nono2357, to random
douglevin, to ukteachers

Just got off the phone with an edu reporter who had been getting recent pitch after pitch from Raptor Technologies about their products (multiple this week alone). She had no idea about their recent breach (https://www.wired.com/story/us-school-shooter-emergency-plans-leak/). To say she had salty words for the company....I need to wash my ears out. Expect we will see some more coverage ;) @PogoWasRight @brett @funnymonkey @michaelfklein

PogoWasRight,

@douglevin @brett @funnymonkey @michaelfklein

I have already been starting to follow -up:

(1) Fowler's notification to Raptor was weeks after I sent RAPTOR multiple notifications that they had not responded to appropriately. And I verified: Fowler was notifying them about the same blob I had been notifying them about. So we know that blob was first exposed no later than November 3 when a researcher notified me about it. Did Raptor tell school districts when the blob was first unsecured?

(2) I have sent an inquiry to Raptor asking why they claim only Fowler and their staff had accessed files, as the first (November) researcher had accessed files in November and I had accessed them in December to verify and to check to see if Raptor locked it down after I notified them. I have now asked Raptor if they really have access logs.

Amazingly, I have gotten no response so far. Again.

(3) I also reached out to Ann Arbor Public Schools to ask what they did in response to the security alert I sent them on December 3 that they never responded to.... and to ask if Raptor told Angell Elementary that there was a file with every student's picture and information -- including parental phone numbers and emergency phone numbers that was leaking and downloaded.

So far, I haven't heard back from AAPS or Angell Elementary School either.

Feel free to share this.

nono2357, to journalism
ai6yr, to Plumbing
@ai6yr@m.ai6yr.org avatar

Aha, FLIR says the drywallers likely hit a pipe behind this wall. Reading cold on this stud. On the other side of the wall is a shower stall and supply.

jwildeboer, (edited ) to microsoft
@jwildeboer@social.wildeboer.net avatar

from the labs: the 2025 keyboard prototype. (Pictured is a Hyper-7 keyboard from https://mechboards.co.uk/products/hyper-7-v4 )

Belganon, to ip French
@Belganon@mastodon.social avatar

Telegram divulgue votre adresse #IP à n'importe qui parmi vos contacts lors d'un appel et un chercheur a créé un outil pour exploiter facilement cette #faille.
#Telegram indique qu'il s'agit d'un comportement attendu, donc il n'y a rien à corriger.
C'est pourquoi la meilleure #alternative WhatsApp que je puisse vous conseiller est #Signal

#Messagerie #Leak #ViePrivée #Confidentialité #DonnéesPersonnelles #Chiffrement #Informatique @signalapp

https://techcrunch.com/2023/10/19/telegram-is-still-leaking-user-ip-addresses-to-contacts/

minioctt, to gaming Italian

a quanto pare, una parte del #SourceCode di #GTA5 è stata trapelata questo #Natale#RockstarGames / #TakeTwo sarà felicissima di questo #leak 🤯️

La schermata del mirror Tor con tutti i download dei leakevito di far vedere link qui, ma vi posso dire che ho scoperto la cosa da questo video di #Mutahar, e se soltanto guardando indizi lì ho in pochi minuti trovato la fonte, allora potete farcela anche voi… https://www.youtube.com/watch?v=jmIOu3uec90 🤗️

https://octospacc.altervista.org/2023/12/26/810/

#GrandTheftAuto #GTA #GTA5 #leak #Mutahar #Natale #RockstarGames #SourceCode #TakeTwo

bluedevil, to GTA

GTA V Source Code Has Leaked

VX-Underground had talked with the people who responsible with the leak. Finally they confirmed. There is a mediafire link winding around! The people who is behind the leak told that they did this because they want to fight scamming in the GTA V modding scene, according to VX-Underground.
#leak #gta #gta5

nono2357, to OpenAI
itnewsbot, to Playstation
@itnewsbot@schleuss.online avatar

Wolverine-developer Insomniac Games sees 1.67TB of secrets leaked in data breach - Enlarge / An officially released image for Insomniac Games' upcoming ga... - https://arstechnica.com/?p=1992064

Nonilex, to Law
@Nonilex@masto.ai avatar
Nonilex,
@Nonilex@masto.ai avatar

In the months since, that draft turned into a , then , then the rare decision that affects the entire , reshaping , the practice of & a fundamental aspect of being . The story of how this happened has seemed obvious: The to abortion effectively died w/Justice Ruth Bader Ginsburg (💔), whom replaced w/a favorite of the movement, Justice Barrett.

adulau, to privacy

“Nebula Genomics – First to offer consumer anonymous sequencing” when I saw it. I was wondering about it and then I saw the “Protected By” on their website. Ok forget about this.

