veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

294
active users

#advisory

35 posts12 participants5 posts today
BeyondMachines :verified:<p>Fortinet reports hacker technique for Persistent Access to FortiGate Devices after patching <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a><br><a href="https://beyondmachines.net/event_details/fortinet-reports-hacker-technique-for-persistent-access-to-fortigate-devices-after-patching-e-v-j-d-m/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/fortinet-reports-hacker-technique-for-persistent-access-to-fortigate-devices-after-patching-e-v-j-d-m/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Siemens reports multiple critical vulnerabilities in SENTRON 7KT Data Manager, won't be patched <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/siemens-reports-multiple-critical-vulnerabilities-in-sentron-7kt-data-manager-won-t-be-patched-h-c-u-2-7/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/siemens-reports-multiple-critical-vulnerabilities-in-sentron-7kt-data-manager-won-t-be-patched-h-c-u-2-7/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical vulnerability reported in Yii 2 PHP framework <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-vulnerability-reported-in-yii-2-php-framework-5-4-f-h-3/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-vulnerability-reported-in-yii-2-php-framework-5-4-f-h-3/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical security vulnerabilities reported in Spotfire AI analysis platform <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-security-vulnerabilities-reported-in-spotfire-ai-analysis-platform-i-r-x-e-7/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-security-vulnerabilities-reported-in-spotfire-ai-analysis-platform-i-r-x-e-7/gD2P6Ple2L</span></a></p>
FischermanCH<p>BSI warnt: Wie Malware-Angriffe über Captchas funktionieren – und wie ihr euch davor schützt<br>Im Normalfall kosten uns Captchas nur etwas Zeit. Wir klicken alle Motorräder auf einem Bild an, markieren Fußgängerüberwege oder bestätigen, dass wir wirklich keine Roboter sind. Allerdings können die zeitraubenden Sicherheitschecks auch zu einer Gefahr für euren Computer und eure Daten werden, wie das Bun<br><a href="https://www.fischerman.ch/?p=535369" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">fischerman.ch/?p=535369</span><span class="invisible"></span></a><br><a href="https://mastodon.online/tags/Advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Advisory</span></a> <a href="https://mastodon.online/tags/Hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacker</span></a> <a href="https://mastodon.online/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> <a href="https://mastodon.online/tags/OnlineSecurityHistory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnlineSecurityHistory</span></a></p>
BeyondMachines :verified:<p>Microsoft confirms Windows April 2025 security update creates 'inetpub' folder <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a><br><a href="https://beyondmachines.net/event_details/microsoft-confirms-windows-april-2025-security-update-creates-inetpub-folder-i-0-k-t-w/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/microsoft-confirms-windows-april-2025-security-update-creates-inetpub-folder-i-0-k-t-w/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Jenkins reports SSH Host Key Reuse in its Docker Images <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/jenkins-reports-ssh-host-key-reuse-in-its-docker-images-1-o-a-j-1/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/jenkins-reports-ssh-host-key-reuse-in-its-docker-images-1-o-a-j-1/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical Remote Code execution vulnerability reported in BentoML <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-remote-code-execution-vulnerability-reported-in-bentoml-g-7-y-7-n/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-remote-code-execution-vulnerability-reported-in-bentoml-g-7-y-7-n/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Juniper patches critical flaws in Junos Space and multiple flaws in Junos OS versions <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/juniper-patches-critical-flaws-in-junos-space-and-multiple-flaws-in-junos-os-versions-j-u-0-h-y/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/juniper-patches-critical-flaws-in-junos-space-and-multiple-flaws-in-junos-os-versions-j-u-0-h-y/gD2P6Ple2L</span></a></p>
packet storm<p>Debian Security Advisory 5815-2 <a href="https://packetstormsecurity.com/files/182933" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">packetstormsecurity.com/files/</span><span class="invisible">182933</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a></p>
BeyondMachines :verified:<p>Critical authentication flaw reported in Siemens Industrial Edge Devices <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-authentication-flaw-reported-in-siemens-industrial-edge-devices-w-a-z-8-b/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-authentication-flaw-reported-in-siemens-industrial-edge-devices-w-a-z-8-b/gD2P6Ple2L</span></a></p>
packet storm<p>Red Hat Security Advisory 2024-10710-03 <a href="https://packetstormsecurity.com/files/182918" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">packetstormsecurity.com/files/</span><span class="invisible">182918</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a></p>
BeyondMachines :verified:<p>Critical vulnerability reported in Langflow AI Builder enabling unauthenticated remote code execution <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/critical-vulnerability-reported-in-langflow-ai-builder-enabling-unauthenticated-remote-code-execution-n-q-c-m-b/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-vulnerability-reported-in-langflow-ai-builder-enabling-unauthenticated-remote-code-execution-n-q-c-m-b/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Dell fixes multiple flaws in PowerScale OneFS, at least one critical <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/dell-fixes-multiple-flaws-in-powerscale-onefs-at-least-one-critical-z-s-r-o-l/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/dell-fixes-multiple-flaws-in-powerscale-onefs-at-least-one-critical-z-s-r-o-l/gD2P6Ple2L</span></a></p>
packet storm<p>Debian Security Advisory 5898-1 <a href="https://packetstorm.news/files/190421" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190421</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a></p>
packet storm<p>Ubuntu Security Notice USN-7430-1 <a href="https://packetstorm.news/files/190420" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190420</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a></p>
packet storm<p>Red Hat Security Advisory 2025-3801-03 <a href="https://packetstorm.news/files/190415" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190415</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a></p>
packet storm<p>Ubuntu Security Notice USN-7429-2 <a href="https://packetstorm.news/files/190407" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190407</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a></p>
BeyondMachines :verified:<p>Researchers demonstrate Nissan Leaf electric vehicle vulnerable to remote hacking, takeover <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/researchers-demonstrate-nissan-leaf-electric-vehicle-vulnerable-to-remote-hacking-takeover-8-z-w-o-3/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/researchers-demonstrate-nissan-leaf-electric-vehicle-vulnerable-to-remote-hacking-takeover-8-z-w-o-3/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Researchers report path traversal vulnerability in AWS SSM Agent's Plugin ID Validation <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/researchers-report-path-traversal-vulnerability-in-aws-ssm-agent-s-plugin-id-validation-k-k-g-5-w/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/researchers-report-path-traversal-vulnerability-in-aws-ssm-agent-s-plugin-id-validation-k-k-g-5-w/gD2P6Ple2L</span></a></p>