flipboard.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Welcome to Flipboard on Mastodon. A place for our community of curators and enthusiasts to inform and inspire each other. If you'd like to join please request an invitation via the sign-up page.

Administered by:

Server stats:

1.2K
active users

#proxy

7 posts5 participants0 posts today

Je suis pas un gros "viewer" sur Twitch, mais quand je peux, je regarde #Proxy d'@arretsurimages.

Là, suis dèg', j'ai raté celui du 1er avril en live, mais on le peut voir replay.

Ça parle du rapport sur la pub qui a fuité après avoir "calé une table" quelques mois dans le bureau du 1er ministre.

J'aime bien que @lorisguemart rappelle, à chaque fois qu'il aborde l'ARPP, que c'est une association et pas une "Autorité" 🙏.

(c'est d'ailleurs rappelé dans ledit rapport)

arretsurimages.net/articles/cl

www.arretsurimages.netClimat : un rapport "explosif" veut interdire des pubs, les médias peu intéressés - Par Loris Guémart | Arrêt sur imagesLa critique média en toute indépendance : enquêtes, analyses, chroniques et émissions.

Latest Mustang Panda Arsenal: Toneshell, StarProxy, PAKLOG, CorKLOG, and SplatCloak

Mustang Panda, a threat actor group, has developed new tools including two keyloggers (PAKLOG and CorKLOG) and an EDR evasion driver (SplatCloak). PAKLOG monitors keystrokes and clipboard data, using a custom encoding scheme. CorKLOG captures keystrokes, encrypts data with RC4, and establishes persistence through services or scheduled tasks. SplatCloak disables kernel-level notification callbacks for Windows Defender and Kaspersky drivers, employing obfuscation techniques like control flow flattening and mixed boolean arithmetic. Along with those tools, the group has been observed using updated versions of ToneShell and a new tool called StarProxy. ToneShell, a backdoor, now features changes in its FakeTLS C2 communication protocol and client identifier storage methods. StarProxy, a lateral movement tool, uses the FakeTLS protocol to proxy traffic and facilitate attacker communications.

Pulse ID: 6800148cd0bb0e7851cc6218
Pulse Link: otx.alienvault.com/pulse/68001
Pulse Author: AlienVault
Created: 2025-04-16 20:35:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Inside BRUTED: Black Basta (RaaS) Used Automated Brute Forcing Framework to Target Edge Network Devices

Black Basta, a ransomware-as-a-service group, has been using an automated brute forcing framework called BRUTED to target edge network devices since 2023. The framework performs internet scanning and credential stuffing against firewalls and VPN solutions in corporate networks. Black Basta prioritizes high-impact industries, particularly the Business Services sector, to amplify operational disruptions. The group's internal communications were leaked, exposing their infrastructure and operational details. BRUTED targets various remote-access and VPN solutions, using proxy rotation, credential generation, and distributed execution to scale attacks. Black Basta exploits vulnerabilities in edge devices for initial access, then targets ESXi hypervisors to encrypt file systems and disrupt virtual machines, maximizing operational impact and ransom leverage.

Pulse ID: 67ffc3faf1eadb11b97d2f1b
Pulse Link: otx.alienvault.com/pulse/67ffc
Pulse Author: AlienVault
Created: 2025-04-16 14:51:38

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Install and Configure #SOCKS #Proxy Server on Rocky Linux VPS

This article provides a guide for how to install and configure SOCKS proxy server on Rocky Linux VPS.

In this tutorial, we'll go through the process of installing and configuring a SOCKS proxy server on a Rocky Linux VPS. We will also discuss enabling SSH tunnelling from a PC using the SOCKS proxy server. This will allow you to route your ...
Continued 👉 blog.radwebhosting.com/install #installguide #proxyserver #vpsguide #rockylinux

How to Install and Configure SOCKS Proxy Server on Rocky Linux VPS
RadWeb, LLC · Install And Configure SOCKS Proxy Server On Rocky Linux VPS - VPS Hosting Blog | Dedicated Servers | Reseller HostingThis article provides a guide for how to install and configure SOCKS proxy server on Rocky Linux VPS.

How to Setup a Reverse #Proxy with HTTPS Using #Nginx and #Certbot (5 Minute Quick-Start Guide)

This article outlines how to setup a reverse proxy with HTTPS using Nginx and Certbot.
What is a Reverse Proxy?
A reverse proxy is a server that sits between client devices and a backend server, forwarding client requests to the backend server and returning the server's response to the clients. Unlike a forward proxy, ...
Continued 👉 blog.radwebhosting.com/how-to- #reverseproxy #proxyserver #letsencrypt

How to Setup a Reverse Proxy with HTTPS Using Nginx and Certbot
RadWeb, LLC · How To Setup A Reverse Proxy With HTTPS Using Nginx And Certbot (5 Minute Quick-Start Guide) - VPS Hosting Blog | Dedicated Servers | Reseller HostingThis article outlines how to setup a reverse proxy with HTTPS using Nginx and Certbot.

Just released: #swad v0.2

SWAD is the "Simple Web Authentication Daemon", meant to add #cookie #authentication with a simple #login form and configurable credential checker modules to a reverse #proxy supporting to delegate authentication to a backend service, like e.g. #nginx' "auth_request". It's a very small piece of software written in pure #C with as little external dependencies as possible. It requires some #POSIX (or "almost POSIX", like #Linux, #FreeBSD, ...) environment, OpenSSL (or LibreSSL) for TLS and zlib for response compression.

Currently, the only credential checker module available offers #PAM authentication, more modules will come in later releases.

swad 0.2 brings a few bugfixes and improvements, especially helping with security by rate-limiting the creation of new sessions as well as failed login attempts. Read details and grab it here:

github.com/Zirias/swad/release

New features:

Configurable rate-limits for new session creation
Configurable rate-limits for failed login attempts (per session, realm
and user name)
Configurable types of proxy headers (X-Forward...
GitHubRelease swad 0.2 · Zirias/swadNew features: Configurable rate-limits for new session creation Configurable rate-limits for failed login attempts (per session, realm and user name) Configurable types of proxy headers (X-Forward...

New blog post 📝

𝐂𝐨𝐧𝐟𝐢𝐠𝐮𝐫𝐢𝐧𝐠 𝐀𝐒𝐏.𝐍𝐄𝐓 𝐂𝐨𝐫𝐞 𝐅𝐨𝐫𝐰𝐚𝐫𝐝𝐞𝐝 𝐇𝐞𝐚𝐝𝐞𝐫𝐬 𝐌𝐢𝐝𝐝𝐥𝐞𝐰𝐚𝐫𝐞

Running ASP.NET Core behind a proxy?

Then you need to configure ForwardedHeadersMiddleware the right way.

✅ Trust proxy IPs
✅ Handle X-Forwarded-* headers
✅ Avoid broken IPs, schemes & hosts

Read it 👉 nestenius.se/net/configuring-a

How ToddyCat tried to hide behind AV software

The ToddyCat APT group has developed a sophisticated tool called TCESB to stealthily execute payloads and evade detection. This tool exploits a vulnerability (CVE-2024-11859) in ESET Command line scanner for DLL proxying, using a modified version of the open-source EDRSandBlast malware. TCESB employs techniques like DLL proxying, kernel memory manipulation, and Bring Your Own Vulnerable Driver (BYOVD) to bypass security solutions. It searches for kernel structure addresses using CSV or PDB files, installs a vulnerable Dell driver, and decrypts AES-128 encrypted payloads. The discovery highlights the need for monitoring driver installations and Windows kernel debug symbol loading events to detect such sophisticated attacks.

Pulse ID: 67f3cb12758e286216442770
Pulse Link: otx.alienvault.com/pulse/67f3c
Pulse Author: AlienVault
Created: 2025-04-07 12:54:42

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Continued thread

🧵
Tähän ketjuun

Iranin juoni rabbin tappamiseksi Azerbaidžanissa epäonnistui, turvallisuusviranomaiset sanovat

”Azerbaidžanin tapaus on turvallisuusviranomaisten mukaan viimeisin Iranin järjestämä salamurhayritys, jossa käytetään usein rikollisia asiamiehiä”

#Iran #Terrorismi #IRGC #Proxy
washingtonpost.com/world/2025/

The Washington Post · Iranian plot to kill rabbi in Azerbaijan foiled, security officials sayBy Mary Ilyushina

3 Easy Steps to Integrate Monitoring Tools for #Apache Reverse #Proxy Server

This article provides a step-by-step guide to integrate monitoring tools for Apache reverse proxy server. Integrating monitoring tools with your Apache reverse proxy server setup allows you to track performance, detect issues, and optimize your infrastructure efficiently.
How to Integrate Monitoring Tools for Apache Reverse Proxy Server
Below, ...
Continued 👉 blog.radwebhosting.com/3-easy- #reverseproxy #proxyserver

3 Easy Steps to Integrate Monitoring Tools for Apache Reverse Proxy Server
RadWeb, LLC · 3 Easy Steps To Integrate Monitoring Tools For Apache Reverse Proxy Server - VPS Hosting Blog | Dedicated Servers | Reseller HostingThis article provides a step-by-step guide to integrate monitoring tools for Apache reverse proxy server. Integrating monitoring tools with your Apache

How to Setup a Reverse #Proxy with HTTPS Using #Nginx and #Certbot (5 Minute Quick-Start Guide)

This article outlines how to setup a reverse proxy with HTTPS using Nginx and Certbot.
What is a Reverse Proxy?
A reverse proxy is a server that sits between client devices and a backend server, forwarding client requests to the backend server and returning the server's response to the clients. Unlike a forward proxy, ...
Continued 👉 blog.radwebhosting.com/how-to- #proxyserver #reverseproxy #letsencrypt

How to Setup a Reverse Proxy with HTTPS Using Nginx and Certbot
RadWeb, LLC · How To Setup A Reverse Proxy With HTTPS Using Nginx And Certbot (5 Minute Quick-Start Guide) - VPS Hosting Blog | Dedicated Servers | Reseller HostingThis article outlines how to setup a reverse proxy with HTTPS using Nginx and Certbot.

Fake Zoom Ends in BlackSuit Ransomware

A malicious website mimicking Zoom led to the installation of a trojanized installer, initiating a multi-stage attack. The initial payload, d3f@ckloader, downloaded additional components, including SectopRAT. After nine days, the threat actor deployed Brute Ratel and Cobalt Strike beacons for lateral movement. They used various techniques for discovery and credential access, including LSASS memory dumping. The attacker employed QDoor for proxying RDP connections, facilitating data collection and exfiltration via the cloud service Bublup. The intrusion culminated in the deployment of BlackSuit ransomware across multiple systems using PsExec, with a total time to ransomware of 194 hours over nine days.

Pulse ID: 67ea2ad332f874a45a095bed
Pulse Link: otx.alienvault.com/pulse/67ea2
Pulse Author: AlienVault
Created: 2025-03-31 05:40:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.