PogoWasRight, to infosec
PogoWasRight, to infosec

Does claiming you were hacked when you had really just screwed up violate the FTC Act?

New: I have followed up on my recent OpEd with another example of misleading and deceptive notifications and why HHS and FTC can and should do more enforcement, but why we also need legislation enacted.

https://www.databreaches.net/does-claiming-you-were-hacked-when-you-had-really-just-screwed-up-violate-the-ftc-act/

@brett @euroinfosec @amvinfe @BleepingComputer

simontsui, to Futurology

Censys assesses that Russian company Raccoon Security is a brand of NTC Vulkan, an IT company contracted by Russian intelligence to create offensive cyber tools. NTC Vulkan documents were leaked, and they detail project requirements contracted with the Russian Ministry of Defense, including in at least one instance for GRU Unit 74455, also known as Sandworm Team, according to Mandiant. Censys assesses with high confidence that the NTC Vulkan hosts, certificates, and domains identified in this report belong to the same NTC Vulkan, and that Raccoon Security, and its related domains, host, and certificates belong to the Moscow-based cybersecurity development brand of the same name.
Links: https://censys.com/discovery-of-ntc-vulkan-infrastructure/ and see semi-related Mandiant article.

Dorianix, to random German
@Dorianix@graz.social avatar
MagicLike, (edited ) to Minecraft
@MagicLike@mstdn.social avatar
realTuckFrumper, to random
@realTuckFrumper@mastodon.social avatar
vhavv,
MrLovenstein, to random
@MrLovenstein@mastodon.social avatar

Secret Panel HERE 🐶 https://tapas.io/episode/1627935

samsonm,
Bas, to LEGO
@Bas@mastodon.social avatar

The first images of the 2023 LEGO Modular Building leaked! 😱

Natural History Museum (10326)

image/jpeg

nblr, to random
@nblr@chaos.social avatar

Hacker leaks millions of 23andme genetic data profiles.

Please resequence your DNA asap, make sure you use at least four different letters and a minimum length of 3.2×10⁹ characters.

https://www.bleepingcomputer.com/news/security/hacker-leaks-millions-of-new-23andme-genetic-data-profiles/

kranzkrone,
@kranzkrone@quasselkopf.de avatar

@nblr
Sadly it was just a Matter of Time, when such a Hack would happen. 🙄
Security of Data is still an afterthought for many Companies, way after Thoughts about how to make the most Profits out of their Customers.😩

Thanks to @IzzyOnDroid for sharing. 👍

br00t4c, to Facebook
@br00t4c@mastodon.social avatar
simontsui, to hacking

BleepingComputer: HelloKitty ransomware source code leaked on a Russian-language hacking forum. This could potentially lead to other threat actors creating their own ransomware variants.
Link: https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-source-code-leaked-on-hacking-forum/

Tags:

adulau, to random

For 25BTC you can buy the complete dataset of

"General Directorate of Migration of the Dominican Republic"

I remember discussions about how safe are "biometrics data". A good example how unsafe it is.

https://www.ransomlook.io/screenshots/rhysida/General%20Directorate%20of%20Migration%20of%20the%20Dominican%20Republic.png

source: @Ransomlook

techbites, to privacy

Mullvad VPN ( @mullvadnet ) dismissed allegations of a data breach involving dozens of its users' accounts being found on the dark web. The VPN provider explained that the accounts in question were not leaked but were given away for free to various organizations, some of which may have subsequently shared them on public forums. Mullvad's CEO emphasized that these accounts do not contain personally identifiable information like passwords, and they do not compromise user privacy. The company is known for its strong commitment to user privacy and security online and has previously demonstrated its no-log policy.

Source: Techradar Pro

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines