<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[DoTheNeedful Forums - All Forums]]></title>
		<link>https://dotheneedful.online/forums/</link>
		<description><![CDATA[DoTheNeedful Forums - https://dotheneedful.online/forums]]></description>
		<pubDate>Sun, 05 Apr 2026 09:00:10 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Native XFCE on android]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=49</link>
			<pubDate>Mon, 26 May 2025 19:35:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=11">monr0e</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=49</guid>
			<description><![CDATA[I found something interesting. Apparently you can install a full xfce environment (or LXQt or MATE for that matter) in Termux, complete with Xorg and Pipewire. It even permits installing a debian container for full-fat linux applications. <br />
<br />
I haven't quite gotten it to work yet. I'm playing around with hardware acceleration, but Vulkan on Adreno is a bit hit&amp;miss. I'll post an update if I get it working.]]></description>
			<content:encoded><![CDATA[I found something interesting. Apparently you can install a full xfce environment (or LXQt or MATE for that matter) in Termux, complete with Xorg and Pipewire. It even permits installing a debian container for full-fat linux applications. <br />
<br />
I haven't quite gotten it to work yet. I'm playing around with hardware acceleration, but Vulkan on Adreno is a bit hit&amp;miss. I'll post an update if I get it working.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Tremors!]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=48</link>
			<pubDate>Thu, 01 May 2025 15:33:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=17">sintax</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=48</guid>
			<description><![CDATA[Tremors is coming back. There's an 8 episode series for it coming to Netflix in August. And....Kevin Bacon will be in the series.<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=14" target="_blank" title="">Screenshot 2025-05-01 at 11.31.46 AM.png</a> (Size: 165.2 KB / Downloads: 1)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Tremors is coming back. There's an 8 episode series for it coming to Netflix in August. And....Kevin Bacon will be in the series.<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=14" target="_blank" title="">Screenshot 2025-05-01 at 11.31.46 AM.png</a> (Size: 165.2 KB / Downloads: 1)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Gibby's Cybersecurity Roundup 4/4/2025]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=42</link>
			<pubDate>Fri, 04 Apr 2025 18:26:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=3">gibby</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=42</guid>
			<description><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /></div>
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the third edition of Gibby’s cybersecurity roundup. Each week, I’ll try to compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  width="332" height="50" alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
Well, look at that! The usual suspects in the software world apparently took a collective "no new critical flaws this week" vacation. So, instead of our regularly scheduled panic, let's dive into the KEV list – the Hall of Shame for bugs <span style="font-style: italic;" class="mycode_i">already</span> being used to cause trouble. And wouldn't you know it, this week's inductees are all bringing the high-stakes drama! <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> </span><span style="font-size: large;" class="mycode_size">Google Chrome Zero-day Vulnerability Exploited in the Wild (CVE-2025-2783)</span><br />
<a href="https://threatprotect.qualys.com/2025/03/26/google-chrome-zero-day-vulnerability-exploited-in-the-wild-cve-2025-2783/" target="_blank" rel="noopener" class="mycode_url">https://threatprotect.qualys.com/2025/03...2025-2783/</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> Cisco Smart Licensing Utility Vulnerabilities</span><br />
<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...u-7gHMzWmw</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> Apache Tomcat CVE-2025-24813</span><br />
<a href="https://www.rapid7.com/blog/post/2025/03/19/etr-apache-tomcat-cve-2025-24813-what-you-need-to-know/" target="_blank" rel="noopener" class="mycode_url">https://www.rapid7.com/blog/post/2025/03...d-to-know/</a><br />
<br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  width="228" height="50" alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Google's Kyle Chrzanowski says big companies need robot overlords for their digital who's-who, automating everything from birth (account creation) to death (access revocation) of employee identities. Apparently, tackling the messy middle of governance before a massive single sign-on migration is the smart way to avoid a chaotic digital identity crisis. <br />
<a href="https://www.googlecloudcommunity.com/gc/Community-Blog/The-Director-s-Guide-IAM-Security-at-Scale/ba-p/882952" target="_blank" rel="noopener" class="mycode_url">https://www.googlecloudcommunity.com/gc/...a-p/882952</a><br />
<br />
Sophos detailed this week that evilnginx is still remarkably effective in grabbing credentials and MFA codes<br />
<a href="https://news.sophos.com/en-us/2025/03/28/stealing-user-credentials-with-evilginx/" target="_blank" rel="noopener" class="mycode_url">https://news.sophos.com/en-us/2025/03/28...-evilginx/</a><br />
<br />
Checkpoint reassures its customers that the bad guys are "totally lying" about what they were able to get into and steal and to trust them instead: <br />
<a href="https://support.checkpoint.com/results/sk/sk183307" target="_blank" rel="noopener" class="mycode_url">https://support.checkpoint.com/results/sk/sk183307</a><br />
<br />
China hackers are *still* exploiting buffer overflow flaw in Ivanti's Connect Secure, Policy Secure, and ZTA gateway products. CVE-2025-22457, released in February was originally marked as "low severity" and now that bad guys are kicking in the door reliably, they reconsidered and have classified the flaw as "critical." Idiots.<br />
<a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457" target="_blank" rel="noopener" class="mycode_url">https://forums.ivanti.com/s/article/Apri...2025-22457</a><br />
<br />
Don't use DMARC? Don't expect Outlook, Live, and Hotmail accounts to get your messages then. After May 5, DMARC is mandatory to get messages to inboxes. <br />
<a href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/strengthening-email-ecosystem-outlook%E2%80%99s-new-requirements-for-high%E2%80%90volume-senders/4399730" target="_blank" rel="noopener" class="mycode_url">https://techcommunity.microsoft.com/blog...rs/4399730</a><br />
<br />
After *WEEKS* of denying it, Oracle finally acknowledged a breach occurred, surprising absolutely no one<br />
<a href="https://www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen" target="_blank" rel="noopener" class="mycode_url">https://www.bloomberg.com/news/articles/...ata-stolen</a><br />
<br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  width="197" height="40" alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
Stratus Red Team is a tool by Datadog that can “detonate” offensive attack techniques against a live cloud environment so you can validate that your detections work as expected. I’m highlighting here that the docs now provide coverage matrices of MITRE ATT&amp;CK tactics and techniques currently covered for different cloud platforms: AWS, Azure, GCP, Kubernetes, Entra ID, and EKS.<br />
<a href="https://stratus-red-team.cloud/attack-techniques/mitre-attack-coverage-matrices" target="_blank" rel="noopener" class="mycode_url">https://stratus-red-team.cloud/attack-te...e-matrices</a><br />
<br />
Wiz has launched a new site for security teams to track critical cloud vulnerabilities, offering handy filters like technology and exploit status. Now you can finally stop manually sifting through endless CVEs and let Wiz be your cloud's most wanted poster.<br />
<a href="https://www.wiz.io/vulnerability-database" target="_blank" rel="noopener" class="mycode_url">https://www.wiz.io/vulnerability-database</a><br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  width="197" height="40" alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
By Thalium comes a Rust-powered digital bloodhound for Linux, sniffing out sneaky kernel-level rootkits with its fancy integrity checks. It's like giving your kernel a superhero sidekick, but instead of a cape, it wields the Linux Rust API.<br />
<a href="https://github.com/thalium/rkchk" target="_blank" rel="noopener" class="mycode_url">https://github.com/thalium/rkchk</a><br />
<br />
This tool sniffs out Google Workspace Domain-Wide Delegation slip-ups in Google Cloud, essentially showing you where you left the keys to the digital kingdom under the doormat. Consider it your auditor for those "oops, did I leave that open?" moments in your GCP setup.<br />
<a href="https://github.com/n0tspam/delepwn" target="_blank" rel="noopener" class="mycode_url">https://github.com/n0tspam/delepwn</a><br />
<br />
ServiceNow, the cloud platform that promised IT zen, turns out to have some hidden ninja stars, according to MDSec's Tim Carrington. Apparently, you can weaponize its own features like custom actions and discovery scripts to run rogue code and generally cause digital mayhem.<br />
<a href="https://www.mdsec.co.uk/2025/03/red-teaming-with-servicenow" target="_blank" rel="noopener" class="mycode_url">https://www.mdsec.co.uk/2025/03/red-team...servicenow</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  width="250" height="40" alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
I sure hope you have a wonderful rest of your week.<br />
<br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week.<br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /> </div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /></div>
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the third edition of Gibby’s cybersecurity roundup. Each week, I’ll try to compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  width="332" height="50" alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
Well, look at that! The usual suspects in the software world apparently took a collective "no new critical flaws this week" vacation. So, instead of our regularly scheduled panic, let's dive into the KEV list – the Hall of Shame for bugs <span style="font-style: italic;" class="mycode_i">already</span> being used to cause trouble. And wouldn't you know it, this week's inductees are all bringing the high-stakes drama! <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> </span><span style="font-size: large;" class="mycode_size">Google Chrome Zero-day Vulnerability Exploited in the Wild (CVE-2025-2783)</span><br />
<a href="https://threatprotect.qualys.com/2025/03/26/google-chrome-zero-day-vulnerability-exploited-in-the-wild-cve-2025-2783/" target="_blank" rel="noopener" class="mycode_url">https://threatprotect.qualys.com/2025/03...2025-2783/</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> Cisco Smart Licensing Utility Vulnerabilities</span><br />
<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...u-7gHMzWmw</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> Apache Tomcat CVE-2025-24813</span><br />
<a href="https://www.rapid7.com/blog/post/2025/03/19/etr-apache-tomcat-cve-2025-24813-what-you-need-to-know/" target="_blank" rel="noopener" class="mycode_url">https://www.rapid7.com/blog/post/2025/03...d-to-know/</a><br />
<br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  width="228" height="50" alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Google's Kyle Chrzanowski says big companies need robot overlords for their digital who's-who, automating everything from birth (account creation) to death (access revocation) of employee identities. Apparently, tackling the messy middle of governance before a massive single sign-on migration is the smart way to avoid a chaotic digital identity crisis. <br />
<a href="https://www.googlecloudcommunity.com/gc/Community-Blog/The-Director-s-Guide-IAM-Security-at-Scale/ba-p/882952" target="_blank" rel="noopener" class="mycode_url">https://www.googlecloudcommunity.com/gc/...a-p/882952</a><br />
<br />
Sophos detailed this week that evilnginx is still remarkably effective in grabbing credentials and MFA codes<br />
<a href="https://news.sophos.com/en-us/2025/03/28/stealing-user-credentials-with-evilginx/" target="_blank" rel="noopener" class="mycode_url">https://news.sophos.com/en-us/2025/03/28...-evilginx/</a><br />
<br />
Checkpoint reassures its customers that the bad guys are "totally lying" about what they were able to get into and steal and to trust them instead: <br />
<a href="https://support.checkpoint.com/results/sk/sk183307" target="_blank" rel="noopener" class="mycode_url">https://support.checkpoint.com/results/sk/sk183307</a><br />
<br />
China hackers are *still* exploiting buffer overflow flaw in Ivanti's Connect Secure, Policy Secure, and ZTA gateway products. CVE-2025-22457, released in February was originally marked as "low severity" and now that bad guys are kicking in the door reliably, they reconsidered and have classified the flaw as "critical." Idiots.<br />
<a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457" target="_blank" rel="noopener" class="mycode_url">https://forums.ivanti.com/s/article/Apri...2025-22457</a><br />
<br />
Don't use DMARC? Don't expect Outlook, Live, and Hotmail accounts to get your messages then. After May 5, DMARC is mandatory to get messages to inboxes. <br />
<a href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/strengthening-email-ecosystem-outlook%E2%80%99s-new-requirements-for-high%E2%80%90volume-senders/4399730" target="_blank" rel="noopener" class="mycode_url">https://techcommunity.microsoft.com/blog...rs/4399730</a><br />
<br />
After *WEEKS* of denying it, Oracle finally acknowledged a breach occurred, surprising absolutely no one<br />
<a href="https://www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen" target="_blank" rel="noopener" class="mycode_url">https://www.bloomberg.com/news/articles/...ata-stolen</a><br />
<br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  width="197" height="40" alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
Stratus Red Team is a tool by Datadog that can “detonate” offensive attack techniques against a live cloud environment so you can validate that your detections work as expected. I’m highlighting here that the docs now provide coverage matrices of MITRE ATT&amp;CK tactics and techniques currently covered for different cloud platforms: AWS, Azure, GCP, Kubernetes, Entra ID, and EKS.<br />
<a href="https://stratus-red-team.cloud/attack-techniques/mitre-attack-coverage-matrices" target="_blank" rel="noopener" class="mycode_url">https://stratus-red-team.cloud/attack-te...e-matrices</a><br />
<br />
Wiz has launched a new site for security teams to track critical cloud vulnerabilities, offering handy filters like technology and exploit status. Now you can finally stop manually sifting through endless CVEs and let Wiz be your cloud's most wanted poster.<br />
<a href="https://www.wiz.io/vulnerability-database" target="_blank" rel="noopener" class="mycode_url">https://www.wiz.io/vulnerability-database</a><br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  width="197" height="40" alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
By Thalium comes a Rust-powered digital bloodhound for Linux, sniffing out sneaky kernel-level rootkits with its fancy integrity checks. It's like giving your kernel a superhero sidekick, but instead of a cape, it wields the Linux Rust API.<br />
<a href="https://github.com/thalium/rkchk" target="_blank" rel="noopener" class="mycode_url">https://github.com/thalium/rkchk</a><br />
<br />
This tool sniffs out Google Workspace Domain-Wide Delegation slip-ups in Google Cloud, essentially showing you where you left the keys to the digital kingdom under the doormat. Consider it your auditor for those "oops, did I leave that open?" moments in your GCP setup.<br />
<a href="https://github.com/n0tspam/delepwn" target="_blank" rel="noopener" class="mycode_url">https://github.com/n0tspam/delepwn</a><br />
<br />
ServiceNow, the cloud platform that promised IT zen, turns out to have some hidden ninja stars, according to MDSec's Tim Carrington. Apparently, you can weaponize its own features like custom actions and discovery scripts to run rogue code and generally cause digital mayhem.<br />
<a href="https://www.mdsec.co.uk/2025/03/red-teaming-with-servicenow" target="_blank" rel="noopener" class="mycode_url">https://www.mdsec.co.uk/2025/03/red-team...servicenow</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  width="250" height="40" alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
I sure hope you have a wonderful rest of your week.<br />
<br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week.<br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /> </div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Quick lunchtime smashburger!]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=41</link>
			<pubDate>Wed, 26 Mar 2025 17:00:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=4">mistiry</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=41</guid>
			<description><![CDATA[80/20 ground:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=4" target="_blank" title="">1.jpg</a> (Size: 336.3 KB / Downloads: 5)
<!-- end: postbit_attachments_attachment --><br />
<br />
First smash the meat kinda stuck to the parchment paper I used:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=5" target="_blank" title="">2.jpg</a> (Size: 592.53 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<br />
Second smash got it right:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=6" target="_blank" title="">3.jpg</a> (Size: 425.5 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<br />
The flip:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=7" target="_blank" title="">4.jpg</a> (Size: 783.43 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br />
<br />
Cheese added. Didn't know we were out of American, had to use Provolone:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=8" target="_blank" title="">5.jpg</a> (Size: 134.11 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br />
<br />
Look at my buns:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=9" target="_blank" title="">6.jpg</a> (Size: 191.88 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<br />
Burger sauce and lettuce on the left top bun, double-patty and pickles on the left:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=10" target="_blank" title="">7.jpg</a> (Size: 193.83 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<br />
Pro Tip: Wrap your burgers up like they do in fast food. This also applies to most other sandwiches made at home. Trust. <br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=11" target="_blank" title="">8.jpg</a> (Size: 157.86 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br />
<br />
Yummy:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=12" target="_blank" title="">9.jpg</a> (Size: 280.61 KB / Downloads: 8)
<!-- end: postbit_attachments_attachment --><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=13" target="_blank" title="">10.jpg</a> (Size: 329.84 KB / Downloads: 8)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[80/20 ground:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=4" target="_blank" title="">1.jpg</a> (Size: 336.3 KB / Downloads: 5)
<!-- end: postbit_attachments_attachment --><br />
<br />
First smash the meat kinda stuck to the parchment paper I used:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=5" target="_blank" title="">2.jpg</a> (Size: 592.53 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<br />
Second smash got it right:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=6" target="_blank" title="">3.jpg</a> (Size: 425.5 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<br />
The flip:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=7" target="_blank" title="">4.jpg</a> (Size: 783.43 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br />
<br />
Cheese added. Didn't know we were out of American, had to use Provolone:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=8" target="_blank" title="">5.jpg</a> (Size: 134.11 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br />
<br />
Look at my buns:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=9" target="_blank" title="">6.jpg</a> (Size: 191.88 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<br />
Burger sauce and lettuce on the left top bun, double-patty and pickles on the left:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=10" target="_blank" title="">7.jpg</a> (Size: 193.83 KB / Downloads: 4)
<!-- end: postbit_attachments_attachment --><br />
<br />
Pro Tip: Wrap your burgers up like they do in fast food. This also applies to most other sandwiches made at home. Trust. <br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=11" target="_blank" title="">8.jpg</a> (Size: 157.86 KB / Downloads: 7)
<!-- end: postbit_attachments_attachment --><br />
<br />
Yummy:<br />
<!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=12" target="_blank" title="">9.jpg</a> (Size: 280.61 KB / Downloads: 8)
<!-- end: postbit_attachments_attachment --><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://dotheneedful.online/forums/images/attachtypes/image.png" title="JPG Image" border="0" alt=".jpg" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=13" target="_blank" title="">10.jpg</a> (Size: 329.84 KB / Downloads: 8)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[For those who have some kids (we salute you! FIRE!)]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=40</link>
			<pubDate>Fri, 21 Mar 2025 17:22:16 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=5">JollyRgrs</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=40</guid>
			<description><![CDATA[ok, AC/DC jokes aside, I know some of us have kids. Mine are well out of the preschooly cartoony phase but I know others might be a bit closer to this topic.<br />
<br />
<a href="https://www.upworthy.com/90s-cartoons" target="_blank" rel="noopener" class="mycode_url">https://www.upworthy.com/90s-cartoons</a><br />
<br />
Kids programming today, far and wide, is much more "dopamine" delivering hard hitting attention grabbing. great if you want to plop your kid down and use the screen as a babysitter, I guess (that's what they are doing now anyways, right?). But if you actually care about the development of the kids, it isn't the best thing for them. This is a pretty good article to read. Even if you don't plan on feeding your kid 90s kids shows all day, the real kicker here is understanding what the shows are doing to the kids and how it affects them.]]></description>
			<content:encoded><![CDATA[ok, AC/DC jokes aside, I know some of us have kids. Mine are well out of the preschooly cartoony phase but I know others might be a bit closer to this topic.<br />
<br />
<a href="https://www.upworthy.com/90s-cartoons" target="_blank" rel="noopener" class="mycode_url">https://www.upworthy.com/90s-cartoons</a><br />
<br />
Kids programming today, far and wide, is much more "dopamine" delivering hard hitting attention grabbing. great if you want to plop your kid down and use the screen as a babysitter, I guess (that's what they are doing now anyways, right?). But if you actually care about the development of the kids, it isn't the best thing for them. This is a pretty good article to read. Even if you don't plan on feeding your kid 90s kids shows all day, the real kicker here is understanding what the shows are doing to the kids and how it affects them.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Gibby's Cybersecurity Roundup 3/21/25]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=33</link>
			<pubDate>Thu, 20 Mar 2025 19:51:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=3">gibby</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=33</guid>
			<description><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /></div>
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the second edition of Gibby’s cybersecurity roundup. Each week, I’ll try to compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  width="332" height="50" alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
First, lets get started with this weeks new vulnerabilities. While this list is not exhaustive-- there were a touch more than 600 new CVEs assigned this week-- it does cover some of the more popular and higher-risk ones. <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> Apach</span><span style="font-size: large;" class="mycode_size">e Tomcat vulnerability exploited 30 hours after security bulletin released, confluence admins collectively groan in unison.</span><span style="font-size: medium;" class="mycode_size">  </span><br />
Can't make this up-- just 30 hours after the release of the vuln, hackers had a extremely effective and really good exploit for the tomcat service. So, you might want to <a href="https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html" target="_blank" rel="noopener" class="mycode_url">patch this if you haven't already!</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> A Vulnerability in Veeam allows attackers to execute code remotely; because why not?</span><br />
<span style="font-size: small;" class="mycode_size">Veeam has had some doosies lately, but this one is pretty up there. Domain joined backup servers can pew pew code out making it easy for attackers to disto malware. There is a patch, but the race is on before this is added to the known exploited database, so get on it. </span><span style="font-size: small;" class="mycode_size"><a href="https://www.veeam.com/kb4724" target="_blank" rel="noopener" class="mycode_url">https://ww</a></span><span style="font-size: small;" class="mycode_size"><a href="https://www.veeam.com/kb4724" target="_blank" rel="noopener" class="mycode_url">w.veeam.com/kb4724</a></span><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs</span><br />
<span style="font-size: small;" class="mycode_size">tj-actions, a well</span> known and used repo for automating CI/CD silliness had its source changed and hackers were able to get info they shouldn't have. <a href="https://www.cve.org/CVERecord?id=CVE-2025-30066" target="_blank" rel="noopener" class="mycode_url">https://www.cve.org/CVERecord?id=CVE-2025-30066</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c19e00;" class="mycode_color">Medium Risk:</span></span> Another Popular Wordpress Plugin used on 200,000+ sites has a major security flaw; no one is surprised. </span><br />
WP Ghost, a popular WordPress security plugin, has a critical remote code execution vulnerability, allowing server takeover by unauthenticated attackers. <a href="https://patchstack.com/articles/critical-lfi-to-rce-vulnerability-in-wp-ghost-plugin-affecting-200k-sites/" target="_blank" rel="noopener" class="mycode_url">https://patchstack.com/articles/critical...00k-sites/</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c19e00;" class="mycode_color">Medium Risk:</span></span> Some Cisco Routers have a software flaw that allows attacker to DoS the BGP service. </span><br />
Looks like this flaw is contained within the BGP service on Cisco XR routers, but it is a pretty bad thing. Check out the security advisory here: <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bgp-dos-O7stePhX" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...s-O7stePhX</a><br />
<br />
<br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  width="228" height="50" alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Here's a free web scanner that returns some really awesome information:<br />
<a href="https://cyscan.io/" target="_blank" rel="noopener" class="mycode_url">https://cyscan.io/</a><br />
<br />
Into Threat Modeling? TRAIL, a threat modeling process by Trail of Bits, blends RRA and NIST approaches to analyze system architecture for design flaws. It models system components, maps threat actor paths, and documents scenarios, providing both immediate mitigations and strategic recommendations.<br />
<a href="https://blog.trailofbits.com/2025/02/28/threat-modeling-the-trail-of-bits-way" target="_blank" rel="noopener" class="mycode_url">https://blog.trailofbits.com/2025/02/28/...f-bits-way</a><br />
<br />
State Sponsored Hackers (and some red teams (shhhhh)) are leveraging a flaw that was discovered in 2017 and still not patched by Microsoft. <br />
<a href="https://www.zerodayinitiative.com/advisories/ZDI-25-148/2017" target="_blank" rel="noopener" class="mycode_url">https://www.zerodayinitiative.com/adviso...5-148/2017</a> <br />
<br />
Sperm bank breach deposits data into hands of cybercriminals (I didn't want to edit this hilarious article title because its A+ on its own)<br />
<a href="https://www.malwarebytes.com/blog/news/2025/03/sperm-bank-breach-deposits-data-into-hands-of-cybercriminals" target="_blank" rel="noopener" class="mycode_url">https://www.malwarebytes.com/blog/news/2...rcriminals</a><br />
