cybersecurity

5281 readers
24 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
1
2
3
4
5
 
 

Dozens of government and university websites belonging to cities, towns, and public agencies across the country are hosting PDFs promoting AI porn apps, porn sites, and cryptocurrency scams; dozens more have been hit with a website redirection attacks which lead to animal vagina sex toy ecommerce pages, penis enlargement treatments, automatically-downloading Windows program files, and porn.

“Sex xxx video sexy Xvideo bf porn XXX xnxx Sex XXX porn XXX blue film Sex Video xxx sex videos Porn Hub XVideos XXX sexy bf videos blue film Videos Oficial on Instagram New Viral Video The latest original video has taken the internet by storm and left viewers in on various social media platforms ex Videos Hot Sex Video Hot Porn viral video,” reads the beginning of a three-page PDF uploaded to the website of the Irvington, New Jersey city government’s website.

Archive: http://archive.today/tgD57

6
13
Off-Topic Friday (self.cybersecurity)
submitted 3 days ago by shellsharks to c/cybersecurity
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

7
8
9
10
11
12
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

13
14
15
6
Off-Topic Friday (self.cybersecurity)
submitted 1 week ago by shellsharks to c/cybersecurity
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

16
 
 

cross-posted from: https://scribe.disroot.org/post/5953090

Archived version

Here is the original Cisa report: BRICKSTORM Backdoor

...

Chinese hackers are using a strain of malware to attack governments in several countries and maintain long-term access, according to U.S. and Canadian cybersecurity officials.

The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Canadian Centre for Cyber Security published an advisory on Thursday outlining the BRICKSTORM malware based off an analysis of eight samples taken from victim organizations.

...

“BRICKSTORM is a sophisticated and stealthy backdoor malware linked to PRC state-sponsored cyber actors,” said CISA Executive Assistant Director for Cybersecurity Nick Andersen.

The advisory includes indicators of compromise and detections organizations can use to tell if they have been impacted by the campaign involving the malware. The malware is used “for long-term persistence on victim systems,” according to U.S. agencies.

...

The goal of the campaign is to steal valuable intellectual property and sensitive data — with a particular focus on the email inboxes of senior company leaders, according to Mandiant. The company attributed the campaign to a threat actor they previously accused of abusing vulnerabilities in firewall products from tech company Ivanti.

...

17
 
 

Record-Breaking DDoS Attacks Mark 2025 Q3 as Aisuru Botnet Emerges

The Aisuru botnet dominated the DDoS threat landscape in Q3 2025, commanding an army of 1-4 million infected devices and launching unprecedented attacks that peaked at 29.7 Tbps and 14.1 billion packets per second[^1]. Cloudflare's autonomous systems blocked 8.3 million DDoS attacks during the quarter, averaging 3,780 attacks per hour - a 15% increase from Q2 and 40% year-over-year[^1].

The Rise of Aisuru

The botnet targeted telecommunications providers, gaming companies, hosting providers, and financial services, causing widespread Internet disruption even when organizations weren't direct targets[^1]. Parts of Aisuru are now offered as botnets-for-hire, enabling attackers to "inflict chaos on entire nations" for just hundreds to thousands of dollars[^1].

Attack Statistics

  • 1,304 hyper-volumetric attacks in Q3 alone (54% increase from Q2)
  • Attacks over 100 million packets per second up 189%
  • Attacks exceeding 1 Tbps increased 227%
  • 4% of HTTP attacks exceeded 1 million requests per second[^15]

Industry Impacts

DDoS attacks against AI companies surged 347% month-over-month in September 2025, coinciding with increased public concern over AI risks[^1]. The Mining, Minerals & Metals industry jumped 24 spots in target rankings amid EU-China tensions over rare earth minerals and EV tariffs[^1].

Geographic Trends

Indonesia maintained its position as the leading source of DDoS attacks globally, holding the top spot for a full year. The country's share of HTTP DDoS attack traffic has grown by 31,900% since 2021[^1].

Attack Types

UDP floods led network-layer attacks with a 231% quarterly increase, followed by DNS floods, SYN floods, and ICMP floods[^1]. Nearly 70% of HTTP DDoS attacks came from known botnets, with 20% originating from fake or headless browsers[^1].

[^1]: Cloudflare - Cloudflare's 2025 Q3 DDoS threat report
[^15]: Security Affairs - Cloudflare mitigates record 29.7 Tbps DDoS attack by the AISURU botnet

18
 
 

cross-posted from: https://lemmy.zip/post/54305624

Open source React executes malicious code with malformed HTML—no authentication needed.

19
20
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

21
 
 

Over the past week, we've identified and tracked an unprecedented 23 extensions which copy other popular extensions, update after publishing with malware, manipulate download counts, and use KNOWN attack signatures which have been in use for months. Many of these relate to Glassworm malware, but there could be mulitple campaigns at work also.

22
 
 

🎁 Here’s a little end-of-year gift backed with Sightings from Vulnerability-Lookup ! A small step into 2026.

The year is almost over, so we’ve wrapped up a fresh Sightings Forecast — looking at how sightings evolve across social platforms, code repositories, and structured feeds. All monitored through our tools[1] and enriched by our fantastic community[2].

👉 Read the full report:

https://www.vulnerability-lookup.org/2025/12/02/end-of-year-threat-intelligence-sightings-forecast/

The goal: track how sightings evolve over time and provide an adaptive short-term forecast for several key sources monitored by Vulnerability-Lookup.

Our methodology combines weekly historical trends with daily adaptive models. Depending on the underlying slope, we apply either a Logistic Growth model (for rising trends) or an Exponential Decay model (for declining activity).

🔍 Key takeaways

Social platforms like the Fediverse and Bluesky show highly event-driven, volatile patterns, reflecting real-time community discussions.

Structured sources such as MISP Projec, The Shadowserver Foundation, and Nuclei offer more stable and reliable signals, ideal for validated intelligence.

Early detection: Social sources provide fast but noisy signals. Not to ignore.

Reliability: Structured intelligence confirms and contextualizes threats.

Better planning: Adaptive forecasting enables informed prioritization and workload management.

Balanced visibility: Combining heterogeneous sources gives stronger situational awareness.

📚 References

💶🇪🇺 Funding

This work is part of the EU-funded FETTA initiative, strengthening cross-European collaboration on threat intelligence.

https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/how-to-participate/org-details/999999999/project/101128030/program/43152860/details

23
 
 

cross-posted from: https://mander.xyz/post/42887934

Web archive link

The accelerating cyber threats facing Ireland demands “an aggressive response” by the State, according to the country’s cyber bosses.

The National Cyber Security Centre (NCSC) said criminal cyber gangs and hackers, aligned to states like China and Russia, pose a “significant threat” to Ireland’s national security.

This is because Ireland is a host to some of the world’s largest tech providers and cloud computing facilities as well as the worsening geopolitical situation and the threat posed to Europe resulting from Russia’s war of aggression in Ukraine.

The centre said it “regularly observes state-aligned threat actors carrying out scanning and other reconnaissance activities” targeting Irish government and State-owned networks.

...

Publishing its 2025 National Cyber Risk Assessment, the NCSC said Ireland was at risk from cyber attacks on “shared critical infrastructure”, such as gas and electricity pipelines connecting Ireland to the UK and France.

...

24
 
 

cross-posted from: https://mander.xyz/post/42887732

Web archive link

Belgium has joined a growing list of countries banning Chinese generative AI tool DeepSeek from devices used by government officials and public servants after a cybersecurity agency raised concerns.

Federal public administration employees had until Monday to uninstall DeepSeek’s apps from all work devices, according to a note circulated by the ministry and reported in local media.

The minister for public action and modernisation, Vanessa Matz, announced the plan in September after receiving the results of an analysis by the Centre for Cybersecurity Belgium of the use of AI tools in the administration. The ban is preventive, according to the minister.

“Trust in the government rests on fundamental principles of prevention, protection of citizens’ personal data, and cybersecurity,” Matz said in a statement. “By banning the use of this system, we are demonstrating vigilance to ensure that our government departments remain a safe, secure, and exemplary environment.”

The government added that “risks to the protection of data transmitted to the DeepSeek AI tool” merit the precautionary ban, per a press release.

Other countries in Europe have taken similar steps: Czechia and the Netherlands barred the use of DeepSeek by government employees on work devices in July and February respectively. Italy, Australia, Taiwan, and South Korea have also announced measures to protect their citizens’ privacy and security.

...

25
view more: next ›