flipboard.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Welcome to Flipboard on Mastodon. A place for our community of curators and enthusiasts to inform and inspire each other. If you'd like to join please request an invitation via the sign-up page.

Administered by:

Server stats:

1.2K
active users

#backdoor

12 posts12 participants1 post today
OTX Bot<p>BPFDoor Malware Uses BPF to Evade Detection and Control Linux Servers</p><p>BPFDoor is a stealthy, advanced backdoor malware that targets Linux systems by<br>abusing a powerful technology known as BPF (Berkeley Packet Filter). BPF is<br>normally used in cybersecurity tools for monitoring and filtering network traffic<br>efficiently, especially in cloud, telecom, finance, and container based<br>environments. It's also used by tools like Cilium, Falco, and Tracee for visibility<br>and threat detection. However, when used maliciously, BPF gives attackers the<br>ability to bypass firewalls and hide inside systems, making BPFDoor very hard<br>to detect.</p><p>Pulse ID: 67ff166c04a6a92ca5ef55f5<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67ff166c04a6a92ca5ef55f5" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67ff1</span><span class="invisible">66c04a6a92ca5ef55f5</span></a> <br>Pulse Author: cryptocti<br>Created: 2025-04-16 02:31:08</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Telecom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telecom</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/cryptocti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocti</span></a></p>
Rene Robichaud<p>Chinese snoops use stealth RAT to backdoor US orgs – still active last week<br><a href="https://www.theregister.com/2025/04/15/chinese_spies_backdoored_us_orgs/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/04/15/chi</span><span class="invisible">nese_spies_backdoored_us_orgs/</span></a></p><p><a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CeptBiro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CeptBiro</span></a> <a href="https://mastodon.social/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> <a href="https://mastodon.social/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://mastodon.social/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> <a href="https://mastodon.social/tags/USorgs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USorgs</span></a></p>
OTX Bot<p>Renewed APT29 Phishing Campaign Against European Diplomats</p><p>A sophisticated phishing campaign targeting European diplomatic entities has been uncovered, attributed to the Russia-linked threat group APT29. The attackers impersonate a major European foreign affairs ministry, sending fake invitations to wine tasting events. The campaign employs a new loader called GRAPELOADER, which is used for initial reconnaissance and payload delivery. Additionally, a new variant of the WINELOADER backdoor has been discovered, likely used in later stages of the attack. Both malware components share similarities in code structure and obfuscation techniques. The campaign focuses on European diplomatic targets, including non-European embassies in Europe, with some indications of limited targeting outside the region.</p><p>Pulse ID: 67feaa2e6c9ebbb325106d44<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67feaa2e6c9ebbb325106d44" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67fea</span><span class="invisible">a2e6c9ebbb325106d44</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-15 18:49:18</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/APT29" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT29</span></a> <a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Nonilex<p>While NPR was unable to recover the code for that project, the name itself suggests that Wick could have been designing a <a href="https://masto.ai/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a>, or "Bdoor," to extract files from <a href="https://masto.ai/tags/NLRB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NLRB</span></a>'s internal case management system, known as NxGen, acc/to several <a href="https://masto.ai/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> experts who reviewed Berulis' conclusions.</p><p>…NxGen is an internal system that was designed specifically for the NLRB in-house, acc/to several of the engineers who created the tool….</p><p><a href="https://masto.ai/tags/criminal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>criminal</span></a> <a href="https://masto.ai/tags/law" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>law</span></a> <a href="https://masto.ai/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> <a href="https://masto.ai/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://masto.ai/tags/DOGE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOGE</span></a> <a href="https://masto.ai/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://masto.ai/tags/NationalSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationalSecurity</span></a></p>
Pyrzout :vm:<p>Fortinet Issues Fixes After Attackers Bypass Patches to Maintain Access <a href="https://hackread.com/fortinet-fixe-attackers-bypass-patches-maintain-access/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/fortinet-fixe-att</span><span class="invisible">ackers-bypass-patches-maintain-access/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> <a href="https://social.skynetcloud.site/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p>
Ruben Borg Nielsen<p><span class="h-card" translate="no"><a href="https://mastodon.social/@nixCraft" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nixCraft</span></a></span> and what good is all of our end-to-end encryption if one of the ends will just spew the information into AI training anyway.</p><p>All these governments trying to fight encryption in order to improve law enforcement and all it took was for <a href="https://hachyderm.io/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> to just install the biggest <a href="https://hachyderm.io/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> in history right into their OS.</p><p>It amazes me that a single soul thought this was a good idea.</p><p>Incentive to switch to Linux, for sure, but it won’t solve anything while the people we communicate with are on <a href="https://hachyderm.io/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> 🙁</p>
Hackread.com<p>Hackers exploit Fortinet flaws to plant stealth backdoors on FortiGate devices, maintaining access even after patches. </p><p>Read: <a href="https://hackread.com/fortinet-fixe-attackers-bypass-patches-maintain-access/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/fortinet-fixe-att</span><span class="invisible">ackers-bypass-patches-maintain-access/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://mstdn.social/tags/FortiGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiGate</span></a> <a href="https://mstdn.social/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://mstdn.social/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a></p>
Frascote<p>"Em 2022, foram identificadas vulnerabilidades nos robôs hospitalares Aethon TUG que permitiam o controle remoto desses dispositivos. Isso poderia levar a incidentes graves, como a entrega de medicamentos errados ou a interrupção de procedimentos médicos. Além disso, a falta de autenticação e autorização adequadas facilitava o acesso não autorizado, e a comunicação insegura permitia a interceptação ou manipulação de dados."</p><p>A descoberta dessas vulnerabilidades foi feita por uma empresa norte-americana especializada em cibersegurança na área hospitalar. </p><p>E o Brasil ?????</p><p>O Brasil não pode depender de empresas estrangeiras, principalmente de países que irão exportar seus robôs domésticos em massa! É necessário urgentemente, criar equipes para INSPECIONAR cada robô antes que eles adentrem os lares! Imagine milhares ou milhões de humanoides que do nada começam a agredir pessoas e destruir cidades?</p><p>Leia mais:<br><a href="https://www.internationalit.com/post/jekyllbot-5-vulnerabilidades-permitem-hacking-remoto-de-robôs-hospitalares" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">internationalit.com/post/jekyl</span><span class="invisible">lbot-5-vulnerabilidades-permitem-hacking-remoto-de-robôs-hospitalares</span></a></p><p><a href="https://techhub.social/tags/AntiColonialismoRobotico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AntiColonialismoRobotico</span></a> <a href="https://techhub.social/tags/SoberaniaDigital" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoberaniaDigital</span></a> <a href="https://techhub.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> <a href="https://techhub.social/tags/robotica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>robotica</span></a></p>
PrivacyDigest<p>Florida’s New <a href="https://mas.to/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> Bill Says the Quiet Part Out Loud and Demands an <a href="https://mas.to/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mas.to/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> <br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/florida" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>florida</span></a> <a href="https://mas.to/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://www.eff.org/deeplinks/2025/04/floridas-new-social-media-bill-says-quiet-part-out-loud-and-demands-encryption" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eff.org/deeplinks/2025/04/flor</span><span class="invisible">idas-new-social-media-bill-says-quiet-part-out-loud-and-demands-encryption</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Florida" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Florida</span></a>’s New <a href="https://mastodon.thenewoil.org/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> Bill Says the Quiet Part Out Loud and Demands an <a href="https://mastodon.thenewoil.org/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.thenewoil.org/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a></p><p><a href="https://www.eff.org/deeplinks/2025/04/floridas-new-social-media-bill-says-quiet-part-out-loud-and-demands-encryption" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eff.org/deeplinks/2025/04/flor</span><span class="invisible">idas-new-social-media-bill-says-quiet-part-out-loud-and-demands-encryption</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>politics</span></a></p>
OTX Bot<p>Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers</p><p>Mandiant discovered China-nexus espionage group UNC3886 deploying custom backdoors on Juniper Networks' Junos OS routers in mid-2024. The actor used TINYSHELL-based backdoors with various capabilities, including active and passive functions and log disabling. UNC3886 demonstrated advanced system knowledge, bypassing Junos OS security measures and injecting malicious code into legitimate processes. The group focused on maintaining long-term network access, targeting defense, technology, and telecommunication organizations in the US and Asia. This activity highlights the ongoing threat of China-nexus actors compromising networking infrastructure with sophisticated malware ecosystems.</p><p>Pulse ID: 67f93853d64af2b80560d124<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67f93853d64af2b80560d124" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67f93</span><span class="invisible">853d64af2b80560d124</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-11 15:42:11</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Asia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Asia</span></a> <a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Edge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Edge</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/Mandiant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mandiant</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/Telecom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telecom</span></a> <a href="https://social.raytec.co/tags/Telecommunication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telecommunication</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Operation Sea Elephant: The Dying Walrus Wandering the Indian Ocean</p><p>The CNC group, with South Asian origins, has been targeting domestic teachers, students, and research institutions. Their operation, named 'sea elephant', aims to spy on scientific research achievements in the ocean field. The group employs various tactics, including spear-phishing emails, IM software exploitation, and customized plug-ins. Their malware includes remote command execution backdoors, USB flash drive propagation tools, keyloggers, and file stealers. The attackers use GitHub APIs and steganographic techniques to avoid detection. The operation's focus on ocean-related research suggests a nation's determination to dominate the Indian Ocean region. Additionally, a related campaign, UTG-Q-011, targets areas such as laser science and aerospace.</p><p>Pulse ID: 67f8130ae540cbf2f4076329<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67f8130ae540cbf2f4076329" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67f81</span><span class="invisible">30ae540cbf2f4076329</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-10 18:50:50</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Asia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Asia</span></a> <a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/India" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>India</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/KeyLogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyLogger</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RemoteCommandExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteCommandExecution</span></a> <a href="https://social.raytec.co/tags/SouthAsia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SouthAsia</span></a> <a href="https://social.raytec.co/tags/SpearPhishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpearPhishing</span></a> <a href="https://social.raytec.co/tags/USB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USB</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Frascote<p>A introdução de grande quantidade de robôs humanoides domésticos importados, com backdoors de fábrica ocultos e não divulgados, pode trazer uma série de perigos para um país:</p><p>- Ataques Físicos: Com acesso via backdoor, os robôs poderiam ser reprogramados para agredir pessoas, quebrar objetos ou causar acidentes domésticos, como derrubar móveis pesados ou manipular eletrodomésticos de forma perigosa.</p><p>- Sabotagem: Milhares ou milhões de robôs poderiam ser usados simultaneamente para interromper serviços essenciais, como cortar energia, danificar sistemas de aquecimento ou bloquear acessos, criando caos em larga escala.</p><p>- Armamento Improvisado: Robôs com força física significativa poderiam ser transformados em armas, utilizando ferramentas domésticas (facas, martelos) ou sua própria estrutura para atacar indivíduos ou infraestruturas críticas dentro das casas.</p><p><a href="https://techhub.social/tags/AntiColonialismoRobotico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AntiColonialismoRobotico</span></a> <a href="https://techhub.social/tags/SoberaniaDigital" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoberaniaDigital</span></a> <a href="https://techhub.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> <a href="https://techhub.social/tags/robotica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>robotica</span></a></p>
Frascote<p>Cão-robô doméstico Unitree Go1 contém um backdoor não documentado, que permite ao fabricante — ou a qualquer pessoa que possua a chave de API correta — obter controle remoto total sobre o robô por meio do serviço de acesso remoto CloudSail. Esse controle inclui acesso às câmeras, movimentação e outras funcionalidades, tudo sem o conhecimento ou consentimento do usuário.</p><p>A "vulnerabilidade" foi catalogada como CVE-2025-2894. </p><p><a href="https://www.cisoadvisor.com.br/caes-robos-tem-backdoor-acessivel-com-chave-de-api/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisoadvisor.com.br/caes-robos-</span><span class="invisible">tem-backdoor-acessivel-com-chave-de-api/</span></a></p><p><a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> <a href="https://techhub.social/tags/robot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>robot</span></a> <a href="https://techhub.social/tags/SoberaniaDigital" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoberaniaDigital</span></a> <a href="https://techhub.social/tags/AntiColonialismoRobotico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AntiColonialismoRobotico</span></a></p>
Tuta<p>Sweden wants to <a href="https://mastodon.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> <a href="https://mastodon.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a>. But we, together with 230+ orgs, are saying no.</p><p><a href="https://mastodon.social/tags/NoToBackdoors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoToBackdoors</span></a> 💪</p><p>Read our open letter to the Swedish Riksdag: 👉 </p><p><a href="https://tuta.com/blog/open-letter-sweden-encryption" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tuta.com/blog/open-letter-swed</span><span class="invisible">en-encryption</span></a></p>
Snow :debian: :gnu: :matrix:<p><a href="https://snowfan.masto.host/tags/Europa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europa</span></a>.</p><p>Lunedì scorso è stato presentato il piano <a href="https://snowfan.masto.host/tags/ProtectEU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProtectEU</span></a> </p><p>Entro il 2025 verrà sviluppata una tabella di marcia per consentire un accesso legale ed efficace ai dati da parte delle forze dell’ordine</p><p>Non esiste una <a href="https://snowfan.masto.host/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> “solo per i buoni”: una volta creata, può essere sfruttata da chiunque riesca a trovarla. E soprattutto, apre un varco non solo nei dispositivi, ma in uno dei principi fondamentali degli esseri umani: il diritto alla riservatezza.</p><p><a href="https://www.redhotcyber.com/post/le-backdoor-di-stato-stanno-arrivando-ma-questa-volta-con-il-timbro-ue/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/le-backdo</span><span class="invisible">or-di-stato-stanno-arrivando-ma-questa-volta-con-il-timbro-ue/</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a>’s demand for <a href="https://mastodon.thenewoil.org/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://mastodon.thenewoil.org/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> should not be heard in secret, says court</p><p><a href="https://techcrunch.com/2025/04/07/uk-demand-for-apple-backdoor-should-not-be-heard-in-secret-says-court/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/04/07/uk-d</span><span class="invisible">emand-for-apple-backdoor-should-not-be-heard-in-secret-says-court/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>politics</span></a> <a href="https://mastodon.thenewoil.org/tags/iCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iCloud</span></a> <a href="https://mastodon.thenewoil.org/tags/ADP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ADP</span></a></p>
Frascote<p>Brasil precisa urgentemente regulamentar a entrada de robôs domésticos e criar uma equipe especial para INSPECIONAR esses dispositivos em busca de backdoors ocultos de fábrica, que não são informados pelos fabricantes. </p><p>Esses robôs irão habitar várias casas daqui a alguns anos e, caso venham com backdoor não-divulgado, poderão ser controlados em massa por atores mal-intencionados, que podem usar os robôs para atacarem pessoas, casas, edifícios, veículos, postes de luz, além de provocar intencionalmente acidentes e incêndios, enfim, causar a maior destruição dentro do país. </p><p>Robô com backdoor oculto pelo fabricante é como infiltrar inimigos no país e, depois de um tempo, ordenar esses inimigos a destruirem o país por dentro. É algo extremamente grave, uma questão séria de soberania nacional!</p><p><a href="https://techhub.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> <a href="https://techhub.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://techhub.social/tags/robots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>robots</span></a> <a href="https://techhub.social/tags/seguranca" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>seguranca</span></a> <a href="https://techhub.social/tags/SoberaniaDigital" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoberaniaDigital</span></a> <a href="https://techhub.social/tags/AntiColonialismoRobotico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AntiColonialismoRobotico</span></a></p>
Alexandre Borges<p>Auto-color - Linux backdoor :</p><p><a href="https://zw01f.github.io/malware%20analysis/auto-color/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zw01f.github.io/malware%20anal</span><span class="invisible">ysis/auto-color/</span></a></p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
Glyn Moody<p>UK’s demand for <a href="https://mastodon.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://mastodon.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> should not be heard in secret, says court - <a href="https://techcrunch.com/2025/04/07/uk-demand-for-apple-backdoor-should-not-be-heard-in-secret-says-court/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/04/07/uk-d</span><span class="invisible">emand-for-apple-backdoor-should-not-be-heard-in-secret-says-court/</span></a> "This is the first public acknowledgement that the case exists, though specific details of the case were withheld." <a href="https://mastodon.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a></p>