mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

585
comptes actifs

#vulnerability

16 messages10 participants0 message aujourd’hui
JOSHI CONSULTANCY SERVICES<p>Your website is at risk. </p><p>This no-nonsense guide gives businesses, developers, and individuals the clear steps to transition from Drupal 7 or another CMS, fast and hassle-free.</p><p>Learn more about the Drupal 7 trap: <a href="https://jos.cx/drupal7-trap" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">jos.cx/drupal7-trap</span><span class="invisible"></span></a></p><p><a href="https://drupal.community/tags/Drupal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Drupal</span></a> <a href="https://drupal.community/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://drupal.community/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://drupal.community/tags/upgrade" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>upgrade</span></a> <a href="https://drupal.community/tags/CMS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CMS</span></a></p>
BeyondMachines :verified:<p>Multiple vulnerabilities reported in Tridium Niagara Framework</p><p>Researchers discovered 10 critical vulnerabilities (CVE-2025-3936 through CVE-2025-3945) in Tridium's widely-deployed Niagara Framework, an IoT middleware platform connecting HVAC, lighting, and security systems. The vulnerabilities can be chained together to enable complete system compromise, allowing adjacent attackers to intercept tokens, hijack administrator sessions, and execute arbitrary code with root privileges.</p><p>**If you use Tridium Niagara Framework systems (common in HVAC, lighting, and building automation), check to confirm that the system is isolated from the internet and accessible only from trusted networks. Then plan an update to the latest patched versions. Also check for proper encrypted communication between Tridium Niagara and all other components to prevent interception of sensitive data.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-tridium-niagara-framework-u-w-q-s-0/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/multiple-vulnerabilities-reported-in-tridium-niagara-framework-u-w-q-s-0/gD2P6Ple2L</span></a></p>
Alexandre Dulaunoy<p>I love the <span class="h-card" translate="no"><a href="https://infosec.exchange/@github" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>github</span></a></span> Security Advisory Database because they actually preserve the data from rejected advisories including the original information and the reason for rejection.</p><p>It’s clearly much more insightful than just having a bare ID marked as "rejected."</p><p>You can easily spot this in vulnerability-lookup: <a href="https://vulnerability.circl.lu/vuln/cve-2025-54371#related" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulnerability.circl.lu/vuln/cv</span><span class="invisible">e-2025-54371#related</span></a></p><p>Yet another great example of why having diverse sources for vulnerability data matters.</p><p><a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
BeyondMachines :verified:<p>Mozilla releases updates for Firefox, 18 vulnerabilities patched, multiple critical</p><p>Mozilla released Firefox and Thunderbird security updates addressing multiple high-severity vulnerabilities with CVSS scores up to 9.8, including several memory safety bugs and JavaScript engine flaws that could enable arbitrary code execution and system compromise. The patches affect Firefox 141, multiple Firefox ESR versions (115.26, 128.13, 140.1), and corresponding Thunderbird releases.</p><p>**Time to update your Mozilla Firefox, Thunderbird and the Firefox based browsers (Waterfox, LibreWolf, Zen...). Yes, there is a difference between the CVSS score severity and Mozilla severity. But realistically, it's much faster to just update the browser than burn time on debating the severity and then finding out that hackers did find a way to exploit it - after they hacked you. So update the browsers, all tabs reopen automatically.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/mozilla-releases-updates-for-firefox-18-vulnerabilities-patched-multiple-critical-q-0-k-m-8/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/mozilla-releases-updates-for-firefox-18-vulnerabilities-patched-multiple-critical-q-0-k-m-8/gD2P6Ple2L</span></a></p>
Pyrzout :vm:<p>Hackers Injected Malicious Firefox Packages in Arch Linux Repo <a href="https://gbhackers.com/hackers-injected-malicious-firefox-packages/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/hackers-injected</span><span class="invisible">-malicious-firefox-packages/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/FirefoxNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FirefoxNews</span></a> <a href="https://social.skynetcloud.site/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a></p>
CVE Program<p>The Rust Project is now a CVE Numbering Authority (CNA) assigning CVE IDs for repositories, packages, &amp; websites maintained by the Rust Project<br> <a href="https://cve.org/Media/News/item/news/2025/07/22/The-Rust-Project-Added-as-CNA" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cve.org/Media/News/item/news/2</span><span class="invisible">025/07/22/The-Rust-Project-Added-as-CNA</span></a> <br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/cna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cna</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
CVE Program<p>TCS-CERT is now a CVE Numbering Authority (CNA) assigning CVE IDs for vulnerabilities related to TCS-CERT’s customers’ environment and vulnerabilities related to research conducted by Cyber Solutions by Thales’ Intrusion and Application Security Team <br> <br><a href="https://cve.org/Media/News/item/news/2025/07/22/TCS-CERT-Added-as-CNA" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cve.org/Media/News/item/news/2</span><span class="invisible">025/07/22/TCS-CERT-Added-as-CNA</span></a> </p><p><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/cna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cna</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
CERT-EU<p><a href="https://infosec.exchange/tags/CERTEU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CERTEU</span></a> <br><a href="https://infosec.exchange/tags/ENISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ENISA</span></a> <br><a href="https://infosec.exchange/tags/CSIRT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSIRT</span></a> <br><a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> </p><p><a href="https://cert.europa.eu/blog/sharepoint-vulnerabilities-joint-statement" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cert.europa.eu/blog/sharepoint</span><span class="invisible">-vulnerabilities-joint-statement</span></a></p>
CVE Program<p>Minutes from the CVE Board teleconference meeting on July 9 are now available <br> <br><a href="https://www.mail-archive.com/cve-editorial-board-list@mitre.org/msg00283.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mail-archive.com/cve-editorial</span><span class="invisible">-board-list@mitre.org/msg00283.html</span></a> <br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://mastodon.social/tags/hssedi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hssedi</span></a> <a href="https://mastodon.social/tags/cisa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisa</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Hackread.com<p>📢 Microsoft reveals 3 Chinese state-backed hacker groups, including Linen Typhoon, Violet Typhoon, and Storm-2603, are exploiting <a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharePoint</span></a> flaws, breaching over 100 organisations.</p><p>Read: <a href="https://hackread.com/microsoft-chinese-state-hackers-exploit-sharepoint-flaws/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/microsoft-chinese</span><span class="invisible">-state-hackers-exploit-sharepoint-flaws/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a></p>
Hackread.com<p>Hackers are exploiting critical <a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharePoint</span></a> vulnerabilities to breach global targets, including governments and corporations.</p><p>Read: <a href="https://hackread.com/hackers-exploit-microsoft-sharepoint-flaws-breaches/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/hackers-exploit-m</span><span class="invisible">icrosoft-sharepoint-flaws-breaches/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p>
Diego Córdoba 🇦🇷<p>Grave vulnerabilidad en Microsoft Sharepoint</p><p>Office 365 no solamente es un conjunto de herramientas horrible para trabajar, sino que también es inseguro 👇 </p><p><a href="https://arstechnica.com/security/2025/07/sharepoint-vulnerability-with-9-8-severity-rating-is-under-exploit-across-the-globe/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/sharepoint-vulnerability-with-9-8-severity-rating-is-under-exploit-across-the-globe/</span></a></p><p><a href="https://mstdn.io/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mstdn.io/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://mstdn.io/tags/cve_2025_53770" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve_2025_53770</span></a> <a href="https://mstdn.io/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://mstdn.io/tags/sharepoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sharepoint</span></a> <a href="https://mstdn.io/tags/office365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>office365</span></a></p>
IT News<p>SharePoint vulnerability with 9.8 severity rating under exploit across globe - Authorities and researchers are sounding the alarm over the ... - <a href="https://arstechnica.com/security/2025/07/sharepoint-vulnerability-with-9-8-severity-rating-is-under-exploit-across-the-globe/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/sharepoint-vulnerability-with-9-8-severity-rating-is-under-exploit-across-the-globe/</span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/sharepoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sharepoint</span></a> <a href="https://schleuss.online/tags/webshells" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webshells</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it</p>
Pyrzout :vm:<p>PHP PDO Flaw Allows Attackers to Inject Malicious SQL Commands <a href="https://gbhackers.com/php-pdo-flaw/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gbhackers.com/php-pdo-flaw/</span><span class="invisible"></span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>/vulnerability <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/PHP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PHP</span></a></p>
