nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,8 Tsd.
aktive Profile

#Keylogger

0 Beiträge0 Beteiligte0 Beiträge heute
not Evander Sinque<p>Es gibt nichts zu sehen, bitte gehen Sie weiter. <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
OMG 🇪🇺 🇺🇦 :linux:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@politik" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>politik</span></a></span><br>Können wir <a href="https://infosec.exchange/tags/Palantir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Palantir</span></a> und die Vordergrundgeschalteten <a href="https://infosec.exchange/tags/AIassistenten" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIassistenten</span></a> als <a href="https://infosec.exchange/tags/digitaleWaffen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaleWaffen</span></a> deklarieren und sie als das bezeichnen, was sie vordergründig sind, <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a>. Was wurde aus dem <a href="https://infosec.exchange/tags/bundestrojaner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bundestrojaner</span></a>? Steckt man Palantir da als Malwarebundle zusammen?<br><a href="https://de.m.wikipedia.org/wiki/Keylogger" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">de.m.wikipedia.org/wiki/Keylog</span><span class="invisible">ger</span></a></p><p><span class="h-card" translate="no"><a href="https://digitalcourage.social/@digitalcourage" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>digitalcourage</span></a></span> <br><span class="h-card" translate="no"><a href="https://chaos.social/@netzpolitik_feed" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>netzpolitik_feed</span></a></span> <br><span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>heiseonline</span></a></span> </p><p><a href="https://infosec.exchange/tags/Politik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Politik</span></a> <a href="https://infosec.exchange/tags/Propaganda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Propaganda</span></a> <a href="https://infosec.exchange/tags/Fakenews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fakenews</span></a></p>
Jérôme Herbinet - FLOSS sower<p>💡 Sous <a href="https://pouet.chapril.org/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a>, à défaut d'avoir e/OS/, on pense à remplacer nos applis propriétaires par des <a href="https://pouet.chapril.org/tags/LogicielsLibres" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LogicielsLibres</span></a> et <a href="https://pouet.chapril.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> ... appels, agenda, SMS, cloud, galerie, vidéos YouTube, GPS / cartographie, magasins d'applications, etc... mais QUID de votre clavier ? </p><p>Et oui, il faut aussi remplacer votre clavier car c'est aussi via cette application que les données fuitent ! </p><p>Dites-vous que le clavier natif de <a href="https://pouet.chapril.org/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> est un véritable <a href="https://pouet.chapril.org/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> 🕵️ </p><p>Mon clavier actuel : <a href="https://f-droid.org/packages/helium314.keyboard/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">f-droid.org/packages/helium314</span><span class="invisible">.keyboard/</span></a></p>
Dissent Doe :cupofcoffee:<p>Today's reminder of the insider threat involves a pharmacist in Maryland who over a period of 8 years or more, used keyloggers and installed spyware on about 400 computers at the University of Maryland Medical System so he could spy on female co-workers in private moments at work (such as changing clothes, breastfeeding their babies), and in their homes. He was reportedly fired in October 2024, and was able to get another job in another healthcare facility in Maryland because there has been no criminal charges filed against him yet and UMMS apparently didn't alert his new employer. </p><p>If Maryland law is like my state's laws, the hospital may be barred legally from revealing what happened if asked for a recommendation by the new employer. And it seems the Maryland state pharmacy board can't just suspend a license unless there's been a conviction, so the failure to have criminal charges filed already seems to have put more potential victims at risk. </p><p>Unsurprisingly, a potential class action lawsuit has already been filed against UMMS with six plaintiffs so far. There are estimates that there are more than 80 victims of the now-former employee. </p><p>Some of the media coverage on the case: <a href="https://thedailyrecord.com/2025/04/04/six-women-sue-umms-claiming-staffer-spied-on-them-after-security-breach/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedailyrecord.com/2025/04/04/</span><span class="invisible">six-women-sue-umms-claiming-staffer-spied-on-them-after-security-breach/</span></a></p><p><a href="https://infosec.exchange/tags/InsiderThreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InsiderThreat</span></a> <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://infosec.exchange/tags/workplace" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>workplace</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Pyrzout :vm:<p>DeepSeek’s Malware-Generation Capabilities Put to Test – Source: www.securityweek.com <a href="https://ciso2ciso.com/deepseeks-malware-generation-capabilities-put-to-test-source-www-securityweek-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/deepseeks-malwar</span><span class="invisible">e-generation-capabilities-put-to-test-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://social.skynetcloud.site/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a></p>
