shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

242
active users

#threatintel

11 posts9 participants0 posts today
Brian Clark<p>DNSFilter, a <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> vendor I'm not very familiar with, published their Q1 2025 Threat Report. I think it's always good to review these reports from a <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> perspective. </p><p>Here's their list of TLD's with domains most likely to be malicious:<br>.tf<br>.pw<br>.sx<br>.ax<br>.li</p><p>Here's a link to the report (not sure if it'll work for you or not as it is behind a registration-wall).</p><p><a href="https://www.dnsfilter.com/hubfs/2025-Content-Downloads/Q1-2025-Security-Report.pdf?_gl=1*1yqax4z*_gcl_au*MTExMDUyODI2NS4xNzQ4ODA5NDM1LjEyMjE0NTIzNDUuMTc0ODgwOTY5MC4xNzQ4ODA5Njkw" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">dnsfilter.com/hubfs/2025-Conte</span><span class="invisible">nt-Downloads/Q1-2025-Security-Report.pdf?_gl=1*1yqax4z*_gcl_au*MTExMDUyODI2NS4xNzQ4ODA5NDM1LjEyMjE0NTIzNDUuMTc0ODgwOTY5MC4xNzQ4ODA5Njkw</span></a></p>
Ian Campbell<p>app-hybridge[.]finance (transferred out to registrar.eu Friday, back into ddos-guard Sunday)<br>app-usualmcney[.]com, app-usuclmoney[.]com (usualmoney platform, note the c in the domain. multiple examples in and out of DDoS-Guard)</p><p>Gaming:<br>csmoney[.]to (CounterStrike skin trading bot)</p><p><a href="https://masto.deoan.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Ian Campbell<p>Subdomain-specific:</p><p>com-more[.]com (Ripple subdomain)<br>communitygethelp[.]com (defisaver subdomain)<br>xyzcomcom[.]com (subdomain targeting Felix stablecoin)</p><p>More cryptocurrency-targeting domains over the past 4 days:</p><p>coindase[.]to<br>apps-defisaver[.]com<br>apps-odos[.]fi<br>app--odos[.]com<br>app-odos[.]fi<br>swap-odos[.]com<br>hyqerunit[.]xyz (hyperunit)<br>yicldnest[.]finance<br>com-ripple-finance[.]com<br>ssi-sosovalue[.]xyz</p><p><a href="https://masto.deoan.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Ian Campbell<p>In my usual monitoring of nameservers for Russian bulletproof host DDoS-Guard the past few days, quite a few new or transferred-in domains are targeting cryptocurrency.</p><p>However, we can also see a new domain of com-worldfinance[.]com - a financial industry magazine boasting a readership of 120,000. A subdomain of "finance-reports" indicates the likelihood that these actors are likely targeting the readership.</p><p>Registrar: GMO Internet<br>NS: DDoS-Guard</p><p><a href="https://masto.deoan.org/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://masto.deoan.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://masto.deoan.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Kevin Beaumont<p>MainStreet Bancshares, a bank also known as MainStreet Bank, has filed a Friday night 8-K with the SEC saying 5% of its customers PII was stolen in March, but they failed to inform customers or file an 8-K until this week. <a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/1693577/000143774925019008/main20250328_8k.htm" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sec.gov/ix?doc=/Archives/edgar</span><span class="invisible">/data/1693577/000143774925019008/main20250328_8k.htm</span></a></p><p><a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
cR0w :cascadia:<p>Free <a href="https://infosec.exchange/tags/threatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatIntel</span></a> Friday.</p><p>Here's a list of observed password spray addresses against some M365 tenants from IPs acknowledged by Microsoft as being known to be malicious:</p><p><a href="https://cascadiacrow.com/20250530_m365_acknowledged.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cascadiacrow.com/20250530_m365</span><span class="invisible">_acknowledged.txt</span></a></p><p>Here's a list of recently observed password spray addresses against some M365 tenants:</p><p><a href="https://cascadiacrow.com/20250530_m365_observed.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cascadiacrow.com/20250530_m365</span><span class="invisible">_observed.txt</span></a></p><p>Here's a list of recently observed password spray addresses against some PAN GlobalProtect portals:</p><p><a href="https://cascadiacrow.com/20250530_pan_observed.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cascadiacrow.com/20250530_pan_</span><span class="invisible">observed.txt</span></a></p>
Eddie.<p>SANS Ransomware Summit is a one day event running right now. Keynote is of great value. Register even if you can’t attend today to go back and watch the videos. It’s free. <br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a><br><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <br><a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <br><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>
DomainTools<p>Pakistani authorities have arrested 21 individuals tied to HeartSender, a long-running phishing and malware-as-a-service operation. The group is linked to global BEC scams and phishing attacks targeting Microsoft 365, iCloud, and more—causing tens of millions in losses.</p><p>This takedown highlights the growing international cooperation in cybercrime investigations and the importance of strong digital defenses.</p><p>🔗 Read more via <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>briankrebs</span></a></span> (KrebsOnSecurity): <a href="https://krebsonsecurity.com/2025/05/pakistan-arrests-21-in-heartsender-malware-service/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/05/pa</span><span class="invisible">kistan-arrests-21-in-heartsender-malware-service/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/BEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BEC</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a></p>
AIL Project<p>AIL 6.2 released - Smarter Analysis, Search and Enhanced User Experience</p><p>We’re excited to release AIL Framework v6.2, a major update with new features and improved performance. This version makes analysis easier and the overall experience faster and more user-friendly.</p><p>Among the highlights are a fully revamped search engine powered by MeiliSearch, improved language detection for short text, local AI-driven image descriptions, and a yara-hunting editor tool.</p><p>🔗 <a href="https://www.ail-project.org/blog/2025/05/28/AIL-v6.2.released/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ail-project.org/blog/2025/05/2</span><span class="invisible">8/AIL-v6.2.released/</span></a></p><p><a href="https://infosec.exchange/tags/darkweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkweb</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>osint</span></a></p>
