ioc.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
INDICATORS OF COMPROMISE (IOC) InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.

Administered by:

Server stats:

1.3K
active users

#imc

0 posts0 participants0 posts today
katzenberger<p><a href="https://tldr.nettime.org/tags/Frontex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Frontex</span></a> will never tow a yacht back to the open sea, and traffickers specialized on <a href="https://tldr.nettime.org/tags/GoldenPassport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoldenPassport</span></a> schemes are not criminalized either. They're operating worldwide and openly, under names such as “Global Citizen Solutions”, with job titles such as “boutique investment consultant”. They promise to be "focused on finding the right residency or citizenship by investment program for individuals wishing to secure their future and become global citizens."</p><p>Such companies are not organized in a mafia either, but in the prestigious "Investment Migration Council" (<a href="https://tldr.nettime.org/tags/IMC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMC</span></a>), which claims to be an “organization in special consultative status with the Economic and Social Council of the United Nations since 2019”.</p><p>So this news item from today sounds quite amusing:</p><p>»The EU Court of Justice agreed with the Commission, finding that such a scheme “amounts to the commercialisation of the granting of the status of national of a member state and, by extension, Union citizenship, which is incompatible with the conception of that fundamental status that stems from the EU Treaties”.«</p><p><a href="https://www.euronews.com/my-europe/2025/04/29/maltas-golden-passport-scheme-rejected-by-eu-top-court" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">euronews.com/my-europe/2025/04</span><span class="invisible">/29/maltas-golden-passport-scheme-rejected-by-eu-top-court</span></a></p><p><a href="https://www.globalcitizensolutions.com/about-us/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">globalcitizensolutions.com/abo</span><span class="invisible">ut-us/</span></a></p><p><a href="https://investmentmigration.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">investmentmigration.org/</span><span class="invisible"></span></a></p><p><a href="https://tldr.nettime.org/tags/Malta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malta</span></a> <a href="https://tldr.nettime.org/tags/EUpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EUpol</span></a> <a href="https://tldr.nettime.org/tags/CJEU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CJEU</span></a></p>
ASX Mkt. Sensitive<p>Immuron ( <a href="https://mastodon-grafa.social/tags/IMC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMC</span></a> ) has released " Immuron Travelan highest sales in history " on Thu 10 Apr at 11:20 AEST <a href="https://mastodon-grafa.social/tags/government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>government</span></a> <a href="https://mastodon-grafa.social/tags/ClinicalTrials" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClinicalTrials</span></a> <a href="https://mastodon-grafa.social/tags/Australia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Australia</span></a> <a href="https://mastodon-grafa.social/tags/media" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>media</span></a> <a href="https://mastodon-grafa.social/tags/Strategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Strategy</span></a> <br><a href="https://grafa.com/asset/immuron-ltd-2491-imc.asx?utm_source=asxmktsensitive&amp;utm_medium=mastodon&amp;utm_campaign=imc.asx" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grafa.com/asset/immuron-ltd-24</span><span class="invisible">91-imc.asx?utm_source=asxmktsensitive&amp;utm_medium=mastodon&amp;utm_campaign=imc.asx</span></a></p>
ASX Mkt Sensitive<p>Immuron ( <a href="https://mastodon.grafa.com/tags/IMC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMC</span></a> ) has released " IMC and Calmino to treat Irritable Bowel Syndrome (IBS) " on Wed 05 Mar at 09:50 AEST <a href="https://mastodon.grafa.com/tags/government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>government</span></a> <a href="https://mastodon.grafa.com/tags/ClinicalTrials" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClinicalTrials</span></a> <a href="https://mastodon.grafa.com/tags/Australia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Australia</span></a> <a href="https://mastodon.grafa.com/tags/media" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>media</span></a> <a href="https://mastodon.grafa.com/tags/Strategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Strategy</span></a> <br><a href="https://grafa.com/asset/immuron-ltd-2491-imc.asx?utm_source=asxmktsensitive&amp;utm_medium=mastodon&amp;utm_campaign=imc.asx" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">grafa.com/asset/immuron-ltd-24</span><span class="invisible">91-imc.asx?utm_source=asxmktsensitive&amp;utm_medium=mastodon&amp;utm_campaign=imc.asx</span></a></p>
