1. Bluesky Feeds /
  2. Sky Feeds /
  3. #cybersecurity

Posts with #cybersecurity from the whole network

Feed on Bluesky

Feeds Stats

  • 💙 Liked by 52 users
  • 📅 Updated about 2 years ago
  • ⚙️ Provider skyfeed.me

#cybersecurity Likes over time

Like count prediction
The feed #cybersecurity has not gained any likes in the last month.

Feed Preview for #cybersecurity

@dumbpasswordrules.bsky.social
about 1 hour ago
This dumb password rule is from Cigna. A max of 12 characters... Can't handle most symbols (only 5 supported). At least they have two factor auth via email or sms **sigh** dumbpasswordrules.com/sit… #password #passwords #infosec #cybersecurity #dumbpasswordrules
Cigna - Dumb Password Rules

dumbpasswordrules.com

Cigna - Dumb Password Rules

A max of 12 characters... Can't handle most symbols (only 5 supported). At least they have two factor auth via email or sms **sigh**

0
0
0
Scratch News Australia
@scratchnews.io
about 1 hour ago
Explore like a local, discover new places, find something new scratchnews.io is your place for #Australia & #NewZealand #tech #news updates Scratch News Australia 👉 scratchnews.io Most Popular 👉 scratchnews.io/page/1156 #startup #technology #software #security #agile #devops #cicd #cybersecurity
The image promotes the website scratchnews.io
A bright Melbourne, Australia, lane way with a brick wall and a graffiti artwork background. In the middle a retro 1970s TV screen is painted on the wall.A purple orange geometric pattern is on the screen, with the words "Scratch News Australia" in black and white. Wooden legs are positioned below the TV screen as if they are supporting the artwork on the wall. A group of people are gathered admiring the artwork.
0
0
0
Matthias Schulze
@percepticon.bsky.social
about 1 hour ago
Toxic trend: Another malware threat targets DeepSeek #cybersecurity #infosec
Toxic trend: Another malware threat targets DeepSeek

dlvr.it

Toxic trend: Another malware threat targets DeepSeek

Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users of all experience levels look for chatbot websites on search engines, and threat actors have started abusing the popularity of LLMs. We previously reported attacks with malware being spread under the guise of DeepSeek to attract victims. The malicious domains spread through X posts and general browsing. But lately, threat actors have begun using malvertising to exploit the demand for chatbots. For instance, we have recently discovered a new malicious campaign distributing previously unknown malware through a fake DeepSeek-R1 LLM environment installer. The malware is delivered via a phishing site that masquerades as the official DeepSeek homepage. The website was promoted in the search results via Google Ads. The attacks ultimately aim to install BrowserVenom, an implant that reconfigures all browsing instances to force traffic through a proxy controlled by the threat actors. This enables them to manipulate the victim’s network traffic and collect data. Phishing lure The infection was launched from a phishing site, located at https[:]//deepseek-platform[.]com. It was spread via malvertising, intentionally placed as the top result when a user searched for “deepseek r1”, thus taking advantage of the model’s popularity. Once the user reaches the site, a check is performed to identify the victim’s operating system. If the user is running Windows, they will be presented with only one active button, “Try now”. We have also seen layouts for other operating systems with slight changes in wording, but all mislead the user into clicking the button. Malicious website mimicking DeepSeek Clicking this button will take the user to a CAPTCHA anti-bot screen. The code for this screen is obfuscated JavaScript, which performs a series of checks to make sure that the user is not a bot. We found other scripts on the same malicious domain signaling that this is not the first iteration of such campaigns. After successfully solving the CAPTCHA, the user is redirected to the proxy1.php URL path with a “Download now” button. Clicking that results in downloading the malicious installer named AI_Launcher_1.21.exe from the following URL: https://r1deepseek-ai[.]com/gg/cc/AI_Launcher_1.21.exe. We examined the source code of both the phishing and distribution websites and discovered comments in Russian related to the websites’ functionality, which suggests that they are developed by Russian-speaking threat actors. Malicious installer The malicious installer AI_Launcher_1.21.exe is the launcher for the next-stage malware. Once this binary is executed, it opens a window that mimics a Cloudflare CAPTCHA. The second fake CAPTCHA This is another fake CAPTCHA that is loaded from https[:]//casoredkff[.]pro/captcha. After the checkbox is ticked, the URL is appended with /success, and the user is presented with the following screen, offering the options to download and install Ollama and LM Studio. Two options to install abused LLM frameworks Clicking either of the “Install” buttons effectively downloads and executes the respective installer, but with a caveat: another function runs concurrently: MLInstaller.Runner.Run(). This function triggers the infectious part of the implant.private async void lmBtn_Click(object sender, EventArgs e) { try { MainFrm.c__DisplayClass5_0 CS$8__locals1 = new MainFrm.c__DisplayClass5_0(); this.lmBtn.Text = "Downloading.."; this.lmBtn.Enabled = false; Action action; if ((action = MainFrm.O.__Run) == null) { action = (MainFrm.O.__Run = new Action(Runner.Run)); #

