[-] IllNess@infosec.pub 40 points 1 month ago

If this is the case then artists should be able to shut down internet access for AI companies that steal their work in those states.

[-] IllNess@infosec.pub 47 points 1 month ago

Oh good! I remember when they said they couldn't afford to pay independent copyright owners. Now they can pay for the work they stole!

[-] IllNess@infosec.pub 58 points 2 months ago

There was a Black Mirror episode where if you close your eyes, the ad stops playing and continues only when you open your eyes again.

This is next.

17
14

Written in Rust and capable of targeting both Windows and Linux/ESXi hosts, Cicada3301 first emerged in June 2024, inviting potential affiliates to join their ransomware-as-a-service (RaaS) platform via an advertisement on the RAMP underground forum.

17

Though D-Link acknowledged the security problems and their severity, it noted that they fall under its standard end-of-life/end-of-support policies, meaning there will be no security updates to address them.

25

The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown request, alleging that it violated its copyright.

53

Researchers Ian Carroll and Sam Curry discovered the vulnerability in FlyCASS, a third-party web-based service that some airlines use to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). KCM is a Transportation Security Administration (TSA) initiative that allows pilots and flight attendants to skip security screening, and CASS enables authorized pilots to use jumpseats in cockpits when traveling.

Definitions:

SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

-Wikipedia

29

North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM privileges using a Windows Kernel exploit.

Citrine Sleet targets financial institutions, focusing on cryptocurrency organizations and associated individuals, and has been previously linked to Bureau 121 of North Korea's Reconnaissance General Bureau.

8

In the watering-hole attacks, threat actors infected two websites, cabinet.gov[.]mn and mfa.gov[.]mn, which belong to Mongolia's Cabinet and Ministry of Foreign Affairs. They then injected code to exploit known flaws in iOS and Chrome on Android, with the ultimate goal of hijacking website visitors' devices.

Definitions:

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected.

-Wikipedia

Whereas zero-days are a class of vulnerability that is unknown to a software developer or hardware manufacturer, an N-day is a flaw that is already publicly known but may or may not have a security patch available.

-Dark Reading

2
submitted 3 months ago by IllNess@infosec.pub to c/databreaches@lemmy.zip

cross-posted from: https://infosec.pub/post/16863645

This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code.

Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

4

This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code.

Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

4

Today, the Cybersecurity and Infrastructure Security Agency (CISA) announces its cyber incident reporting form moved to the new CISA Services Portal as part of its ongoing effort to improve cyber incident reporting.

CISA Services Portal

25
[-] IllNess@infosec.pub 54 points 3 months ago

While NSA did not possess the equipment required to access the footage from the media format in which it was preserved, NSA deemed the footage to be of significant public interest and requested assistance from the National Archives and Records Administration (NARA) to retrieve the footage. NARA’s Special Media Department was able to retrieve the footage contained on two 1" AMPEX tapes and transferred the footage to NSA to be reviewed for public release.

This was a story a couple of months ago. Glad it worked out.

[-] IllNess@infosec.pub 40 points 3 months ago

Jimmy Carter gave up his peanut farm when he became president. After his presidency, Rosalynn and Jimmy spent their time building affordable housing. Rosalynn passed away last year on November 19. at the age of 96. They were married for 77 years.

Crazy how some people view what a good leader is now...

[-] IllNess@infosec.pub 40 points 3 months ago

I understand they want it to be a drop in replacement for the original Pico but I wish they upgraded the MicroUSB port to a USB-C port.

I guess third party for me again.

[-] IllNess@infosec.pub 42 points 3 months ago

Finding out the Supreme Court isn't going give him unlimited power might've blown a gasket.

On top of what you said if Harris wins a prosecutor who Trump constantly insults will be president, and Biden, who Trump also insults and put his son in prison, will have 3 months to do whatever the fuck he wants. Lol

[-] IllNess@infosec.pub 53 points 5 months ago

Imagine parents actually parenting instead of blaming everyone else but themselves?

[-] IllNess@infosec.pub 45 points 6 months ago

I wonder if this would affect speed tests. I know using Ookla's speed test is inaccurate because ISPs change speeds when connected to certain servers.

26
[-] IllNess@infosec.pub 49 points 8 months ago

This doesn't differentiate different types of English but I will post it any just in case it is useful to you.

https://goblin.tools/Formalizer

[-] IllNess@infosec.pub 48 points 8 months ago

This looks like a straight cash grab. I bet the whoever owns this github won't work on it at all.

[-] IllNess@infosec.pub 41 points 9 months ago

All these AI and machine learning companies are taking content directly from websites and ignoring robot.txt files.

If your content is able to be crawled, even without being listed on search engines, I don't think it really matters.

view more: ‹ prev next ›

IllNess

joined 2 years ago