#collaborative

2025-06-17

16% of proven-aggressive IPs CrowdSec blocks are still unknown to other vendors for 15 to 20 days. ๐Ÿ‘€

๐Ÿ—“๏ธ Thatโ€™s over two weeks where youโ€™re protected while others remain exposed.

How do we do it?
#CrowdSec leverages a #collaborative network of thousands of contributors worldwide, enabling us to detect and block malicious behavior before it becomes common knowledge.

Learn more ๐Ÿ‘‰ crowdsec.net/blocklists

#cybersecurity #blocklists #cyberthreatintelligence

GetMusic - Free Bandcamp CodesGetMusic
2025-06-12

Free download codes:

The Missing Note - et cetera

"A multi-genre album of Post-Everything"

getmusic.fm/l/D1jgeM

2025-06-10

Get 7 to 60 days ahead of #attacks. โšก

โณ When malicious IPs hit the internet, every second counts. 

#CrowdSec gives you the upper hand by identifying and blocking malicious IPs days to even weeks before any other vendor on the market. 

How? Our real-time #collaborative network of thousands of contributors feeds into our blocklists, resulting in early, accurate, and actionable #IP intelligence.

Learn more ๐Ÿ‘‰ crowdsec.net/blocklists

GetMusic - Free Bandcamp CodesGetMusic
2025-06-10

Free download codes:

Zone-440 - Inverted Waves (LB)

"Exponential Growth; We shape our tools and then our tools shape us."

getmusic.fm/l/uevl0W

Sencha Wizard ๐Ÿตsenchawizard
2025-06-03
2025-06-02

๐Ÿšจ CVE-2025-3248: Renewed Interest in Langflow Remote Code Execution

โ„น๏ธ About the exploit:
#Langflow is a widely used #opensource library for building AI agents, backed by corporate support from #Datastax (now #IBM). The tool provides a web-based, drag-and-drop interface for creating agentic workflows, making it particularly attractive to businesses, but also a high-value target for exploits. Given that such workflows often integrate with critical business databases and tools, security vulnerabilities in Langflow could have severe consequences.

This risk is not hypothetical. Langchain, another leading AI framework, has already been associated with over 30 CVEs, underscoring the security challenges in the fast-moving LLM development ecosystem.

The vulnerability in Langflow allowed unauthenticated attackers to execute arbitrary code on the host machine. Discovered and disclosed by Horizon3 in late February, the issue was patched in version 1.3, released at the end of March. Below is a detailed timeline of the discovery and remediation process.

๐Ÿ”Ž Trend analysis:
๐Ÿ”น Feb 25, 2025: The vulnerability is disclosed to DataStax by Horizon3.
๐Ÿ”น Mar 5, 2025: DataStax fixes the vulnerability in the development branch.
๐Ÿ”น Mar 31, 2025: Langflow 1.3.0 releases, containing a fix for CVE-2025-3248.
๐Ÿ”น April 7, 2025: CVE-2025-3248 is published to the NVD.
๐Ÿ”น April 9, 2025: The exploit is leaked to the public, and the CrowdSec Network starts tracking the exploit.
๐Ÿ”น April 11-12, 2025: The CrowdSec Network observes a first wave of exploitation attempts by approximately 200 machines.
๐Ÿ”น April 12 - May 14, 2025: Attackers disappear, with barely any attacks registered in the CrowdSec Network.
๐Ÿ”น May 14 - 23, 2025: The CrowdSec Network observes a renewed, smaller wave of attacks, peaking out at around 100 involved machines.

