techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#attack

26 posts21 participants3 posts today

Why did #Singapore name #cyberthreat group #UNC3886 & is it linked to #China?
"Shanmugam said: “As far as 🇸🇬 #government is concerned, we can say we r confident tt it's tis particular org'zn. Who they r linked to, & how they operate, is not something I want to go into.”.. te govt thought #Singaporeans ought to know where te #attack was coming from.. given Singapore’s relations w #US, other Western powers & #Taiwan, PRC wld hv interest in exercis'g deterrence & to sabotage"
scmp.com/week-asia/politics/ar

South China Morning Post · Why did Singapore name cyberthreat group UNC3886 and is it linked to China?Minister K Shanmugam says Singapore is facing an advanced persistent threat from UNC3886, which is targeting its strategic targets.

"#Russian courts have sentenced 135 people to prison for their roles in the October 2023 mob #attack on Makhachkala Uytash Airport in the Muslim-majority region of #Dagestan, Russia’s Investigative Committee announced Friday.

The attack occurred amid heightened tensions following the #October7 #Hamas massacre in southern #Israel and Israel’s subsequent war in #Gaza, the #Jewish Chronicle reported.

On October 29, 2023, hundreds of young #Muslim men stormed the airport after rumours spread that a flight from #TelAviv had landed.

Footage from the scene showed rioters waving #Palestinian flags, shouting “Allahu Akbar,” and searching terminals for Jewish and @Israeli passengers."

worldisraelnews.com/over-130-s

WIN · Over 130 sentenced in attempted lynching of Jews at Dagestan airportRussian courts have sentenced 135 people to prison for their roles in the October 2023 mob attack on Makhachkala Uytash Airport in Dagestan.

Microsoft reports on-premise SharePoint vulnerability under active attack

Microsoft issued an urgent alert about a critical zero-day vulnerability (CVE-2025-53770) in on-premises SharePoint Server installations being actively exploited since July 18, 2025, as part of the "ToolShell" attack campaign that allows remote code execution.

**If you have on-premises SharePoint servers, immediately enable AMSI integration and install Microsoft Defender Antivirus on all SharePoint systems. There is an active exploitation of these systems and patch is still not available. Check your SharePoint template layouts directory for any malicious "spinstall0.aspx" files. If you can't enable AMSI, disconnect your SharePoint servers from the internet until Microsoft releases a patch.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesMicrosoft reports on-premise SharePoint vulnerability under active attackMicrosoft issued an urgent alert about a critical zero-day vulnerability (CVE-2025-53770) in on-premises SharePoint Server installations being actively exploited since July 18, 2025, as part of the "ToolShell" attack campaign that allows remote code execution.

Critical vulnerability in CrushFTP actively exploited to hijack servers

CrushFTP is reporting active exploitation of a critical zero-day vulnerability (CVE-2025-54309) that allows unauthenticated attackers to gain full administrative access to vulnerable file transfer servers. There are confirmed real-world breaches including a German customer compromised on July 18, 2025.

**If you use CrushFTP file transfer servers, IMMEDIATELY upgrade to latest versions. Attackers are actively exploiting all unpatched CrushFTP servers. And by the very nature of the server you can't hide it from the internet. Check your logs for suspicious admin accounts or unexpected file transfers between July 16-18, 2025, and restore user configs from backups if you find anything suspicious.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesCritical vulnerability in CrushFTP actively exploited to hijack serversCrushFTP is reporting active exploitation of a critical zero-day vulnerability (CVE-2025-54309) that allows unauthenticated attackers to gain full administrative access to vulnerable file transfer servers. There are confirmed real-world breaches including a German customer compromised on July 18, 2025.

Critical Fortinet FortiWeb SQL injection vulnerability actively exploited

A critical SQL injection vulnerability (CVE-2025-25257) in FortiWeb web application firewalls is being actively exploited since July 11, 2025, allowing unauthenticated attackers to execute unauthorized SQL commands via crafted HTTP requests to the /api/fabric/device/status endpoint.

**If you have Fortinet FortiWeb systems running versions 7.0 through 7.6.3, time to act NOW. Make sure it's web admin interface is isolated from the internet and accessible from trusted networks. Then plan a VERY QUICK patch, there is an exploit PoC public and hackers are actively attacking the systems.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesCritical Fortinet FortiWeb SQL injection vulnerability actively exploitedA critical SQL injection vulnerability (CVE-2025-25257) in FortiWeb web application firewalls is being actively exploited since July 11, 2025, allowing unauthenticated attackers to execute unauthorized SQL commands via crafted HTTP requests to the /api/fabric/device/status endpoint.
click.actionnetwork.orgTell Congress: Stop the 83% Cut to Tribal College Funding NOW The Department of the Interior has proposed an 83% cut to Tribal college funding. If Congress signs off, over $100 million will vanish, destroying institutions that provide higher education and cultural lifelines to Native communities. From $127 million in 2024 to just $22 million in 2025, this proposal is a calculated decision to starve out Tribal colleges and universities that are already underfunded by $250 million each year. These colleges serve students in some of the most rural and historically neglected areas in the country. They provide affordable, culturally-rooted education, job training, and degrees that are vital to economic survival. Many of these schools operate with crumbling infrastructure, limited staff, and inadequate resources to support their students. And now Congress wants to make that worse. Some offer the only programs of their kind in the U.S., like the Institute of American Indian Arts. Cutting this funding will mean shutting down opportunities, closing doors, and sending a message that Native lives and futures don’t matter. It’s outrageous. It’s unacceptable. And it’s a direct violation of the federal government’s trust responsibilities to Native nations. Congress must not just reject these cuts, they must increase funding to meet the legal mandate of $40,000 per student. Anything less is a broken promise. Demand Congress reject the 83% cut and fully fund Tribal colleges NOW.

Today we received a little packet of four teardrop-shaped #seeds from China.

We do not know why.

My #security-focused or anime-raddled brain I'm not sure which or if there's a difference is filled with possible ways in which this may be an #attack vector. Not the least of which is destabilising of Western Civilisation through sheer paranoia. (Just as well I don't believe in Western Civilisation, eh?)

But I may be missing out on the chance to grow something beautiful?

/