ohai.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A cozy, fast and secure Mastodon server where everyone is welcome. Run by the folks at ohai.is.

Administered by:

Server stats:

1.9K
active users

#Sophos

1 post1 participant0 posts today
Christoffer S.<p>(sophos.com) Evilginx: How Attackers Bypass MFA Through Adversary-in-the-Middle Attacks <a href="https://news.sophos.com/en-us/2025/03/28/stealing-user-credentials-with-evilginx/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.sophos.com/en-us/2025/03/</span><span class="invisible">28/stealing-user-credentials-with-evilginx/</span></a></p><p>A short descriptive article about Evilginx and how stealing credentials work, a few suggested ways of detecting etc.</p><p>Summary:<br>This article examines Evilginx, a tool that leverages the legitimate nginx web server to conduct Adversary-in-the-Middle (AitM) attacks that can bypass multifactor authentication (MFA). The tool works by proxying web traffic through malicious sites that mimic legitimate services like Microsoft 365, capturing not only usernames and passwords but also session tokens. The article demonstrates how Evilginx operates, showing how attackers can gain full access to a user's account even when protected by MFA. It provides detection methods through Azure/Microsoft 365 logs and suggests both preemptive and reactive mitigations, emphasizing the need to move toward phishing-resistant FIDO2-based authentication methods.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Evilginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Evilginx</span></a> <a href="https://swecyb.com/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://swecyb.com/tags/Credentials" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Credentials</span></a> <a href="https://swecyb.com/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://swecyb.com/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> <a href="https://swecyb.com/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a></p>
schatenseite.de<p>Vor zwei Jahren habe ich aufgeschrieben wie ich mir mit einem alten <a href="https://ohai.social/tags/Sophos" class="mention hashtag" rel="tag">#<span>Sophos</span></a> Gateway und <a href="https://ohai.social/tags/OPNsense" class="mention hashtag" rel="tag">#<span>OPNsense</span></a> einen sehr anständigen <a href="https://ohai.social/tags/Router" class="mention hashtag" rel="tag">#<span>Router</span></a> / <a href="https://ohai.social/tags/Firewall" class="mention hashtag" rel="tag">#<span>Firewall</span></a> gebaut habe.<br />Ganz vergessen zu veröffentlichen, das habe ich jetzt mal nachgeholt. 😵‍💫</p><p><a href="https://www.schatenseite.de/2025/03/04/opnsense-appliance-mit-sonos-hardware/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">schatenseite.de/2025/03/04/opn</span><span class="invisible">sense-appliance-mit-sonos-hardware/</span></a></p>
John Leonard<p>Cyber gangs from Russia are increasingly acting as Microsoft support staff, in order to steal data or deliver ransomware to their victims. </p><p><a href="https://www.computing.co.uk/news/2025/security/russian-cybercriminals-muscle-in-on-microsoft-support-scam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/2025/secu</span><span class="invisible">rity/russian-cybercriminals-muscle-in-on-microsoft-support-scam</span></a></p><p><a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sophos</span></a> <a href="https://mastodon.social/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a> <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/teams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>teams</span></a></p>
OTX Bot<p>Two ransomware campaigns tracked using 'email bombing,' Microsoft Teams 'vishing'</p><p>Sophos MDR has identified two threat clusters, STAC5143 and STAC5777, utilizing Microsoft Office 365 to gain unauthorized access to organizations. Both groups employ email bombing and fake tech support social engineering via Microsoft Teams to deliver malware. STAC5143 uses Java and Python-based tools, possibly linked to FIN7. STAC5777 employs Microsoft Quick Assist for remote access and deploys malware through a legitimate Microsoft updater. This group has connections to the Black Basta ransomware. Both clusters aim to steal data and deploy ransomware, using similar tactics but different tools and malware. The report details their attack chains, malware analysis, and attribution, highlighting the need for improved security measures and employee awareness.</p><p>Pulse ID: 678f95b9bcfbf75c9495246f<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/678f95b9bcfbf75c9495246f" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/678f9</span><span class="invisible">5b9bcfbf75c9495246f</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-01-21 12:40:25</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Java</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.raytec.co/tags/MicrosoftOffice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftOffice</span></a> <a href="https://social.raytec.co/tags/MicrosoftTeams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftTeams</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/Office" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Office</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://social.raytec.co/tags/RansomWare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomWare</span></a> <a href="https://social.raytec.co/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://social.raytec.co/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