โœ… How to protect your systems:
๐Ÿ”นPatch: If you havenโ€™t already, ensure your publicly exposed Langflow instance is updated with the latest patch.
๐Ÿ”นPreemptive blocking: Use Crowdsec CTI to block IPs exploiting CVE-2025-3248 ๐Ÿ‘‰ app.crowdsec.net/cti?q=cves%3A
๐Ÿ”นStay proactive: Install the Crowdsec Web Application Firewall to stay ahead of exploit attempts with 100+ virtual patching rules available ๐Ÿ‘‰ app.crowdsec.net/cti?q=cves%3A

Sharing insights and taking swift action can collectively reduce the impact of these threats. This is your call to action for real-time threat intelligence and #collaborative #cybersecurity ๐Ÿ‘‰ crowdsec.net/

De la graine ร  l'humusLagraine
2025-05-26

///From Seed to Humus///
Here is the video presentation of our association, recently posted online.
From Seed to Humus offers open, free and collaborative resources to move towards a sustainable development more in harmony with our environment.
tube.hoga.fr/w/1YVU4o4cS1d82PC

2025-05-26

๐Ÿšจ Rapid surge in Log4j scanning campaigns (CVE-2021-44228) detected!

4 Years after the exploit was first published, the CrowdSec Network still detects active campaigns targeting the Log4Shell class of exploits.

โ„น๏ธ About the exploit:
The Log4j exploit, a famous remote code execution issue in a popular Apache logging library, ruined Christmas festivities for most security teams in 2021. Nowadays, this exploit is still abused by small-time hacker groups looking to find easy targets to launch more dangerous exploits from.

๐Ÿ”Ž Trend analysis:
๐Ÿ”น20th of May: The CrowdSec network detects a rapid surge in machines targeting CVE-2021-44228, with over 95% of machines originating from DigitalOcean, a VPS provider. The group is assigned a tag, โ€œMagical Peachpuff Scimitarbillโ€ by the CrowdSec monitoring service.
๐Ÿ”น20th - 24th of May: Within 4 days, the campaign targets over 1000 machines connected to the CrowdSec network with a diverse selection of exploits targeting popular open source applications such as CVE-2021-41773 (Apache Server) or CVE-2021-43798 (Grafana).
๐Ÿ”น25th of May: The machines disappear, presumably due to intervention from DigitalOcean.

โœ… How to protect your systems:
๐Ÿ”นStay informed: Use Crowdsec CTI to explore IPs used for the campaign ๐Ÿ‘‰ app.crowdsec.net/cti?q=classif
๐Ÿ”นStay proactive: Install Crowdsec Web Application Firewall to stay ahead of exploit attempts with 100+ virtual patching rules available ๐Ÿ‘‰ doc.crowdsec.net/docs/next/app

Sharing insights and taking swift action can collectively reduce the impact of these threats. This is your call to action for real-time threat intelligence and #collaborative #cybersecurity ๐Ÿ‘‰ crowdsec.net/

2025-05-20
โ€žBounceโ†‘โ†“โ€œ #circular #open #customizable #collaborative #shoes
See parts and instructions here โ†’ https://ikego.world/products/clothing/bounce/

#sustainable #modular
Pictures of feet wearing modular shoesPictures of feet wearing modular shoesPictures of feet wearing modular shoesPictures of feet wearing modular shoes
IkegoIkego
2025-05-20

โ€žBounceโ†‘โ†“โ€œ
See parts and instructions here โ†’ ikego.world/products/clothing/

Pictures of feet wearing modular shoes
2025-05-12

โš ๏ธ Update: Active exploitation of SAP NetWeaver Zero-Day (CVE-2025-31324) surges!

At the end of April, the CrowdSec Network detected a wave of critical zero-day vulnerability exploits (CVE-2025-31324) affecting SAP NetWeaverโ€™s Visual Composer component. Since then, exploitation attempts have surged by 20x, with multiple threat actors now actively targeting unpatched systems.

โ„น๏ธ About the exploit:
A critical zero-day vulnerability (CVSS 10.0) was identified in SAP NetWeaver's Visual Composer component. This flaw allows unauthenticated attackers to upload arbitrary files via the /developmentserver/metadatauploader endpoint, leading to remote code execution with high privileges. Active exploitation in the wild was confirmed, with attackers deploying web shells and tools like Brute Ratel to gain persistent access.

