norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.4K
active users

#cybersecurity

680 posts311 participants2 posts today
Continued thread

The other thing about the awesome #cybersecurity at Noodles & Co is that when I give them my email address that ends in paco.to, they "correct" it to paco.com. So even though that is NOT my email address, I had to login with a paco.com email address. Great work, guys. Take a bow.

We’ve all made some embarrassing tech flubs, but a recent spate of questionable decisions, including U.S. Secretary of Defense Pete Hegseth’s sharing of top-secret military plans, facilitates this observation: Government officials are kinda bad at tech. @Techcrunch has more on these cautionary tales and how to avoid some of them:

flip.it/C-EkXg

TechCrunch · Government officials are kind of bad at the internet | TechCrunchPerhaps no one in the world has made such catastrophic tech flubs this year as U.S. Secretary of Defense Pete Hegseth. The saga started when the

Craft CMS zero-Day vulnerabilities actively exploited

Orange Cyberdefense reports an attack targeting Craft CMS installations that exploits two critical vulnerabilities: CVE-2025-32432 (RCE, CVSS 10.0) and CVE-2024-58136. The flaws enable attackers to execute malicious code remotely, deploy backdoors, and exfiltrate data. Approximately 13,000 instances worldwide are suspected to be vulnerable.

**Update all your Craft CMS installations to the patched versions (3.9.15, 4.14.15, or 5.6.17) immediately. If you can't follow the mitigation measures, although they are not really a long term fix. Review the advisory for the indicators of compromise to check your server. You can't ignore this patch, your server is exposed on the internet by design.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesCraft CMS zero-Day vulnerabilities actively exploitedOrange Cyberdefense reports an attack targeting Craft CMS installations that exploits two critical vulnerabilities: CVE-2025-32432 (RCE, CVSS 10.0) and CVE-2024-58136. The flaws enable attackers to execute malicious code remotely, deploy backdoors, and exfiltrate data. Approximately 13,000 instances worldwide are suspected to be vulnerable.