mstdn.games is one of the many independent Mastodon servers you can use to participate in the fediverse.
We are a gaming-focused space on Mastodon. We welcome everyone who enjoys any type of gaming - it doesn't just need to be video games. Let's build a diverse and inclusive community together!

Administered by:

Server stats:

452
active users

#solarwinds

0 posts0 participants0 posts today
jbz<p>🫠 Private equity to the rescue</p><p><a href="https://www.reuters.com/technology/private-equity-firm-turnriver-capital-take-solarwinds-private-44-billion-deal-2025-02-07/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reuters.com/technology/private</span><span class="invisible">-equity-firm-turnriver-capital-take-solarwinds-private-44-billion-deal-2025-02-07/</span></a></p><p><a href="https://indieweb.social/tags/solarwinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>solarwinds</span></a> <a href="https://indieweb.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://indieweb.social/tags/privateequity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privateequity</span></a></p>
Glyn Moody<p>Abandoned <a href="https://mastodon.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> S3 buckets can be reused in supply-chain attacks that would make <a href="https://mastodon.social/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> look 'insignificant' - <a href="https://www.theregister.com/2025/02/04/abandoned_aws_s3/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/02/04/aba</span><span class="invisible">ndoned_aws_s3/</span></a> "If someone were to take over those buckets, they could use them to feed malicious software into people's devices."</p>
Security Incidents<p>Avaya: Sicherheitsvorfall <a href="https://social.tchncs.de/tags/Datendiebstahl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datendiebstahl</span></a> <a href="https://social.tchncs.de/tags/Solarwinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solarwinds</span></a> <a href="https://social.tchncs.de/tags/Supply" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Supply</span></a> Chain <a href="https://social.tchncs.de/tags/TeamInfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TeamInfoSec</span></a> <a href="https://social.tchncs.de/tags/cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberangriff</span></a> <a href="https://www.security-incidents.de/sicherheitsvorfaelle/sicherheitsvorfall-avaya-US-7156.php" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security-incidents.de/sicherhe</span><span class="invisible">itsvorfaelle/sicherheitsvorfall-avaya-US-7156.php</span></a></p>
Security Incidents<p>Check Point: Sicherheitsvorfall <a href="https://social.tchncs.de/tags/Datendiebstahl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datendiebstahl</span></a> <a href="https://social.tchncs.de/tags/Solarwinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solarwinds</span></a> <a href="https://social.tchncs.de/tags/Supply" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Supply</span></a> Chain <a href="https://social.tchncs.de/tags/TeamInfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TeamInfoSec</span></a> <a href="https://social.tchncs.de/tags/cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberangriff</span></a> <a href="https://www.security-incidents.de/sicherheitsvorfaelle/sicherheitsvorfall-check-point-US-7157.php" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security-incidents.de/sicherhe</span><span class="invisible">itsvorfaelle/sicherheitsvorfall-check-point-US-7157.php</span></a></p>
Security Incidents<p>Mimecast: Sicherheitsvorfall <a href="https://social.tchncs.de/tags/Datendiebstahl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datendiebstahl</span></a> <a href="https://social.tchncs.de/tags/Solarwinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solarwinds</span></a> <a href="https://social.tchncs.de/tags/Supply" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Supply</span></a> Chain <a href="https://social.tchncs.de/tags/TeamInfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TeamInfoSec</span></a> <a href="https://social.tchncs.de/tags/cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberangriff</span></a> <a href="https://www.security-incidents.de/sicherheitsvorfaelle/sicherheitsvorfall-mimecast-US-7158.php" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security-incidents.de/sicherhe</span><span class="invisible">itsvorfaelle/sicherheitsvorfall-mimecast-US-7158.php</span></a></p>
Security Incidents<p>Unisys: Sicherheitsvorfall <a href="https://social.tchncs.de/tags/Datendiebstahl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datendiebstahl</span></a> <a href="https://social.tchncs.de/tags/Solarwinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solarwinds</span></a> <a href="https://social.tchncs.de/tags/Supply" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Supply</span></a> Chain <a href="https://social.tchncs.de/tags/TeamInfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TeamInfoSec</span></a> <a href="https://social.tchncs.de/tags/cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberangriff</span></a> <a href="https://www.security-incidents.de/sicherheitsvorfaelle/sicherheitsvorfall-unisys-US-7143.php" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security-incidents.de/sicherhe</span><span class="invisible">itsvorfaelle/sicherheitsvorfall-unisys-US-7143.php</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/SEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SEC</span></a> fined 4 companies for misleading disclosures about the impact of the <a href="https://infosec.exchange/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> attack<br><a href="https://securityaffairs.com/170125/laws-and-regulations/sec-fined-4-companies-misleading-disclosures-impact-solarwinds-attack.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/170125/law</span><span class="invisible">s-and-regulations/sec-fined-4-companies-misleading-disclosures-impact-solarwinds-attack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
mephisto<p>Are you fucking kidding me? <a href="https://social.netz.org/tags/Solarwinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solarwinds</span></a> harcoded credentials issue.. </p><p><a href="https://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">horizon3.ai/attack-research/cv</span><span class="invisible">e-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/</span></a></p><p>Why block resources rather than just removing hardcoded credentials from the Code? I don't get it.. </p><p><a href="https://social.netz.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.netz.org/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://social.netz.org/tags/problemb%C3%A4r" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>problembär</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/Kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kernel</span></a>, <a href="https://infosec.exchange/tags/Mozilla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mozilla</span></a> <a href="https://infosec.exchange/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a>&nbsp;and <a href="https://infosec.exchange/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> Web Help Desk bugs to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/169882/hacking/u-s-cisa-microsoft-windows-kernel-mozilla-firefox-solarwinds-web-help-desk-bugs-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/169882/hac</span><span class="invisible">king/u-s-cisa-microsoft-windows-kernel-mozilla-firefox-solarwinds-web-help-desk-bugs-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
