veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

293
active users

#crowdsec

0 posts0 participants0 posts today
CrowdSec<p>🚀 At CrowdSec, we rely on <span class="h-card" translate="no"><a href="https://bird.makeup/users/mongodb" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mongodb</span></a></span> to power our solution. Its speed, flexibility, and reliability help us deliver real-time protection at scale, keeping our community safe from evolving cyber threats.</p><p>Learn more 👉 <a href="https://www.mongodb.com/solutions/customer-case-studies/crowdsec" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mongodb.com/solutions/customer</span><span class="invisible">-case-studies/crowdsec</span></a></p><p><a href="https://infosec.exchange/tags/CrowdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdSec</span></a> <a href="https://infosec.exchange/tags/MongoDB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MongoDB</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a></p>
CrowdSec<p>Sharing insights and taking swift action can collectively reduce the impact of these threats. This is your call to action for real-time threat intelligence and collaborative cybersecurity. </p><p>For more information, visit <a href="http://crowdsec.net" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">http://</span><span class="">crowdsec.net</span><span class="invisible"></span></a> </p><p>Want to stay ahead of the latest cyber threats? Get our weekly Threat Alert delivered straight to your inbox, along with critical threat updates and trending cybersecurity insights. </p><p>📩 Sign up now for exclusive access: <a href="https://contact.crowdsec.net/threat-alert" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">contact.crowdsec.net/threat-al</span><span class="invisible">ert</span></a></p><p>🧵6/6</p><p><a href="https://infosec.exchange/tags/CVE202525257" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202525257</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/FortiWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiWeb</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CrowdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdSec</span></a></p>
CrowdSec<p>🛡️ How to protect your systems:<br>🔹 Patch: Patch your FortiWeb instance if it is publicly exposed; otherwise, remove outside access to the affected admin panel.<br>🔹 Preemptive blocking: Use Crowdsec CTI to block IPs exploiting CVE-2025-25257 👉 <a href="https://app.crowdsec.net/cti?q=cves%3A%22CVE-2025-25257%22&amp;page=1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.crowdsec.net/cti?q=cves%3A</span><span class="invisible">%22CVE-2025-25257%22&amp;page=1</span></a><br>🔹 Stay proactive: Install the Crowdsec Web Application Firewall to stay ahead of exploit attempts, with 100+ virtual patching rules available. 👉 <a href="https://doc.crowdsec.net/docs/next/appsec/intro" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doc.crowdsec.net/docs/next/app</span><span class="invisible">sec/intro</span></a></p><p>🧵5/6</p><p><a href="https://infosec.exchange/tags/CVE202525257" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202525257</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/FortiWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiWeb</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CrowdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdSec</span></a></p>
CrowdSec<p>📈 Trend analysis:<br>🔹 CrowdSec detected the first in-the-wild exploitation of this vulnerability on July 11th, shortly after we rolled out detection rules. Using our wayback tools, we were able to establish that there were no exploitation attempts before July 11th, confirming once again that public exploits are a key driver of vulnerability weaponization. <br>🔹 For CVE-2025-25257, CrowdSec has observed about 40 distinct IPs producing about 500 attack events in total. Most of these attacks occurred on Friday, July 11th, the day the exploit was publicized. The attacks on Friday were mainly due to a presumably coordinated attacker spinning up a bunch of machines on Scaleway cloud to use in a broad scanning campaign. Over the weekend, the exploit quickly lost popularity. This might be due to the fact that the exploit requires the Fabric Connector administrative interface to be publicly accessible, which is somewhat unlikely. While we cannot make predictions, CrowdSec expects exploitation signals to pick up slightly this week as vulnerability scanners start looking for vulnerable devices. However, we don’t expect the attacker volume for this vulnerability to reach that of other Fortinet-related CVEs.</p><p>🧵4/6</p><p><a href="https://infosec.exchange/tags/CVE202525257" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202525257</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/FortiWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiWeb</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CrowdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdSec</span></a></p>
CrowdSec<p>🛠️ About the exploit:<br>🔹 The Fortinet FortiWeb Fabric Connector is an integration component designed to enhance application security by linking FortiWeb web application firewalls (WAFs) with other elements of the Fortinet Security Stack. It enables policy enforcement and automated threat response by leveraging intelligence gathered from FortiGate firewalls, FortiSandbox, FortiAnalyzer, and other “Fabric-enabled” devices. It is in some sense a glue product that holds an array of different Fortinet products together.<br>🔹 The vulnerability allows unauthenticated attackers to execute arbitrary SQL statements against the MySQL database connected to Fabric Connector. As this database runs as root per default, this attack can be chained to run arbitrary Python code on the affected machine, allowing attackers to further compromise the system. The vulnerability affects various FortiWeb versions from 7.0 to 7.6. As a workaround, the vendor recommends disabling the administrative interface to external visitors.</p><p>🧵3/6</p><p><a href="https://infosec.exchange/tags/CVE202525257" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202525257</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/FortiWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiWeb</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CrowdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdSec</span></a></p>
CrowdSec<p>⚠️ Key findings:<br>🔹 A new SQL injection vulnerability in a FortiWeb component allows attackers to execute arbitrary code on the affected machine.<br>🔹 CrowdSec has been tracking exploitation since the 11th of July 2025.<br>🔹 Data from the CrowdSec network indicates that attacker interest in the vulnerability remains very limited.</p><p>🧵2/6</p><p><a href="https://infosec.exchange/tags/CVE202525257" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202525257</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/FortiWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiWeb</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CrowdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdSec</span></a></p>
CrowdSec<p>🚨 In this week’s Threat Alert Newsletter: exploitation of CVE-2025-25257 in Fortinet’s FortiWeb Fabric Connector.</p><p>We break down how the exploit works, what CrowdSec sees on the network, and steps to stay protected.</p><p>Read more 👇</p><p>🧵1/6</p><p><a href="https://infosec.exchange/tags/CVE202525257" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202525257</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/FortiWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiWeb</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CrowdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdSec</span></a></p>
R. Kirchner 🇩🇪<p>NGINX Proxy Manager mit CrowdSec absichern - Docker-Setup unter Ubuntu schützen</p><p><a href="https://www.ksite.de/blog/nginx-proxy-manager-mit-crowdsec-absichern-docker-setup-unter-ubuntu-schuetzen/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ksite.de/blog/nginx-proxy-mana</span><span class="invisible">ger-mit-crowdsec-absichern-docker-setup-unter-ubuntu-schuetzen/</span></a></p><p><a href="https://social.ksite.de/tags/ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ubuntu</span></a> <a href="https://social.ksite.de/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.ksite.de/tags/nginxproxymanager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginxproxymanager</span></a> <a href="https://social.ksite.de/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://social.ksite.de/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://social.ksite.de/tags/crowdsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crowdsec</span></a></p>
LinuxNews.de<p>Wenn /dev/null eine Größenbeschränkung hätte, würde morgen auch die Welt stillstehen… </p><p><a href="https://social.anoxinon.de/tags/devnull" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devnull</span></a> <a href="https://social.anoxinon.de/tags/Crowdsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crowdsec</span></a></p>
Gabriel H. Nunes<p>Wow! <span class="h-card" translate="no"><a href="https://infosec.exchange/@CrowdSec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>CrowdSec</span></a></span> "Community" offering only gets worse and worse!</p><p>First, they had raised a paywall around querying details on IP addresses that triggered Alerts. Only 30 queries per week for the "Community".</p><p>Now, they have extended that paywall to cover the whole Alerts feature! Only 500 alerts per month for the "Community"!</p><p>Where are my logs, <span class="h-card" translate="no"><a href="https://infosec.exchange/@CrowdSec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>CrowdSec</span></a></span>?</p><p>Enshitification meets cybersecurity!</p><p><a href="https://mastodon.social/tags/CrowdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdSec</span></a> <a href="https://mastodon.social/tags/Enshitification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enshitification</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Jan Wildeboer 😷:krulorange:<p>Currently blocking 18687 IPv4 and 890 IPv6 IP addresses that are trying to brute force their way in to my mailserver. Thanks, <a href="https://social.wildeboer.net/tags/nftables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nftables</span></a>, thanks, <a href="https://social.wildeboer.net/tags/crowdsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crowdsec</span></a> :) (This is on a single core VPS with 2GB of RAM, no measurable performance impact, since quite some years now)</p>
LinuxNews.de<p><span class="h-card" translate="no"><a href="https://imker.social/@dirk" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dirk</span></a></span> und im Gegensatz zu <a href="https://social.anoxinon.de/tags/crowdsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crowdsec</span></a> läuft das Datenschutzkonform auf dem Server, ohne nach Hause zu telefonieren!</p>
aleph<p>Hier unsere Anleitung fürs <a href="https://afterspace.rocks/tags/Upgrade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Upgrade</span></a> von <a href="https://afterspace.rocks/tags/Mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mastodon</span></a> auf die <a href="https://afterspace.rocks/tags/Beta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Beta</span></a> 4.3.0</p><p>Unsere Instanz lief auf Version 4.2.12 in einem Docker Container. Geschützt von <a href="https://afterspace.rocks/tags/Crowdsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crowdsec</span></a> und in Verbindung mit <a href="https://afterspace.rocks/tags/Traefik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Traefik</span></a> und <a href="https://afterspace.rocks/tags/Elasticsearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Elasticsearch</span></a></p><p>Unsere Anleitung basiert auf der im Github angegebenen Schritte. <a href="https://github.com/mastodon/mastodon/releases/tag/v4.3.0-beta.2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mastodon/mastodon/r</span><span class="invisible">eleases/tag/v4.3.0-beta.2</span></a></p><p>Leider hat das bei uns nicht auf Anhieb funktioniert. Daher schreiben wir unsere Schritte. Bitte nicht vergessen vorher Backup anlegen! 🧵 1/4<br><a href="https://afterspace.rocks/tags/MastoAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MastoAdmin</span></a></p>