toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

214
active users

#vulnerabilities

8 posts8 participants0 posts today
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/AIslop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIslop</span></a> and fake reports are exhausting <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/bugbounties" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounties</span></a><br>The world of <a href="https://hachyderm.io/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> is not immune to this problem. In last year, people across the cybersecurity industry have raised concerns about <a href="https://hachyderm.io/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://hachyderm.io/tags/slop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>slop</span></a> <a href="https://hachyderm.io/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> reports, meaning reports that claim to have found <a href="https://hachyderm.io/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> that do not actually exist, because they were created with a <a href="https://hachyderm.io/tags/largelanguagemodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>largelanguagemodel</span></a> (<a href="https://hachyderm.io/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a>) that simply made up the <a href="https://hachyderm.io/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a>, and then packaged it into a professional-looking writeup<br><a href="https://techcrunch.com/2025/07/24/ai-slop-and-fake-reports-are-exhausting-some-security-bug-bounties/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/07/24/ai-s</span><span class="invisible">lop-and-fake-reports-are-exhausting-some-security-bug-bounties/</span></a></p>
Steele Fortress<p>CISA has added two critical SharePoint vulnerabilities (CVE-2025-49704, CVE-2025-49706) to its KEV catalog after reports of active exploitation by Chinese hackers. Immediate patching is essential. Are your systems up to date? <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a></p><p>Read more: <a href="https://short.steelefortress.com/jgrfdr" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">short.steelefortress.com/jgrfdr</span><span class="invisible"></span></a></p>
Ars Technica News<p>What to know about ToolShell, the SharePoint threat under mass exploitation <a href="https://arstechni.ca/UZML" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechni.ca/UZML</span><span class="invisible"></span></a> <a href="https://c.im/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://c.im/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://c.im/tags/toolshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>toolshell</span></a> <a href="https://c.im/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://c.im/tags/exploits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploits</span></a> <a href="https://c.im/tags/Biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Biz</span></a>&amp;IT</p>
IT News<p>What to know about ToolShell, the SharePoint threat under mass exploitation - Government agencies and private industry have been under sie... - <a href="https://arstechnica.com/security/2025/07/what-to-know-about-toolshell-the-sharepoint-threat-under-mass-exploitation/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/what-to-know-about-toolshell-the-sharepoint-threat-under-mass-exploitation/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sharepoint</span></a> <a href="https://schleuss.online/tags/toolshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>toolshell</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/exploits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploits</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Steele Fortress<p>🚨 Germany's BSI reports ~200 vulnerable SharePoint servers due to an unpatched Microsoft flaw. Some are in government networks, yet no breaches confirmed. Stay vigilant and ensure your systems are updated. Are your SharePoint servers secure? <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a></p><p>Read more: <a href="https://short.steelefortress.com/dlgq13" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">short.steelefortress.com/dlgq13</span><span class="invisible"></span></a></p>
Nicolas Kosinski<p>On my <a href="https://fosstodon.org/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> laptop, <a href="https://fosstodon.org/tags/MacPorts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MacPorts</span></a> doesn’t seem ready to patch the recent <a href="https://fosstodon.org/tags/Git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Git</span></a> <a href="https://fosstodon.org/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a>, unlike <a href="https://fosstodon.org/tags/Homebrew" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Homebrew</span></a>. 🔓/🤓</p><p><a href="https://github.blog/open-source/git/git-security-vulnerabilities-announced-6/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.blog/open-source/git/gi</span><span class="invisible">t-security-vulnerabilities-announced-6/</span></a></p>
Schneier on Security RSS<p>Another Supply Chain Vulnerability</p><p>ProPublica is reporting:<br>Microsoft is using engineers in China to help maintain the Defense Department’s ... <a href="https://www.schneier.com/blog/archives/2025/07/another-supply-chain-vulnerability.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/07/another-supply-chain-vulnerability.html</span></a></p><p> <a href="https://burn.capital/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/supplychain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supplychain</span></a> <a href="https://burn.capital/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://burn.capital/tags/risks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>risks</span></a></p>
Duncan Blues<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@sadmin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sadmin</span></a></span> <span class="h-card" translate="no"><a href="https://social.heise.de/@heisec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>heisec</span></a></span> <br>Ich bekomme echt Schleudertrauma vom permanenten Kopfschütteln! 🤦🏻‍♂️<br><a href="https://norden.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://norden.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://norden.social/tags/fail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fail</span></a> <a href="https://norden.social/tags/Defender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Defender</span></a> <a href="https://norden.social/tags/MDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MDE</span></a> <a href="https://norden.social/tags/enshittification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enshittification</span></a> <br>🚮</p>
Pyrzout :vm:<p>CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable <a href="https://www.securityweek.com/citrixbleed-2-100-organizations-hacked-thousands-of-instances-still-vulnerable/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/citrixbleed-2</span><span class="invisible">-100-organizations-hacked-thousands-of-instances-still-vulnerable/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> <a href="https://social.skynetcloud.site/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> <a href="https://social.skynetcloud.site/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> <a href="https://social.skynetcloud.site/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>
Emanuele<p>«Hackers exploit a blind spot by hiding <a href="https://m.divita.eu/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> inside <a href="https://m.divita.eu/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> records»</p><p><a href="https://arstechnica.com/security/2025/07/hackers-exploit-a-blind-spot-by-hiding-malware-inside-dns-records/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/hackers-exploit-a-blind-spot-by-hiding-malware-inside-dns-records/</span></a></p><p><a href="https://m.divita.eu/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://m.divita.eu/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://m.divita.eu/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Schneier on Security RSS<p>Security Vulnerabilities in ICEBlock</p><p>The ICEBlock tool has vulnerabilities:<br>The developer of ICEBlock, an iOS app for anonymously reporting sightings of US I... <a href="https://www.schneier.com/blog/archives/2025/07/security-vulnerabilities-in-iceblock.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/07/security-vulnerabilities-in-iceblock.html</span></a></p><p> <a href="https://burn.capital/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/anonymity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anonymity</span></a> <a href="https://burn.capital/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://burn.capital/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a></p>
Ars Technica News<p>Google finds custom backdoor being installed on SonicWall network devices <a href="https://arstechni.ca/xwQo" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechni.ca/xwQo</span><span class="invisible"></span></a> <a href="https://c.im/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://c.im/tags/sonicwall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sonicwall</span></a> <a href="https://c.im/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://c.im/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://c.im/tags/Biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Biz</span></a>&amp;IT</p>
IT News<p>Google finds custom backdoor being installed on SonicWall network devices - Researchers from the Google Threat Intelligence Group said t... - <a href="https://arstechnica.com/security/2025/07/google-finds-custom-backdoor-being-installed-on-sonicwall-network-devices/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/google-finds-custom-backdoor-being-installed-on-sonicwall-network-devices/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/sonicwall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sonicwall</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Syft<p>Just picked up my holiday photos!<br>50% landscapes, 50% Grype being <span class="h-card" translate="no"><a href="https://fosstodon.org/@grype" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>grype</span></a></span> 👽📷<br><a href="https://fosstodon.org/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/family" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>family</span></a></p>
Manuel 'HonkHase' Atug<p><a href="https://chaos.social/tags/PerfektBlue" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PerfektBlue</span></a> <a href="https://chaos.social/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> <a href="https://chaos.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> Expose Millions of <a href="https://chaos.social/tags/Vehicles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vehicles</span></a> to Remote Code Execution</p><p>"Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if successfully <a href="https://chaos.social/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a>, could allow remote code execution <a href="https://chaos.social/tags/rce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rce</span></a> on millions of <a href="https://chaos.social/tags/transport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transport</span></a> vehicles from different vendors."<br><a href="https://thehackernews.com/2025/07/perfektblue-bluetooth-vulnerabilities.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/07/perf</span><span class="invisible">ektblue-bluetooth-vulnerabilities.html</span></a></p>
ADMIN magazine<p>ICYMI: Gerd Pflüger looks at the Purdue Model for industrial networking, investigates an implementation tool, and explains the role of zero trust<br><a href="https://www.admin-magazine.com/Archive/2025/85/Purdue-Model-for-industrial-networking?utm_source=mam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/Archive/202</span><span class="invisible">5/85/Purdue-Model-for-industrial-networking?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/PurdueModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PurdueModel</span></a> <a href="https://hachyderm.io/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://hachyderm.io/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://hachyderm.io/tags/tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tools</span></a> <a href="https://hachyderm.io/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/DigitalCeiling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalCeiling</span></a></p>
IT News<p>Critical CitrixBleed 2 vulnerability has been under active exploit for weeks - A critical vulnerability allowing hackers to bypass multifac... - <a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a></p>
Ars Technica News<p>Critical CitrixBleed 2 vulnerability has been under active exploit for weeks <a href="https://arstechni.ca/bJJZ" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechni.ca/bJJZ</span><span class="invisible"></span></a> <a href="https://c.im/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://c.im/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://c.im/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://c.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://c.im/tags/Biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Biz</span></a>&amp;IT <a href="https://c.im/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a></p>
ADMIN magazine<p>From the ADMIN Update newsletter: Learn how the tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations<br><a href="https://www.admin-magazine.com/Archive/2025/85/ASM-tools-and-strategies-for-threat-management?utm_source=mam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/Archive/202</span><span class="invisible">5/85/ASM-tools-and-strategies-for-threat-management?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/ASM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASM</span></a> <a href="https://hachyderm.io/tags/tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tools</span></a> <a href="https://hachyderm.io/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/AttackSurface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AttackSurface</span></a> <a href="https://hachyderm.io/tags/SaaS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SaaS</span></a></p>
UK<p><a href="https://www.europesays.com/uk/244121/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/244121/</span><span class="invisible"></span></a> China-linked attacker hit France’s critical infrastructure via trio of Ivanti zero-days last year <a href="https://pubeurope.com/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://pubeurope.com/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://pubeurope.com/tags/CybersecurityAndInfrastructureSecurityAgency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersecurityAndInfrastructureSecurityAgency</span></a>(cisa) <a href="https://pubeurope.com/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> <a href="https://pubeurope.com/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://pubeurope.com/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://pubeurope.com/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a> <a href="https://pubeurope.com/tags/France" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>France</span></a> <a href="https://pubeurope.com/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://pubeurope.com/tags/mandiant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mandiant</span></a> <a href="https://pubeurope.com/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://pubeurope.com/tags/ZeroDays" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDays</span></a></p>