trusty falxter 🧠<p><span class="h-card" translate="no"><a href="https://chaos.social/@HonkHase" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>HonkHase</span></a></span><br>Ah, <a href="https://social.tchncs.de/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> again and again via their <a href="https://social.tchncs.de/tags/supplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplyChain</span></a>. 🙄 Why do they still have customers?</p>
Manuel 'HonkHase' Atug<p>Major Cyber Incident: <a href="https://chaos.social/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a></p><p>released by EuRepoC | European Repository of Cyber Incidents</p><p>"The Russian state-integrated hacking group APT29/”Cozy Bear”/The Dukes used a <a href="https://chaos.social/tags/supplychain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychain</span></a> <a href="https://chaos.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> within SolarWinds Corp. to compromise multiple targets worldwide. It managed to inject a <a href="https://chaos.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> <a href="https://chaos.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> into a SolarWinds routine update file,which allowed it to escalate privileges and establish permanent access across the internal systems of the company’s customers"<br><a href="https://eurepoc.eu/publication/major-cyber-incident-solarwinds/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eurepoc.eu/publication/major-c</span><span class="invisible">yber-incident-solarwinds/</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> fixed critical <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> CVE-2024-28991 in Access Rights Manager<br><a href="https://securityaffairs.com/168456/security/solarwinds-fixed-rce-cve-2024-28991.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/168456/sec</span><span class="invisible">urity/solarwinds-fixed-rce-cve-2024-28991.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Manuel 'HonkHase' Atug<p>Hartkodierte Zugangsdaten gefährden <a href="https://chaos.social/tags/Solarwinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solarwinds</span></a> Web Help Desk</p><p>"Angreifer können unbefugt auf die Kundensupport-Software Web Help Desk von Solarwinds zugreifen und Daten manipulieren." <a href="https://www.heise.de/news/Erneut-kritische-Sicherheitsluecke-in-Solarwinds-Web-Help-Desk-geschlossen-9843636.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Erneut-kritische</span><span class="invisible">-Sicherheitsluecke-in-Solarwinds-Web-Help-Desk-geschlossen-9843636.html</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> fixed a hardcoded credential issue in Web Help Desk<br><a href="https://securityaffairs.com/167408/hacking/solarwinds-hardcoded-credential-flaw-web-help-desk.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/167408/hac</span><span class="invisible">king/solarwinds-hardcoded-credential-flaw-web-help-desk.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/WHD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WHD</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> Web Help Desk bug to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/167157/hacking/cisa-adds-solarwinds-web-help-desk-bug-to-its-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/167157/hac</span><span class="invisible">king/cisa-adds-solarwinds-web-help-desk-bug-to-its-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
TugaTech 🖥️<p>SolarWinds alerta para falha grave em Web Help Desk<br>🔗 <a href="https://tugatech.com.pt/t61813-solarwinds-alerta-para-falha-grave-em-web-help-desk" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tugatech.com.pt/t61813-solarwi</span><span class="invisible">nds-alerta-para-falha-grave-em-web-help-desk</span></a><br>...<br><a href="https://masto.pt/tags/grave" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>grave</span></a> <a href="https://masto.pt/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a> <a href="https://masto.pt/tags/solarwinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>solarwinds</span></a> <a href="https://masto.pt/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://masto.pt/tags/noticias" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>noticias</span></a> <a href="https://masto.pt/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://masto.pt/tags/tugatech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tugatech</span></a></p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a>: Critical RCE Bug Requires Urgent Patch </p><p><a href="https://www.darkreading.com/vulnerabilities-threats/solarwinds-critical-rce-bug-requires-urgent-patch" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/vulnerabilitie</span><span class="invisible">s-threats/solarwinds-critical-rce-bug-requires-urgent-patch</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> addressed a critical <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> in all Web Help Desk versions<br><a href="https://securityaffairs.com/167031/security/solarwinds-addressed-rce-whd.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/167031/sec</span><span class="invisible">urity/solarwinds-addressed-rce-whd.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/WHD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WHD</span></a></p>
Nemo_bis 🌈<p><span class="h-card" translate="no"><a href="https://mastodon.social/@tommorris" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tommorris</span></a></span> Wasn't <a href="https://mamot.fr/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrowdStrike</span></a> the answer to that question? "Avoid <a href="https://mamot.fr/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> by creating another SolarWinds with higher privileges on everyone's systems".</p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Adobe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Adobe</span></a> Commerce and <a href="https://infosec.exchange/tags/Magento" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Magento</span></a>, <a href="https://infosec.exchange/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SolarWinds</span></a> Serv-U, and <a href="https://infosec.exchange/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> vCenter Server bugs to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/165981/hacking/u-s-cisa-adds-adobe-commerce-and-magento-solarwinds-serv-u-and-vmware-vcenter-server-bugs-to-its-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/165981/hac</span><span class="invisible">king/u-s-cisa-adds-adobe-commerce-and-magento-solarwinds-serv-u-and-vmware-vcenter-server-bugs-to-its-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>