mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

595
comptes actifs

#botnet

5 messages5 participants1 message aujourd’hui
Peter N. M. Hansteen<p>Happy "Logging in as users -, [ and $ day" to all who celebrate:</p><p>Jul 19 02:02:12 portal sshd-session[88959]: Failed password for invalid user - from 152.42.130.79 port 33738 ssh2<br>Jul 19 03:00:14 portal sshd-session[79691]: Failed password for invalid user [ from 152.42.130.79 port 41708 ssh2<br>Jul 19 03:58:56 portal sshd-session[6194]: Failed password for invalid user $ from 152.42.130.79 port 55398 ssh2</p><p><a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/passwordgroping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwordgroping</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> sues to disrupt <a href="https://mastodon.thenewoil.org/tags/BadBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BadBox</span></a> 2.0 <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> infecting 10 million devices</p><p><a href="https://www.bleepingcomputer.com/news/security/google-sues-to-disrupt-badbox-20-botnet-infecting-10-million-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/google-sues-to-disrupt-badbox-20-botnet-infecting-10-million-devices/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
The Spamhaus Project<p>🤖 Jan-Jun 2025 Botnet Threat Update out now!</p><p>⬆️ Total of 17,258 botnet C&amp;Cs observed, up by +26%. <br>⬇️ Botnet C&amp;Cs continue to drop for 🇧🇬 Bulgaria (-40%) and 🇲🇽 Mexico (-25%) <br>➡️ Pentest frameworks represent 43% of Top 20 malware associated with Botnet C&amp;Cs. </p><p>🇺🇲 Meanwhile, three US-based networks suffered significant increases for hosting the most active botnet C&amp;Cs…. </p><p>Find out which ones in the latest FREE report here👇<br><a href="https://www.spamhaus.org/resource-hub/botnet-c-c/botnet-threat-update-january-to-june-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/botn</span><span class="invisible">et-c-c/botnet-threat-update-january-to-june-2025</span></a> </p><p><a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a></p>
Deborah Pickett<p>Website owner? Not keen on the Mellowtel browser library building a botnet of untraceable scrapers from unwitting users who are using a browser plugin that contains Mellowtel? I've raised a GitHub issue for them to explain how much contempt they have for our consent. Join in, politely, make them look like the jerks they are. <a href="https://github.com/mellowtel-inc/mellowtel-js/issues/41" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mellowtel-inc/mello</span><span class="invisible">wtel-js/issues/41</span></a></p><p><a href="https://old.mermaid.town/tags/Mellowtel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mellowtel</span></a> <a href="https://old.mermaid.town/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://old.mermaid.town/tags/scrapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scrapers</span></a></p>
@francks<p>Our small team vs millions of bots</p><p><a href="https://www.fsf.org/blogs/sysadmin/our-small-team-vs-millions-of-bots" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fsf.org/blogs/sysadmin/our-sma</span><span class="invisible">ll-team-vs-millions-of-bots</span></a></p><p><a href="https://mstdn.fr/tags/fsf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fsf</span></a> <a href="https://mstdn.fr/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://mstdn.fr/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://mstdn.fr/tags/javascrip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascrip</span></a> <a href="https://mstdn.fr/tags/anubis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>anubis</span></a> <a href="https://mstdn.fr/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://mstdn.fr/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a> <a href="https://mstdn.fr/tags/scraper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scraper</span></a> <a href="https://mstdn.fr/tags/crawler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crawler</span></a> <a href="https://mstdn.fr/tags/proprietarysoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proprietarysoftware</span></a> <a href="https://mstdn.fr/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
Jan Wildeboer 😷:krulorange:<p>Someone (I guess a Russian "friend") is paying a botnet to try to guess my email password. 852 tries from 852 different IP addresses in the last few days. It doesn't really bother me, as I block these IP addresses after the first try for a long time, and my password is complex enough to keep his botnet busy for many years (and I change it regularly ;). This is unfortunately nothing new, this has been going on for at least a year now.</p><p>1/3</p><p><a href="https://social.wildeboer.net/tags/SelfHost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHost</span></a> <a href="https://social.wildeboer.net/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Prometei" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Prometei</span></a> <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> activity has surged since March 2025<br><a href="https://securityaffairs.com/179303/cyber-crime/prometei-botnet-activity-has-surged-since-march-2025.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179303/cyb</span><span class="invisible">er-crime/prometei-botnet-activity-has-surged-since-march-2025.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
heise online<p>Montag: Apple an Perplexity interessiert, ultradünnes Samsung-Handy kein Renner</p><p>Apple sucht KI-Hilfe + Verkäufe von Galaxy S25 Edge enttäuschen + Anstieg heftiger DDoS-Attacken + 50 Jahre "Der weiße Hai" + Reddit feiert 20. Geburtstag</p><p><a href="https://www.heise.de/news/Montag-Apple-an-Perplexity-interessiert-ultraduennes-Samsung-Handy-kein-Renner-10455370.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Montag-Apple-an-</span><span class="invisible">Perplexity-interessiert-ultraduennes-Samsung-Handy-kein-Renner-10455370.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/DoSSchwachstelle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoSSchwachstelle</span></a> <a href="https://social.heise.de/tags/Filme" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Filme</span></a> <a href="https://social.heise.de/tags/hoDaily" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hoDaily</span></a> <a href="https://social.heise.de/tags/Journal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Journal</span></a> <a href="https://social.heise.de/tags/K%C3%BCnstlicheIntelligenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KünstlicheIntelligenz</span></a> <a href="https://social.heise.de/tags/Reddit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Reddit</span></a> <a href="https://social.heise.de/tags/SamsungGalaxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SamsungGalaxy</span></a> <a href="https://social.heise.de/tags/Smartphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smartphone</span></a> <a href="https://social.heise.de/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online<p>Junk-Traffic-Flut: Rekord-DDoS-Angriff auf Provider mit 7,3 TBit/s</p><p>Groß angelegte DDoS-Attacken werden immer heftiger. Cloudflare meldet einen Angriff mit einer Datenmenge von 7,3 Terabit pro Sekunde auf einen Host-Provider.</p><p><a href="https://www.heise.de/news/Junk-Traffic-Flut-Rekord-DDoS-Angriff-auf-Provider-mit-7-3-TBit-s-10455216.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Junk-Traffic-Flu</span><span class="invisible">t-Rekord-DDoS-Angriff-auf-Provider-mit-7-3-TBit-s-10455216.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
IT News<p>Record DDoS Pummels Site With Once-Unimaginable 7.3Tbps of Junk Traffic - An anonymous reader quotes a report from Ars Technica: Large-scale attacks designe... - <a href="https://yro.slashdot.org/story/25/06/20/2010218/record-ddos-pummels-site-with-once-unimaginable-73tbps-of-junk-traffic?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/06/2</span><span class="invisible">0/2010218/record-ddos-pummels-site-with-once-unimaginable-73tbps-of-junk-traffic?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a> <a href="https://schleuss.online/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>A record-breaking <a href="https://kolektiva.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attack just slammed a hosting provider with 7.3 Tbps of traffic.</p><p>It lasted 45 seconds—and bombarded 34,000+ ports per second.</p><p>Cloudflare blocked it. But <a href="https://kolektiva.social/tags/RapperBot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RapperBot</span></a> is just getting started. <a href="https://kolektiva.social/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://kolektiva.social/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://thehackernews.com/2025/06/massive-73-tbps-ddos-attack-delivers.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/06/mass</span><span class="invisible">ive-73-tbps-ddos-attack-delivers.html</span></a></p>
securityaffairs<p>News <a href="https://infosec.exchange/tags/Flodrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Flodrix</span></a> <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> targets vulnerable <a href="https://infosec.exchange/tags/Langflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Langflow</span></a> servers<br><a href="https://securityaffairs.com/179094/malware/news-flodrix-botnet-targets-vulnerable-langflow-servers.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179094/mal</span><span class="invisible">ware/news-flodrix-botnet-targets-vulnerable-langflow-servers.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
securityaffairs<p>News <a href="https://infosec.exchange/tags/Flodrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Flodrix</span></a> <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> targets vulnerable <a href="https://infosec.exchange/tags/Langflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Langflow</span></a> servers<br><a href="https://securityaffairs.com/179094/malware/news-flodrix-botnet-targets-vulnerable-langflow-servers.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179094/mal</span><span class="invisible">ware/news-flodrix-botnet-targets-vulnerable-langflow-servers.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
:sigil: Lou Lüeder<p>Très sympa d'apprendre sur Reddit que la dernière version de la rom de mon téléphone est infectée par un botnet et que la mise a jour a été retirée depuis une semaine. 🙃</p><p><a href="https://www.reddit.com/r/Bigme/s/T167QnQitF" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reddit.com/r/Bigme/s/T167QnQit</span><span class="invisible">F</span></a></p><p><a href="https://eldritch.cafe/tags/BigMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BigMe</span></a> <a href="https://eldritch.cafe/tags/HibreakPro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HibreakPro</span></a> <a href="https://eldritch.cafe/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://eldritch.cafe/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://eldritch.cafe/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> infect <a href="https://mastodon.thenewoil.org/tags/TBK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TBK</span></a> <a href="https://mastodon.thenewoil.org/tags/DVR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DVR</span></a> devices via command injection flaw</p><p><a href="https://www.bleepingcomputer.com/news/security/new-mirai-botnet-infect-tbk-dvr-devices-via-command-injection-flaw/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-mirai-botnet-infect-tbk-dvr-devices-via-command-injection-flaw/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p>New <a href="https://infosec.exchange/tags/Mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mirai</span></a> <a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> targets TBK DVRs by exploiting CVE-2024-3721<br><a href="https://securityaffairs.com/178779/malware/new-mirai-botnet-targets-tbk-dvrs-by-exploiting-cve-2024-3721.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/178779/mal</span><span class="invisible">ware/new-mirai-botnet-targets-tbk-dvrs-by-exploiting-cve-2024-3721.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
IT News<p>FBI: BadBox 2.0 Android Malware Infects Millions of Consumer Devices - An anonymous reader quotes a report from BleepingComputer: The FBI is warning that... - <a href="https://it.slashdot.org/story/25/06/06/2033225/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/06/06</span><span class="invisible">/2033225/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a> <a href="https://schleuss.online/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/PumaBot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PumaBot</span></a> <a href="https://mastodon.thenewoil.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> brute forces <a href="https://mastodon.thenewoil.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> credentials to breach devices</p><p><a href="https://www.bleepingcomputer.com/news/security/new-pumabot-botnet-brute-forces-ssh-credentials-to-breach-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-pumabot-botnet-brute-forces-ssh-credentials-to-breach-devices/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>