hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

8.9K
active users

#security

507 posts347 participants13 posts today

Open source runs on passion and a little help from you.
We're raising $400 to keep SecBSD project alive.
That covers 1 month of power, internet, and food for 2 devs.
If you believe in open source, please consider donating.

Paypal: project@secbsd.org
Bitcoin: bc1q08d6vh93h43m9gpleu8kn9l6kuk3jrnxwrth2x
Solana: 7W3LDYfz8xehd6jAnjVhTMXWPUyXeaFE9ukpYnMs2jXH
Ethereum: 0xAe621c93985e199e7FA3CEE6D4F8CC956D2c933

DATE: May 02, 2025 at 11:55PM
SOURCE: HIPAA Watch from JD Supra

Direct article link at end of text block below.

PIH Health Settles HIPAA Violations for $600,000 t.co/2nm64jjhyq

Here are any URLs found in the article text:

t.co/2nm64jjhyq

Articles can be found by scrolling down the page at jdsupra.com/ under the title "Latest Updates".

-------------------------------------------------

Private, vetted email list for mental health professionals: clinicians-exchange.org

Most healthcare security and privacy posts related to IT or infosec are at @rsstosecurity

-------------------------------------------------

JD SupraPIH Health Settles HIPAA Violations for $600,000 | JD SupraPIH Health, a health care entity located in California, suffered a data breach in June 2019 when 45 employee email accounts were compromised in a...

I just had a weird experience at Target—my girlfriend and I were bra shopping and this fucking sketchy crew-cut white guy in jeans and a kinda well-worn—not quite clean—white undershirt is keeping an eye on us and another woman. Then he speaks into a hidden collar mic. I couldn't quite hear him, but it sounded like he was talking about a woman.

Then, as we were checking out, he was over by the restrooms—still looking sketchy as fuck—and watching people (including us). Then I caught him following us out, but he turned around and went back in after a few feet.

We got back to the car and I told my partner my observations. I thought he might be private security...or some conservative transvestigator fucker—it really could have been either (or both) with the way he was acting.

We decided to go back in to make sure he wasn't hassling anyone. Sure enough, he was still looking sketchy AF and following people around the women's section and towards the exit. So we reported him. The lady who worked there told us he's their security, and that she'd let him know we said he should be less fucking sketchy.

China's National Computer Network Emergency Response Technical Team/Coordination Center disclosed malicious foreign websites and IP addresses.

The identified sources were mainly from the US, Sweden, and India. The attacks involved botnet creation, backdoor exploitation, and data theft.

Seven of the nine malicious IP addresses were traced to locations in the US. The cyberattacks posed a significant threat to institutions and internet users in China.

globaltimes.cn/page/202505/133

www.globaltimes.cnChina's cybersecurity center discloses malicious foreign websites and IP addresses, mainly from US, Sweden and India - Global Times

2025-05-02 RDP #Honeypot IOCs - 4179 scans
Thread with top 3 features in each category and links to the full dataset
#DFIR #InfoSec

Top IPs:
45.117.177.2 - 2451
152.42.203.145 - 930
161.35.201.228 - 357

Top ASNs:
AS131353 - 2451
AS14061 - 1308
AS142002 - 93

Top Accounts:
hello - 3948
142.93.8.59 - 135
Administr - 21

Top ISPs:
NHANHOA - 2451
DigitalOcean, LLC - 1308
Scloud Pte Ltd - 93

Top Clients:
Unknown - 4179

Top Software:
Unknown - 4179

Top Keyboards:
Unknown - 4179

Top IP Classification:
hosting - 3477
hosting & proxy - 369
Unknown - 309

Pastebin links with full 24-hr RDP Honeypot IOC Lists:
pastebin.com/RZQrKvgE

Pastebin2025-05-02_stats.json - Pastebin.comPastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

2025-05-02 RDP #Honeypot IOCs - 2786 scans
Thread with top 3 features in each category and links to the full dataset
#DFIR #InfoSec

Top IPs:
45.117.177.2 - 1634
152.42.203.145 - 620
161.35.201.228 - 238

Top ASNs:
AS131353 - 1634
AS14061 - 872
AS142002 - 62

Top Accounts:
hello - 2632
142.93.8.59 - 90
Administr - 14

Top ISPs:
NHANHOA - 1634
DigitalOcean, LLC - 872
Scloud Pte Ltd - 62

Top Clients:
Unknown - 2786

Top Software:
Unknown - 2786

Top Keyboards:
Unknown - 2786

Top IP Classification:
hosting - 2318
hosting & proxy - 246
Unknown - 206

Pastebin links with full 24-hr RDP Honeypot IOC Lists:
pastebin.com/2CuNjFEi

Pastebin2025-05-02_stats.json - Pastebin.comPastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

2025-05-02 RDP #Honeypot IOCs - 1393 scans
Thread with top 3 features in each category and links to the full dataset
#DFIR #InfoSec

Top IPs:
45.117.177.2 - 817
152.42.203.145 - 310
161.35.201.228 - 119

Top ASNs:
AS131353 - 817
AS14061 - 436
AS142002 - 31

Top Accounts:
hello - 1316
142.93.8.59 - 45
Administr - 7

Top ISPs:
NHANHOA - 817
DigitalOcean, LLC - 436
Scloud Pte Ltd - 31

Top Clients:
Unknown - 1393

Top Software:
Unknown - 1393

Top Keyboards:
Unknown - 1393

Top IP Classification:
hosting - 1159
hosting & proxy - 123
Unknown - 103

Pastebin links with full 24-hr RDP Honeypot IOC Lists:
pastebin.com/HW5A5iJQ

Pastebin2025-05-02_stats.json - Pastebin.comPastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.