<br />
By Golly G Wizz... Google Buys Wiz (for a metric shittonne of money)<br />
<a href="https://www.reuters.com/technology/cybersecurity/google-agrees-buy-cybersecurity-startup-wiz-32-bln-ft-reports-2025-03-18/" target="_blank" rel="noopener" class="mycode_url">https://www.reuters.com/technology/cyber...025-03-18/</a><br />
<br />
New kali version out! Now with less salt and more theme action! <br />
<a href="https://www.kali.org/blog/kali-linux-2025-1-release/" target="_blank" rel="noopener" class="mycode_url">https://www.kali.org/blog/kali-linux-2025-1-release/</a><br />
<br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  width="197" height="40" alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
Detection Studio is a browser tool that converts Sigma rules to SIEM languages (Splunk, Elasticsearch, Grafana) locally using pySigma. It features pipeline/filter support, persistent workspaces, and rule sharing. <br />
<a href="https://detection.studio/" target="_blank" rel="noopener" class="mycode_url">https://detection.studio/</a> <br />
<br />
Purple Lab simplifies detection rule testing by deploying a lab for log simulation, malware/ATT&amp;CK execution, and sandbox restoration. <br />
<a href="https://github.com/Krook9d/PurpleLab" target="_blank" rel="noopener" class="mycode_url">https://github.com/Krook9d/PurpleLab</a><br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  width="197" height="40" alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
shadow-rs is a rust-based Windows kernel rootkit showcases advanced kernel manipulation with Rust's safety and performance <br />
<a href="https://github.com/joaoviictorti/shadow-rs" target="_blank" rel="noopener" class="mycode_url">https://github.com/joaoviictorti/shadow-rs</a><br />
<br />
Adversary Simulation Success by the folks over at TrustedSec outlines measuring AdSim success via control testing, defensive enlightenment, and professional courtesy, providing metrics for each. <br />
<a href="https://trustedsec.com/blog/measuring-the-success-of-your-adversary-simulations" target="_blank" rel="noopener" class="mycode_url">https://trustedsec.com/blog/measuring-th...imulations</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  width="250" height="40" alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
Keep an eye out on the clickfix campaigns I mentioned last week folks. That activity is really ramping up.<br />
<br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week.<br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /> </div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /></div>
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/O0zT3Ar.png" loading="lazy"  alt="[Image: O0zT3Ar.png]" class="mycode_img" /></div>
<br />
Hi everyone and welcome to the second edition of Gibby’s cybersecurity roundup. Each week, I’ll try to compile items I’ve found unique or interesting as I came across them in the cybersecurity world. I’ll try to keep things succinct and to the point, but if there is something I find particularly interesting I may deep dive into a topic a bit more.<br />
<br />
I'm using some industry terminology here that might not be clear to everyone. If you have questions let me know but in the meantime here's my attempt to make it digestible for everyone:<ul class="mycode_list"><li>TLP: Traffic Light Protocol - a method to classify information from no restrictions (CLEAR) to only shareable between certain people (RED). You can find more information about <a href="https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage" target="_blank" rel="noopener" class="mycode_url">TLP, and its classification levels, here</a><br />
</li>
<li>Blue Team - The Security Team focused on Defense and Detection<br />
</li>
<li>Red team - The Security Team focused on Attacks and Evasion <br />
</li>
</ul>
<br />
If you want to see something added here let me know! <br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/plvm6YX.png" loading="lazy"  width="332" height="50" alt="[Image: plvm6YX.png]" class="mycode_img" /></div>
<br />
First, lets get started with this weeks new vulnerabilities. While this list is not exhaustive-- there were a touch more than 600 new CVEs assigned this week-- it does cover some of the more popular and higher-risk ones. <br />
<br />
<span style="color: #c10300;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">High Risk:</span></span></span><span style="font-size: medium;" class="mycode_size"> Apach</span><span style="font-size: large;" class="mycode_size">e Tomcat vulnerability exploited 30 hours after security bulletin released, confluence admins collectively groan in unison.</span><span style="font-size: medium;" class="mycode_size">  </span><br />
Can't make this up-- just 30 hours after the release of the vuln, hackers had a extremely effective and really good exploit for the tomcat service. So, you might want to <a href="https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html" target="_blank" rel="noopener" class="mycode_url">patch this if you haven't already!</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> A Vulnerability in Veeam allows attackers to execute code remotely; because why not?</span><br />
<span style="font-size: small;" class="mycode_size">Veeam has had some doosies lately, but this one is pretty up there. Domain joined backup servers can pew pew code out making it easy for attackers to disto malware. There is a patch, but the race is on before this is added to the known exploited database, so get on it. </span><span style="font-size: small;" class="mycode_size"><a href="https://www.veeam.com/kb4724" target="_blank" rel="noopener" class="mycode_url">https://ww</a></span><span style="font-size: small;" class="mycode_size"><a href="https://www.veeam.com/kb4724" target="_blank" rel="noopener" class="mycode_url">w.veeam.com/kb4724</a></span><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color">High Risk:</span></span> tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs</span><br />
<span style="font-size: small;" class="mycode_size">tj-actions, a well</span> known and used repo for automating CI/CD silliness had its source changed and hackers were able to get info they shouldn't have. <a href="https://www.cve.org/CVERecord?id=CVE-2025-30066" target="_blank" rel="noopener" class="mycode_url">https://www.cve.org/CVERecord?id=CVE-2025-30066</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c19e00;" class="mycode_color">Medium Risk:</span></span> Another Popular Wordpress Plugin used on 200,000+ sites has a major security flaw; no one is surprised. </span><br />
WP Ghost, a popular WordPress security plugin, has a critical remote code execution vulnerability, allowing server takeover by unauthenticated attackers. <a href="https://patchstack.com/articles/critical-lfi-to-rce-vulnerability-in-wp-ghost-plugin-affecting-200k-sites/" target="_blank" rel="noopener" class="mycode_url">https://patchstack.com/articles/critical...00k-sites/</a><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c19e00;" class="mycode_color">Medium Risk:</span></span> Some Cisco Routers have a software flaw that allows attacker to DoS the BGP service. </span><br />
Looks like this flaw is contained within the BGP service on Cisco XR routers, but it is a pretty bad thing. Check out the security advisory here: <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bgp-dos-O7stePhX" target="_blank" rel="noopener" class="mycode_url">https://sec.cloudapps.cisco.com/security...s-O7stePhX</a><br />
<br />
<br />
 <br />
<hr class="mycode_hr" />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size"> </span></span><br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/TVVm7lW.png" loading="lazy"  width="228" height="50" alt="[Image: TVVm7lW.png]" class="mycode_img" /></div>
<br />
Here's a free web scanner that returns some really awesome information:<br />
<a href="https://cyscan.io/" target="_blank" rel="noopener" class="mycode_url">https://cyscan.io/</a><br />
<br />
Into Threat Modeling? TRAIL, a threat modeling process by Trail of Bits, blends RRA and NIST approaches to analyze system architecture for design flaws. It models system components, maps threat actor paths, and documents scenarios, providing both immediate mitigations and strategic recommendations.<br />
<a href="https://blog.trailofbits.com/2025/02/28/threat-modeling-the-trail-of-bits-way" target="_blank" rel="noopener" class="mycode_url">https://blog.trailofbits.com/2025/02/28/...f-bits-way</a><br />
<br />
State Sponsored Hackers (and some red teams (shhhhh)) are leveraging a flaw that was discovered in 2017 and still not patched by Microsoft. <br />
<a href="https://www.zerodayinitiative.com/advisories/ZDI-25-148/2017" target="_blank" rel="noopener" class="mycode_url">https://www.zerodayinitiative.com/adviso...5-148/2017</a> <br />
<br />
Sperm bank breach deposits data into hands of cybercriminals (I didn't want to edit this hilarious article title because its A+ on its own)<br />
<a href="https://www.malwarebytes.com/blog/news/2025/03/sperm-bank-breach-deposits-data-into-hands-of-cybercriminals" target="_blank" rel="noopener" class="mycode_url">https://www.malwarebytes.com/blog/news/2...rcriminals</a><br />
<br />
By Golly G Wizz... Google Buys Wiz (for a metric shittonne of money)<br />
<a href="https://www.reuters.com/technology/cybersecurity/google-agrees-buy-cybersecurity-startup-wiz-32-bln-ft-reports-2025-03-18/" target="_blank" rel="noopener" class="mycode_url">https://www.reuters.com/technology/cyber...025-03-18/</a><br />
<br />
New kali version out! Now with less salt and more theme action! <br />
<a href="https://www.kali.org/blog/kali-linux-2025-1-release/" target="_blank" rel="noopener" class="mycode_url">https://www.kali.org/blog/kali-linux-2025-1-release/</a><br />
<br />
 <br />
<hr class="mycode_hr" />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/EEG6FZS.png" loading="lazy"  width="197" height="40" alt="[Image: EEG6FZS.png]" class="mycode_img" /></div>
<br />
Detection Studio is a browser tool that converts Sigma rules to SIEM languages (Splunk, Elasticsearch, Grafana) locally using pySigma. It features pipeline/filter support, persistent workspaces, and rule sharing. <br />
<a href="https://detection.studio/" target="_blank" rel="noopener" class="mycode_url">https://detection.studio/</a> <br />
<br />
Purple Lab simplifies detection rule testing by deploying a lab for log simulation, malware/ATT&amp;CK execution, and sandbox restoration. <br />
<a href="https://github.com/Krook9d/PurpleLab" target="_blank" rel="noopener" class="mycode_url">https://github.com/Krook9d/PurpleLab</a><br />
<br />
<hr class="mycode_hr" />
<br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.imgur.com/JkUpDIt.png" loading="lazy"  width="197" height="40" alt="[Image: JkUpDIt.png]" class="mycode_img" /></div>
<br />
shadow-rs is a rust-based Windows kernel rootkit showcases advanced kernel manipulation with Rust's safety and performance <br />
<a href="https://github.com/joaoviictorti/shadow-rs" target="_blank" rel="noopener" class="mycode_url">https://github.com/joaoviictorti/shadow-rs</a><br />
<br />
Adversary Simulation Success by the folks over at TrustedSec outlines measuring AdSim success via control testing, defensive enlightenment, and professional courtesy, providing metrics for each. <br />
<a href="https://trustedsec.com/blog/measuring-the-success-of-your-adversary-simulations" target="_blank" rel="noopener" class="mycode_url">https://trustedsec.com/blog/measuring-th...imulations</a><br />
 <br />
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://i.imgur.com/p227pSB.png" loading="lazy"  width="250" height="40" alt="[Image: p227pSB.png]" class="mycode_img" /></span></span></div>
<br />
Here is a spot where I’ll just generally soapbox when I want to. <br />
 <br />
Keep an eye out on the clickfix campaigns I mentioned last week folks. That activity is really ramping up.<br />
<br />
<br />
<br />
That's it for this week. Thanks for reading, y'all. See you next week.<br />
<br />
<div style="text-align: right;" class="mycode_align"><img src="https://dotheneedful.online/forums/images/tlp/tlpclear.png" style="width:auto;height:auto;max-width:5%;" /> </div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A certain Russian's cookbook]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=39</link>
			<pubDate>Thu, 20 Mar 2025 17:48:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=21">teh_f4ll3n</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=39</guid>
			<description><![CDATA[Hopefully, this will eventually become a gathering of all my favourite dishes and some experiments for you lot to enjoy.]]></description>
			<content:encoded><![CDATA[Hopefully, this will eventually become a gathering of all my favourite dishes and some experiments for you lot to enjoy.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[MARCH MADNESS]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=38</link>
			<pubDate>Thu, 20 Mar 2025 16:39:19 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=3">gibby</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=38</guid>
			<description><![CDATA[I know its a little late but I think it'd be cool to do brackets, even if you're not a huge sportball fan! <br />
<br />
Find a fillable bracket yourself, or download/edit one here: <a href="https://www.cbssports.com/college-basketball/ncaa-tournament/bracket/printable-men/" target="_blank" rel="noopener" class="mycode_url">https://www.cbssports.com/college-basket...table-men/</a><br />
<br />
<br />
Here is mine! <img src="https://i.imgur.com/UC8edYu.png" loading="lazy"  alt="[Image: UC8edYu.png]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[I know its a little late but I think it'd be cool to do brackets, even if you're not a huge sportball fan! <br />
<br />
Find a fillable bracket yourself, or download/edit one here: <a href="https://www.cbssports.com/college-basketball/ncaa-tournament/bracket/printable-men/" target="_blank" rel="noopener" class="mycode_url">https://www.cbssports.com/college-basket...table-men/</a><br />
<br />
<br />
Here is mine! <img src="https://i.imgur.com/UC8edYu.png" loading="lazy"  alt="[Image: UC8edYu.png]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[AI scrapers causing big issues]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=37</link>
			<pubDate>Thu, 20 Mar 2025 14:58:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=5">JollyRgrs</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=37</guid>