๐Ÿ”Ž Trend analysis:
๐Ÿ”น April 25, 2025: The CrowdSec Network starts flagging the first exploitation attempts.
๐Ÿ”น April 28, 2025: The CrowdSec Network publicly communicated about ~40 IPs exploiting the CVE.
๐Ÿ”น April 29, 2025: A coordinated actor nicknamed Magical Firebrick Piopio in Crowdsec CTI was flagged as exploiting this CVE, and 400 IPs were flagged that day.
๐Ÿ”น May 12, 2025: More than 1,000 IPs are being spotted daily and made available in the CrowdSec CTI. Most IPs (90%) are from Microsoft ASN georeferenced in the US, with a high rotation rate.

โœ… How to protect your systems:
๐Ÿ”น Patch: Apply SAP Security Note immediately.
๐Ÿ”น Preemptive blocking: Use the CrowdSec CTI to block IPs exploiting CVE-2025-31324 ๐Ÿ‘‰ app.crowdsec.net/cti?q=cves%3A
๐Ÿ”น Stay proactive: Install the CrowdSec WAF to stay ahead of exploit attempts with 100+ virtual patching rules available ๐Ÿ‘‰ youtube.com/watch?v=LyNfr4QWiqw

Sharing insights and taking swift action can collectively reduce the impact of these threats. This is your call to action for real-time threat intelligence and #collaborative #cybersecurity ๐Ÿ‘‰ crowdsec.net/

De la graine ร  l'humusLagraine
2025-05-12

///PS: Handilibre///

In addition to providing guidance on disability issues when we can and taking your suggestions into account for moving forward, we also contact developers to add features missing from certain free tools ;)

handilibre.org

De la graine ร  l'humusLagraine
2025-05-12

///Handilibre Call for Participation///

Do you or some close have a disability and a free project has made your life easier?

It could be a plugin, a 3D print, a software program, a fablab project...

Share it with us in the comments or on www.handilibre.org to spread the word!

handilibre.org

2025-05-05

๐Ÿšจ Threat alert on #Microsoft Exchange: Surge in CVE-2022-41082 exploitation ๐Ÿ‘‡

The #CrowdSec Network has detected a wave of exploitation attempts targeting CVE-2022-41082, a critical vulnerability in Microsoft Exchange Server. This flaw allows authenticated attackers to execute remote code via PowerShell, often in conjunction with CVE-2022-41040, forming the notorious "ProxyNotShell" exploit chain.

โ„น๏ธ About the exploit:
CVE-2022-41082 affects Microsoft Exchange Server 2013, 2016, and 2019. When exploited alongside CVE-2022-41040, it enables attackers to gain remote access and execute arbitrary code. Microsoft has released patches addressing these vulnerabilities, but unpatched systems remain at high risk.

๐Ÿ”Ž Trend analysis:
๐Ÿ”น The exploitation started on April 28 and is still going on as we publish.
๐Ÿ”น Most of the exploitation attempts are emanating from cloud actors known for dubious activity (M247 Europe SRL or LATITUDE-SH) and already referenced in several of the CrowdSec Blocklists.

โœ… How to protect your systems:
๐Ÿ”น Make sure your servers are patched and up-to-date.
๐Ÿ”น Check this 4-minute video on how to install the CrowdSec Web Application Firewall and get instant protection from this exploitation and hundreds of other CVEs: youtube.com/watch?v=LyNfr4QWiqw
๐Ÿ”น Protect yourself using blocklists updated in real-time with collective intelligence: app.crowdsec.net/blocklists/65

Sharing insights and taking swift action can collectively reduce the impact of these #threats. This is your call to action for real-time threat intelligence and #collaborative #cybersecurity.

For more information, visit crowdsec.net

FreshOutMagfreshoutmag
2025-05-02

by Paul Callus @callus.safi47 of ฤฆal Safi, Malta and Linda L. Ludwig of Florida, USA. โ€” both accomplished poets & editors.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst