veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

208
active users

#PatchNOW

2 posts2 participants0 posts today
ZeroDaily<p>🚨 SAP has issued an emergency patch for CVE-2025-31324, a critical zero-day flaw in NetWeaver Visual Composer. Unpatched systems risk full compromise—patch now! 🛡️</p><p>Learn more: <a href="https://zerodaily.me/blog/2025-04-27-sap-zero-day-cve-2025-31324-patched" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zerodaily.me/blog/2025-04-27-s</span><span class="invisible">ap-zero-day-cve-2025-31324-patched</span></a></p><p><a href="https://mastodon.social/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> <a href="https://mastodon.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a></p>
ZeroDaily<p>🔒 ConnectWise just patched a critical ViewState vulnerability in ScreenConnect! On-prem users must update ASAP to prevent remote code execution risks. Get all the details and remediation steps in our latest post: <a href="https://zerodaily.me/blog/2025-04-25-connectwise-screenconnect-25-2-4-security-patch" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zerodaily.me/blog/2025-04-25-c</span><span class="invisible">onnectwise-screenconnect-25-2-4-security-patch</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/patchnow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patchnow</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/remotework" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remotework</span></a> <a href="https://mastodon.social/tags/screenconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenconnect</span></a> <a href="https://mastodon.social/tags/connectwise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>connectwise</span></a></p>
ZeroDaily<p>🚨 A critical authentication bypass flaw in CrushFTP is being actively exploited in ransomware campaigns! Attackers can gain unauthorized access &amp; compromise file transfer systems. If you use CrushFTP v10 or v11, patch immediately to protect your data and business. Stay alert, monitor for suspicious activity, &amp; review CISA guidance for mitigation steps. 🔒</p><p>Learn more: <a href="https://zerodaily.me/blog/2025-04-13-crushftp-vulnerability" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zerodaily.me/blog/2025-04-13-c</span><span class="invisible">rushftp-vulnerability</span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/CVE202531161" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202531161</span></a> <a href="https://mastodon.social/tags/CrushFTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrushFTP</span></a> <a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://mastodon.social/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a></p>
small circle 🕊 in calmness<p>⚠️ <a href="https://social.coop/tags/WARN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WARN</span></a> Severe <a href="https://social.coop/tags/RealityFault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RealityFault</span></a>. <a href="https://social.coop/tags/AlternativeReality" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlternativeReality</span></a> encountered. <a href="https://social.coop/tags/TruthMissing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TruthMissing</span></a>.</p><p>⛔ <a href="https://social.coop/tags/FAULT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FAULT</span></a> <a href="https://social.coop/tags/Newspeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Newspeak</span></a> <a href="https://social.coop/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> recursion. <a href="https://social.coop/tags/Realspeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Realspeak</span></a> correction route 404_NOT_FOUND. Call <a href="https://social.coop/tags/OrwellSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OrwellSupport</span></a> for patch to <a href="https://social.coop/tags/SocietySystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocietySystems</span></a></p><p>♾️ INFO <a href="https://social.coop/tags/Orwell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Orwell</span></a> <a href="https://social.coop/tags/HealthSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HealthSupport</span></a>. We invert it to make it <a href="https://social.coop/tags/right" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>right</span></a>. From <a href="https://social.coop/tags/Skynet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Skynet</span></a> to <a href="https://social.coop/tags/Peopleverse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Peopleverse</span></a> we serve <a href="https://social.coop/tags/YOU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YOU</span></a>. Please dial <a href="https://social.coop/tags/CriticalThinking101" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CriticalThinking101</span></a> for our <a href="https://social.coop/tags/WickedSolution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WickedSolution</span></a> <a href="https://social.coop/tags/DeliveryService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeliveryService</span></a></p><p>♾️ INFO Insert Realspeak <a href="https://social.coop/tags/patchNOW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patchNOW</span></a> and <a href="https://social.coop/tags/Reboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reboot</span></a></p><p><a href="https://social.coop/@smallcircles/113881914450747944" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">social.coop/@smallcircles/1138</span><span class="invisible">81914450747944</span></a></p><p><a href="https://social.coop/tags/WTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WTF</span></a> <a href="https://social.coop/tags/Enshittification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enshittification</span></a> <a href="https://social.coop/tags/Hypercapitalism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypercapitalism</span></a></p>
nemo™ 🇺🇦<p>🚨 The Apache Software Foundation has uncovered critical vulnerabilities in MINA, HugeGraph-Server, and Traffic Control, with one flaw scoring a maximum 10/10! 🛡️ Admins are urged to patch ASAP to avoid potential exploits, especially during the busy holiday season. 🎄🔒 Read more here: <a href="https://www.techradar.com/pro/security/apache-foundation-urges-users-to-patch-now-and-fix-major-security-worries" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/apa</span><span class="invisible">che-foundation-urges-users-to-patch-now-and-fix-major-security-worries</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Apache" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apache</span></a> <a href="https://mas.to/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://mas.to/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
nemo™ 🇺🇦<p>🚨 Security Alert! Sophos has identified and patched three critical vulnerabilities in its Firewall, including risks for remote code execution and privilege escalation. Users are urged to apply the patch immediately! If unable, follow the suggested workarounds to protect your systems. 🔒💻 Read more here: <a href="https://www.techradar.com/pro/security/sophos-flags-concerning-firewall-security-flaws-users-told-to-patch-now" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/sop</span><span class="invisible">hos-flags-concerning-firewall-security-flaws-users-told-to-patch-now</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://mas.to/tags/FirewallFlaws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallFlaws</span></a> <a href="https://mas.to/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
nemo™ 🇺🇦<p>The US government has issued a warning to federal agencies about a critical Windows kernel vulnerability! 🚨 CISA has added this flaw to its KEV catalog, urging immediate patching to prevent potential attacks. Agencies have until January 6, 2025, to act! 🔒💻 <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mas.to/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mas.to/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mas.to/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mas.to/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> Read more here: <a href="https://www.techradar.com/pro/security/us-government-warns-federal-agencies-to-patch-dangerous-windows-kernel-bug" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/us-</span><span class="invisible">government-warns-federal-agencies-to-patch-dangerous-windows-kernel-bug</span></a></p>
CERT-Bund<p>❗️ <a href="https://social.bund.de/tags/CERTWarnung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CERTWarnung</span></a> ❗️<br>In <a href="https://social.bund.de/tags/FortiManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiManager</span></a> von Fortinet wurde eine Zero-Day <a href="https://social.bund.de/tags/Schwachstelle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schwachstelle</span></a> geschlossen, die seit Juni ausgenutzt wird. Eine Kompromittierung ist zu prüfen. Kunden sollten unverzüglich ihre Geräte absichern. <a href="https://social.bund.de/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <br><a href="https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-282848-10Ub2.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bsi.bund.de/SharedDocs/Cybersi</span><span class="invisible">cherheitswarnungen/DE/2024/2024-282848-10Ub2.html</span></a></p>