director/</span></a></p>
The Spamhaus Project<p>🤖 Jan-Jun 2024 Botnet Threat Update out now!</p><p>⬇️ Total of 14,248 botnet C&amp;Cs observed, down by -6%. <br>⬇️ Misuse of pentest framework, Cobalt Strike, decreased -41% <br>⬇️ Great work from 11 networks hosting most active Botnet C&amp;Cs!&nbsp;</p><p>Find out which networks and read the FREE report here👇<br><a href="https://www.spamhaus.org/resource-hub/botnet-c-c/botnet-threat-update-january-to-june-2024" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/botn</span><span class="invisible">et-c-c/botnet-threat-update-january-to-june-2024</span></a> </p><p><a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a></p>
Graham Cluley<p>Round 3 in the toothbrush DDoS debacle!</p><p>We thought it was all over... but the Swiss newspaper has come out fighting, blaming Fortinet for spreading untruths about a toothbrush botnet. </p><p>Will Fortinet return for Round 4, or is that a knockout punch? </p><p><a href="https://grahamcluley.com/round-3-in-the-toothbrush-ddos-debacle/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grahamcluley.com/round-3-in-th</span><span class="invisible">e-toothbrush-ddos-debacle/</span></a></p><p><a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortinet</span></a> <a href="https://mastodon.green/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.green/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mastodon.green/tags/toothbrush" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>toothbrush</span></a></p>
Avoid the Hack! :donor:<p>NGL a toothbrush <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> would be SkyNet stuff.</p>
Glyn Moody<p>Three million malware-infected smart <a href="https://mastodon.social/tags/toothbrushes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>toothbrushes</span></a> used in Swiss <a href="https://mastodon.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attacks — <a href="https://mastodon.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> causes millions of euros in damages - <a href="https://www.tomshardware.com/networking/three-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomshardware.com/networking/th</span><span class="invisible">ree-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages</span></a> what a headline...</p>
Boris Vulikh<p><a href="https://www.tomshardware.com/networking/three-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomshardware.com/networking/th</span><span class="invisible">ree-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages</span></a></p><p>Take a moment to have it sink in: a botnet comprised from internet connected toothbrushes. </p><p>Who the hell connects a toothbrush to the internet?! </p><p>As we all know, the ‘S’ in IoT is for ‘Security’.<br><a href="https://fosstodon.org/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://fosstodon.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> </p><p>Update:<br>Please read clarification by Kevin Beaumont:<br><a href="https://cyberplace.social/@GossiTheDog/111886558855943676" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberplace.social/@GossiTheDog</span><span class="invisible">/111886558855943676</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> list of resources for week #05/2024 is out! It includes the following and much more:</p><p>➝ 🔓 <a href="https://infosec.exchange/tags/Binance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Binance</span></a> Code and Internal Passwords Exposed on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> for Months<br>➝ 🔓 ☁️ <a href="https://infosec.exchange/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloudflare</span></a> hacked using auth tokens stolen in <a href="https://infosec.exchange/tags/Okta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Okta</span></a> attack<br>➝ 🔓 🚘 <a href="https://infosec.exchange/tags/Europcar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europcar</span></a> denies data breach of 50 million users, says data is fake<br>➝ 🔓 💸 Johnson Controls says <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> attack cost $27 million, data stolen<br>➝ 🔓 🚘 A mishandled GitHub token exposed Mercedes-Benz AG source code<br>➝ 🔓 🇮🇳 Data of 750 Million Indian Mobile Subscribers Sold on Hacker Forums<br>➝ 🔓 🇺🇸 1.5 Million Affected by <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> at Insurance Broker Keenan, Ciccitto &amp; Associates, LLP<br>➝ 🤖 <a href="https://infosec.exchange/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a> says mysterious chat histories resulted from account takeover<br>➝ 🇺🇸 🇮🇷 U.S. government sanctions Iranian officials over Pennsylvania water facility hack<br>➝ 🇮🇳 A startup allegedly “hacked the world.” Then came the censorship—and now the backlash.<br>➝ 🌍 <a href="https://infosec.exchange/tags/INTERPOL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>INTERPOL</span></a>-led operation targets growing cyber threats<br>➝ 🇷🇺 🥸 Russian <a href="https://infosec.exchange/tags/spies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spies</span></a> impersonating Western researchers in ongoing hacking campaign<br>➝ 🇩🇪 💰 Police seize record 50,000 <a href="https://infosec.exchange/tags/Bitcoin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bitcoin</span></a> from now-defunct piracy site<br>➝ 🇨🇳 🇲🇲 <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a>-Linked Hackers Target <a href="https://infosec.exchange/tags/Myanmar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Myanmar</span></a>'s Top Ministries with <a href="https://infosec.exchange/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> Blitz<br>➝ 