TuxPanik's Avatar

TuxPanik

@tuxpanik.bsky.social

Head of CERT & PSIRT #infosec #DFIR #malware #pentest #legal #CTI #MISP #OpenCTI #TheHive opinions are my own

65 Followers  |  100 Following  |  2,412 Posts  |  Joined: 14.12.2024  |  2.0576

Latest posts by tuxpanik.bsky.social on Bluesky

Preview
La France va devenir le premier actionnaire de l'opérateur européen de satellites Eutelsat Eutelsat, concurrent de l'entreprise Starlink d'Elon Musk, va voir l'État français devenir son premier actionnaire à la faveur d'un réinvestissement de 717 millions d'euros dans le groupe européen, deuxième opérateur mondial de satellites en orbite basse.

La France va devenir le premier actionnaire de l'opérateur européen de satellites Eutelsat

19.06.2025 20:18 — 👍 21    🔁 3    💬 0    📌 0
Preview
L’adoption de DMARC n’est pas assez généralisée, ce qui favorise les attaques de phishing - IT SOCIAL Selon une nouvelle étude, plus de 90 % des principaux domaines de messagerie électronique dans le monde sont vulnérables à l’usurpation d’identité. Cette faille permet aux cybercriminels de lancer…

⚡L’adoption de DMARC n’est pas assez généralisée, ce qui favorise les attaques de phishing

13.06.2025 11:09 — 👍 0    🔁 1    💬 0    📌 0
Preview
Éducation nationale : Stormous semble avoir constitué une « combolist » | LeMagIT Le groupe malveillant Stormous vient de revendiquer une cyberattaque contre les systèmes de l’éducation nationale. L’échantillon de données publié pour le moment suggère la création d’une liste…

💡 L'authentification à facteurs multiples (#MFA) n'est aujourd'hui plus une option.
Mais il faut aussi (ré)apprendre à fermer sa session, à se déconnecter d'un service Web après usage, avant de fermer la fenêtre ou l'onglet de son navigateur.

www.lemagit.fr/actualites/3...

12.06.2025 10:28 — 👍 1    🔁 1    💬 0    📌 0
Post image

#VIGINUM publie avec les contributions de partenaires internationaux, un rapport sur African Initiative, une agence de presse russe, pensée comme l'un des principaux vecteurs de la réarticulation du dispositif d’influence de la Russie en Afrique post-Prigojine ➡️ www.sgdsn.gouv.fr/publications...

12.06.2025 12:11 — 👍 20    🔁 13    💬 0    📌 1
Preview
Hack of Contractor Was at Root of Massive Federal Data Breach A software company that handles sensitive data for nearly every US federal agency was the victim of a cyber breach earlier this year due to a "major

Two rogue employees from IT company Opexus have stolen data and destroyed over 30 US government databases

www.insurancejournal.com/news/nationa...

22.05.2025 12:31 — 👍 11    🔁 10    💬 0    📌 0
Preview
UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware Talos has observed exploitation of CVE-2025-0994 in the wild by UAT-6382, a Chinese-speaking threat actor, who then deployed malware payloads via TetraLoader.

Cisco Talos says a group tracked as UAT-6382 has used a recent Trimble CityWorks zero-day (CVE-2025-0944) to breach local governing bodies in the US

blog.talosintelligence.com/uat-6382-exp...

22.05.2025 12:54 — 👍 8    🔁 2    💬 0    📌 0
Post image

La victimologie de l'infostealer Lumma. Graphique Microsoft.

22.05.2025 16:20 — 👍 4    🔁 3    💬 1    📌 0
Post image Post image

Looks like there's a DanaBot botnet takedown happening tomorrow

😂

22.05.2025 20:41 — 👍 3    🔁 1    💬 1    📌 0
Preview
Modèle de Politique de Sécurité des Systèmes d’Information pour l’IA - NoLimitSecu Episode #502 Dans cet épisode, Michel Dubois nous parle d’un document de référence réalisé par le CLUSIF pouvant servir de base à une Politique de Sécurité des Systèmes d’Information (PSSI) dédiée à l...

#Podcast #Cybersécurité

Épisode #502 : un modèle de PSSI pour l'IA (publié par le CLUSIF), avec Michel Dubois

www.nolimitsecu.fr/modele-de-po...

