101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

485
active users

#keylogger

0 posts0 participants0 posts today
Henning<p><span class="h-card" translate="no"><a href="https://social.heise.de/@heisec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>heisec</span></a></span> </p><p>Auf <a href="https://berlin.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> niemals die vorinstallierte Tastatur verwenden, gerade bei <a href="https://berlin.social/tags/Samsung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Samsung</span></a> mit seiner bloatware!</p><p>Stattdessen <a href="https://berlin.social/tags/Heliboard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Heliboard</span></a> (wenn man Autokorrektur braucht) oder <a href="https://berlin.social/tags/Florisboard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Florisboard</span></a> (um stattdessen die Tastatur so anzupassen, dass man auch so schreiben kann)</p><p>Software-Tastaturen sind (theoretisch) <a href="https://berlin.social/tags/Keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keylogger</span></a> und brauchen volles Vertrauen!</p>
Dissent Doe :cupofcoffee:<p>Today's reminder of the insider threat involves a pharmacist in Maryland who over a period of 8 years or more, used keyloggers and installed spyware on about 400 computers at the University of Maryland Medical System so he could spy on female co-workers in private moments at work (such as changing clothes, breastfeeding their babies), and in their homes. He was reportedly fired in October 2024, and was able to get another job in another healthcare facility in Maryland because there has been no criminal charges filed against him yet and UMMS apparently didn't alert his new employer. </p><p>If Maryland law is like my state's laws, the hospital may be barred legally from revealing what happened if asked for a recommendation by the new employer. And it seems the Maryland state pharmacy board can't just suspend a license unless there's been a conviction, so the failure to have criminal charges filed already seems to have put more potential victims at risk. </p><p>Unsurprisingly, a potential class action lawsuit has already been filed against UMMS with six plaintiffs so far. There are estimates that there are more than 80 victims of the now-former employee. </p><p>Some of the media coverage on the case: <a href="https://thedailyrecord.com/2025/04/04/six-women-sue-umms-claiming-staffer-spied-on-them-after-security-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedailyrecord.com/2025/04/04/</span><span class="invisible">six-women-sue-umms-claiming-staffer-spied-on-them-after-security-breach/</span></a></p><p><a href="https://infosec.exchange/tags/InsiderThreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InsiderThreat</span></a> <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> <a href="https://infosec.exchange/tags/workplace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>workplace</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Brad<p>Social media post I wrote about <a href="https://infosec.exchange/tags/RemcosRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemcosRAT</span></a> for my employer at <a href="https://www.linkedin.com/posts/unit42_remcos-rat-keylogger-activity-7304958245322768385-tu-a/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_remc</span><span class="invisible">os-rat-keylogger-activity-7304958245322768385-tu-a/</span></a> and <a href="https://x.com/malware_traffic/status/1899207006939947440" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">x.com/malware_traffic/status/1</span><span class="invisible">899207006939947440</span></a></p><p>2025-03-10 (Monday): <a href="https://infosec.exchange/tags/Remcos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Remcos</span></a> <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> activity. Email distribution used a zip archive attachment with a .7z file extension. During a test infection, we saw indicators of a <a href="https://infosec.exchange/tags/Keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keylogger</span></a> and a Hacking tool to view browser passwords.</p><p>More info at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2025-03-10-IOCs-for-Remcos-RAT-activity.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2025-03-10-IOCs-for-Remcos-RAT-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the infection traffic and the associated <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> files are available at <a href="https://malware-traffic-analysis.net/2025/03/10/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/03/10/index.html</span></a></p>
Hackread.com<p>🚨 Alert for Windows users! A new variant of Snake Keylogger is targeting <a href="https://mstdn.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> users worldwide with over 280 million blocked infection attempts globally.</p><p>🔗 Learn more: <a href="https://hackread.com/snake-keylogger-variant-windows-data-telegram-bots/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/snake-keylogger-v</span><span class="invisible">ariant-windows-data-telegram-bots/</span></a></p><p> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mstdn.social/tags/Hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackers</span></a> <a href="https://mstdn.social/tags/Keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keylogger</span></a></p>
DeFrisselle ☑️<p>Investigating Malicious Hardware with Industrial CT: <a href="https://www.lumafield.com/article/investigating-malicious-hardware-with-industrial-ct" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lumafield.com/article/investig</span><span class="invisible">ating-malicious-hardware-with-industrial-ct</span></a> </p><p><a href="https://mastodon.sdf.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.sdf.org/tags/Cables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cables</span></a> <a href="https://mastodon.sdf.org/tags/Thunderbold" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Thunderbold</span></a><br><a href="https://mastodon.sdf.org/tags/Malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malicious</span></a> <a href="https://mastodon.sdf.org/tags/Keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keylogger</span></a></p>
Marek :troll_face:<p>Windows 11 24H2 dostaje automatycznie keyloggera, znaczy się recall. Bawcie się dobrze. </p><p><a href="https://www.youtube.com/watch?v=G9FRadIkkE0" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=G9FRadIkkE0</span><span class="invisible"></span></a></p><p><a href="https://101010.pl/tags/windows" class="mention hashtag" rel="tag">#<span>windows</span></a> <a href="https://101010.pl/tags/windows11" class="mention hashtag" rel="tag">#<span>windows11</span></a> <a href="https://101010.pl/tags/spyware" class="mention hashtag" rel="tag">#<span>spyware</span></a> <a href="https://101010.pl/tags/keylogger" class="mention hashtag" rel="tag">#<span>keylogger</span></a></p>
Linux Is Awesome<p>⚠️ Pidgin users warned of ss-otr plugin containing a keylogger, shares screenshots. Immediate uninstall is advised. ⚠️</p><p>Source: <a href="https://pidgin.im/posts/2024-08-malicious-plugin/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pidgin.im/posts/2024-08-malici</span><span class="invisible">ous-plugin/</span></a></p><p><a href="https://mastodon.social/tags/Pidgin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pidgin</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keylogger</span></a></p>
Brad<p>Social media post I authored for my employer at <a href="https://www.linkedin.com/posts/unit42_malspam-guloader-remcos-ugcPost-7234210583800135680-3F6J/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_mals</span><span class="invisible">pam-guloader-remcos-ugcPost-7234210583800135680-3F6J/</span></a> and <a href="https://x.com/Unit42_Intel/status/1828444963001995599" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">x.com/Unit42_Intel/status/1828</span><span class="invisible">444963001995599</span></a></p><p>2024-08-26 (Monday): <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malspam</span></a> pushing <a href="https://infosec.exchange/tags/GuLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GuLoader</span></a> for <a href="https://infosec.exchange/tags/Remcos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Remcos</span></a> <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> (<a href="https://infosec.exchange/tags/RemcosRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemcosRAT</span></a>). Steals login credentials and runs <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a>. Indicators available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-08-26-GuLoader-for-Remcos-RAT-IOCs.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2024-08-26-GuLoader-for-Remcos-RAT-IOCs.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the GuLoader/Remcos RAT infection traffic and the associated <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malspam</span></a>, <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> and artifacts are available at <a href="https://malware-traffic-analysis.net/2024/08/26/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/08/26/index.html</span></a></p>
9x0rg<p>So vous utilisez Pidgin/XMPP avec le plugin `oss-otr`, ce dernier contient un keylogger.</p><p>À désinstaller immédiatement.<br> <a href="https://pidgin.im/posts/2024-08-malicious-plugin/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pidgin.im/posts/2024-08-malici</span><span class="invisible">ous-plugin/</span></a></p><p><a href="https://mamot.fr/tags/XMPP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XMPP</span></a> <a href="https://mamot.fr/tags/Pidgin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pidgin</span></a> <a href="https://mamot.fr/tags/KeyLogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KeyLogger</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>Cybercriminals are using <a href="https://infosec.exchange/tags/Scalable_Vector_Graphics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scalable_Vector_Graphics</span></a> (<a href="https://infosec.exchange/tags/SVG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SVG</span></a>) files to deliver malware because SVG is an XML-based vector image format for two-dimensional graphics that supports interactivity and animation. SVG files can natively contain <a href="https://infosec.exchange/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> code, which can be executed by browsers when the SVG is loaded. <br> They do this by leveraging the <a