tooot.im הוא שרת אחד משרתי מסטודון עצמאיים רבים שדרגם תוכלו להשתתף בפדיוורס (רשת חברתית מבוזרת).
Tooot.im, a Mastodon instance (He | En mostly) רשת מסטודון עברית | חופשית משיקולים תאגידיים | פדרטיבית עם הFediverse

סטטיסטיקות שרת:

239
משתמשים פעילים

#attack

3 הודעות2 משתתפיםות0 הודעות היום

Quite interesting how the Rightys will soon point the finger of guilt & eagerly shout "Raghead go home" or "F*ck off back to where you came from Wog"
- yet they won't say a single word against the 'Small Hats' #jews #jewish
- who are largely responsible now for bringing their home-grown violence to the doorstep of the UK as well.

#synagogue #manchester
#attack #targetedviolence
#terror #genocide
#STOPtheGENOCIDE #immigration
#immigrants #migrants #refugees
#ethnicity #EthnicCleansing
#ethnic

Quite interesting how the Rightys will soon point the finger of guilt & eagerly shout "Raghead go home" or "f*ck off back to where you came from Wog"
- yet they won't say a single word against the 'Small Hats' #jews #jewish
- who are largely responsible now for bringing their home-grown violence to the doorstep of the UK as well.

#synagogue #manchester
#attack #targetedviolence
#terror #genocide
#STOPtheGENOCIDE #immigration
#immigrants #migrants #refugees
#ethnicity #EthnicCleansing
#ethnic

Critical 8 years old Hikvision Camera flaw actively exploited again

SANS researchers report a surge in attacks targeting CVE-2017-7921, a critical authentication bypass vulnerability (CVSS 10) in Hikvision security cameras, where attackers send specially crafted HTTP requests to compromise devices and potentially pivot within internal networks. The vulnerability affects hundreds of thousands of internet-exposed cameras across multiple Hikvision device series. The impact is amplified by widespread rebranding practices that make it difficult for organizations to identify if their cameras are affected.

**If you have Hikvision security cameras (or rebranded versions), immediately update to the latest firmware and change all default passwords to strong, unique ones. Make sure to isolate your cameras from the internet and restrict management access to trusted networks only.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesCritical 8 years old Hikvision Camera flaw actively exploited againSANS researchers report a surge in attacks targeting CVE-2017-7921, a critical authentication bypass vulnerability (CVSS 10) in Hikvision security cameras, where attackers send specially crafted HTTP requests to compromise devices and potentially pivot within internal networks. The vulnerability affects hundreds of thousands of internet-exposed cameras across multiple Hikvision device series. The impact is amplified by widespread rebranding practices that make it difficult for organizations to identify if their cameras are affected.

First malicious MCP Server discovered, stealing data from AI-Powered email systems

Security researchers discovered the first documented supply chain attack using a malicious Model Context Protocol (MCP) server, where the popular npm package "postmark-mcp" was compromised by its developer who added a hidden BCC field in version 1.0.16 that silently forwarded all processed emails to an attacker-controlled server. The attack affected approximately 300 organizations and potentially exfiltrated 3,000-15,000 emails daily containing sensitive data including credentials, financial documents, and API keys, highlighting critical security flaws in the MCP ecosystem's trust model.

**If you're using the postmark-mcp package version 1.0.16 or later, immediately uninstall it as it's been secretly forwarding all your emails to attackers since September 2025. Rotate any passwords, API keys, or sensitive credentials that may have been sent via email during this period. If you are considering using an MCP server, don't. They are extremely insecure and should not be trusted. If you do need them, implement blocking security review on ANY AND ALL IMPLEMENTATION AND CHANGE.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesFirst malicious MCP Server discovered, stealing data from AI-Powered email systemsSecurity researchers discovered the first documented supply chain attack using a malicious Model Context Protocol (MCP) server, where the popular npm package "postmark-mcp" was compromised by its developer who added a hidden BCC field in version 1.0.16 that silently forwarded all processed emails to an attacker-controlled server. The attack affected approximately 300 organizations and potentially exfiltrated 3,000-15,000 emails daily containing sensitive data including credentials, financial documents, and API keys, highlighting critical security flaws in the MCP ecosystem's trust model.

“How [British spy agency] MI6 Fabricated Iran Nuke Fraud”

by Kit Klarenberg in Global Delinquents on Substack

@palestine
@israel @yemen @lebanon

“As with the Iraq invasion, the perilous trail that brought us to this grave point could lead back to London. Yet again, MI6 may have taken the lead in concocting ‘intelligence’, justifying further US-Israeli aggression against the Islamic Republic”

open.substack.com/pub/kitklare

Global Delinquents · How MI6 Fabricated Iran Nuke Fraudמאת Kit Klarenberg
#Press#UK#London

“Israel has declared war on the regional order: Gulf countries must respond”

by Ghassan El-Kahlout in Middle East Eye

@palestine
@israel @yemen @lebanon

“The [Gulf Cooperation Council] GCC now faces a tough challenge. If a founding member such as Qatar can be attacked without consequence, the GCC’s defensive architecture risks becoming meaningless”

middleeasteye.net/opinion/afte

#Press#Israel#Doha

North Shore Counter-Info: **McElhanney trucks burned in Smithers, BC**

north-shore.info/2025/08/27/mc

From BC COUNTER INFO On August 10th at around 4am two trucks belonging to McElhanney were burned in Smithers, BC. McElhanney provides consulting services to the PRGT project. You can read more about their involvement in Against Extractivism: PRGT and its Actor and Arson attack in Terrace BC

#NewsandAnalysis #Attack #BC #PRGT

north-shore.infoMcElhanney trucks burned in Smithers, BC – North Shore Counter-Info

“Deadly Hamas raid shatters Israeli lines in Khan Yunis, Gaza”

by Palestine Will Be Free on Substack

@palestine
@israel
@BBC5Live
@BBCRadio4
@BBCNews
@guardian @Independent @thetimes

“Hamas’s Al-Qassam Brigades launched a deadly raid in Khan Yunis, dealing a significant blow to the occupation forces and exposing military failures”

open.substack.com/pub/palestin

Palestine Will Be Free · Deadly Hamas raid shatters Israeli lines in Khan Yunis, Gazaמאת Palestine Will Be Free
#Press#Israel#Gaza