#cybersecurity

IT InsightsITinsights
2026-03-07

TriZetto datalek: een wake-up call voor de zorgsector. Tijd voor actie en betere beveiliging! πŸ›‘οΈ  
itinsights.nl/cybersecurity/da

EUVD BotEUVD_Bot
2026-03-07

🚨 EUVD-2026-10186

πŸ“Š Score: 4.8/10 (CVSS v3.1)
πŸ“¦ Product: dGEN1
🏒 Vendor: Freedom Factory
πŸ“… Updated: 2026-03-07

πŸ“ A security vulnerability has been detected in Freedom Factory dGEN1 up to 20260221. This impacts the function AlarmService of the component com.dgen.alarm. Such manipulation leads to improper authorization. The attack needs to be performed locally. The...

πŸ”— euvd.enisa.europa.eu/vulnerabi

EUVD BotEUVD_Bot
2026-03-07

🚨 EUVD-2026-10187

πŸ“Š Score: 4.8/10 (CVSS v3.1)
πŸ“¦ Product: dGEN1
🏒 Vendor: Freedom Factory
πŸ“… Updated: 2026-03-07

πŸ“ A vulnerability was detected in Freedom Factory dGEN1 up to 20260221. Affected is an unknown function of the component com.dgen.alarm. Performing a manipulation results in improper authorization. The attack requires a local approach. The exploit is now...

πŸ”— euvd.enisa.europa.eu/vulnerabi

IT InsightsITinsights
2026-03-07

⚠️ Belangrijk: Kritieke iOS-lekken ontdekt! Bescherm je data nu en voorkom risico's voor je organisatie. πŸš€ 
itinsights.nl/cybersecurity/ac

urlDNA.io :verified:urldna@infosec.exchange
2026-03-07

Possible Phishing 🎣
on: ⚠️hxxps[:]//www[.]roblox[.]com[.]gl/users/384259844172/profile
🧬 Analysis at: urldna.io/scan/69ac0cf63b77500
#cybersecurity #phishing #infosec #urldna #scam #infosec

urlDNA.io :verified:urldna@infosec.exchange
2026-03-07

Possible Phishing 🎣
on: ⚠️hxxp[:]//www[.]web3connect[.]click/
🧬 Analysis at: urldna.io/scan/69ac0cf93b77500
#cybersecurity #phishing #infosec #urldna #scam #infosec

EUVD BotEUVD_Bot
2026-03-07

🚨 EUVD-2026-10185

πŸ“Š Score: 2.3/10 (CVSS v3.1)
πŸ“¦ Product: Neurofeedback Headset
🏒 Vendor: Mendi
πŸ“… Updated: 2026-03-07

πŸ“ A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy Handler. Performing a manipulation results in cleartext transmission of sensitive inf...

πŸ”— euvd.enisa.europa.eu/vulnerabi

urlDNA.io :verified:urldna@infosec.exchange
2026-03-07

Possible Phishing 🎣
on: ⚠️hxxps[:]//fgbsfvgsgr[.]weebly[.]com
🧬 Analysis at: urldna.io/scan/69ac3d873b77500
#cybersecurity #phishing #infosec #urldna #scam #infosec

hackmachackmac
2026-03-07

Angreifer loggen sich ein – sie brechen nicht mehr ein. Die aktuellen Threat Reports von CrowdStrike, Cloudflare und Google zeichnen ein alarmierendes Bild: KI hat die Spielregeln der CyberkriminalitΓ€t fundamental verschoben. Breakout Time: vom ersten Zugriff bis zur lateralen Bewegung im Netzwerk – liegt bei nur noch 29 Minuten. Der schnellste dokumentierte Angriff: 27 Sekunden. 90 aktiv ausgenutzte Zero-Day-Schwachstellen allein in 2025.

2026-03-07

Caught a great line about β€œzero trust” still looking like handing out trust like free samples at Costco. That visual sticks.
#ZeroTrust #CyberSecurity #Identity

2026-03-07

Fantastic ITV with Eric Bedell (Chief Privacy Officer, Franklin Templeton & DPO of the Year 2020)! A clear, practical deep-dive into privacy strategy, data protection and compliance in finance β€” essential viewing for privacy pros and security-minded folks. #Privacy #DataProtection #Cybersecurity #DPO #Finance #Interview #GDPR #English
peertube.lhc.lu/videos/watch/e

2026-03-07

China-Nexus Hackers attacks Telecommunication Providers with New Malware

A China linked threat actor tracked as UAT – 9244 has been actively targeting telecommunication providers including Windows and Linux based endpoints and edge devices. Three new malware implants were identified in this campaign named as TernDoor, PeerTime and BruteEntry.