href="https://infosec.exchange/tags/AutoSmuggle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AutoSmuggle</span></a> tool introduced in May 2022. This tool embeds malicious files into SVG/HTML content, bypassing security measures. Notably, SVG files were exploited to distribute <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> in 2015 and the <a href="https://infosec.exchange/tags/Ursnif" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ursnif</span></a> malware in January 2017. A significant advancement occurred in 2022, with malware like <a href="https://infosec.exchange/tags/QakBot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QakBot</span></a> being delivered through SVG files containing embedded .zip archives. AutoSmuggle campaigns in December 2023 and January 2024 delivered the <a href="https://infosec.exchange/tags/XWorm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XWorm</span></a> <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> and <a href="https://infosec.exchange/tags/Agent_Tesla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Agent_Tesla</span></a> <a href="https://infosec.exchange/tags/Keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keylogger</span></a>, respectively, showcasing a shift towards embedding executable files directly within SVG files to evade detection by Secure Email Gateways (<a href="https://infosec.exchange/tags/SEGs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SEGs</span></a>). This evolution underscores the need for updated security measures to combat sophisticated malware delivery methods. <br> The misuse of SVG files for malware distribution dates back to 2015, with ransomware being one of the first to be delivered through this vector.<br> Original report: <a href="https://cofense.com/blog/svg-files-abused-in-emerging-campaigns/" rel="nofollow noopener" target="_blank">Cofense</a></p>
Linux Magazine<p>Is someone listening in on your typing? Chris Binnie shows you how acoustic keyloggers work <a href="https://www.linux-magazine.com/Issues/2024/278/Acoustic-Keyloggers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Issues/2024</span><span class="invisible">/278/Acoustic-Keyloggers</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> <a href="https://fosstodon.org/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://fosstodon.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://fosstodon.org/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://fosstodon.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://fosstodon.org/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a></p>
heavyboots<p>Just to be sure everyone knows this and yet ANOTHER reason to not install these apps on your phone. The built-in browsers in the TikTok, Instagram, FB etc apps log your keystrokes (and therefore your passwords) if you visit a site from the in-app browser. </p><p><a href="https://www.abc.net.au/news/2022-08-22/tiktok-in-app-browser-can-monitor-keystrokes-researcher-finds/101356198" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">abc.net.au/news/2022-08-22/tik</span><span class="invisible">tok-in-app-browser-can-monitor-keystrokes-researcher-finds/101356198</span></a></p><p><a href="https://mastodon.social/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> <a href="https://mastodon.social/tags/tiktok" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tiktok</span></a> <a href="https://mastodon.social/tags/instagram" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>instagram</span></a> <a href="https://mastodon.social/tags/facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>facebook</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
Tarnkappe.info<p>📬 EvilExtractor: Windows-Malware stiehlt mehr als nur Passwörter<br><a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/Dropbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dropbox</span></a> <a href="https://social.tchncs.de/tags/EvilExtractor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EvilExtractor</span></a> <a href="https://social.tchncs.de/tags/Keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keylogger</span></a> <a href="https://social.tchncs.de/tags/Kodex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kodex</span></a> <a href="https://social.tchncs.de/tags/pdf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pdf</span></a> <a href="https://social.tchncs.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://social.tchncs.de/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://social.tchncs.de/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://social.tchncs.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.tchncs.de/tags/WindowsMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsMalware</span></a> <a href="https://tarnkappe.info/artikel/it-sicherheit/malware/evilextractor-windows-malware-stiehlt-mehr-als-nur-passwoerter-273352.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tarnkappe.info/artikel/it-sich</span><span class="invisible">erheit/malware/evilextractor-windows-malware-stiehlt-mehr-als-nur-passwoerter-273352.html</span></a></p>
Tarnkappe.info<p>📬 VPN-Software kam mit iranischer Spyware<br><a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/Geheimdienste" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Geheimdienste</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/Bitdefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitdefender</span></a> <a href="https://social.tchncs.de/tags/CryptoWallet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CryptoWallet</span></a> <a href="https://social.tchncs.de/tags/Iran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iran</span></a> <a href="https://social.tchncs.de/tags/Keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Keylogger</span></a> <a href="https://social.tchncs.de/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://social.tchncs.de/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://tarnkappe.info/artikel/datenschutz/vpn-software-kam-mit-iranischer-spyware-262844.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tarnkappe.info/artikel/datensc</span><span class="invisible">hutz/vpn-software-kam-mit-iranischer-spyware-262844.html</span></a></p>
James_inthe_box<p>A new one on me; <a href="https://infosec.exchange/tags/viotto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>viotto</span></a> <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> </p><p><a href="https://app.any.run/tasks/908f81a5-f60e-48a5-908e-f959c60d23a7" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/908f81a5-f60</span><span class="invisible">e-48a5-908e-f959c60d23a7</span></a></p><p>with Precision support dll. cc <span class="h-card"><a href="https://infosec.exchange/@da_667" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>da_667</span></a></span></p>
Patryk Krawaczyński<p>Keysniffer (keylogger) jako moduł do jądra Linuksa (<a href="https://nfsec.pl/security/5827" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">nfsec.pl/security/5827</span><span class="invisible"></span></a>) <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> <a href="https://infosec.exchange/tags/keysniffer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keysniffer</span></a> <a href="https://infosec.exchange/tags/module" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>module</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/twittermigration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>twittermigration</span></a></p>
Karl Voit :emacs: :orgmode:<p>Orga­ni­za­tions that create soft­ware assets will have to forbid the use of <a href="https://graz.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> <a href="https://graz.social/tags/Copilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copilot</span></a> and other AI-assisted tools, lest they unwit­tingly cont­a­m­i­nate those soft­ware assets with <a href="https://graz.social/tags/license" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>license</span></a> viola­tions and intel­lec­tual-prop­erty infringe­ments <a href="https://matthewbutterick.com/chron/this-copilot-is-stupid-and-wants-to-kill-me.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">matthewbutterick.com/chron/thi</span><span class="invisible">s-copilot-is-stupid-and-wants-to-kill-me.html</span></a> <a href="https://graz.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://graz.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://graz.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://graz.social/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a></p>
Boiling Steam<p>Some top 100,000 websites collect everything you type—before you hit submit: <a href="https://arstechnica.com/?p=1854097" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1854097</span><span class="invisible"></span></a> <a href="https://mastodon.cloud/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.cloud/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://mastodon.cloud/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a></p>
Gert<p>Thousands of Popular Websites See What You Type—Before You Hit Submit</p><p>A surprising number of the top 100,000 websites effectively include keyloggers that covertly snag everything you type into a form.<br><a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> </p><p><a href="https://www.wired.com/story/leaky-forms-keyloggers-meta-tiktok-pixel-study/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/leaky-forms-ke</span><span class="invisible">yloggers-meta-tiktok-pixel-study/</span></a></p>
Tarnkappe.info<p>📬 Leaky Forms: wie Webseiten eure Daten klauen<br><a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/G%C3%BCne%C5%9FAcar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GüneşAcar</span></a> <a href="https://social.tchncs.de/tags/KeyLogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KeyLogger</span></a> <a href="https://social.tchncs.de/tags/KULeuven" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KULeuven</span></a> <a href="https://social.tchncs.de/tags/LeakInspector" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LeakInspector</span></a> <a href="https://social.tchncs.de/tags/RadboudUniversity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RadboudUniversity</span></a> <a href="https://social.tchncs.de/tags/UniversityofLausanne" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UniversityofLausanne</span></a> <a href="https://tarnkappe.info/artikel/datenschutz/leaky-forms-wie-webseiten-eure-daten-klauen-229350.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tarnkappe.info/artikel/datensc</span><span class="invisible">hutz/leaky-forms-wie-webseiten-eure-daten-klauen-229350.html</span></a></p>