mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

585
comptes actifs

#toolshell

0 message0 participant0 message aujourd’hui
securityaffairs<p><a href="https://infosec.exchange/tags/ToolShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ToolShell</span></a> under siege: <a href="https://infosec.exchange/tags/Check" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Check</span></a> <a href="https://infosec.exchange/tags/Point" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Point</span></a> analyzes Chinese <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> Storm-2603<br><a href="https://securityaffairs.com/180657/apt/toolshell-under-siege-check-point-analyzes-chinese-apt-storm-2603.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180657/apt</span><span class="invisible">/toolshell-under-siege-check-point-analyzes-chinese-apt-storm-2603.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> links <a href="https://mastodon.thenewoil.org/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sharepoint</span></a> <a href="https://mastodon.thenewoil.org/tags/ToolShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ToolShell</span></a> attacks to Chinese hackers</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-toolshell-attacks-linked-to-chinese-hackers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/microsoft-sharepoint-toolshell-attacks-linked-to-chinese-hackers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
ESET Research<p><a href="https://infosec.exchange/tags/BREAKING" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BREAKING</span></a> <a href="https://infosec.exchange/tags/ESETResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESETResearch</span></a> has been monitoring the recently discovered <a href="https://infosec.exchange/tags/ToolShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ToolShell</span></a> zero-day vulnerabilities in <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharePoint</span></a> Server: CVE-2025-53770 and CVE-2025-53771. SharePoint Online in Microsoft 365 is not impacted. <a href="https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/toolshell-an-all-you-can-eat-buffet-for-threat-actors/</span></a><br>ESET first detected an attempt to exploit part of the execution chain on July 17 in Germany 🇩🇪. Here, the final <a href="https://infosec.exchange/tags/webshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webshell</span></a> payload was not delivered. The first time we registered the payload was on July 18 in Italy 🇮🇹. We have since seen active ToolShell exploitation all over the world. <br>We have uncovered several IP addresses that were used in the attacks from July 17 to July 22. The charts show the timeline of the attacks from the three most active of these IP addresses. <br>ToolShell is being exploited by all sorts of threat actors, from petty cybercriminals to state-sponsored groups, among them China 🇨🇳-aligned <a href="https://infosec.exchange/tags/APTs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APTs</span></a>. We expect these attacks to continue taking advantage of unpatched systems.<br>IoCs available in our GitHub repo: <a href="https://github.com/eset/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/eset/</span><span class="invisible"></span></a></p>
IT News<p>What to know about ToolShell, the SharePoint threat under mass exploitation - Government agencies and private industry have been under sie... - <a href="https://arstechnica.com/security/2025/07/what-to-know-about-toolshell-the-sharepoint-threat-under-mass-exploitation/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/what-to-know-about-toolshell-the-sharepoint-threat-under-mass-exploitation/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/sharepoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sharepoint</span></a> <a href="https://schleuss.online/tags/toolshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>toolshell</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it</p>
securityaffairs<p><a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> issues emergency patches for <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharePoint</span></a> zero-days exploited in “<a href="https://infosec.exchange/tags/ToolShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ToolShell</span></a>” attacks<br><a href="https://securityaffairs.com/180197/hacking/microsoft-issues-emergency-patches-for-sharepoint-zero-days-exploited-in-toolshell-attacks.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180197/hac</span><span class="invisible">king/microsoft-issues-emergency-patches-for-sharepoint-zero-days-exploited-in-toolshell-attacks.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
heise online<p>Alarmstufe Rot für Sharepoint-Administratoren! 🚨 Microsoft hat die ersten Patches für die kritische Sicherheitslücke "ToolShell" veröffentlicht, die seit einigen Tagen für Unruhe in der IT-Sicherheitsbranche sorgt.</p><p>Zum Artikel: <a href="https://heise.de/-10493989?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">heise.de/-10493989?wt_mc=sm.re</span><span class="invisible">d.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sharepoint</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSicherheit</span></a> <a href="https://social.heise.de/tags/ToolShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ToolShell</span></a></p>