social.tchncs.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
A friendly server from Germany – which tends to attract techy people, but welcomes everybody. This is one of the oldest Mastodon instances.

Administered by:

Server stats:

3.7K
active users

#kritec

0 posts0 participants0 posts today
Mika Rautio<p>Credit card skimming on the rise for the holiday shopping season</p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/11/credit-card-skimming-on-the-rise-for-the-holiday-shopping-season" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwarebytes.com/blog/threat-i</span><span class="invisible">ntelligence/2023/11/credit-card-skimming-on-the-rise-for-the-holiday-shopping-season</span></a></p><p><a href="https://infosec.exchange/tags/kritec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kritec</span></a> <a href="https://infosec.exchange/tags/cardskimming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cardskimming</span></a> <a href="https://infosec.exchange/tags/ecommerce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ecommerce</span></a></p>
Jérôme Segura<p>Some Magecart IOCs. This is the <a href="https://infosec.exchange/tags/Kritec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kritec</span></a> skimmer (<a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/04/kritec-art" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwarebytes.com/blog/threat-i</span><span class="invisible">ntelligence/2023/04/kritec-art</span></a>)</p><p>lemodigit[.]online<br>macsetech[.]online<br>mopedigit[.]shop<br>ttewe[.]quest<br>yalomob[.]pics</p><p>yalomob[.]pics/mage-cache-loader-v2-4.min.js<br>ttewe[.]quest/cleanfeed-loader.js</p><p><a href="https://infosec.exchange/tags/Magecart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Magecart</span></a> <a href="https://infosec.exchange/tags/iocs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iocs</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Opalsec :verified:<p>Another week, another newsletter - catch up on the week's infosec news here:</p><p><a href="https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-240423-300423" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.substack.com/p/soc-gou</span><span class="invisible">lash-weekend-wrap-up-240423-300423</span></a></p><p>Researchers have found that nearly two years on, 2 in 3 installs of <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Superset" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Superset</span></a> are still using default Flask Secret Keys - a configuration flaw which would allow an attacker to forge session cookies and access said servers with full administrative privileges.</p><p><a href="https://infosec.exchange/tags/Kritec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kritec</span></a> is a commodity <a href="https://infosec.exchange/tags/skimmer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>skimmer</span></a> found installed on compromised <a href="https://infosec.exchange/tags/Magecart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Magecart</span></a> sites, with its code heavily obfuscated and customised to match the site's aesthetic in order to con users out of credit card details.</p><p><a href="https://infosec.exchange/tags/FIN7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIN7</span></a> look to be popping instances of the <a href="https://infosec.exchange/tags/Veeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Veeam</span></a> backup software that are unpatched for a recent vulnerability; a revised <a href="https://infosec.exchange/tags/ViperSoftX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ViperSoftX</span></a> <a href="https://infosec.exchange/tags/infostealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infostealer</span></a> now targets <a href="https://infosec.exchange/tags/1password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>1password</span></a> and <a href="https://infosec.exchange/tags/keepass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keepass</span></a> password vaults, and <a href="https://infosec.exchange/tags/TA505" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TA505</span></a> deliver a new infostealer through a <a href="https://infosec.exchange/tags/GoogleAds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleAds</span></a> campaign</p><p><a href="https://infosec.exchange/tags/LockBit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LockBit</span></a> &amp; <a href="https://infosec.exchange/tags/CL0P" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CL0P</span></a> ransomware affiliates have been abusing a month-old vulnerability in the <a href="https://infosec.exchange/tags/PaperCut" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperCut</span></a> print management software to drop ransomware. With the cat out of the bag, security researchers have decided now is a great time to drop a PoC exploit on Github - I mean, why not let the skiddies get in on the action too, right?</p><p>The <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> have some great research worth reading on <a href="https://infosec.exchange/tags/Smishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smishing</span></a> via <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>; detections for <a href="https://infosec.exchange/tags/SliverC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SliverC2</span></a> and different implementations of <a href="https://infosec.exchange/tags/PsExec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PsExec</span></a>, as well as <a href="https://infosec.exchange/tags/Sigma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sigma</span></a> integration for <a href="https://infosec.exchange/tags/SentinelOne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SentinelOne</span></a> and a <a href="https://infosec.exchange/tags/KQL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KQL</span></a> hack for monitoring LOLDrivers.</p><p>Have a great week ahead folks, I hope this newsletter proves helpful!</p><p><a href="https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-240423-300423" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.substack.com/p/soc-gou</span><span class="invisible">lash-weekend-wrap-up-240423-300423</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://infosec.exchange/tags/newsletter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newsletter</span></a> <a href="https://infosec.exchange/tags/cybernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybernews</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecnews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecnews</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://infosec.exchange/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/affiliate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>affiliate</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/soc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>soc</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/detection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>detection</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/detectionengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>detectionengineering</span></a> <a href="https://infosec.exchange/tags/flask" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flask</span></a> <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://infosec.exchange/tags/fraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fraud</span></a> <a href="https://infosec.exchange/tags/malvertising" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malvertising</span></a> <a href="https://infosec.exchange/tags/clop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clop</span></a> <a href="https://infosec.exchange/tags/PoC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoC</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/securityresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityresearch</span></a> <a href="https://infosec.exchange/tags/LOLBAS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LOLBAS</span></a> <a href="https://infosec.exchange/tags/LOLBIN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LOLBIN</span></a> <a href="https://infosec.exchange/tags/BYOVD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BYOVD</span></a></p>
Tarnkappe.info<p>📬 Kreditkartendaten gestohlen: Hacker infiltrieren Online-Shops und tauschen Zahlungsformulare aus<br /><a href="https://social.tchncs.de/tags/Internet" class="mention hashtag" rel="tag">#<span>Internet</span></a> <a href="https://social.tchncs.de/tags/OnlineBetrug" class="mention hashtag" rel="tag">#<span>OnlineBetrug</span></a> <a href="https://social.tchncs.de/tags/Kreditkartegehackt" class="mention hashtag" rel="tag">#<span>Kreditkartegehackt</span></a> <a href="https://social.tchncs.de/tags/Kreditkartegestohlen" class="mention hashtag" rel="tag">#<span>Kreditkartegestohlen</span></a> <a href="https://social.tchncs.de/tags/Kreditkartendaten" class="mention hashtag" rel="tag">#<span>Kreditkartendaten</span></a> <a href="https://social.tchncs.de/tags/Kritec" class="mention hashtag" rel="tag">#<span>Kritec</span></a> <a href="https://social.tchncs.de/tags/Modal" class="mention hashtag" rel="tag">#<span>Modal</span></a> <a href="https://social.tchncs.de/tags/OnlineShop" class="mention hashtag" rel="tag">#<span>OnlineShop</span></a> <a href="https://social.tchncs.de/tags/Skimmer" class="mention hashtag" rel="tag">#<span>Skimmer</span></a> <a href="https://social.tchncs.de/tags/Zahlungsdienstleister" class="mention hashtag" rel="tag">#<span>Zahlungsdienstleister</span></a> <a href="https://social.tchncs.de/tags/Zahlungsformular" class="mention hashtag" rel="tag">#<span>Zahlungsformular</span></a> <a href="https://tarnkappe.info/artikel/internet/kreditkartendaten-gestohlen-hacker-infiltrieren-online-shops-und-tauschen-zahlungsformulare-aus-273811.html" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">tarnkappe.info/artikel/interne</span><span class="invisible">t/kreditkartendaten-gestohlen-hacker-infiltrieren-online-shops-und-tauschen-zahlungsformulare-aus-273811.html</span></a></p>