Pyrzout :vm:<p>DeepSeek’s Malware-Generation Capabilities Put to Test <a href="https://www.securityweek.com/deepseeks-malware-generation-capabilities-put-to-test/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/deepseeks-mal</span><span class="invisible">ware-generation-capabilities-put-to-test/</span></a> <a href="https://social.skynetcloud.site/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://social.skynetcloud.site/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a></p>
Pyrzout :vm:<p>DeepSeek’s Malware-Generation Capabilities Put to Test <a href="https://www.securityweek.com/deepseeks-malware-generation-capabilities-put-to-test/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/deepseeks-mal</span><span class="invisible">ware-generation-capabilities-put-to-test/</span></a> <a href="https://social.skynetcloud.site/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://social.skynetcloud.site/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a></p>
Brad<p>Social media post I wrote about <a href="https://infosec.exchange/tags/RemcosRAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemcosRAT</span></a> for my employer at <a href="https://www.linkedin.com/posts/unit42_remcos-rat-keylogger-activity-7304958245322768385-tu-a/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_remc</span><span class="invisible">os-rat-keylogger-activity-7304958245322768385-tu-a/</span></a> and <a href="https://x.com/malware_traffic/status/1899207006939947440" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">x.com/malware_traffic/status/1</span><span class="invisible">899207006939947440</span></a></p><p>2025-03-10 (Monday): <a href="https://infosec.exchange/tags/Remcos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Remcos</span></a> <a href="https://infosec.exchange/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> activity. Email distribution used a zip archive attachment with a .7z file extension. During a test infection, we saw indicators of a <a href="https://infosec.exchange/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a> and a Hacking tool to view browser passwords.</p><p>More info at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2025-03-10-IOCs-for-Remcos-RAT-activity.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2025-03-10-IOCs-for-Remcos-RAT-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> of the infection traffic and the associated <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> files are available at <a href="https://malware-traffic-analysis.net/2025/03/10/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">025/03/10/index.html</span></a></p>
Tino Eberl<p>‼️ Ein neuer Angriff mit dem Snake-<a href="https://mastodon.online/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a> betrifft Millionen von <a href="https://mastodon.online/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a>-Nutzern.</p><p>Die <a href="https://mastodon.online/tags/Schadsoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Schadsoftware</span></a> zeichnet unbemerkt <a href="https://mastodon.online/tags/Tastatureingaben" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tastatureingaben</span></a> auf, um <a href="https://mastodon.online/tags/Passw%C3%B6rter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Passwörter</span></a> und sensible Daten zu stehlen. </p><p>Laut Fortinet wurden seit Jahresbeginn über 280 Millionen <a href="https://mastodon.online/tags/Infektionsversuche" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infektionsversuche</span></a> registriert. Besonders verbreitet ist der Angriff in <a href="https://mastodon.online/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a>, der <a href="https://mastodon.online/tags/T%C3%BCrkei" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Türkei</span></a>, <a href="https://mastodon.online/tags/Indonesien" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Indonesien</span></a>, <a href="https://mastodon.online/tags/Taiwan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Taiwan</span></a> und <a href="https://mastodon.online/tags/Spanien" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spanien</span></a>. Der Keylogger wird meist über <a href="https://mastodon.online/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a>-Mails verbreitet.</p><p><a href="https://www.golem.de/news/zugangsdaten-in-gefahr-windows-nutzer-millionenfach-mit-keylogger-attackiert-2502-193493.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/zugangsdaten-in-</span><span class="invisible">gefahr-windows-nutzer-millionenfach-mit-keylogger-attackiert-2502-193493.html</span></a></p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p>
Pyrzout :vm:<p>Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots – Source:hackread.com <a href="https://ciso2ciso.com/snake-keylogger-variant-hits-windows-steals-data-via-telegram-bots-sourcehackread-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/snake-keylogger-</span><span class="invisible">variant-hits-windows-steals-data-via-telegram-bots-sourcehackread-com/</span></a> <a href="https://social.skynetcloud.site/tags/1CyberSecurityNewsPost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>1CyberSecurityNewsPost</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.skynetcloud.site/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://social.skynetcloud.site/tags/Hackread" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackread</span></a> <a href="https://social.skynetcloud.site/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.skynetcloud.site/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/Snake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Snake</span></a> <a href="https://social.skynetcloud.site/tags/Bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bots</span></a></p>