Pulse ID: 69ac69331b0d758dcad5860b
Pulse Link: otx.alienvault.com/pulse/69ac6
Pulse Author: cryptocti
Created: 2026-03-07 18:06:43

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#China #CyberSecurity #Edge #Endpoint #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Telecom #Telecommunication #Windows #bot #cryptocti

urlDNA.io :verified:urldna@infosec.exchange
2026-03-07

Possible Phishing 🎣
on: ⚠️hxxps[:]//icewarpwebclientbright[.]weebly[.]com
🧬 Analysis at: urldna.io/scan/69ac59b23b77500
#cybersecurity #phishing #infosec #urldna #scam #infosec

Partij voor de Dieren AlkmaarPvdDAlkmaar
2026-03-07

Ook voor de zit je goed bij ons! Maar liefst 4 kandidaten op de lijst hebben een achtergrond in de IT. πŸ€“ Zij hebben ruime kennis over , , en .

In de wereld van vandaag zijn deze zaken belangrijker dan ooit. Waar jouw zonder toestemming gebruikt wordt om te trainen en gevoelige persoonlijke informatie op straat komt te liggen of bij onderdrukkende regimes.

(1/2) 🧡

Foto van Kivilcim Pinar op een groen witte achtergrond. 

Tekst op de afbeelding: 

Stem Pinar - Lijst 8 - #1
Nerd Vote Alkmaar
Partij voor de DierenFoto van Fabian Zoon op een groen witte achtergrond. 

Tekst op de afbeelding: 

Stem Zoon - Lijst 8 - #2
Nerd Vote Alkmaar
Partij voor de DierenFoto van Lilian Jonker op een groen witte achtergrond. 

Tekst op de afbeelding: 

Stem Jonker - Lijst 8 - #4
Nerd Vote Alkmaar
Partij voor de DierenFoto van Janine Visser op een groen witte achtergrond. 

Tekst op de afbeelding: 

Stem Visser - Lijst 8 - #11
Nerd Vote Alkmaar
Partij voor de Dieren
2026-03-07

Seedworm Targets Critical Sectors Using Latest Backdoors

Seedworm compromises systems in critical sectors including airports and governments. The threat actor was observed to use state of the art backdoors named Dindoor and Fakeset that were signed with valid certificates.

Pulse ID: 69ac66128f7d265e2d1d986f
Pulse Link: otx.alienvault.com/pulse/69ac6
Pulse Author: cryptocti
Created: 2026-03-07 17:53:22

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #ESET #Government #InfoSec #OTX #OpenThreatExchange #SeedWorm #Worm #bot #cryptocti

EUVD BotEUVD_Bot
2026-03-07

🚨 EUVD-2026-10176

πŸ“Š Score: 8.1/10 (CVSS v3.1)
πŸ“¦ Product: caddy
🏒 Vendor: caddyserver
πŸ“… Updated: 2026-03-06

πŸ“ Caddy forward_auth copy_headers Does Not Strip Client-Supplied Headers, Allowing Identity Injection and Privilege Escalation

πŸ”— euvd.enisa.europa.eu/vulnerabi

EUVD BotEUVD_Bot
2026-03-07

🚨 EUVD-2026-10177

πŸ“Š Score: 5.5/10 (CVSS v3.1)
πŸ“¦ Product: caddy
🏒 Vendor: caddyserver
πŸ“… Updated: 2026-03-06

πŸ“ Caddy's vars_regexp double-expands user input, leaking env vars and files

πŸ”— euvd.enisa.europa.eu/vulnerabi

EUVD BotEUVD_Bot
2026-03-07

🚨 EUVD-2026-10178

πŸ“Š Score: 8.8/10 (CVSS v3.1)
πŸ“¦ Product: WeKnora
🏒 Vendor: Tencent
πŸ“… Updated: 2026-03-06

πŸ“ WeKnora Vulnerable to Broken Access Control in Tenant Management

πŸ”— euvd.enisa.europa.eu/vulnerabi

EUVD BotEUVD_Bot
2026-03-07

🚨 EUVD-2026-10179

πŸ“Š Score: 5.9/10 (CVSS v3.1)
πŸ“¦ Product: WeKnora
🏒 Vendor: Tencent
πŸ“… Updated: 2026-03-06

πŸ“ WeKnora Vulnerable to Tool Execution Hijacking via Ambigous Naming Convention In MCP client and Indirect Prompt Injection

πŸ”— euvd.enisa.europa.eu/vulnerabi

EUVD BotEUVD_Bot
2026-03-07

🚨 EUVD-2026-10180

πŸ“Š Score: 5.3/10 (CVSS v3.1)
πŸ“¦ Product: WeKnora
🏒 Vendor: Tencent
πŸ“… Updated: 2026-03-06

πŸ“ WeKnora has Unauthorized Cross‑Tenant Knowledge Base Cloning

πŸ”— euvd.enisa.europa.eu/vulnerabi

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst