1
1

The Bohemia and Cannabia platforms operated as a massive, unrestricted bazaar for every illicit good and service imaginable. At its peak, it hosted a mind-boggling 82,000 listings per day spanning drugs, malware, DDoS attacks, and more across 67,000 monthly transactions. The sites' staggering finances are highlighted by a €12 million...Read Entire Article

2
1

The Internet Archive, an online repository of web pages, was offline Thursday after its founder confirmed a major cyberattack that left the site defaced and exposed the data of millions of users.

3
1

Wikipedia has a new initiative called WikiProject AI Cleanup. It is a task force of volunteers currently combing through Wikipedia articles, editing or removing false information that appears to have been posted by people using generative AI.Read Entire Article

4
1

Despite a huge talent shortage in the cybersecurity industry, women still feel discouraged from joining it due to concerns over their knowledge, its inclusivity, and the pay.

5
1

But hey, no worries, the firm claims no evidence of data misuse Fidelity Investments has notified 77,099 people that their personal information was stolen in an August data breach. …

6
1

Police: Porch pirates follow FedEx drivers, have tracking info for AT&T iPhones.

7
1

IT systems not up to speed.

8
1

Firefixed: It's maintenance time for low-complexity, high-impact security flaw It's patch time for Firefox fans as Mozilla issues a security advisory for a critical code execution vulnerability in the browser.…

9
1

The fraudsters allegedly used multiple trading bots for the wash trades.

10
1

Marriott will pay $52m to 50 US states for a data breach impacting 131.5 million American customers, and has agreed to implement stronger security practices

11
1
12
1

The Internet Archive, a nonprofit digital library that preserves the history of the internet and is home to the beloved Wayback Machine, has suffered a major data breach affecting 31 million users. The incident came to light when visitors to the site encountered an unauthorized JavaScript pop-up message claiming that...Read Entire Article

13
1

Qualcomm chips found in Samsung, Motorola, OnePlus, and more brands’ phones could have been exploited, but we don’t know to what extent.

14
1
15
1

Researcher spots 110 TB of sensitive info sitting in unprotected database Nearly 32 million records belonging to users of tech from Trackman were left exposed to the internet, sitting in a non-password protected database, for an undetermined amount of time, according to researcher Jeremiah Fowler.…

16
1

The EU's Cyber Resilience Act requires cybersecurity standards for all connected products throughout their entire lifecycle

17
1

⁤A honeypot is a ‘cybersecurity mechanism’ that is primarily designed to lure threat actors away from legitimate targets. ⁤ ⁤While this mechanism is performed by simulating a valuable asset like a “server” or “application.” ⁤ ⁤Not only that even it also serves as a lure that enables the organizations to “monitor” and “analyze” the ‘tactics’ […] The post GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors appeared first on Cyber Security News.

18
1

The $4.4 billion in crypto is set to be the largest pile of criminal proceeds ever sold off by the US. The former IRS agent who seized the recording-breaking sum, meanwhile, languishes in a Nigerian jail cell.

19
1
User and email Enumeration (systemweakness.com)

In this blog i will share different methods through which user and email enum can be done on a particular web application if the error…Continue reading on System Weakness »

20
1

70% of customer-facing APIs are secured using HTTPS, leaving nearly one-third of these APIs completely unprotected, according to F5. This is a stark contrast to the 90% of web pages that are now accessed via HTTPS, following the push for secure web communications over the past decade. “APIs are becoming the backbone of digital transformation efforts, connecting critical services and applications across organizations,” said Lori MacVittie, Distinguished Engineer at F5. “However, as our report indicates, … More → The post 30% of customer-facing APIs are completely unprotected appeared first on Help Net Security.

21
1

An APT hacking group known as GoldenJackal has successfully breached air-gapped government systems in Europe using two custom toolsets to steal sensitive data, like emails, encryption keys, images, archives, and documents. [...]

22
1

American IT software company Ivanti has released security updates to fix three new Cloud Services Appliance (CSA) zero-days tagged as actively exploited in attacks. [...]

23
1

Users searching for game cheats are being tricked into downloading a Lua-based malware that is capable of establishing persistence on infected systems and delivering additional payloads. "These attacks capitalize on the popularity of Lua gaming engine supplements within the student gamer community," Morphisec researcher Shmuel Uzan said in a new report published today, adding "this malware

24
1

On Friday night, cryptocurrency scammers briefly hacked the LEGO website to promote a fake Lego token that could be purchased with Ethereum. [...]

25
1

New guidance helps CISOs communicate with Boards to improve oversight of cyber risk.

view more: next ›

Pulse of Truth

442 readers
0 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 1 year ago
MODERATORS