veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

134
active users

#hacking

43 posts22 participants13 posts today

So I updated the README for my security-courses Git repo containing all my teaching materials. Trying to make it more understandable and readable, but wondering if it is ...

If you want to help me please read it, and comment. If you feel adventurous you can also start installing LaTeX and try it! This might pull you into a nice rabbit hole though!

or look at PDFs all over the place, quite a lot about #DDoS, #Pentest, #hacking etc.

codeberg.org/kramse/security-c

and it is #OpenSource of course

Summary card of repository kramse/security-courses
Codeberg.orgsecurity-coursesvarious courses, presentation etc.
Replied in thread

@hisold @bagder §202c Criminal Code specifically says "made with the intent to abide and conduct manipulations (as per §202a & §202b)"

Plus, the actual "#hacking" on it's own is already criminalized.

www.gesetze-im-internet.de§ 202c StGB - Einzelnorm

How many unauthenticated file transfer servers are still exposed online in 2025? 🌐🔓

A critical flaw in CrushFTP, tracked as CVE-2025-2825, is being actively exploited in the wild. The vulnerability affects versions 10.0.0 through 10.8.3 and version 11.0.0, and it allows remote attackers to bypass authentication entirely using specially crafted HTTP or HTTPS requests. Public proof-of-concept code is already circulating, lowering the barrier for exploitation.

Shadowserver, a nonprofit security watchdog, reported that over 1,500 vulnerable instances remain online as of March 30, 2025. Just two days earlier, around 1,800 instances were detected, with more than half located in the U.S. These numbers suggest that many organizations haven't taken mitigation steps despite clear warnings.

The CrushFTP team has urged users to either patch immediately or, if an update isn't feasible, isolate installations using a DMZ configuration. This can reduce the attack surface but is not a long-term fix.

This type of vulnerability is particularly concerning because unauthenticated access to managed file transfer software often leads to sensitive data exposure or ransomware deployment. Groups like Cl0p have historically targeted platforms like MOVEit, Accellion FTA, and GoAnywhere MFT using similar flaws. In January, Cl0p claimed responsibility for exploiting Cleo file transfer software to breach dozens of companies.

CrushFTP's CVE-2025-2825 carries a CVSS score of 9.8. That reflects the ease of exploitation and the potential impact of compromise. For systems handling regulated or confidential data, the urgency is not optional—patching is essential.

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

"Passwort" Folge 30: i-Soon, das Leak aus der chinesischen Cybercrime-Industrie

Die Hosts diskutieren einen seltenen Einblick in die kommerzielle Hacking-Szene in China und was man daraus über die dortige Cybercrime-Industrie lernen kann.

heise.de/news/Passwort-Folge-3

heise online · "Passwort" Folge 30: i-Soon, das Leak aus der chinesischen Cybercrime-Industrie
More from Sylvester Tremmel