19.05.2025 08:42 — 👍 5    🔁 5    💬 0    📌 0
Preview
Operation RoundPress targeting high-value webmail servers ESET researchers uncover a Russia-aligned espionage operation that they named RoundPress and that targets webmail servers via XSS vulnerabilities.

ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities | www.welivesecurity.com/en/eset-rese... @esetofficial.bsky.social

15.05.2025 11:16 — 👍 21    🔁 7    💬 0    📌 0
Post image

This DTEX report on North Korea's hacking capabilities, along with Viginum's Russian info op report from last week, are probably the best reports of the year so far

You MUST read it!

PDF: reports.dtexsystems.com/DTEX-Exposin...

15.05.2025 08:52 — 👍 22    🔁 12    💬 0    📌 0
Original post on cyberplace.social

Reupping this thread - remember to patch both #ESXicape and CVE-2025-22230 in VMware Tools.

The four vulns chained together allow full hypervisor escape from a Windows VM, without needing admin rights, gaining full SAN storage access to all VMs from one host - including to backups.

I […]

14.05.2025 18:48 — 👍 1    🔁 2    💬 0    📌 0
Preview
Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Patch Tuesday: Microsoft patches at least 70 security bugs and flagged five zero-days in the “exploitation detected” category.

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
www.securityweek.com/zero-day-att...

#Infosec #Security #Cybersecurity #CeptBiro #ZeroDayAttacks #Microsoft #PatchTuesday

13.05.2025 20:25 — 👍 0    🔁 1    💬 0    📌 0
 Microsoft’s May 2025 Patch Tuesday fixes 73 vulnerabilities, including 5 zero-days actively exploited in the wild and 6 critical flaws.

Microsoft’s May 2025 Patch Tuesday fixes 73 vulnerabilities, including 5 zero-days actively exploited in the wild and 6 critical flaws.

🚨 Microsoft’s May 2025 Patch Tuesday fixes 73 vulnerabilities, including 5 zero-days actively exploited in the wild and 6 critical flaws. windows101tricks.com/microsoft-pa...
💻 Windows users: update now to stay secure.
#CyberSecurity #PatchTuesday #Microsoft #ZeroDay #Windows11 #windows10 #technews

13.05.2025 20:36 — 👍 1    🔁 1    💬 0    📌 0
Preview
Détection vs Recherche de Compromissions : La discussion continue - NoLimitSecu Épisode #502 – Détection vs Recherche : La discussion continue (épisode #491) Avec Stéfan LE BERRE

#Podcast #Cybersécurité

Épisode #501 : détection vs. recherche de compromissions (suite de l'épisode #491), avec @heurs.bsky.social

www.nolimitsecu.fr/detection-vs...

12.05.2025 06:38 — 👍 5    🔁 7    💬 0    📌 0
Preview
Threat Analysis: SAP Vulnerability in the Wild by Chinese Threat Actor Forescout’s Vedere Labs research and threat hunting team analyzes SAP vulnerability (CVE-2025-31324) in the wild.

A Chinese threat actor that Forescout tracks as Chaya_004 is behind a recent SAP NetWeaver zero-day (CVE-2025-31324)

www.forescout.com/blog/threat-...

08.05.2025 19:14 — 👍 4    🔁 4    💬 0    📌 0
Preview
Conti Ransomware Gang Rank EDR Solutions Based on Ease of Evasion | CyberMaxx Conti ransomware gang recently published a list of EDR solutions based on how easy they are to bypass during active intrusions.

Ransomware group ranks EDR/Anti-Malware products. Microsoft in the LOL Tier is surprising. Seems like a great result for CrowdStrike customers.

01.05.2025 19:57 — 👍 8    🔁 5    💬 0    📌 0
Preview
Amazon, CrowdStrike, Google and Palo Alto Networks claim no change to threat intel sharing under Trump Top security leaders at some of the largest tech and cybersecurity vendors said public-private collaborative work continues, despite budget cuts and personnel changes.

Amazon, CrowdStrike, Google and Palo Alto Networks claim no change to threat intel sharing under Trump. Top security leaders at some of the largest tech and cybersecurity vendors said public-private collaborative work continues, despite budget cuts and personnel changes. via @mattkapko.com

02.05.2025 21:27 — 👍 5    🔁 5    💬 0    📌 1
Source

🇯🇵 Hitachi Vantara (hitachivantara.com) victime d'une cyberattaque autour du 26 avril 2025.
👉 https://www.ransomware.live/#/recentcyberattacks

28.04.2025 20:14 — 👍 1    🔁 1    💬 0    📌 0
Preview
Hitachi Vantara takes servers offline after Akira ransomware attack Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was forced to take servers offline over the weekend to contain an Akira ransomware attack.

