techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.7K
active users

#cybersecurity

1.8K posts524 participants158 posts today

🚨 Hackers are spreading **malware** disguised as a "free VPN" on GitHub, targeting gamers & privacy-seekers! The fake VPN drops Lumma Stealer straight into your system. Always verify downloads and avoid unofficial software. Stay safe! 🔒🛡️ #Cybersecurity #Malware #VPN #newz

🔗 techradar.com/pro/criminals-ar

TechRadar · Criminals are using a dangerous fake free VPN to spread malware via GitHub - here's how to stay safeBy Efosa Udinmwen

Another phishing email going around, targeting #netcup users

email comes from

contact [at] anghelhotel [dot] com

Domain registered 2012 so who knows why it's getting routed data like this now.

The phishing link in the email leads to:

hxxp://12229530 [dot] sophrologie-arles [dot] com/?id=$YOUR_DOMAIN

where $YOUR_DOMAIN is your registered domain/website that is hosted on netcup. Rather, the domain doesn't have to be managed DNS wise by netcup, just hosted on a netcup IP.

Another reference:
lowendtalk.com/discussion/comm

#Cybersecurity hat nicht nur mit Finanzmitteln zu tun - aber auch:

Das #BSI-Budget betrug 2024 238 Mio. EUR, 2025 sollen aus dem BMI-Etat 231 Mio. EUR an das BSI gehen.

Schon jetzt dürfte fraglich sein, ob das BSI in der Lage ist, sämtliche ihm übertragenen Aufgaben in gleicher Intensität und Güte zu erfüllen - mit der nationalen Umsetzung von #NIS2 und perspektivisch dem EU CRA dürften die benötigten Ressourcen gegenüber dem gegenwärtigen Stand noch deutlich wachsen:

behoerden-spiegel.de/2025/07/1

The 2023 National Cybersecurity Strategy Implementation Plan reshapes how the U.S. defends against digital threats—from secure‑by‑design software to private‑sector accountability.

In our new white paper, we explore how public-private partnerships and emerging tech drive (or hinder) progress.

📘 Read more → mercurysecurity.io/navigating-

Critical buffer overflow flaw reported in D-Link DIR-825 routers

Security researchers have discovered a critical stack-based buffer overflow vulnerability in D-Link DIR-825 Rev.
When the router processes subsequent requests to ASP pages containing specific script tags, the stored language value is retrieved and processed through multiple functions, ultimately leading to a stack overflow condition.
js”></script> is requested, the router attempts to process the stored language value, leading to a stack overflow in the sub_40bFC4 function.
The researcher provided a detailed proof of concept demonstrating the vulnerability’s exploitation.
cgi with a carefully crafted payload containing an extremely long language parameter value.

**If you have a D-Link DIR-825 router, isolate its web interface from any public networks and block external access since this model is no longer supported with security updates. Consider replacing the router since it won't be getting any patches. And other flaws will be found.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachinesCritical buffer overflow flaw reported in D-Link DIR-825 routersSecurity researchers have discovered a critical stack-based buffer overflow vulnerability in D-Link DIR-825 Rev. When the router processes subsequent requests to ASP pages containing specific script tags, the stored language value is retrieved and processed through multiple functions, ultimately leading to a stack overflow condition. js”></script> is requested, the router attempts to process the stored language value, leading to a stack overflow in the sub_40bFC4 function. The researcher provided a detailed proof of concept demonstrating the vulnerability’s exploitation. cgi with a carefully crafted payload containing an extremely long language parameter value.

🚨 KongTuke FileFix Leads to New Interlock RAT Variant

Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). This new malware, a shift from the previously identified JavaScript-based Interlock RAT (aka NodeSnake), uses PHP and is being used in a widespread campaign.

🧅 Attack Chain
FileFix lure ➡️ PowerShell ➡️ Obfuscated PHP RAT

🧠 Key Capabilities
🔍 Automated Discovery
‣ Enumerates processes, services, ARP tables, and user context

🛠️ Hands-On-Keyboard Activity
‣ net user, tasklist, nltest, whoami, dir, and more

⚙️ Execution & Persistence
‣ Runs EXE, DLL, and shell commands
‣ Establishes persistence via registry Run key

📖 Full Report:

thedfirreport.com/2025/07/14/k

The DFIR Report · KongTuke FileFix Leads to New Interlock RAT VariantResearchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). This new malware,…
Continued thread

Sharing insights and taking swift action can collectively reduce the impact of these threats. This is your call to action for real-time threat intelligence and collaborative cybersecurity.

For more information, visit crowdsec.net

Want to stay ahead of the latest cyber threats? Get our weekly Threat Alert delivered straight to your inbox, along with critical threat updates and trending cybersecurity insights.

📩 Sign up now for exclusive access: contact.crowdsec.net/threat-al

🧵6/6

crowdsec.netCurated Threat Intelligence Powered by the Crowd | CrowdSecWe turn crowd-powered intelligence into tactical intelligence with actionable blocklists to maximize your SOC efficiency and reduce your costs.