shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

259
active users

#cyberthreat

0 posts0 participants0 posts today
Redhotcyber<p>🔥 ULTIMI POSTI PER IL CORSO "DARK WEB E CYBER THREAT INTELLIGENCE" IN PARTENZA IL 15 GIUGNO .</p><p>Sei ancora indeciso?<br>Contattaci tramite WhatsApp al 379 163 8765 o scrivici a academy@redhotcyber.com per avere maggiori informazioni.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/formazione" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formazione</span></a> <a href="https://mastodon.bida.im/tags/formazioneonline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formazioneonline</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://mastodon.bida.im/tags/cyberthreatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreatintelligence</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://mastodon.bida.im/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreat</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Cybernews<p>Hackers are targeting pre-OS environments like UEFI, bypassing kernel protections and staying hidden, Eclypsium warns.</p><p><a href="https://infosec.exchange/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/boot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boot</span></a> <a href="https://infosec.exchange/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreat</span></a></p><p><a href="https://cnews.link/hackers-targeting-uefi-bios-bootloaders-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cnews.link/hackers-targeting-u</span><span class="invisible">efi-bios-bootloaders-1/</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>🚨DDoS Alert🚨</p><p>AnonSec claim to have taken down 5 Israeli Government websites.</p><p>The websites seem to be down at this moment.</p><p>Actor: AnonSec <br>Method: <a href="https://kolektiva.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a><br>Date: April 7, 2025</p><p><a href="https://kolektiva.social/tags/Hacktivism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacktivism</span></a> <a href="https://kolektiva.social/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://kolektiva.social/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreat</span></a> <a href="https://kolektiva.social/tags/Darkweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Darkweb</span></a> <a href="https://kolektiva.social/tags/AnonSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AnonSec</span></a> <a href="https://kolektiva.social/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://kolektiva.social/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://kolektiva.social/tags/NewsUpdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NewsUpdate</span></a> <a href="https://kolektiva.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://kolektiva.social/tags/SpyoSecure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpyoSecure</span></a> <a href="https://kolektiva.social/tags/SpyoSecureNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpyoSecureNews</span></a> <a href="https://kolektiva.social/tags/OpIsrael" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpIsrael</span></a></p>
Cybernews<p>Cybercriminals exploited at least 75 security vulnerabilities previously unknown to vendors – the so-called zero days – a report by Google Threat Intelligence Group (GTIG) reveals</p><p><a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://infosec.exchange/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreat</span></a> <a href="https://infosec.exchange/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> </p><p><a href="https://cnews.link/hackers-launched-75-zero-day-attacks-last-year-google-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cnews.link/hackers-launched-75</span><span class="invisible">-zero-day-attacks-last-year-google-1/</span></a></p>
FIRST.org<p>The 2025 Cyber Threat Intelligence Conference is LIVE on YouTube! Check out the content as it's being streamed out of Berlin, Germany for the first Plenary day of the conference at: <a href="https://youtube.com/live/2pSjbSx8J1Q?feature=share" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtube.com/live/2pSjbSx8J1Q?f</span><span class="invisible">eature=share</span></a> <a href="https://infosec.exchange/tags/FIRSTCTI25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIRSTCTI25</span></a> <a href="https://infosec.exchange/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreat</span></a> <a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTI</span></a></p>
DomainTools<p>'It's Always DNS' - and in 2025, that's truer than ever. DTI's expert analysts are tracking evolving TTPs across the threat landscape, from Charming Kitten to TrickBot.</p><p>Follow <span class="h-card" translate="no"><a href="https://infosec.exchange/@DomainTools" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DomainTools</span></a></span> for the latest insights from our seasoned research team.</p><p><a href="https://infosec.exchange/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreat</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> </p><p><a href="https://dti.domaintools.com/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=DTI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dti.domaintools.com/?utm_sourc</span><span class="invisible">e=Mastodon&amp;utm_medium=Social&amp;utm_campaign=DTI</span></a></p>
beSpacific<p>The near-term impact of <a href="https://newsie.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> on the <a href="https://newsie.social/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreat</span></a>. An <a href="https://newsie.social/tags/NCSC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NCSC</span></a> <a href="https://newsie.social/tags/assessment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>assessment</span></a> focusing on how <a href="https://newsie.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> will impact the efficacy of <a href="https://newsie.social/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> operations and the implications for the cyber threat over the next two years. <a href="https://newsie.social/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ncsc.gov.uk/report/impact-of-a</span><span class="invisible">i-on-cyber-threat</span></a></p>
Freemind<p>A recent report from the security threat monitoring platform Shadowserver reveals that almost 11 million SSH servers on the public web, identified by unique IP addresses, are vulnerable to Terrapin attacks.</p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.online/tags/TerrapinAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TerrapinAttack</span></a> <a href="https://mastodon.online/tags/Cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberthreat</span></a></p><p><a href="https://cybersec84.wordpress.com/2024/01/04/11-million-ssh-servers-at-risk-terrapin-attack-threatens-secure-communications/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersec84.wordpress.com/2024/</span><span class="invisible">01/04/11-million-ssh-servers-at-risk-terrapin-attack-threatens-secure-communications/</span></a></p>
Freemind<p>Despite varied initial infection methods, the core of the attack remains consistent: reliance on PowerShell and the establishment of a scheduled task executing a VBS file.</p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.online/tags/Cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberthreat</span></a> <a href="https://mastodon.online/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a></p><p><a href="https://cybersec84.wordpress.com/2023/12/25/winrar-exploited-by-lonepage-unveiling-a-new-data-stealing-backdoor/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersec84.wordpress.com/2023/</span><span class="invisible">12/25/winrar-exploited-by-lonepage-unveiling-a-new-data-stealing-backdoor/</span></a></p>
The Hacker News<p>Originally posted by The Hacker News / @TheHackersNews: <a href="http://nitter.platypush.tech/TheHackersNews/status/1646042091351425024#m" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">http://</span><span class="ellipsis">nitter.platypush.tech/TheHacke</span><span class="invisible">rsNews/status/1646042091351425024#m</span></a></p><p>R to @TheHackersNews: A particularly dangerous MSMQ bug, CVE-2023-21554, could lead to unauthorized code execution and server takeover by sending a malicious MSMQ packet to a MSMQ server. Stay vigilant and ensure your systems are protected!</p><p><a href="https://social.platypush.tech/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreat</span></a></p>
The Hacker News<p>Originally posted by The Hacker News / @TheHackersNews: <a href="http://nitter.platypush.tech/TheHackersNews/status/1643101879411277824#m" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">http://</span><span class="ellipsis">nitter.platypush.tech/TheHacke</span><span class="invisible">rsNews/status/1643101879411277824#m</span></a></p><p>R to @TheHackersNews: The info-stealer component weaponizes a 10-year-old Windows flaw (CVE-2013-3900) to inject arbitrary code into a DLL without invalidating its signature – a technique used in a ZLoader malware campaign discovered in Jan 2022.</p><p><a href="https://social.platypush.tech/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreat</span></a> <a href="https://social.platypush.tech/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p>
DisinfoDocket<p>Fog of war: how the <a href="https://toot.community/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> conflict transformed the cyber threat landscape, report from Google's Threat Analysis Group <a href="https://blog.google/threat-analysis-group/fog-of-war-how-the-ukraine-conflict-transformed-the-cyber-threat-landscape/?ref=disinfodocket" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.google/threat-analysis-gr</span><span class="invisible">oup/fog-of-war-how-the-ukraine-conflict-transformed-the-cyber-threat-landscape/?ref=disinfodocket</span></a> <a href="https://toot.community/tags/misinformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>misinformation</span></a> <a href="https://toot.community/tags/disinformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disinformation</span></a> <a href="https://toot.community/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreat</span></a></p>