Takes a fairly big ransomware attack to break through all the noise…this definitely qualifies.

via @bleepingcomputer.com

28.04.2025 19:42 — 👍 3    🔁 3    💬 1    📌 0
Post image

Did you know that there is a monument to NotPetya in Moscow? It was installed by INVITRO, a Russian medical firm & one of the victims of the 2017 global attack initially aimed at Ukraine. INVITRO's PR goal was to remind the world that it knows how to fight viruses

27.04.2025 10:38 — 👍 19    🔁 14    💬 1    📌 1

Fortinet's security team has spotted a new Mirai-based IoT botnet in the wild.

They named this one RustoBot because it's coded in Rust.

So far, the botnet only targets TOTOLINK routers.

www.fortinet.com/blog/threat-...

26.04.2025 22:43 — 👍 12    🔁 3    💬 2    📌 0
Preview
Attacks against Teltonika Networks SMS Gateways - SANS Internet Storm Center Attacks against Teltonika Networks SMS Gateways, Author: Johannes Ullrich

Threat actors are hacking Teltonika SMS gateways in what appears to be massive SMS spam campaigns.

Attackers are targeting devices that still use their default login credentials of user1/user_pass.

isc.sans.edu/diary/rss/31...

26.04.2025 22:44 — 👍 23    🔁 8    💬 2    📌 1

Web browser Brave has open-sourced Cookiecrumbler, a tool to detect and block cookie consent banners

github.com/brave/cookie...

brave.com/privacy-upda...

25.04.2025 19:49 — 👍 16    🔁 4    💬 0    📌 0
Preview
CVE-2025-24054, NTLM Exploit in the Wild - Check Point Research Key Points Introduction NTLM (New Technology LAN Manager) is a suite of authentication protocols developed by Microsoft to verify user identities and protect the integrity and confidentiality of netwo...

Check Point published a write-up of CVE-2025-24054, an NTLM leak that Microsoft patched last month.

The company says the vulnerability is now being exploited in the wild, with one campaign targeting government and private institutions in Poland and Romania.

research.checkpoint.com/2025/cve-202...

17.04.2025 09:17 — 👍 8    🔁 8    💬 1    📌 1
Preview
GCVE.eu GCVE: Global CVE Allocation SystemThe Global CVE (GCVE) allocation system is a new, decentralized approach to vulnerability identification and numbering, designed to improve flexibility, scalability, and autonomy for participating entities. While remaining compatible with the traditional CVE system, GCVE introduces GCVE Numbering Authorities (GNAs). GNAs are independent entities that can allocate identifiers without relying on a centralised block distribution system or rigid policy enforcement. Explore About FAQ News Contact

Another effort - https://gcve.eu/ Global CVE Allocation System

16.04.2025 09:14 — 👍 14    🔁 6    💬 0    📌 1
Preview
Patrowl, prix du FIC 2025 - NoLimitSecu Episode #498 consacré à la société Patrowl, lauréate du Grand Prix de la Startup au FIC 2025. Avec Vladimir Kolla, Florent Montel, et Nicolas Mattiocco

#Podcast #Cybersécurité

Épisode #498 consacré à la société @patrowl.bsky.social, lauréate du Grand Prix de la Startup au FIC 2025.

Avec Vladimir Kolla, Florent Montel, et Nicolas Mattiocco

www.nolimitsecu.fr/patrowl-prix...

14.04.2025 07:30 — 👍 5    🔁 5    💬 0    📌 0
Post image

Europol has published a report looking at all the ways it has seen criminal groups abuse biometric systems

www.europol.europa.eu/publication-...

08.04.2025 18:43 — 👍 62    🔁 25    💬 2    📌 0

If everyone who has ever lost AirPods could give a like, it would make me feel a little bit better 😢

09.04.2025 22:27 — 👍 3    🔁 0    💬 0    📌 0
Preview
CentreStack RCE exploited as zero-day to breach file sharing servers Hackers exploited a vulnerability in Gladinet CentreStack's secure file-sharing software as a zero-day since March to breach storage servers

This feels like another Cl0P operation…

09.04.2025 20:22 — 👍 6    🔁 2    💬 0    📌 0

@tuxpanik is following 20 prominent accounts