Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)LE
Resident Pulser @infosec.pub
BOT

I pulse the truth from a Dittybopper instance to this community

Posts 312
Comments 0
blog.mozilla.org An update on our Terms of Use | The Mozilla Blog

On Wednesday we shared that we’re introducing a new Terms of Use (TOU) and Privacy Notice for Firefox. Since then, we’ve been listening to some of our

An update on our Terms of Use | The Mozilla Blog

Comments

0

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

go.theregister.com CISA's KEV list informs ransomware attacks, paper suggests

1 in 3 entries are used to extort civilians, says new paper

CISA's KEV list informs ransomware attacks, paper suggests

1 in 3 entries are used to extort civilians, says new paper Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware attacks.…

1
www.infosecurity-magazine.com Third-Party Attacks Drive Major Financial Losses in 2024

Data from Resilience found that third-party attacks made up 23% of material cyber insurance claims in 2024, with ransomware attacks targeting vendors a major driver

Third-Party Attacks Drive Major Financial Losses in 2024
0

Privacy tech firms warn France’s encryption and VPN laws threaten privacy

Privacy-focused email provider Tuta (previously Tutanota) and the VPN Trust Initiative (VTI) are raising concerns over proposed laws in France set to backdoor encrypted messaging systems and restrict internet access. [...]

0
www.infosecurity-magazine.com Software Vulnerabilities Take Almost Nine Months to Patch

Veracode found a 47% increase in the average time taken to patch software vulnerabilities, driven by growing reliance on third-party code

Software Vulnerabilities Take Almost Nine Months to Patch
0
www.404media.co Alibaba Releases Advanced Open Video Model, Immediately Becomes AI Porn Machine

It took about 24 hours for Alibaba’s Wan 2.1 to become popular in the AI porn community.

Alibaba Releases Advanced Open Video Model, Immediately Becomes AI Porn Machine

It took about 24 hours for Alibaba’s Wan 2.1 to become popular in the AI porn community.

3

Hackers Can Crack Into Car Cameras in Minutes Flat

It's shockingly simple to turn a car dashcam into a powerful reconnaissance tool for gathering everyday routine and location data, researchers warn.

0

Investigation: criminals who make billions from scam compounds in Myanmar, where tens of thousands of people are enslaved, are using Starlink to get online (Matt Burgess/Wired)

Matt Burgess / Wired: Investigation: criminals who make billions from scam compounds in Myanmar, where tens of thousands of people are enslaved, are using Starlink to get online  —  A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmar—where tens of thousands of people are enslaved—are using Starlink to get online.

0

An investigation identifies a dozen Telegram groups targeting women who joined "Are We Dating the Same Guy?" Facebook groups with doxxing, harassment, and more (Wired)

Wired: An investigation identifies a dozen Telegram groups targeting women who joined “Are We Dating the Same Guy?” Facebook groups with doxxing, harassment, and more  —  A WIRED investigation goes inside the Telegram groups targeting women who joined “Are We Dating the Same Guy?” …

0
protos.com Crypto execs hiring private security after high-profile kidnappings, report

Demand for private security among crypto professionals has reportedly "grown considerably" following the kidnapping of Ledger's CEO.

Crypto execs hiring private security after high-profile kidnappings, report

Demand for private security among crypto professionals has reportedly "grown considerably" following the kidnapping of Ledger's CEO. The post Crypto execs hiring private security after high-profile kidnappings, report appeared first on Protos.

0
gizmodo.com A Mystery Disease Has Killed Dozens So Far in Northwestern Congo

WHO officials have identified two outbreaks of a mystery illness in the area that has sickened hundreds and killed over 50 people to date.

A Mystery Disease Has Killed Dozens So Far in Northwestern Congo
0

PyPi package with 100K installs pirated music from Deezer for years

A malicious PyPi package named 'automslc'  has been downloaded over 100,000 times from the Python Package Index since 2019, abusing hard-coded credentials to pirate music from the Deezer streaming service. [...]

0

Harassment allegations against DEF CON veteran detailed in court filing

go.theregister.com Chris Hadnagy allegations revealed in trial filings

More than a dozen women came forward with accusations

Chris Hadnagy allegations revealed in trial filings

More than a dozen women came forward with accusations Details about the harassment allegations leveled at DEF CON veteran Christopher Hadnagy have now been revealed after a motion for summary judgment was filed over the weekend.…

1
www.infosecurity-magazine.com Only a Fifth of Ransomware Attacks Now Encrypt Data

ReliaQuest report claims 80% of ransomware attacks now focus solely on exfiltrating data as it is faster

Only a Fifth of Ransomware Attacks Now Encrypt Data

ReliaQuest claims 80% of ransomware attacks now focus solely on exfiltrating data as it is faster

0
securityaffairs.com A large botnet targets M365 accounts with password spraying attacks

A botnet of 130,000+ devices is attacking Microsoft 365 accounts via password-spraying, bypassing MFA by exploiting basic authentication.

A large botnet targets M365 accounts with password spraying attacks

A botnet of 130,000+ devices is attacking Microsoft 365 accounts via password-spraying, bypassing MFA by exploiting basic authentication. SecurityScorecard researchers discovered a botnet of over 130,000 devices that is conducting password-spray attacks against Microsoft 365 (M365) accounts worldwide. The attackers targeted accounts protected with basic authentication bypassing multi-factor authentication. The experts pointed out that organizations […]

1
securityaffairs.com Australia bans Kaspersky over national security concerns

Australia bans Kaspersky over national security concerns, citing risks of foreign interference, espionage,and sabotage of government networks

Australia bans Kaspersky over national security concerns

Australia bans Kaspersky software over national security concerns, citing risks of foreign interference, espionage, and sabotage of government networks. Australian Government banned products and services provided by Russian cybersecurity firm Kaspersky over national security concerns. The Secretary of the Department of Home Affairs has issued a mandatory directive under the Protective Security Policy Framework (PSPF) […]

0

Curl’s Daniel Stenberg on Securing 180,000 Lines of C Code

In his talk for this year’s annual open source conference FOSDEM, Curl creator Daniel Stenberg promised to show his audience The post Curl’s Daniel Stenberg on Securing 180,000 Lines of C Code appeared first on The New Stack.

0