CVE Program<p>1,133 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of July 7, 2025 <br> <br><a href="https://www.cisa.gov/news-events/bulletins/sb25-195" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/bulletins</span><span class="invisible">/sb25-195</span></a> <br> <br><a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/CVEID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVEID</span></a> <a href="https://mastodon.social/tags/CVSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVSS</span></a> <a href="https://mastodon.social/tags/CWE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CWE</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityManagement</span></a> <a href="https://mastodon.social/tags/HSSEDI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HSSEDI</span></a> <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a></p>
Hackread.com<p>Microsoft confirms active exploits of two SharePoint vulnerabilities, urges immediate patching for on-prem users.</p><p>Read: <a href="https://hackread.com/microsoft-hackers-exploit-sharepoint-flaws-patch-now/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/microsoft-hackers</span><span class="invisible">-exploit-sharepoint-flaws-patch-now/</span></a></p><p><a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mstdn.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharePoint</span></a> <a href="https://mstdn.social/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a></p>
BeyondMachines :verified:<p>Ukrainian Military Intelligence claims cyberattack on Russia's energy giant Gazprom</p><p>Ukraine's Main Intelligence Directorate claims responsibility for a cyberattack on July 17, 2025, against Russian state energy giant Gazprom that allegedly wiped critical data and rendered systems inoperable, compromising corporate databases, SCADA systems, financial records, and user profiles for over 20,000 employees. Gazprom and Russian authorities have commented on the claims.</p><p>****<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/incident" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incident</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/ukrainian-military-intelligence-claims-cyberattack-on-russia-s-energy-giant-gazprom-c-r-7-8-k/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/ukrainian-military-intelligence-claims-cyberattack-on-russia-s-energy-giant-gazprom-c-r-7-8-k/gD2P6Ple2L</span></a></p>
Audubon Ballroon (he/him)<p>"It's the initial moments of an <a href="https://mastodon.social/tags/adopted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adopted</span></a> <a href="https://mastodon.social/tags/dog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dog</span></a>. Showing <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> &amp; deep <a href="https://mastodon.social/tags/gratitude" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gratitude</span></a> is the quality of an <a href="https://mastodon.social/tags/innocent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innocent</span></a>. A kind deed can bring out the best. 🙏🪄"</p><p>@1hakankapucu </p><p><a href="https://mastodon.social/tags/pet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pet</span></a> <a href="https://mastodon.social/tags/animal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>animal</span></a></p>
Stan Stewart (muz4now)<p>Tracking The Toughest of All – Singing Vulnerability - <a class="hashtag" rel="nofollow noopener noreferrer" href="https://bsky.app/search?q=%23creativity" target="_blank">#creativity</a> and <a class="hashtag" rel="nofollow noopener noreferrer" href="https://bsky.app/search?q=%23vulnerability" target="_blank">#vulnerability</a> - <a class="hashtag" rel="nofollow noopener noreferrer" href="https://bsky.app/search?q=%23recording" target="_blank">#recording</a> <a class="hashtag" rel="nofollow noopener noreferrer" href="https://bsky.app/search?q=%23singing" target="_blank">#singing</a> <a href="https://muz4now.com/2025/tracking-the-toughest-of-all-singing-vulnerability/" rel="nofollow noopener noreferrer" target="_blank">muz4now.com/2025/trackin...</a><br><br><a href="https://muz4now.com/2025/tracking-the-toughest-of-all-singing-vulnerability/" rel="nofollow noopener noreferrer" target="_blank">Tracking The Toughest of All -...</a></p>
Stan Stewart aka muz4now<p>Tracking The Toughest of All – Singing Vulnerability<br>- <a href="https://mastodon.world/tags/creativity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>creativity</span></a> and <a href="https://mastodon.world/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> -<br><a href="https://mastodon.world/tags/recording" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>recording</span></a> <a href="https://mastodon.world/tags/singing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>singing</span></a><br><a href="https://muz4now.com/2025/tracking-the-toughest-of-all-singing-vulnerability/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">muz4now.com/2025/tracking-the-</span><span class="invisible">toughest-of-all-singing-vulnerability/</span></a></p>