mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

591
comptes actifs

#sharepoint

12 messages9 participants0 message aujourd’hui
En réponse à Zach Clouseau

@demiguru
Okay. But *I* AM NOT connecting the #Epstein FBI #SharePoint file exposure to that story. I appreciate you pointing out some possible false connections.
I'm looking ahead to how lists that we know DO exist, might end up in hands of groups OTHER than the FBI & DOJ.

Who might have them & how they might use them are all of interest to me.

En réponse à Spocko

@spocko
The #conspiracy-like part is connecting the #Epstein FBI #SharePoint file exposure to the recent #Chinese #zeroday #exploit, potentially implying it was either:
exploited intentionally,
the result of deep systemic failure,
or even deliberate mishandling tied to a broader cover-up.
There’s currently no #credible evidence backing that link. Misconfiguration is a more parsimonious explanation for the older #FBI case. #conspiracytheorists #infosec

En réponse à Zach Clouseau

@demiguru
What part is the conspiracy theory?
It appears some #SharePoint servers were venerable over a specific time period. Including #FBI servers?
muellershewrote.com/p/the-epst
"Additionally, the internal SharePoint site the bureau ended up using to distribute the files toward the end did not have the usual restricted permissions. This left the Epstein and Maxwell files open to viewing by a much larger group of people than previously thought."
Bondi's incompetence is real. How can we use it?

The Breakdown · The Epstein Cover-Up at the FBIPar Allison Gill
En réponse à Spocko

@spocko it’s #conspiracytheory. #Reuters reports #Microsoft is looking whether a leak from MAPP enabled #Chinese to exploit #SharePoint #vulnerabilities b4 fixes were fully in place.notifications went out on 6/24, 7/3, and 7/7; attack signs began on 7/7—the same day the final notification was issued. #TrendMicro called it the “likeliest scenario” that someone in the program weaponized that info. They pulled the trigger on the #exploit they had at hand bc time was running out.

Question for my #Infosec friends
@emptywheel talked about how FBI agents reviewing the #Epstein #Maxwell materials put together a list for #PamBondi & placed it on an internal #SharePoint server.
muellershewrote.com/p/the-epst
@briankrebs wrote about this #ZeroDay exploit 7-21-25 krebsonsecurity.com/2025/07/mi
Do you think a group has that info?
If so, what's the best way to use existence of that hacked list as POLITICAL leverage against DJT to get the full list out?
@nicolesandler youtube.com/live/thdaQyDzYFI?s

#Microsoft Used China-Based Engineers to Support Product Recently Hacked by #China
==

Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular #SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.

#News #Tech #Cybersecurity #Government #Safety #privacy

propublica.org/article/microso

ProPublicaMicrosoft Used China-Based Engineers to Support Product Recently Hacked by China
Plus via ProPublica

Microsofts Sharepoint-Lücken: Die Zero-Days, die vielleicht gar keine waren

Die Angriffe auf Sharepoint-Server nutzten keine neuen sondern bekannte Lücken aus, für die es bereits Patches gab. Ob die geschützt hätten, ist jedoch offen.

heise.de/news/Microsofts-Share

heise online · Microsofts Sharepoint-Lücken: Die Zero-Days, die vielleicht gar keine warenPar Jürgen Schmidt
#IT#Microsoft#Security

"Blame a leak for #Microsoft #SharePoint attacks, researcher insists"

... July software updates didn't fully fix a couple of bugs, ...

How did the attackers, ... Chinese government spies, data thieves, and ransomware operators, know how to exploit the SharePoint CVEs ... bypass the #security fixes Microsoft released the following day?

theregister.com/2025/07/26/mic

The process of pre announcing bugs to authorities is now broken. Patch was incomplete. As usual with quick fixes

@evawolfangel

The Register · Blame a leak for Microsoft SharePoint attacks, researcher insistsPar Jessica Lyons

Angriff auf #SharePoint & Stimme geklaut – mit “Tech like Vera” - #They_Talk_Tech – mit Eckert und Wolfangel - #Podcast:

Ein #Microsoft- Desaster rollt durchs Netz: Eine Lücke in #SharePoint wird zur globalen #Angriffswelle und hat einen seltsamen Ursprung: einen #Hacker- #Wettbewerb in #Berlin. Was genau passiert ist, warum hunderte Server kompromittiert wurden klären Svea und Eva in dieser Folge.

frauen-technik.podigee.io/40-n

They Talk Tech – mit Eckert und WolfangelAngriff auf SharePoint & Stimme geklaut – mit “Tech like Vera”Ein Microsoft-Desaster rollt durchs Netz: Eine Lücke in SharePoint wird zur globalen Angriffswelle und hat einen seltsamen Ursprung: einen Hacker-Wettbewerb in Berlin. Was genau passiert ist, warum hunderte Server kompromittiert wurden klären Svea und Eva in dieser Folge. Außerdem zu Gast: Vera Bauer von “Tech like Vera” – YouTuberin, Techniknerd und kritische Stimme im Netz. Vera spricht offen über über Hate, Sexismus und warum sie ausgerechnet ein Video über Nippel machen musste. Und sie erzählt, wie ihre eigene Stimme von einer KI geklaut wurde, für Werbung, die sie nie gemacht hat. Deepfake, ganz real. Zum Schluss wird’s noch persönlich – bei einer kleinen TikTok-Challenge mit Eva. Spoiler: Wir erfahren die Wahrheit über Eva™. Hosts: Svea Eckert & Eva Wolfangel Musik und Produktion Marko Pauli Shownotes https://www.zeit.de/digital/datenschutz/2025-07/sharepoint-sicherheitsluecke-hacker-microsoft-cyberangriff?freebie=c9855b17 https://research.eye.security/sharepoint-under-siege/ https://www.security-insider.de/pwn2own-berlin-2025-ergebnisse-gewinner-schwachstellen-a-8d499492d1a5d4ee46fdc4b4d56b2655/ https://www.youtube.com/@TechlikeVera/videos https://www.ndr.de/fernsehen/sendungen/content-createrin-wird-opfer-von-deepfake,ndrinfo-1286.html https://apnews.com/article/deepfake-denmark-ai-artificial-intelligence-misinformation-73ed761617ebbdb8382086287530a7f6