🇺🇸 🇪🇬 US Sanctions Two <a href="https://infosec.exchange/tags/ISIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISIS</span></a>-Affiliated ‘Cybersecurity Experts’<br>➝ 🇮🇹 🦠 Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a><br>➝ 🇺🇸 🇨🇳 U.S. officials warn of dire Chinese cyber threats in wake of FBI operation to disrupt <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a><br>➝ 🇺🇸 ⚖️ Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider<br>➝ 🔓 💥 45k <a href="https://infosec.exchange/tags/Jenkins" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jenkins</span></a> servers exposed to RCE attacks using public exploits<br>➝ 🇺🇸 ⚖️ Ex-CIA hacker jailed for 40 years for his role in <a href="https://infosec.exchange/tags/WikiLeaks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WikiLeaks</span></a><br>➝ 🇺🇸 ⚖️ New York Sues <a href="https://infosec.exchange/tags/Citibank" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Citibank</span></a> Over Poor Data Security<br>➝ 🇺🇸 <a href="https://infosec.exchange/tags/NSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSA</span></a> Admits Secretly Buying Your Internet Browsing Data without Warrants<br>➝ ⚡️ 💰 Energy giant Schneider Electric hit by Cactus <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> attack<br>➝ 🦠 💬 <a href="https://infosec.exchange/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware<br>➝ 🦠 🇺🇦 <a href="https://infosec.exchange/tags/PurpleFox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PurpleFox</span></a> malware infects thousands of computers in <a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a><br>➝ 🦠 Hackers Exploiting <a href="https://infosec.exchange/tags/Ivanti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ivanti</span></a> VPN Flaws to Deploy <a href="https://infosec.exchange/tags/KrustyLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KrustyLoader</span></a> Malware<br>➝ 🐛 📨 Researchers Uncover How <a href="https://infosec.exchange/tags/Outlook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Outlook</span></a> Vulnerability Could Leak Your <a href="https://infosec.exchange/tags/NTLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NTLM</span></a> Passwords<br>➝ 🐛 🐧 New <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> flaw lets attackers get root on major distros<br>➝ 🔓 Vulnerabilities in <a href="https://infosec.exchange/tags/WatchGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WatchGuard</span></a>, Panda Security Products Lead to Code Execution</p> <p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://open.substack.com/pub/0x58/p/infosec-mashup-week-052024?r=299go8&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">open.substack.com/pub/0x58/p/i</span><span class="invisible">nfosec-mashup-week-052024?r=299go8&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Your <a href="https://hachyderm.io/tags/washingmachine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>washingmachine</span></a> could be sending 3.7GB of data/day<br><a href="https://hachyderm.io/tags/LG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LG</span></a> washing machine owner disconnected his device from <a href="https://hachyderm.io/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a> after noticing excessive outgoing daily data traffic History of hackers taking over LG smart appliances. <a href="https://hachyderm.io/tags/SmartThinQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmartThinQ</span></a> <a href="https://hachyderm.io/tags/HomeHack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HomeHack</span></a> <a href="https://hachyderm.io/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> was patched weeks after being made public. A similar modern hack might use washing machine’s esources as part of a <a href="https://hachyderm.io/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> or for <a href="https://hachyderm.io/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a> mining. Large numbers of low-power devices can be formidable. <a href="https://www.tomshardware.com/networking/your-washing-machine-could-be-sending-37-gb-of-data-a-day" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomshardware.com/networking/yo</span><span class="invisible">ur-washing-machine-could-be-sending-37-gb-of-data-a-day</span></a> <a href="https://hachyderm.io/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
Avoid the Hack! :donor:<p>US confirms takedown of China-run botnet targeting home and office routers</p><p>This particular <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> targets home and office routers, infecting them with <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> and recruiting them into a <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> used for illicit activities.</p><p><a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> on SOHO routers are pretty much an afterthought, but you should make sure you at least use the firewall and change the default admin credentials. Also helps to keep the <a href="https://infosec.exchange/tags/firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmware</span></a> updated.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p><p><a href="https://therecord.media/china-run-botnet-takedown-fbi-doj-routers" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/china-run-botn</span><span class="invisible">et-takedown-fbi-doj-routers</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>The <a href="https://hachyderm.io/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> Confessions: Three Young <a href="https://hachyderm.io/tags/Hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackers</span></a> Who Built a Web-Killing Monster Finally Tell Their Story<br><a href="https://hachyderm.io/tags/Netflix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netflix</span></a>, <a href="https://hachyderm.io/tags/Spotify" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spotify</span></a>, <a href="https://hachyderm.io/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a>, <a href="https://hachyderm.io/tags/PayPal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayPal</span></a>, <a href="https://hachyderm.io/tags/Slack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Slack</span></a>. All down for millions of people. How a group of teen friends plunged into an underworld of <a href="https://hachyderm.io/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> and broke the internet—then went to work for the <a href="https://hachyderm.io/tags/FBI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FBI</span></a>. <a href="https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/mirai-untold-s</span><span class="invisible">tory-three-young-hackers-web-killing-monster/</span></a> <a href="https://hachyderm.io/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://hachyderm.io/tags/BotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BotNet</span></a></p>
Renée Burton<p>This is a really good (if long) read on persistent DDoS botnet from (mostly) TVs. Scary nugget: because they have compromised TVs they can control what content airs to the viewer! referencing the streaming of Gaza conflict video to devices. I thought of <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>briankrebs</span></a></span> because they claim that they know who the actor is and seem to have done a good deal of doxing on the actor they say has been active for 6 yrs. <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://blog.xlab.qianxin.com/bigpanzi-exposed-hidden-cyber-threat-behind-your-stb/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.xlab.qianxin.com/bigpanzi</span><span class="invisible">-exposed-hidden-cyber-threat-behind-your-stb/</span></a></p>
Avoid the Hack! :donor:<p>Thousands of routers and cameras vulnerable to new 0-day attacks by hostile <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p><p>Two 0-day exploits used on routers and video cameras to recruit these devices into a botnet used for <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attacks.</p><p>Patches not available as of posting, though one manufacturer is working on an update.</p><p>Akamai has provided IOCs.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a></p><p><a href="https://arstechnica.com/security/2023/11/thousands-of-routers-and-cameras-vulnerable-to-new-0-day-attacks-by-hostile-botnet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2023/</span><span class="invisible">11/thousands-of-routers-and-cameras-vulnerable-to-new-0-day-attacks-by-hostile-botnet/</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> list of resources for week #44/2023 is out! It includes the following and much more:</p><p>➝ 🔓 <a href="https://infosec.exchange/tags/Okta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Okta</span></a> hit by another <a href="https://infosec.exchange/tags/breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>breach</span></a>, this one stealing employee data from 3rd-party vendor<br>➝ 🔓 💸 <a href="https://infosec.exchange/tags/LastPass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LastPass</span></a> breach linked to theft of $4.4 million in crypto<br>➝ 🇮🇳 <a href="https://infosec.exchange/tags/India" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>India</span></a>'s Biggest Data Leak So Far? Covid-19 Test Info of 81.5Cr Citizens With ICMR Up for Sale<br>➝ 🔓 ✈️ <a href="https://infosec.exchange/tags/Lockbit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lockbit</span></a> ransomware group claims to have hacked <a href="https://infosec.exchange/tags/Boeing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Boeing</span></a><br>➝ 🇳🇱 ⚖️ Dutch hacker jailed for extortion, selling stolen data on RaidForums<br>➝ 🇷🇺 🇺🇸 Russian Reshipping Service ‘SWAT USA Drop’ Exposed<br>➝ 🇮🇷 🦠 Iranian Cyber Spies Use ‘<a href="https://infosec.exchange/tags/LionTail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LionTail</span></a>’ Malware in Latest Attacks<br>➝ 📉 Security researchers observed ‘deliberate’ takedown of notorious <a href="https://infosec.exchange/tags/Mozi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mozi</span></a> <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a><br>➝ 🇮🇳 📱 Apple warns Indian opposition leaders of state-sponsored <a href="https://infosec.exchange/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a> attacks<br>➝ 🌍 Four dozen countries declare they won’t pay <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> ransoms<br>➝ 🇷🇺 How <a href="https://infosec.exchange/tags/Kopeechka" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kopeechka</span></a>, an Automated Social Media Accounts Creation Service, Can Facilitate <a href="https://infosec.exchange/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a><br>➝ 🇪🇺 EU digital ID reforms should be ‘actively resisted’, say experts<br>➝ 🇷🇺 🇺🇦 <a href="https://infosec.exchange/tags/FSB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FSB</span></a> arrests Russian hackers working for Ukrainian cyber forces<br>➝ 🇺🇸 FTC orders non-bank financial firms to report breaches in 30 days<br>➝ 🇨🇦 📱 <a href="https://infosec.exchange/tags/Canada" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Canada</span></a> Bans <a href="https://infosec.exchange/tags/WeChat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WeChat</span></a> and <a href="https://infosec.exchange/tags/Kaspersky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kaspersky</span></a> Apps On Government Devices<br>➝ 🇺🇸 <a href="https://infosec.exchange/tags/SEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SEC</span></a> Charges <a href="https://infosec.exchange/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> and Its <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> With Fraud and Cybersecurity Failures<br>➝ 🇺🇸 🤖 <a href="https://infosec.exchange/tags/Biden" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Biden</span></a> Wants to Move Fast on AI Safeguards and Will Sign an Executive Order to Address His Concerns<br>➝ 🦠 📱 <a href="https://infosec.exchange/tags/Avast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Avast</span></a> confirms it tagged Google app as <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> on Android phones<br>➝ 🦠 🇰🇵 North Korean Hackers Targeting Crypto Experts with <a href="https://infosec.exchange/tags/KANDYKORN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KANDYKORN</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> Malware<br>➝ 👥 💸 EleKtra-Leak <a href="https://infosec.exchange/tags/Cryptojacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptojacking</span></a> Attacks Exploit <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> IAM Credentials Exposed on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a><br>➝ 🦠 🐍 Trojanized <a href="https://infosec.exchange/tags/PyCharm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PyCharm</span></a> Software Version Delivered via <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> Search Ads<br>➝ ✅ 🤖 <a href="https://infosec.exchange/tags/GooglePlay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GooglePlay</span></a> adds security audit badges for Android <a href="https://infosec.exchange/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> apps<br>➝ 🔐 Microsoft pledges to bolster security as part of ‘Secure Future’ initiative<br>➝ 🆕 FIRST Releases <a href="https://infosec.exchange/tags/CVSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVSS</span></a> 4.0 Vuln Scoring Standard<br>➝ 🆕 <a href="https://infosec.exchange/tags/MITRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MITRE</span></a> Releases ATT&amp;CK v14 With Improvements to Detections, ICS, Mobile<br>➝ ⛔️ 🦠 <a href="https://infosec.exchange/tags/Samsung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Samsung</span></a> Galaxy gets new Auto Blocker anti-malware feature<br>➝ 🍏 🔐 <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> Improves <a href="https://infosec.exchange/tags/iMessage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iMessage</span></a> Security With Contact Key Verification<br>➝ 🔓 Researchers Find 34 <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> Drivers Vulnerable to Full Device Takeover<br>➝ 🔓 🪶 3,000 <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/ActiveMQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveMQ</span></a> servers vulnerable to RCE attacks exposed online<br>➝ 🗣️ <a href="https://infosec.exchange/tags/Atlassian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Atlassian</span></a> CISO Urges Quick Action to Protect <a href="https://infosec.exchange/tags/Confluence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Confluence</span></a> Instances From Critical <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a><br>➝ 🔓 🩸 “This vulnerability is now under mass exploitation.” <a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CitrixBleed</span></a> bug bites hard<br>➝ 🐛 💰 HackerOne paid ethical hackers over $300 million in <a href="https://infosec.exchange/tags/bugbounties" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounties</span></a></p> <p>📚 This week's recommended reading is: "Permanent Record" by Edward Snowden</p> <p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-week-442023" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-week-442023</span></a></p>
abuse.ch :verified:<p>Quak 🦆! The FBI and the U.S. Department of Justice announced a multinational operation to disrupt and dismantle the Qakbot botnet 💣 💥 Goodbye <a href="https://ioc.exchange/tags/Qakbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Qakbot</span></a>, I hope we won't see you ever again 👋. And this is how it looks like from Feodo Tracker' perspective ⬇️. All <a href="https://ioc.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> C2s are offline 🛑</p><p><a href="https://feodotracker.abuse.ch/browse/qakbot/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">feodotracker.abuse.ch/browse/q</span><span class="invisible">akbot/</span></a></p><p>Tango down! 💪</p>
Neil Craig<p>Having a look at some recent DDOS stats. We're now seeing individual bots which *each* generate more RPS than we used to see as the combined peak RPS of an entire attack just a few years ago.<br>Several bots generated over 40K RPS each in at least 3 recent DDOS, some over 50K RPS.<br>Looks like lots of these bots are running on compromised Squid proxy servers. Squid 4.14 is common among quite a few of them and many are running I2P on TCP:4444.<br>Patch your Squids, people!<br><a href="https://mastodon.social/tags/DDOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDOS</span></a> <a href="https://mastodon.social/tags/BotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BotNet</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p>