heise online English<p>Critical vulnerabilities threaten Sophos firewalls</p><p>Important security updates for Sophos firewalls have been released. They install automatically with the default settings. </p><p><a href="https://www.heise.de/en/news/Critical-vulnerabilities-threaten-Sophos-firewalls-10218984.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Critical-vuln</span><span class="invisible">erabilities-threaten-Sophos-firewalls-10218984.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
nemo™ 🇺🇦<p>🚨 Security Alert! Sophos has identified and patched three critical vulnerabilities in its Firewall, including risks for remote code execution and privilege escalation. Users are urged to apply the patch immediately! If unable, follow the suggested workarounds to protect your systems. 🔒💻 Read more here: <a href="https://www.techradar.com/pro/security/sophos-flags-concerning-firewall-security-flaws-users-told-to-patch-now" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/sop</span><span class="invisible">hos-flags-concerning-firewall-security-flaws-users-told-to-patch-now</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://mas.to/tags/FirewallFlaws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallFlaws</span></a> <a href="https://mas.to/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
heise Security<p>Kritische Sicherheitslücken bedrohen Sophos-Firewalls</p><p>Es sind wichtige Sicherheitsupdates für Firewalls von Sophos erschienen. Mit den Standardeinstellungen installieren sie sich automatisch. </p><p><a href="https://www.heise.de/news/Kritische-Sicherheitsluecken-bedrohen-Sophos-Firewalls-10218914.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Kritische-Sicher</span><span class="invisible">heitsluecken-bedrohen-Sophos-Firewalls-10218914.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p><a href="https://kolektiva.social/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> has addressed three vulnerabilities in its Sophos Firewall product that could allow remote unauthenticated threat actors to perform <a href="https://kolektiva.social/tags/SQLinjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLinjection</span></a>, remote code execution, and gain privileged SSH access to devices.<br><a href="https://kolektiva.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://www.bleepingcomputer.com/news/security/sophos-discloses-critical-firewall-remote-code-execution-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sophos-discloses-critical-firewall-remote-code-execution-flaw/</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Alert: Two critical vulnerabilities in <a href="https://kolektiva.social/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> Firewalls could grant attackers remote code execution and privileged access.</p><p>🔧 Action Plan:<br>✔️ Update to v21 MR1 or newer.<br>✔️ Restrict SSH access immediately.<br>✔️ Ensure user portals are not WAN-exposed.</p><p>🔗<a href="https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2024/12/soph</span><span class="invisible">os-fixes-3-critical-firewall-flaws.html</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> fixed critical vulnerabilities in its <a href="https://infosec.exchange/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> product <br><a href="https://securityaffairs.com/172179/security/sophos-firewall-critical-vulnerabilities.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/172179/sec</span><span class="invisible">urity/sophos-firewall-critical-vulnerabilities.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
WinFuture.de<p>Chinesischer Hacker knackte 81.000 Firewalls weltweit - darunter 36 in kritischen US-Infrastrukturen. Zero-Day-Lücke in <a href="https://mastodon.social/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a>-Systemen ermöglichte massive Angriffe. <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://winfuture.de/news,147614.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,147614.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
PrivacyDigest<p>Chinese <a href="https://mas.to/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> singlehandedly responsible for <a href="https://mas.to/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> 81,000 <a href="https://mas.to/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://mas.to/tags/firewalls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewalls</span></a> , <a href="https://mas.to/tags/DOJ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOJ</span></a> says | Cybernews <br><a href="https://mas.to/tags/china" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>china</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p><p><a href="https://cybernews.com/security/doj-indicts-ofac-sanctions-chinese-hacker-exploits-sophos-firewalls-/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybernews.com/security/doj-ind</span><span class="invisible">icts-ofac-sanctions-chinese-hacker-exploits-sophos-firewalls-/</span></a></p>
benzogaga33 :verified:<p>Un pirate chinois a compromis 81 000 firewalls Sophos avec une seule faille zero-day <a href="https://www.it-connect.fr/un-pirate-chinois-a-compromis-81-000-firewalls-sophos-avec-une-seule-faille-zero-day/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">it-connect.fr/un-pirate-chinoi</span><span class="invisible">s-a-compromis-81-000-firewalls-sophos-avec-une-seule-faille-zero-day/</span></a> <a href="https://mamot.fr/tags/ActuCybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActuCybersécurité</span></a> <a href="https://mamot.fr/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mamot.fr/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://mamot.fr/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a></p>
heise online English<p>Reward in the millions: FBI seeks alleged developer of Sophos exploits</p><p>A group from China is said to have developed malicious code on Sophos firewalls and attacked thousands. This has now earned them an indictment and sanctions.</p><p><a href="https://www.heise.de/en/news/Reward-in-the-millions-FBI-seeks-alleged-developer-of-Sophos-exploits-10195455.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Reward-in-the</span><span class="invisible">-millions-FBI-seeks-alleged-developer-of-Sophos-exploits-10195455.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Millionenbelohnung: FBI sucht mutmaßlichen Entwickler von Sophos-Exploits</p><p>Eine Gruppe aus China soll Schadcode auf Sophos-Firewalls entwickelt und Tausende angegriffen haben. Das bringt ihnen nun eine Anklage und Sanktionen ein.</p><p><a href="https://www.heise.de/news/Millionenbelohnung-FBI-sucht-mutmasslichen-Entwickler-von-Sophos-Exploits-10195008.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Millionenbelohnu</span><span class="invisible">ng-FBI-sucht-mutmasslichen-Entwickler-von-Sophos-Exploits-10195008.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
securityaffairs<p>Chinese national charged for hacking thousands of <a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> firewalls<br><a href="https://securityaffairs.com/171870/security/chinese-national-charged-for-hacking-sophos-firewalls.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/171870/sec</span><span class="invisible">urity/chinese-national-charged-for-hacking-sophos-firewalls.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a></p>
securityaffairs<p>Chinese national charged for hacking thousands of <a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> firewalls<br><a href="https://securityaffairs.com/171870/security/chinese-national-charged-for-hacking-sophos-firewalls.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/171870/sec</span><span class="invisible">urity/chinese-national-charged-for-hacking-sophos-firewalls.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a></p>
heise Security<p>"Passwort" Folge 20: Pacific Rim - Hackback nach China</p><p>Ein großer Hersteller von Sicherheitsprodukten dreht den Spieß um und versieht Geräte chinesischer Kunden mit einer Hintertür.</p><p><a href="https://www.heise.de/news/Passwort-Folge-20-Pacific-Rim-Hackback-nach-China-10189738.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Passwort-Folge-2</span><span class="invisible">0-Pacific-Rim-Hackback-nach-China-10189738.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/PasswortPodcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswortPodcast</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Marcel SIneM(S)US<p>Analyse und Kommentar: <a href="https://social.tchncs.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> und der gebrochene Schwur | Security <a href="https://www.heise.de/meinung/Analyse-und-Kommentar-Sophos-und-der-gebrochene-Schwur-10010073.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/meinung/Analyse-und-K</span><span class="invisible">ommentar-Sophos-und-der-gebrochene-Schwur-10010073.html</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://social.tchncs.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Überwachung</span></a> <a href="https://social.tchncs.de/tags/masssurveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>masssurveillance</span></a> <a href="https://social.tchncs.de/tags/Massen%C3%BCberwachung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Massenüberwachung</span></a></p>
furicle<p>Now here's a rabbit hole I wish I had time to fall into...</p><p><a href="https://community.sophos.com/sophos-xg-firewall/management-apis/b/announcements/posts/now-available-ansible-collection-for-sophos-firewall" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">community.sophos.com/sophos-xg</span><span class="invisible">-firewall/management-apis/b/announcements/posts/now-available-ansible-collection-for-sophos-firewall</span></a></p><p><a href="https://mastodon.social/tags/sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sophos</span></a> has released an <a href="https://mastodon.social/tags/ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ansible</span></a> collection for firewall control</p>