shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

254
active users

#networkabuse

0 posts0 participants0 posts today
The Spamhaus Project<p>👏 Big shout out to Marco Schmidt and Rene Wilhelm of RIPE NCC for their insightful article on the concerning trend of IPv6 stockpiling, a phenomenon Spamhaus has observed for some time.</p><p>Schmidt highlights, "Lastly, we should also consider that such blocks might attract actors who prefer to operate discreetly.For instance, they may intend to use these IPv6 blocks for spamming or other malicious actions. [..] As a regional Internet registry, we are accountable to competent authorities and governments, which places upon us the responsibility to ensure that the resources we steward are not misused or abused."</p><p>Although it's great to see RIPE NCC acknowledging this issue, it will be interesting to see what steps will be taken to address the problem of rampant misuse/abuse of network resources in the RIPE region.</p><p>You can read the article in full here ⬇ <br><a href="https://labs.ripe.net/author/marco_schmidt/ipv6-stockpiling-a-trojan-horse-in-our-midst/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">labs.ripe.net/author/marco_sch</span><span class="invisible">midt/ipv6-stockpiling-a-trojan-horse-in-our-midst/</span></a></p><p><a href="https://infosec.exchange/tags/RIPE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RIPE</span></a> <a href="https://infosec.exchange/tags/NetworkAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkAbuse</span></a> <a href="https://infosec.exchange/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a></p>
The Spamhaus Project<p>❗ Researchers at Spamhaus have identified an abuse problem for Internet Backbone and Colocation Provider, Hurricane Electric relating to AS394711, allocated to New Hampshire-based Limenet LLC.</p><p>Spamhaus currently assesses that Limenet is a bulletproof hosting operation; consequently, all prefixes announced by AS394711 are listed in DROP. </p><p>Hurricane Electric's trust and safety desk was notified of the incident by this SBL listing: 👉 <a href="https://check.spamhaus.org/listed/?searchterm=SBL639456" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">check.spamhaus.org/listed/?sea</span><span class="invisible">rchterm=SBL639456</span></a></p><p>Notification emails have been sent to the Hurricane Electric trust and safety desk, and we’ve reached out to your Network Operations Director, as we see you are having challenges.</p><p>We’re here to help you - please reach out to us.</p><p><a href="https://infosec.exchange/tags/Blocklistings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blocklistings</span></a> <a href="https://infosec.exchange/tags/NetworkAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkAbuse</span></a> <a href="https://infosec.exchange/tags/GetInTouch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GetInTouch</span></a></p>
The Spamhaus Project<p>In Q4 2023, five big-name networks accounted for almost 60% of ALL <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> C&amp;Cs in the top 20 networks hosting the most active botnet C&amp;Cs. </p><p>#1 Tencent<br>#2 Alibaba-inc<br>#3 DigitalOcean<br>#4 OVHCloud<br>#5 Amazon</p><p>Please get in touch and speak to us about the challenges you are facing when dealing with abuse. We can help.</p><p>Read the latest botnet insights from Spamhaus Project in Spamhaus Technology’s Q4 Botnet Threat Update: </p><p><a href="https://info.spamhaus.com/botnet-threat-updates" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">info.spamhaus.com/botnet-threa</span><span class="invisible">t-updates</span></a></p><p><a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://infosec.exchange/tags/botnetCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnetCC</span></a> <a href="https://infosec.exchange/tags/networkabuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkabuse</span></a></p>