Brian Clark<p>Ever hear of the legitimate file sharing service files.catbox[.]moe? It’s really uncommon and you should probably block it in your environment. </p><p>Read Palo Alto’s overview of a DarkCloud Steamer campaign that makes use of a catbox.moe file share to distribute its payload here. </p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://infosec.exchange/@VirusBulletin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>VirusBulletin</span></a></span><br><a href="https://infosec.exchange/@VirusBulletin/114579078874978016" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@VirusBulleti</span><span class="invisible">n/114579078874978016</span></a></p>
Kevin Beaumont<p>Adidas have a third party supplier breach incident ongoing, of their customer helpdesk provider. Was tucked away on their corporate website, posted on May 23rd but flew under the radar. <a href="https://www.adidas-group.com/en/data-security-information" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">adidas-group.com/en/data-secur</span><span class="invisible">ity-information</span></a></p><p><a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
SecuritySnacks<p>🔥 Hot off the presses!</p><p>DomainTools Investigations shares that a spoofed antivirus download page is delivering VenomRAT, StormKitty, and SilentTrinity—a powerful combo for credential theft, persistence, and long-term access.</p><p>🔎 We traced the infrastructure, payloads, and attacker tactics.</p><p>Full breakdown: <a href="https://dti.domaintools.com/venomrat/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=VenomRAT" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dti.domaintools.com/venomrat/?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=VenomRAT</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a></p>
Taylor Parizo<p>You can't be serious in this field. What's next? Charmin Bear? </p><p><a href="https://therecord.media/laundry-bear-void-blizzard-russia-hackers-netherlands" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/laundry-bear-v</span><span class="invisible">oid-blizzard-russia-hackers-netherlands</span></a><br><a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a></p>
Ian Campbell<p>Russian bulletproof host DDoS-Guard nameserver activity over the weekend (non-exhaustive):</p><p>-cryptocurrency-targeting<br>app-hyperlend[.]com<br>app-yei[.]com (Yei Finance)<br>en-ledger[.]to<br>trezor-wallet[.]to<br>metamack[.]to (metamask)<br>rabby-wallet[.]to<br>app-defisaver[.]co<br>app-dragonswap[.]com<br>app-yei[.]financial<br>yel[.]financial<br>appdragonclient[.]com<br>sailor[.]financial (seilor)</p><p>-general malice<br>com-updates[.]com<br>privnotea[.]com<br>xyzdotcom[.]com</p><p><a href="https://masto.deoan.org/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://masto.deoan.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://masto.deoan.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
RedPacket Security<p>[PLAY] - Ransomware Victim: South Atlantic Federal Credit Union - <a href="https://www.redpacketsecurity.com/play-ransomware-victim-south-atlantic-federal-credit-union/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/play-ran</span><span class="invisible">somware-victim-south-atlantic-federal-credit-union/</span></a></p><p><a href="https://mastodon.social/tags/play" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>play</span></a> <a href="https://mastodon.social/tags/dark_web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dark_web</span></a> <a href="https://mastodon.social/tags/data_breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_breach</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a></p>
RedPacket Security<p>[SILENTRANSOMGROUP] - Ransomware Victim: Liberty Tax (d) - <a href="https://www.redpacketsecurity.com/silentransomgroup-ransomware-victim-liberty-tax-d/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/silentra</span><span class="invisible">nsomgroup-ransomware-victim-liberty-tax-d/</span></a></p><p><a href="https://mastodon.social/tags/silentransomgroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>silentransomgroup</span></a> <a href="https://mastodon.social/tags/dark_web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dark_web</span></a> <a href="https://mastodon.social/tags/data_breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_breach</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a></p>
RedPacket Security<p>[PLAY] - Ransomware Victim: AKJ Energiteknik - <a href="https://www.redpacketsecurity.com/play-ransomware-victim-akj-energiteknik/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/play-ran</span><span class="invisible">somware-victim-akj-energiteknik/</span></a></p><p><a href="https://mastodon.social/tags/play" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>play</span></a> <a href="https://mastodon.social/tags/dark_web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dark_web</span></a> <a href="https://mastodon.social/tags/data_breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_breach</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a></p>
Infoblox Threat Intel<p>Our latest blog is out! It covers a rising issue that many major organization experiences: Subdomain hijacking through abandoned cloud resources.<br> <br>This research follows our reporting from earlier in the year about the CDC subdomain hijack. We initially assumed that this was an isolated incident. Well… We were wrong.<br> <br>We tied some of this activity to a threat actor, dubbed Hazy Hawk, who hijacks high-profile subdomains which they use to conduct large-scale scams and malware distribution.</p><p><a href="https://blogs.infoblox.com/threat-intelligence/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.infoblox.com/threat-inte</span><span class="invisible">lligence/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor/</span></a><br> <br><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/HazyHawk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HazyHawk</span></a></p>
k3ym𖺀<blockquote><p>"Coinbase, the largest cryptocurrency exchange platform in the U.S., refused to pay a $20 million ransom and instead offered the same amount as a bounty for information leading to the arrest of the hackers."</p></blockquote><p><a href="https://www.secureworld.io/industry-news/coinbase-flips-script-ransomware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">secureworld.io/industry-news/c</span><span class="invisible">oinbase-flips-script-ransomware</span></a></p><p><a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a></p>
Risotto Bias<p>are you in any other cybersecurity communities? discord? slack? matrix? IRC? carrier pigeons?<br> <br>let me know!</p><p><a href="https://toot.risottobias.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.risottobias.org/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://toot.risottobias.org/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://toot.risottobias.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>