0
0
0
CyberLens Newsletter
@cyberlensnews.bsky.social
about 2 hours ago
Cracked at the Core: Ransomware gangs are targeting unpatched SimpleHelp flaws—using remote access against you. The result? Double extortion: data stolen and encrypted. Patch now or pay twice. #Cybersecurity #Ransomware #SimpleHelp #DoubleExtortion #Infosec cyberlens.beehiiv.com/p/c….
Cracked at the Core:  How Ransomware Gangs Exploit SimpleHelp Flaws for Double Extortion Schemes

cyberlens.beehiiv.com

Cracked at the Core: How Ransomware Gangs Exploit SimpleHelp Flaws for Double Extortion Schemes

Inside the Tactical Playbook of Threat Actors Weaponizing Remote Access Software Vulnerabilities to Orchestrate Multi-Layered Extortion Campaigns

0
0
1
CTI.FYI
@cti.fyi
about 3 hours ago
🚨New ransom group blog post!🚨 Group name: play Post title: S&H Express #ransomware #cti #threatintelligence #cybersecurity #infosec
0
0
1
Ransomware Victims
@intelvictims.bsky.social
about 3 hours ago
-ランサムウェア攻撃 アラート- 公開日時: 2025-06-15 00:43:06.916033 被害企業: S&H Express ランサムグループ: play #Cybersecurity #サイバーセキュリティ #Ransomware #ランサムウェア
0
0
1
noyanlimited
@noyanlimited.bsky.social
about 4 hours ago
Stay Safe Online Protect your data: use strong passwords, update software, and avoid suspicious links. #cybersecurity #safebrowsing #onlinesafety #dataprotection #techtips #2025trends #securityfirst #internetsecurity
0
0
1
Ninja Owl
@ninjaowl.ai
about 4 hours ago
Researchers Detail Zero-Click Copilot Exploit 'EchoLeak' #cybersecurity #hacking #news #infosec #security #technology #privacy www.darkreading.com/...
0
0
0
Timothy King
@tk1ng.bsky.social
about 5 hours ago
"the growing accessibility and affordability of #AI tools such as open source large language models (LLMs) are making it faster, cheaper, and easier for threat actors to identify and exploit vulnerabilities" #CyberSecurity www.darkreading.com/cyber….
How Organizations Approach Security in the AI Era

www.darkreading.com

How Organizations Approach Security in the AI Era

LevelBlue research analyzes the rise of AI-powered threats, organizational preparedness, and the executive mindset around AI and cyber resilience.

0
0
1
HackNotice
@hacknotice.bsky.social
about 5 hours ago
The McCracken vs. French Ministry Hack: 40,000 Records Breached! #DataBreach #CyberSecurity #Hacking
Video thumbnail
Play button
0
0
0
Denny Cherry & Associates Consulting
@dcac.com
about 5 hours ago
buff.ly/48ekqvy #Prevention Versus #Clean-Up of a #Data Breach by @mrdenny.com via @inc.com Join Denny as he talks about the pain of a data breach and why companies need to protect customer information. #security #ITsecurity #cloud #SMB #cybersecurity #inc5000
A long exposure picture of a big city so everything looks fast.
0
0
1
Ransomware Victims
@intelvictims.bsky.social
about 5 hours ago
-ランサムウェア攻撃 アラート- 公開日時: 2025-06-14 22:32:06.351088 被害企業: Rollex ランサムグループ: play #Cybersecurity #サイバーセキュリティ #Ransomware #ランサムウェア
0
0
1
CTI.FYI
@cti.fyi
about 5 hours ago
🚨New ransom group blog post!🚨 Group name: play Post title: Rollex #ransomware #cti #threatintelligence #cybersecurity #infosec
0
0
1
2rZiKKbOU3nTafniR2qMMSE0gwZ
@2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy
about 3 hours ago
Cosmic Downtime Simulation for Blockchain Resilience: Stress Testing the Immutable in a Mutable… By Aditiya Widodo Putra, Cybersecurity & Blockchain Consultant Continue reading on Medium » #science #cybersecurity #business #technology #blockchain Origin | Interest | Match
Cosmic Downtime Simulation for Blockchain Resilience: Stress Testing the Immutable in a Mutable…

medium.com

Cosmic Downtime Simulation for Blockchain Resilience: Stress Testing the Immutable in a Mutable…

By Aditiya Widodo Putra, Cybersecurity & Blockchain Consultant

0
0
1