Pyrzout :vm:<p>Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots <a href="https://hackread.com/snake-keylogger-variant-windows-data-telegram-bots/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/snake-keylogger-v</span><span class="invisible">ariant-windows-data-telegram-bots/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.skynetcloud.site/tags/keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keylogger</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/Snake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Snake</span></a> <a href="https://social.skynetcloud.site/tags/Bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bots</span></a></p>
Hackread.com<p>🚨 Alert for Windows users! A new variant of Snake Keylogger is targeting <a href="https://mstdn.social/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> users worldwide with over 280 million blocked infection attempts globally.</p><p>🔗 Learn more: <a href="https://hackread.com/snake-keylogger-variant-windows-data-telegram-bots/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/snake-keylogger-v</span><span class="invisible">ariant-windows-data-telegram-bots/</span></a></p><p> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://mstdn.social/tags/Hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackers</span></a> <a href="https://mstdn.social/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a></p>
Netzpalaver<p>Check Points Top-Malware-Ranking - 16,5 % aller Malware-Infektionen im Januar durch Formbook verursacht</p><p><a href="https://social.tchncs.de/tags/Bildungssektor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bildungssektor</span></a> @CheckPointSW <a href="https://social.tchncs.de/tags/CredentialStealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialStealer</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/GlobalThreatIndex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GlobalThreatIndex</span></a> <a href="https://social.tchncs.de/tags/Infostealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infostealer</span></a> <a href="https://social.tchncs.de/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p><p><a href="https://netzpalaver.de/2025/02/14/check-points-top-malware-ranking-165-aller-malware-infektionen-im-januar-durch-formbook-verursacht/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/02/14/chec</span><span class="invisible">k-points-top-malware-ranking-165-aller-malware-infektionen-im-januar-durch-formbook-verursacht/</span></a></p>
Netzpalaver<p>Gefährliche Jobangebote für Software-Entwickler auf Linkedin</p><p><a href="https://social.tchncs.de/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> @Bitdefender_DE <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersicherheit</span></a> <a href="https://social.tchncs.de/tags/Infostealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infostealer</span></a> <a href="https://social.tchncs.de/tags/Jobangebot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jobangebot</span></a> <a href="https://social.tchncs.de/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a> <a href="https://social.tchncs.de/tags/Kryptominer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kryptominer</span></a> <a href="https://social.tchncs.de/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinkedIn</span></a> <a href="https://social.tchncs.de/tags/SoftwareEntwickler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareEntwickler</span></a></p><p><a href="https://netzpalaver.de/2025/02/06/gefaehrliche-jobangebote-fuer-software-entwickler-auf-linkedin/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/02/06/gefa</span><span class="invisible">ehrliche-jobangebote-fuer-software-entwickler-auf-linkedin/</span></a></p>
Netzpalaver<p>Jailbreaking von Deepseek</p><p><a href="https://social.tchncs.de/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/Datenexfiltration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenexfiltration</span></a> <a href="https://social.tchncs.de/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> <a href="https://social.tchncs.de/tags/GenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenAI</span></a> <a href="https://social.tchncs.de/tags/Keylogger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keylogger</span></a> <a href="https://social.tchncs.de/tags/k%C3%BCnstlicheIntelligenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>künstlicheIntelligenz</span></a> <a href="https://social.tchncs.de/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> @PaloAltoNetworks <a href="https://social.tchncs.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.tchncs.de/tags/Unit42" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Unit42</span></a></p><p><a href="https://netzpalaver.de/2025/01/31/jailbreaking-von-deepseek/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/01/31/jail</span><span class="invisible">breaking-von-deepseek/</span></a></p>
Fortgeführter Thread

Wenn man jedoch einmal Opfer eines #Infostealer geworden sein sollte, reicht auch ein starkes Masterpasswort nicht, Das Passwort kann über einen #Keylogger mitgelesen und exfiltriert worden sein.

Da hilft dann nur noch das zügige Auswechseln aller Passwörter. Je weniger im betroffenen Passwort-Tresor drin waren, desto besser. Alles nicht ständig benötigte sollte man ohnehin nicht dauerhaft auf einem PC speichern, der online geht.

Nur entnehmbare Token für #2FA können vor sowas schützen.

IONOS-Kunden aufgepasst! Es werden massiv sehr gut imitierte #Phishing Mails versendet. Mails von IONOS sollten sofort gelöscht werden, bitte nicht öffnen und nicht auf den Link in der Mail klicken! Loggt euch ausschliesslich über die offizielle #IONOS Website in euren #Account ein und schaut euch dort eure Benachrichtigungen an! Die gefälschten Login-Seiten sehen täuschend echt aus. Die enthaltenen #Scripte sind verschleiert (#obfuscatet) und mit einem bösen, fiesen #Keylogger versehen.