BeyondMachines :verified:

Simple, automated security tools and guidance for individuals and companies of all sizes.
Good cybersecurity shouldn't be an enterprise feature.

Sometimes a bot, sometimes not.

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-03

How it started, how it's going
#RightToRepair

A photo of a circuit board

Text etched in the board:
"If you can read this, you have voided your warranty"A photo of a circuit board

Text etched in the board:
"If you can read this, we are suing you"
BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-03

Security flaw reported in Cl0p ransomware gang data theft tool

It's a weird day when security researchers report a flaw in software used in criminal operations. Security researchers are reporting a vulnerability in the Cl0p ransomware gang's Python-based data exfiltration utility that could potentially allow command injection attacks against the cybercriminals' own infrastructure.

**Obviously, we don't really care if the criminals patch their software. But this is a prime example that all software can be flawed, and that input validation IS ALWAYS A GREAT IDEA.**
#cybersecurity #infosec #advisory #ransomware
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-03

Not sure that I would call #sohamgate a scandal.

But the memes are making themselves

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-03

Catwatchful stalkerware platform vulnerable to SQL Injection exposes 62,000 customers

An SQL injection vulnerability in the Catwatchful stalkerware operation exposed the entire customer database containing personal information of over 62,000 customers who used the service to secretly surveil approximately 26,000 victim devices, revealing plaintext passwords, device identifiers, and the identity of the operation's administrator Omar Soca Charcov in Uruguay.

**People managing spyware platforms are not great at security. Check your phone from time to time for any weird applications.**
#cybersecurity #infosec #incident #databreach
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-03

Cisco patches critical hardcoded credentials vulnerability in Unified Communications Manager

Cisco reports a maximum-severity vulnerability (CVE-2025-20309) in its Unified Communications Manager platforms caused by hardcoded static SSH credentials for the root account. The flaw allows unauthenticated remote attackers to gain complete administrative control over enterprise IP telephony networks.

**Obvious first step - isolate the SSH port of your CUCM and make it accessible from trusted networks only. Then VERY QUICLY update to versions 15.0.1.13010-1 through 15.0.1.13017-1, or apply the patches. Just isolating the CUCM isn't enough - the hardcoded password can be abused by malicious insiders, or other devices with access to trusted networks can be breached and the attackers can then breach CUCM.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

@GrahamDowns intentional. There's a method to the madness

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

WordPress Plugin flaw exposes over 600,000 websites to potential remote takeover

A critical vulnerability (CVE-2025-6463) in the Forminator WordPress plugin affecting over 600,000 installations allows unauthenticated attackers to delete arbitrary files, including critical WordPress files like wp-config.php. The flaw enable site takeover by forcing installations into setup mode after deleting wp-config.php and then connecting to a database they control.

**If you're using the Forminator WordPress plugin, immediately update to version 1.44.3 or later. Your WordPress site is exposed to the internet by design, so attackers will find it very quickly. Don't delay, updating a plugin in WordPress is quite easy. Then check your form submission logs for any suspicious entries that might indicate your site was already targeted.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

@cjust i'm sure pun not intended

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

@lp0_on_fire @rysiek start worrying if you find a void bullet

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

Centers for Medicare & Medicaid warn 103,000 beneficiaries of unauthorized Medicare.gov account creation

The Centers for Medicare & Medicaid Services (CMS) disclosed a security incident involving unauthorized creation of Medicare.gov accounts affecting approximately 103,000 beneficiaries, discovered on May 2, 2025, when confused beneficiaries began calling about account creation letters they never requested. Malicious actors systematically created fraudulent accounts between 2023-2025 using legitimate beneficiary information obtained from unknown sources, exposing sensitive healthcare data which can be abused for scams and identity theft.

**As an individual, be very careful what data is available online about you. Be very selfish with your data, because it can be abused to impersonate you. As a developer, consider that an attacker can scrape data for someone else, and implement controls that can stop such impersonation by mechanisms for extra verification.**
#cybersecurity #infosec #incident #databreach
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

@oblomov @rysiek It's the journey, not the destination

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

@realn2s When you have three locks on your door and leave one unlocked.

When burglars tamper with the locks they unlock two and lock one.

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

Australia's Qantas Airways suffers cyberattack affecting up to 6 million customers

Australia's Qantas Airways suffered a cyberattack discovered on June 30, 2025, that potentially compromised personal information of up to 6 million customers through a third-party customer service platform breach. Cybersecurity experts are noting similarities to Scattered Spider ransomware tactics. The airline's CEO issued a public apology while the company works with Australian authorities to investigate the "significant" amount of stolen data.

****
#cybersecurity #infosec #incident #databreach
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

@realn2s that's intentional 🤡
so hackers will try to close the strong and fail login!

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

@rysiek If you are willing to unpack a lot, i have a file 42.zip for you 😈

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

Strong Password Policy 101
Edit: for bonus points it messes with your OCD. There's a method to the madness

Screenshot of Google form for creating a password

Create a strong password
Create a strong password with a mix of letters, numbers
and symbols

The submitted password is
<body><strong>password<strong></body>
BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

Virginia student loan administrator Southwood Financial hit by ransomware attack

Southwood Financial, a student loan administrator in Virginia, was hit by an Akira ransomware attack, that compromised sensitive borrower information. The company is providing credit monitoring services to affected individuals and has established a dedicated helpline.

****
#cybersecurity #infosec #incident #databreach
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

Critical remote code execution flaw reported in Anthropic's MCP Inspector tool

Cybersecurity researchers disclosed a critical vulnerability (CVE-2025-49596, CVSS 9.4) in Anthropic's Model Context Protocol (MCP) Inspector debugging tool that allows remote code execution on developer machines through browser-based attacks exploiting the "0.0.0.0 Day" vulnerability and lack of authentication in default configurations. Attackers can compromise developer systems by tricking them into visiting malicious websites that send unauthorized commands to locally running MCP Inspector instances.

**If you're using Anthropic's MCP Inspector for AI development upgrade to version 0.14.1 or later. There is a fairly trivial exploit of your MCP Inspector tool that only requires you to visit a malicious site for your laptop to be fully compromised. So don't ignore this, update your MCP Inspector.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

Cyberattack in Missouri healthcare provider Esse Health exposes data of over 263,000 patients

Esse Health, a physician group serving the Greater St. Louis area, suffered a cyberattack discovered on April 21, 2025, that compromised personal and medical information of 263,601 individuals. The attack disrupted the organization's electronic medical record system and phone communications, forcing them to use manual processes and alternative communication channels.

****
#cybersecurity #infosec #incident #databreach
beyondmachines.net/event_detai

BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-07-02

@cR0w agreed. Yet since our objective is to get more people to click update we accept being less accurate.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst