#attackvector

Anthony Acciolyanthony@accioly.social
2025-06-03

I really like this kind of content that breaks down research papers for the rest of us. I had no idea that BGP hijacking was such a threat.

I wonder if any security folks out there have more up-to-date information on the resilience of OVH, Hetzner, DigitalOcean and other major provider networks. Are Counter-RAPTOR guards, counter-fingerprinting measures, BGP monitoring and RPKI being deployed in the wild?

youtu.be/XDsLDhKG8Cs

#Security #BGP #Networking #Tor #AttackVector #Deanonymization

100%/0% TAX ✅ ✅shoppingtonz
2025-04-04

@Snowshadow @anomnomnomaly

There's an automated account that wanted to follow me today. I don't have any "follower protection" so I don't get these follow requests but this time I got it

and it was only cause it was an automated account that wanted to follow me.

They are now blocked...

Anyway this is an attack vector! Imagine a bad actor fixing up 2000 accounts a day and then having them send follow requests to you.

Imagine the spam!

I could not block them all...

Anthony Acciolyanthony@accioly.social
2025-03-12

This is crazy! Be careful with browser extensions that simulate payment tools, password managers, security tools, etc.

youtu.be/oWtR8vqbYX4

#PolymorphicExtensions #AttackVector #Cybersecurity #Infosec #BrowserSecurity

readbeanicecreamreadbeanicecream
2025-02-16

Graphene Tattoos: The Future Of Continuous Health Monitoring?

hackaday.com/2025/02/16/graphe

The part of me thinks this is cool, but my part immediately thinks, "the road to Hell is paved with good intentions."

Geekmaster 👽:system76:Geekmaster@ioc.exchange
2025-01-17
2024-04-22

The Register: SafeBreach presented at the Black Hat Asia conference on Friday that flaws in Microsoft and Kaspersky security products could potentially allow the remote deletion of files. Microsoft Defender and Kaspersky's Endpoint Detection and Response (EDR) can be made to detect false positive indicators of malicious files – and then to delete them. The attack relies on the fact that Microsoft and Kaspersky use byte signatures – unique sequences of bytes in file headers – to detect malware. "Our goal was to confuse EDR by implanting malware signatures into legit files and make them think its malicious" 🔗 theregister.com/2024/04/22/edr

#MicrosoftDefender #Kaspersky #attackvector #EDR

2023-07-24

Reminder: Every "free" web account that you create is an attack vector, an addition to your attack surface. Every additional set of login credentials that has anything to do with "you", every working email address you provide: each one of these is a digital point of weakness that you have voluntarily provided to your enemies and predators. Make sure each new one is worth it.
#CyberSecurity #credentials #CyberAttack #OnlineSafety #AttackVector #AttackSurface

Joy Denebeim :tv: :tb: :pa:denebeim@deepthot.org
2022-11-11

#mastodon #security I'm concerned about #vulnerabilities in the #federation of servers. It seems to me that #badActors will be able to use throw away #instances as an #attackVector

2022-11-11

This project is an Interesting one. #Meraki devices allow you to log in using the Serial Number. Need a lot more data to refine the key search to something feasible for an online attack.

git.blackmarble.sh/init6/merak

#passwords #attackVector

2020-12-17

Nuclear Weapons Agency Hacked in Widening Cyberattack – Report - Sources said the DoE suffered "damage" in the attack, which also likely extends beyond the initial... threatpost.com/nuclear-weapons #criticalinfrastructure #nuclearweaponsagency #departmentofenergy #vulnerabilities #attackvector #cyberattack #government #solarwinds #malware #damage #hacks #orion #cisa #ferc #doe

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst