mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.1K
active users

#passwords

24 posts17 participants2 posts today

This dumb password rule is from Movistar.

Min 7 and max 8 characters for password! Also to be different than the
username: the user name is automatically generated and is based on the
surname of the user with some characters replaced by digits :)
Has been that way for more than 10 years.

dumbpasswordrules.com/sites/mo

dumbpasswordrules.comMovistar - Dumb Password RulesMin 7 and max 8 characters for password! Also to be different than the username: the user name is automatically generated and is based on the surname of the user with some characters replaced by digits :) Has been that way for more than 10 years.

RAVEN STEALER UNMASKED: Telegram-Based Data Exfiltration

Raven Stealer is a modern, lightweight information-stealing malware developed in Delphi and C++. It targets Chromium-based browsers to extract sensitive data, including passwords, cookies, and payment details. The malware uses a modular architecture and UPX packing to evade detection. It executes stealthily and exfiltrates data via Telegram bot integration. Distributed through GitHub and promoted on Telegram, Raven Stealer's user-friendly interface and dynamic module support make it attractive in the commodity malware ecosystem. The malware's capabilities include credential theft, browser data harvesting, and real-time exfiltration, posing a significant threat when used maliciously.

Pulse ID: 6884f157954b5e95a3f11907
Pulse Link: otx.alienvault.com/pulse/6884f
Pulse Author: AlienVault
Created: 2025-07-26 15:16:39

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Global Botnet Targets Outdated VoIP Devices With Telnet

Security researchers have uncovered a global botnet campaign targeting VoIP-
enabled routers that are configured with default or weak Telnet passwords. This

botnet exhibits characteristics similar to the Mirai botnet. It was initially detected
in rural New Mexico and later traced to over 500 infected systems worldwide.
The threat highlights how exposed and poorly secured VoIP infrastructure is being
exploited to power large-scale botnets. Organizations that rely on VoIP technology
especially utilities and ISPs face an immediate risk if their devices are internet
facing and not properly secured.

Pulse ID: 68849f774a7bb224bf2cf18c
Pulse Link: otx.alienvault.com/pulse/68849
Pulse Author: cryptocti
Created: 2025-07-26 09:27:19

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

After $380M hack, #Clorox_corp sues its “service desk” vendor [#Cognizant_corp] for simply giving out #passwords, 20250723,
by Nate A,
arstechnica.com/security/2025/

『But Clorox says that the "debilitating" breach was not its fault. It had outsourced the "service desk" part of its IT security operations to the massive services company Cognizant …』
-- right; hmm hmm.

Picture of Clorox products.
Ars Technica · After $380M hack, Clorox sues its “service desk” vendor for simply giving out passwordsBy Nate Anderson