			<description><![CDATA[<a href="https://thelibre.news/foss-infrastructure-is-under-attack-by-ai-companies/" target="_blank" rel="noopener" class="mycode_url">https://thelibre.news/foss-infrastructur...companies/</a><br />
<br />
Pretty good article and seems like an issue that will only be growing in problems in the future <img src="https://dotheneedful.online/forums/images/smilies/sad.png" alt="Sad" title="Sad" class="smilie smilie_8" /><br />
<br />
tl;dr the scrapers are hammering websites (especially code repository ones) using different IPs and masking their UAs for each page request causing real performance issues (aside from the fact the data is being scraped against the robots.txt request)]]></description>
			<content:encoded><![CDATA[<a href="https://thelibre.news/foss-infrastructure-is-under-attack-by-ai-companies/" target="_blank" rel="noopener" class="mycode_url">https://thelibre.news/foss-infrastructur...companies/</a><br />
<br />
Pretty good article and seems like an issue that will only be growing in problems in the future <img src="https://dotheneedful.online/forums/images/smilies/sad.png" alt="Sad" title="Sad" class="smilie smilie_8" /><br />
<br />
tl;dr the scrapers are hammering websites (especially code repository ones) using different IPs and masking their UAs for each page request causing real performance issues (aside from the fact the data is being scraped against the robots.txt request)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[MLB Opening Day!!!]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=36</link>
			<pubDate>Thu, 20 Mar 2025 13:59:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=5">JollyRgrs</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=36</guid>
			<description><![CDATA[ok, I don't count the Tokyo games, so really, it starts a week from today! March 27!<br />
<br />
Who's excited? What team are you rooting for?<br />
<br />
I'm a lifetime Cincinnati Reds fan. I'm actually excited for this year.]]></description>
			<content:encoded><![CDATA[ok, I don't count the Tokyo games, so really, it starts a week from today! March 27!<br />
<br />
Who's excited? What team are you rooting for?<br />
<br />
I'm a lifetime Cincinnati Reds fan. I'm actually excited for this year.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Plex price hikes and new free feature limitations]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=35</link>
			<pubDate>Thu, 20 Mar 2025 00:31:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=4">mistiry</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=35</guid>
			<description><![CDATA[From: <a href="https://www.pcworld.com/article/2642674/plexs-lifetime-subscription-plan-is-getting-a-massive-price-hike.html" target="_blank" rel="noopener" class="mycode_url">https://www.pcworld.com/article/2642674/...-hike.html</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>Once the new Plex Pass prices kick in, remote streaming of content in personal Plex media libraries won’t be free anymore. That means if you want to stream your Plex Media Server content outside your home—or, crucially, if you want to stream media from another Plex Media Server user who doesn’t have a Plex Pass—you’ll need to pay up. </blockquote>
<br />
So, if you are a free-tier user you will no longer be able to access your own library remotely. Nor will you be able to watch other's libraries. And, if you're a paid user, you will not be able to remotely access a non-paid users' library.<br />
<br />
Price is going up to &#36;250USD for the lifetime pass. Monthly rates also going up, if you use the Plex Pass subscription.]]></description>
			<content:encoded><![CDATA[From: <a href="https://www.pcworld.com/article/2642674/plexs-lifetime-subscription-plan-is-getting-a-massive-price-hike.html" target="_blank" rel="noopener" class="mycode_url">https://www.pcworld.com/article/2642674/...-hike.html</a><br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>Once the new Plex Pass prices kick in, remote streaming of content in personal Plex media libraries won’t be free anymore. That means if you want to stream your Plex Media Server content outside your home—or, crucially, if you want to stream media from another Plex Media Server user who doesn’t have a Plex Pass—you’ll need to pay up. </blockquote>
<br />
So, if you are a free-tier user you will no longer be able to access your own library remotely. Nor will you be able to watch other's libraries. And, if you're a paid user, you will not be able to remotely access a non-paid users' library.<br />
<br />
Price is going up to &#36;250USD for the lifetime pass. Monthly rates also going up, if you use the Plex Pass subscription.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Bassmaster Classic 2025]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=34</link>
			<pubDate>Wed, 19 Mar 2025 13:22:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=17">sintax</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=34</guid>
			<description><![CDATA[The Bassmaster Classic starts this Friday March 21, 2025. This year on Lake Ray Roberts in Texas. Follow along online! Should be a good one. <br />
<br />
<a href="https://www.bassmaster.com/tournament/2025-bassmaster-classic/experience/" target="_blank" rel="noopener" class="mycode_url">Link to watch</a>]]></description>
			<content:encoded><![CDATA[The Bassmaster Classic starts this Friday March 21, 2025. This year on Lake Ray Roberts in Texas. Follow along online! Should be a good one. <br />
<br />
<a href="https://www.bassmaster.com/tournament/2025-bassmaster-classic/experience/" target="_blank" rel="noopener" class="mycode_url">Link to watch</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Who plays an instrument?]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=32</link>
			<pubDate>Tue, 18 Mar 2025 03:07:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=4">mistiry</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=32</guid>
			<description><![CDATA[I only have a Yamaha acoustic guitar currently, and don't ever really play it anymore. I was never amazing, but at one point I could at least play a bit. Have thought about getting an electric guitar again, but that's not high on the priority list at the moment. I've also dabbled with electronic music applications like GarageBand and Fruity Loops. <br />
<br />
Who else plays an instrument?]]></description>
			<content:encoded><![CDATA[I only have a Yamaha acoustic guitar currently, and don't ever really play it anymore. I was never amazing, but at one point I could at least play a bit. Have thought about getting an electric guitar again, but that's not high on the priority list at the moment. I've also dabbled with electronic music applications like GarageBand and Fruity Loops. <br />
<br />
Who else plays an instrument?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Some new features!]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=31</link>
			<pubDate>Sat, 15 Mar 2025 03:46:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=4">mistiry</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=31</guid>
			<description><![CDATA[Hey everyone!<br />
<br />
We've made some updates to the forums and added some new features!<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">MyAlerts</span><br />
This plugin adds "Alerts" to your user profile (hover over your name in the top-right). If you click on the Alerts, even if you have none, and then click "View Alerts", it should take you to <a href="https://dotheneedful.online/forums/alerts.php" target="_blank" rel="noopener" class="mycode_url">this page.</a> From there you should be able to navigate to the Alert Settings to adjust the settings to your liking!<br />
<br />
<span style="font-weight: bold;" class="mycode_b">DVZ Shoutbox</span><br />
On the right-hand side you will see a new Shoutbox. In theory, alerts can/will also appear here. This one is going live as a beta feature - if we ultimately don't like how it integrates with the flow of the forums, we may remove it. You can collapse the Shoutbox by clicking on the title bar of the box. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">DVZ Mentions</span><br />
This allows you to "mention" a user by typing "@" and then their username. It's not great, as it doesn't autofill or search usernames, so you have to know the username you want to tag. But it does work, and will supposedly will alert in the Shoutbox.<br />
<br />
<hr class="mycode_hr" />
<br />
Please report any issues you have with any of these new features or any other part of the forums!]]></description>
			<content:encoded><![CDATA[Hey everyone!<br />
<br />
We've made some updates to the forums and added some new features!<br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">MyAlerts</span><br />
This plugin adds "Alerts" to your user profile (hover over your name in the top-right). If you click on the Alerts, even if you have none, and then click "View Alerts", it should take you to <a href="https://dotheneedful.online/forums/alerts.php" target="_blank" rel="noopener" class="mycode_url">this page.</a> From there you should be able to navigate to the Alert Settings to adjust the settings to your liking!<br />
<br />
<span style="font-weight: bold;" class="mycode_b">DVZ Shoutbox</span><br />
On the right-hand side you will see a new Shoutbox. In theory, alerts can/will also appear here. This one is going live as a beta feature - if we ultimately don't like how it integrates with the flow of the forums, we may remove it. You can collapse the Shoutbox by clicking on the title bar of the box. <br />
<br />
<span style="font-weight: bold;" class="mycode_b">DVZ Mentions</span><br />
This allows you to "mention" a user by typing "@" and then their username. It's not great, as it doesn't autofill or search usernames, so you have to know the username you want to tag. But it does work, and will supposedly will alert in the Shoutbox.<br />
<br />
<hr class="mycode_hr" />
<br />
Please report any issues you have with any of these new features or any other part of the forums!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Referral Links & Coupon/Discount Codes]]></title>
			<link>https://dotheneedful.online/forums/showthread.php?tid=29</link>
			<pubDate>Fri, 14 Mar 2025 04:21:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://dotheneedful.online/forums/member.php?action=profile&uid=4">mistiry</a>]]></dc:creator>
			<guid isPermaLink="false">https://dotheneedful.online/forums/showthread.php?tid=29</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Referral Links</span></span><br />
Many services offer an incentive if you refer someone else to sign up. Usually, this benefits both parties and just requires a referral link to redeem it. As long as you disclose what each party receives, feel free to share any referral links to services you use - it might help someone else, and helps you at the same time!<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Coupon/Discount Codes</span></span><br />
Similar to referral links, some services sometimes publish coupons or discount codes to offer additional benefits for purchases. This might be in the form of money off, additional length of subscription, additional features, or other bonuses and incentives that help the vendor drive their business.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color"><span style="text-decoration: underline;" class="mycode_u">This is not a place to advertise your own business. Do not create referral links, coupons, or discount codes for businesses with which you are affiliated in a manner other than that of a customer. We are not a place to advertise to.</span></span></span><br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">My Referral Links</span></span><br />
<span style="font-weight: bold;" class="mycode_b">Vultr.com</span> - VPS Hosting - <a href="https://www.vultr.com/?ref=9712766-9J" target="_blank" rel="noopener" class="mycode_url">https://www.vultr.com/?ref=9712766-9J</a><br />
You will get:<ul class="mycode_list"><li>&#36;300 Credit<br />
</li>
<li>Expires in 30 days<br />
</li>
</ul>
I will get:<ul class="mycode_list"><li>&#36;100 Credit<br />
</li>
<li>You must be active for more than 30 days and use at least &#36;100 in payments.<br />
</li>
</ul>
Why I use it:<br />
I have used Vultr for almost 10 years. It runs the DoTheNeedful bot, the website, these forums, a few other things. It's cheap, it's fast, and I have only ever opened one support ticket, not related to the infrastructure or the service itself, my entire account lifetime.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Referral Links</span></span><br />
Many services offer an incentive if you refer someone else to sign up. Usually, this benefits both parties and just requires a referral link to redeem it. As long as you disclose what each party receives, feel free to share any referral links to services you use - it might help someone else, and helps you at the same time!<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Coupon/Discount Codes</span></span><br />
Similar to referral links, some services sometimes publish coupons or discount codes to offer additional benefits for purchases. This might be in the form of money off, additional length of subscription, additional features, or other bonuses and incentives that help the vendor drive their business.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color"><span style="text-decoration: underline;" class="mycode_u">This is not a place to advertise your own business. Do not create referral links, coupons, or discount codes for businesses with which you are affiliated in a manner other than that of a customer. We are not a place to advertise to.</span></span></span><br />
<br />
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">My Referral Links</span></span><br />
<span style="font-weight: bold;" class="mycode_b">Vultr.com</span> - VPS Hosting - <a href="https://www.vultr.com/?ref=9712766-9J" target="_blank" rel="noopener" class="mycode_url">https://www.vultr.com/?ref=9712766-9J</a><br />
You will get:<ul class="mycode_list"><li>&#36;300 Credit<br />
</li>
<li>Expires in 30 days<br />
</li>
</ul>
I will get:<ul class="mycode_list"><li>&#36;100 Credit<br />
</li>
<li>You must be active for more than 30 days and use at least &#36;100 in payments.<br />
</li>
</ul>
Why I use it:<br />
I have used Vultr for almost 10 years. It runs the DoTheNeedful bot, the website, these forums, a few other things. It's cheap, it's fast, and I have only ever opened one support ticket, not related to the infrastructure or the service itself, my entire account lifetime.]]></content:encoded>
		</item>
	</channel>
</rss>