GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Untitled attachment

Download link

https://cyberplace.social/system/media_attachments/files/111/887/119/203/770/408/original/30c04177ae6c46f0.jpeg

Notices where this attachment appears

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 07-Feb-2024 08:27:02 JST Kevin Beaumont Kevin Beaumont

    Two days ago, mass exploitation of Cisco AnyConnect CVE-2020-3580 began, per @greynoise data. It’s another Positive Technologies vuln.

    77 IP addresses are hammering the internet now. https://viz.greynoise.io/query?gnql=tags%3A%22Cisco%20ASA%20XSS%20Attempt%22

    This isn’t to be confused with the other 2020 AnyConnect CVE being used by Akira ransomware group.

    There are now three Cisco ASA vulns being used by Akira and Lockbit. #threatintel

    In conversation about a year ago from cyberplace.social permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.