83r71n<p>A critical vulnerability, identified as CVE-2024-20356, has been found in Cisco&#39;s Integrated Management Controller (IMC). This flaw allows for command injection, potentially giving attackers the ability to gain root access to systems. The vulnerability is located in the web-based management interface of the IMC, which is used for remotely managing Cisco hardware. The issue arises from insufficient user input validation in the IMC interface, allowing an authenticated, remote attacker with administrative privileges to inject malicious commands.</p><p>Security researchers from Nettitude have developed a Proof of Concept (PoC) exploit, named &quot;CISCown,&quot; to demonstrate this vulnerability. The exploit involves sending crafted commands through the web interface, enabling attackers to execute arbitrary code with root privileges on the underlying operating system of Cisco hardware. This PoC exploit is part of a toolkit developed by Nettitude and is available on GitHub. It uses parameters such as target IP, username, and password to automate the exploitation process and deploy a telnetd root shell service on compromised devices.</p><p>The release of this PoC exploit signifies a critical threat level for organizations using affected Cisco products. Gaining root access can lead to data theft, system downtime, and further network compromise. Cisco has responded by releasing software updates to address this vulnerability. It is strongly recommended that all affected organizations apply these updates immediately, as no known workaround mitigates this vulnerability.</p><p>The affected products include a range of Cisco servers and computing systems, such as the 5000 Series Enterprise Network Compute Systems (ENCS), Catalyst 8300 Series Edge uCPE, UCS C-Series M5, M6, and M7 Rack Servers in standalone mode, UCS E-Series Servers, and UCS S-Series Storage Servers. Users and administrators are advised to visit Cisco’s official security advisory page and the Nettitude GitHub repository hosting the exploitation toolkit for more detailed information and access to the updates.</p><p><a href="https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">labs.nettitude.com/blog/cve-20</span><span class="invisible">24-20356-jailbreaking-a-cisco-appliance-to-run-doom/</span></a></p><p><a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/cisco" class="mention hashtag" rel="tag">#<span>cisco</span></a> <a href="https://ioc.exchange/tags/vulnerability" class="mention hashtag" rel="tag">#<span>vulnerability</span></a> <a href="https://ioc.exchange/tags/imc" class="mention hashtag" rel="tag">#<span>imc</span></a> <a href="https://ioc.exchange/tags/cve" class="mention hashtag" rel="tag">#<span>cve</span></a> <a href="https://ioc.exchange/tags/poc" class="mention hashtag" rel="tag">#<span>poc</span></a> <a href="https://ioc.exchange/tags/nettitude" class="mention hashtag" rel="tag">#<span>nettitude</span></a> <a href="https://ioc.exchange/tags/encs" class="mention hashtag" rel="tag">#<span>encs</span></a> <a href="https://ioc.exchange/tags/ucpe" class="mention hashtag" rel="tag">#<span>ucpe</span></a> <a href="https://ioc.exchange/tags/ucs" class="mention hashtag" rel="tag">#<span>ucs</span></a> <a href="https://ioc.exchange/tags/m5" class="mention hashtag" rel="tag">#<span>m5</span></a> <a href="https://ioc.exchange/tags/m6" class="mention hashtag" rel="tag">#<span>m6</span></a> <a href="https://ioc.exchange/tags/m7" class="mention hashtag" rel="tag">#<span>m7</span></a> <a href="https://ioc.exchange/tags/github" class="mention hashtag" rel="tag">#<span>github</span></a></p>
83r71n<p>A vulnerability in Cisco&#39;s Integrated Management Controller (IMC) allows attackers with certain privileges to gain full control of the system. This vulnerability, identified as CVE-2024-20295, is due to improper validation of user input on the IMC Command Line Interface (CLI). It affects various Cisco products, including wireless controllers, APIC servers, and Business Edition appliances. However, UCS B-Series, C-Series Rack Servers, S-Series Storage Servers, and X-Series Modular Systems are not vulnerable as they do not support Cisco IMC. Cisco has released software updates to address this issue, available for free to customers with service contracts. Users are advised to update their software immediately to mitigate the risk.</p><p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">sec.cloudapps.cisco.com/securi</span><span class="invisible">ty/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ</span></a></p><p><a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/cisco" class="mention hashtag" rel="tag">#<span>cisco</span></a> <a href="https://ioc.exchange/tags/imc" class="mention hashtag" rel="tag">#<span>imc</span></a> <a href="https://ioc.exchange/tags/vulnerability" class="mention hashtag" rel="tag">#<span>vulnerability</span></a> <a href="https://ioc.exchange/tags/cve" class="mention hashtag" rel="tag">#<span>cve</span></a> <a href="https://ioc.exchange/tags/cli" class="mention hashtag" rel="tag">#<span>cli</span></a> <a href="https://ioc.exchange/tags/apic" class="mention hashtag" rel="tag">#<span>apic</span></a> <a href="https://ioc.exchange/tags/servers" class="mention hashtag" rel="tag">#<span>servers</span></a> <a href="https://ioc.exchange/tags/software" class="mention hashtag" rel="tag">#<span>software</span></a> <a href="https://ioc.exchange/tags/update" class="mention hashtag" rel="tag">#<span>update</span></a></p>