agilealliance.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon for Agilists! Want to create an account here? Become a member of Agile Alliance to join this server and/or log in with your membership account and visit the Member Portal. agilealliance.org

Server stats:

14
active users

#ddos

7 posts7 participants0 posts today

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #11/2025 is out!

It includes the following and much more:

➝ Alleged Co-Founder of #Garantex Arrested in India;

➝ X Suffered a #DDoS Attack;

➝ Microsoft #PatchTuesday Fixes 7 Zero-days;

➝ UK Hospital Discovered 5,000 to 10,000 Unknown Devices Connected to its Network;

#NVIDIA Chips Smugglers Granted Bail in Singapore;

#Tenable tested #DeepSeek's Ability to Generate #Malware;

#OpenAI labelling DeepSeek as "state-controlled";

➝ New #Jailbreak Method called Context Compliance Attack (CCA) Works Against Most #AI Models

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s InfoSec Newsletter🕵🏻‍♂️ [InfoSec MASHUP] 11/2025Alleged Co-Founder of Garantex Arrested in India; X Suffered a DDoS Attack;Microsoft Patch Tuesday Fixes 7 Zero-days; UK Hospital Discovered 5,000 to 10,000 Unknown Devices Connected to its Network; NVIDIA Chips Smugglers Granted Bail in Singapore; Tenable tested DeepSeek's Ability to Generate Malware; OpenAI labelling DeepSeek as "state-controlled"; New Jailbreak Method called Context Compliance Attack (CCA) Works Against Most AI Models

Oh really it was Ukraine that took down X on March 10? Not so fast.

Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. wired.com/story/x-ddos-attack- #X #Musk #DDoS #cyberattack #cybersecurity #security #Ukraine #BotNet #Internet

No, Elon — X DDoS was NOT by Ukraine

#X marks the botnet: #Outage outrage was a Ukrainian cyberattack, implies our favorite African billionaire comedy villain.

The social media platform formerly known as #Twitter went offline earlier this week. It was swamped by wave after wave of distributed denial of service attacks (DDoS). Now-owner #ElonMusk (pictured) has been telling everyone the #DDoS traffic came from Ukraine.

O RLY? That’s “garbage,” say experts. In #SBBlogwatch, we never stopped calling it Twitter.

@TheFuturumGroup @TechstrongGroup @SecurityBlvd: securityboulevard.com/2025/03/

Security Boulevard · No, Elon — X DDoS was NOT by UkraineX marks the botnet: Outage outrage was a Ukrainian cyberattack, implies our favorite African billionaire comedy villain.

"The social network X suffered intermittent outages on Monday, a situation owner Elon Musk attributed to a “massive cyberattack.” Musk said in an initial X post that the attack was perpetrated by “either a large, coordinated group and/or a country.” In a post on Telegram, a pro-Palestinian group known as Dark Storm Team took credit for the attacks within a few hours. Later on Monday, though, Musk claimed in an interview on Fox Business Network that the attacks had come from Ukrainian IP addresses.

Web traffic analysis experts who tracked the incident on Monday were quick to emphasize that the type of attacks X seemed to face—distributed denial-of-service, or DDoS, attacks—are launched by a coordinated army of computers, or a “botnet,” pummeling a target with junk traffic in an attempt to overwhelm and take down its systems. Botnets are typically dispersed around the world, generating traffic with geographically diverse IP addresses, and they can include mechanisms that make it harder to determine where they are controlled from.

“It’s important to recognize that IP attribution alone is not conclusive. Attackers frequently use compromised devices, VPNs, or proxy networks to obfuscate their true origin," says Shawn Edwards, chief security officer of the network connectivity firm Zayo."

wired.com/story/x-ddos-attack-

WIRED · What Really Happened With the DDoS Attacks That Took Down XBy Lily Hay Newman

This is NOT a good thing; and there's a big stinky rat here. I very much question the combination of "pro-Palestinian" and "Russian geopolitical interests" in the same sentence. If this is actually a Russian threat actor, then it's attacking Moscow's allies. If this is a "pro-Palestinian" threat actor, then expect more mass punishment against Palestinians, whether you're guilty or not. Things being the way they are, I am very suspicious about the origins of this group.

The last time something like this came up, it turned out to be a bunch of Kenyan kids paid to disrupt humanitarian aid to Palestinians while pretending to be pro-Palestinian. What are the odds?

It's important to note what Orange Cyberdefense says about DarkStorm: "Although seemingly pro-Palestinian, their actions also appear aligned with Russian geopolitical interests" orangecyberdefense.com/global/

DarkStorm: orangecyberdefense.com/fileadm

"A pro-Palestinian hacktivist group claimed responsibility for the attack, providing evidence to back their claims.

Bitdefender: Hacktivist Group Claims Cyberattack That Spurred Multiple X Outages on Monday bitdefender.com/en-us/blog/hot @bitdefender #cybersecurity #infosec #Musk #DDoS

Så er der opdateret lidt på materialet til på mandag, Workshop hos PROSA.

DDoS simulering hvor vi samles om noget netværksudstyr og lærer at sende netværkspakker, MANGE MANGE netværkspakker

github.com/kramse/security-cou

Materialet må som altid deles og kopieres, og samme workshop plejer jeg at holde på BornHack, så måske skal du skrive det i kalenderen

GitHubsecurity-courses/presentations/pentest/simulated-ddos-workshop at master · kramse/security-coursesvarious courses, presentation etc. Contribute to kramse/security-courses development by creating an account on GitHub.

I've been working on an automated triager for the frequent volumetric DDOS we see against www.bbc.com & www.bbc.co.uk.

The idea is to use our edge access logs (stored in BigQuery) to isolate & describe the attack traffic then recommend any additional mitigations/filters etc. It also gives us a database of DDOS metrics/sources we can reference.

Obviously I had to add the obligatory pew-pew map.