HIPAABot, to security
@HIPAABot@mastodon.clinicians-exchange.org avatar

HUMAN OPERATOR

Hello All -- This robot is now handling Healthcare privacy and security matters not related to infosec and IT. Mainly HIPAA for now.

Sending this message to all and groups covered by @rsstosecurity so you can decide it you want to subscribe here ( @HIPAABot ).

In the future, this robot won't use infosec- and IT-related tags.

Thanks,
Michael

@infosec

hackeriet, to hacking
@hackeriet@chaos.social avatar
elaterite, to motorcycles
@elaterite@fosstodon.org avatar

The 1976 Kawasaki KZ400 "Reloaded" lives again! Lithium powered this time! No more "lead sled."

paul_denton, to Sports French
@paul_denton@mastodon.social avatar

Le retour en beauté d'Amélie Oudéa-Castéra: la ministre victime de piratage sur X, des hackers ont détourné son compte. A quelques semaines des JO, on voit que la sécurité est assurée! https://www.numerama.com/cyberguerre/1742108-la-ministre-amelie-oudea-castera-victime-de-piratage-sur-x-des-hackers-ont-detourne-son-compte.html

#Politique #AOC #Sports #JO #JeuxOlympiques #Piratage #Hacking

maehw, to ReverseEngineering German
@maehw@chaos.social avatar

Do I have any followers who know a little bit of Chinese? I am curious if the characters give any hint about this mystery PCB or its little IC on the other side. It uses inductive(?) and or capacitive touch sensing of three buttons and controls RGBW brightness.

The other side of the PCB with some resistors, capacitors, a transistor(?) and a mystery IC (might be a low cost uC or an ASIC).

mattotcha, to China
@mattotcha@mastodon.social avatar

Cyberthreat landscape permanently altered by Chinese operations, US officials say
https://therecord.media/cyberthreat-landscape-altered-chinese-operations

gtbarry, to microsoft
@gtbarry@mastodon.social avatar

Windows vulnerability reported by the NSA exploited to install Russian malware

Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attacks that targeted a vast array of organizations with a previously undocumented tool, the software maker disclosed

#ForestBlizzard #Microsoft #Windows #russia #russian #NSA #malware #security #cybersecurity #hackers #hacking #hacked

https://arstechnica.com/security/2024/04/kremlin-backed-hackers-exploit-critical-windows-vulnerability-reported-by-the-nsa/

paul, to infosec
@paul@oldfriends.live avatar

North Korean hackers crack DMARC to spoof emails from trusted sources

North Korean state-sponsored threat actors are abusing misconfigurations in DMARC to send convincing phishing emails and gather vital intelligence from Western targets~impersonating journalists, officials have warned.

https://www.techradar.com/pro/security/north-korean-hackers-crack-dmarc-to-spoof-emails-from-trusted-sources

Naich, to hacking
@Naich@fosstodon.org avatar

I've knocked up a quick hack for those in the UK who want to know if it's worth going outside to try and see the aurora.

https://qop.pm/aurora.html

Just bung in your postcode and leave it running to keep updated with the probability of it being visible.

dcz, to hacking
@dcz@fosstodon.org avatar

Hey Fediversians, is anyone going to https://gulas.ch ? I'm looking for roommates today.

gtbarry, to security
@gtbarry@mastodon.social avatar

Boeing confirms attempted $200 million ransomware extortion attempt

The cybercriminals who targeted Boeing using the LockBit ransomware platform in October 2023 demanded a $200 million extortion payment.

Boeing reportedly did not pay any ransom to LockBit after roughly 43 gigabytes of company data was posted to LockBit’s website in early November.

https://cyberscoop.com/boeing-confirms-attempted-200-million-ransomware-extortion-attempt/

gtbarry, to security
@gtbarry@mastodon.social avatar

Ascension healthcare takes systems offline after cyberattack

​Ascension, one of the largest private healthcare systems in the United States, has taken some of its systems offline to investigate what it describes as a "cyber security event."

https://www.bleepingcomputer.com/news/security/ascension-healthcare-takes-systems-offline-after-cyberattack/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Just submitted a to the to try and see if they did have any investigation into potential retaliation for the sentencing of the "Atlanta 3" hackers who were linked to Legion of Doom.

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Uploaded some court documents from an appeal by Electra, a phone phreak who was caught up in Operation Sun Devil for hacking voicemail systems and sharing calling card codes.

https://archive.org/details/com.-v.-gerulis

danie10, to hacking
@danie10@mastodon.social avatar

Hackbat: This Raspberry Pi hacking tool is what the Flipper One could have been

The whole thing runs off of a Raspberry Pi RP2040 and open-source code. It has modules for NFC, SD card, and Wi-Fi communication, plus it features a miniature display so you can tell what it’s doing. If you want to make your own, the Hackster page f ...continues

See https://gadgeteer.co.za/hackbat-this-raspberry-pi-hacking-tool-is-what-the-flipper-one-could-have-been/

kubikpixel, to hacking German
@kubikpixel@chaos.social avatar

Tut man nicht den anderen die Schuld zuweisen um selber nicht schuldig angesehen zu werden und auch sich selbst, anhand gegenüber dem Gegenangriffe, zu rechtfertigen? Dies ist mMn sogar min Europa weit so (ähnlich).

»Kommentar zur Debatte über IT-Sicherheit – "Die Empörten sind nackt​":
Deutschlands Politik beschwert sich über russische Hacker. Zurecht – aber handeln müsste sie selbst.​ […]«
– von @fsteiner auf @heiseonline

📰 https://www.heise.de/news/Kommentar-zur-Debatte-um-IT-Sicherheit-Die-Empoerten-sind-nackt-9708160.html


thejapantimes, to worldwithoutus
@thejapantimes@mastodon.social avatar

China is likely building profiles of British military personnel and people in other sensitive roles using hacked data, government officials and cyber experts said. https://www.japantimes.co.jp/news/2024/05/08/asia-pacific/politics/china-hacks-uk-defense-personnel/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Stumbled across this 1984 episode of the comedy series Night Court called "The Computer Kid" about a precocious boy who winds up in trouble for his school and I love it.

"He's plugged his computer into the phone!"

video/mp4

asbestos, to bbs
@asbestos@toot.community avatar

d00d3 go7 any warez?

NeadReport, to hacking
@NeadReport@vivaldi.net avatar

Here's another rant about a large corporation bending us over a chair with a huge security breach. But first the bits emailed to me from Dropbox:

"We can confirm that Dropbox Sign customer information such as emails, usernames, phone numbers, hashed passwords, multi-factor authentication, and general account settings were obtained."

Me: Fuck you Dropbox

"At Dropbox, our number one value is to be worthy of trust. We hold ourselves to a high standard when protecting our customers and their content. We didn’t live up to that standard here, and we’re deeply sorry for the impact it caused our customers."

Me: Fuck you Dropbox

schizanon, to internet_funeral
@schizanon@mastodon.social avatar
  1. is a shaping engine, it's used in , , , , , +, , , , , , , , , , , Engine, and other places.

  2. Harfbuzz 8.0 introduces a shaper, that allows to be embedded in a file. https://www.phoronix.com/news/HarfBuzz-8.0

  3. It's only a matter of time until someone embeds a in a font file.

kubikpixel, to email German
@kubikpixel@chaos.social avatar

Die machen Werbung über sich, dass ihre KI toll einsetzbar sei und dann das, eine übliche Schwäche von Profi-Dienste. Nicht im Detail, sondern was es betrifft.

»Account-Übernahme möglich – Kritische Gitlab-Schwachstelle wird aktiv ausgenutzt:
Die Schwachstelle ermöglicht es Angreifern, beliebige Nutzerpasswörter über eine eigene E-Mail-Adresse zurückzusetzen. Tausende von Gitlab-Instanzen sind gefährdet.«

👉 https://www.golem.de/news/account-uebernahme-moeglich-kritische-gitlab-schwachstelle-wird-aktiv-ausgenutzt-2405-184798.html

tness16, to hacking French
@tness16@mastodon.social avatar

violence et coup de pression, qui a tenté d’empêcher la diffusion ?

La fait elle la police en ?
Hacking violence et coup de pression, qui a tenté d’empêcher la diffusion ?

Alerté en amont, Envoyé Spécial a pu suivre et filmer une opération clandestine de la à . Une à peine croyable racontée dans un exceptionnel qui dérange la Chine.

https://invidious.fdn.fr/watch?v=-oOuo6fDcIY

redhotcyber, to IT Italian
@redhotcyber@mastodon.bida.im avatar
realhackhistory, to hacking
@realhackhistory@chaos.social avatar

An article by David E. Sanger
via the New York Times News Service which was published in the Pittsburgh Post-Gazette on the 24th of November, 1988.

This reminds me of Russian news headlines about Russian hackers:

"Envious of computer virus
Well-behaved Japanese programmers have not developed the creative of U.S. competitors"

  • All
  • Subscribed
  • Moderated
  • Favorites
  • normalnudes
  • tsrsr
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • everett
  • Youngstown
  • tacticalgear
  • slotface
  • ngwrru68w68
  • rosin
  • khanakhh
  • kavyap
  • PowerRangers
  • Leos
  • InstantRegret
  • mdbf
  • Durango
  • GTA5RPClips
  • cubers
  • vwfavf
  • ethstaker
  • hgfsjryuu7
  • osvaldo12
  • tester
  • cisconetworking
  • modclub
  • anitta
  • All magazines