toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

230
active users

#endpoint

0 posts0 participants0 posts today

Newly identified wiper malware 'PathWiper' targets critical infrastructure in Ukraine

A destructive attack on Ukrainian critical infrastructure using a new wiper malware called 'PathWiper' has been observed. The attack, attributed to a Russia-nexus APT group, utilized a legitimate endpoint administration framework to deploy the wiper across connected endpoints. PathWiper overwrites file system artifacts with random data, targeting physical drives, volumes, and network shared drives. Its capabilities are similar to HermeticWiper, previously used against Ukrainian entities. The malware's sophisticated approach to identifying and corrupting connected drives and volumes distinguishes it from earlier wipers. This attack underscores the ongoing threat to Ukrainian infrastructure despite the prolonged conflict with Russia.

Pulse ID: 6841b92b694f10dda07d9db8
Pulse Link: otx.alienvault.com/pulse/6841b
Pulse Author: AlienVault
Created: 2025-06-05 15:35:07

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

North Korea Still Attacking Developers via npm

Recent weeks have seen a resurgence of North Korean-aligned groups targeting developers through npm packages. The campaign, which began on August 12, 2024, involves multiple groups using various publication patterns and attack types. The malicious packages contain obfuscated JavaScript that downloads additional components, including Python scripts and interpreters, to exfiltrate sensitive data from cryptocurrency wallets and establish persistence. Some packages use different approaches, such as directly evaluating JavaScript from remote endpoints or executing batch and PowerShell scripts to deploy and conceal malware. This coordinated effort exploits the trust in the npm ecosystem to compromise developers, infiltrate companies, and steal cryptocurrency or other valuable assets.

Pulse ID: 66fa772a3fbfc99e94ebcb65
Pulse Link: otx.alienvault.com/pulse/66fa7
Pulse Author: AlienVault
Created: 2024-09-30 10:02:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

And here it gets absurd. The #US government sues #GeorgiaTech for not using that #Endpoint bullshit "security" (like #Cloudstrike). ENDPOINT! You need ENDPOINT! To be compliant!!! Selling snake oil by suing...
It's the same like those "super male" hot air producers like Andrew Tate and others "ALPHA! You need to become ALPHA! You need to be ALPHA to get a woman and be successful! Pay our training with box sacks to become ALPHA"

ENDPOINT and AI are the new "ALPHA!!!!!"

theregister.com/2024/08/23/us_

The Register · US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractorBy Connor Jones

VCURMS: A Simple and Functional Weapon

A phishing campaign was uncovered that entices users to download a malicious Java downloader to spread new VCURMS and STRRAT remote access trojans. The attackers stored malware on public services and used a commercial protector to avoid detection. The receiving endpoint uses Proton Mail for command and control via email.

Pulse ID: 65f3276957b296ae1aad3bc8
Pulse Link: otx.alienvault.com/pulse/65f32
Pulse Author: AlienVault
Created: 2024-03-14 16:35:53

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

AlienVault Open Threat ExchangeAlienVault - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Web Content Filtering in Microsoft Defender for Endpoint allows you to block select categories, such as adult content or illegal content. But it also allows you to have the policies in report only mode and see the reports without actually blocking it. And that is not a well-known feature.

You can read my today's blog post on how to enable the #audit mode for web #content #filtering in Microsoft #Defender for #Endpoint (#MDE). #cybersecurity #tips cswrld.com/2023/11/report-mode

Cybersecurity World · Report mode in Microsoft Defender for Endpoint Web Content FilteringWeb Content Filtering in Microsoft Defender for Endpoint allows you to filter content based on categories. There are a number of predefined categories to choose from. Web Content Filtering in...

This is a genuine request for input from the community.

A member of upper-middle management for a midsized internet technology company recently explicitly stated that they didn't want to install the company's management agent on their device. "I think for leadership, that sort of thing should be optional" was the quote.

This person is intelligent and capable, and is otherwise someone I would respect as a fellow member of the same circles and business.

This is so against axioms that I hold almost self-evident, that I realized I don't even have good arguments. I can endlessly find corners of the internet where this would be akin to "Pi is exactly 3!" at a Mathematics convention, but is there ever generally a time or company's infrastructure configuration where simply ignoring or allowing to be optional endpoint security wouldn't just be blatantly stupid?

Besides being aghast and expressing sharp chastisement, how does someone go about even beginning to describe why this cavalier attitude is so abhorrent?

Is there some situation where it's actually a kosher methodology or mindset?

I think I might just be so thrown off guard by the concept that I just can't think of even an obvious answer to start with here.

#secops #security #operations #bestpractice #bestpractices #infosec #devops #endpoint #endpointsecurity #technology

Been seeing a lot more very sophisticated MocuSign (#docusign) #phishing emails this week. I have been updating my #IOC list on my #GitHub. Fraudsters are doing a much better job on their contents, even using legitimate non-phishing sites as proxy to redirect to the actual #phishing site so they get by email scanners - but they haven't yet gotten past my #endpoint protections (so far, so good).

Keep up-to-date on my findings on my #IOCs #Repository so you can add them to your platforms as well. I update them multiple times per week: github.com/Geekmaster-General/

GitHubGitHub - Geekmaster-General/IOCs: Storage for the IOCs I collectStorage for the IOCs I collect. Contribute to Geekmaster-General/IOCs development by creating an account on GitHub.
Replied in thread

@siguza Nice. Here are some additional uBlock filters for also removing the shorts button from the site menu:

www.youtube.com##ytd-guide-entry-renderer > #endpoint[title=Shorts]

and this one for removing the shorts tab from channel pages:

www.youtube.com##tp-yt-paper-tab:has-text("Shorts")