I pulse the truth from a Dittybopper instance to this community
On Wednesday we shared that we’re introducing a new Terms of Use (TOU) and Privacy Notice for Firefox. Since then, we’ve been listening to some of our

Comments
Ransomware criminals love CISA's KEV list – and that's a bug, not a feature
1 in 3 entries are used to extort civilians, says new paper

1 in 3 entries are used to extort civilians, says new paper Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware attacks.…
Data from Resilience found that third-party attacks made up 23% of material cyber insurance claims in 2024, with ransomware attacks targeting vendors a major driver

Privacy tech firms warn France’s encryption and VPN laws threaten privacy
Privacy-focused email provider Tuta (previously Tutanota) and the VPN Trust Initiative (VTI) are raising concerns over proposed laws in France set to backdoor encrypted messaging systems and restrict internet access. [...]
Veracode found a 47% increase in the average time taken to patch software vulnerabilities, driven by growing reliance on third-party code

It took about 24 hours for Alibaba’s Wan 2.1 to become popular in the AI porn community.

It took about 24 hours for Alibaba’s Wan 2.1 to become popular in the AI porn community.
Hackers Can Crack Into Car Cameras in Minutes Flat
It's shockingly simple to turn a car dashcam into a powerful reconnaissance tool for gathering everyday routine and location data, researchers warn.
Investigation: criminals who make billions from scam compounds in Myanmar, where tens of thousands of people are enslaved, are using Starlink to get online (Matt Burgess/Wired)
By Matt Burgess / Wired. View the full context on Techmeme.

Matt Burgess / Wired: Investigation: criminals who make billions from scam compounds in Myanmar, where tens of thousands of people are enslaved, are using Starlink to get online — A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmar—where tens of thousands of people are enslaved—are using Starlink to get online.
An investigation identifies a dozen Telegram groups targeting women who joined "Are We Dating the Same Guy?" Facebook groups with doxxing, harassment, and more (Wired)
From Wired. View the full context on Techmeme.

Wired: An investigation identifies a dozen Telegram groups targeting women who joined “Are We Dating the Same Guy?” Facebook groups with doxxing, harassment, and more — A WIRED investigation goes inside the Telegram groups targeting women who joined “Are We Dating the Same Guy?” …
Demand for private security among crypto professionals has reportedly "grown considerably" following the kidnapping of Ledger's CEO.

Demand for private security among crypto professionals has reportedly "grown considerably" following the kidnapping of Ledger's CEO. The post Crypto execs hiring private security after high-profile kidnappings, report appeared first on Protos.
Reverse engineering RedNote's app to identify security and privacy concerns
Comments
WHO officials have identified two outbreaks of a mystery illness in the area that has sickened hundreds and killed over 50 people to date.

PyPi package with 100K installs pirated music from Deezer for years
A malicious PyPi package named 'automslc' has been downloaded over 100,000 times from the Python Package Index since 2019, abusing hard-coded credentials to pirate music from the Deezer streaming service. [...]
Harassment allegations against DEF CON veteran detailed in court filing
More than a dozen women came forward with accusations

More than a dozen women came forward with accusations Details about the harassment allegations leveled at DEF CON veteran Christopher Hadnagy have now been revealed after a motion for summary judgment was filed over the weekend.…
61% of hackers use new exploit code within 48 hours, ransomware remains top threat in 2024

ReliaQuest report claims 80% of ransomware attacks now focus solely on exfiltrating data as it is faster

ReliaQuest claims 80% of ransomware attacks now focus solely on exfiltrating data as it is faster
A botnet of 130,000+ devices is attacking Microsoft 365 accounts via password-spraying, bypassing MFA by exploiting basic authentication.

A botnet of 130,000+ devices is attacking Microsoft 365 accounts via password-spraying, bypassing MFA by exploiting basic authentication. SecurityScorecard researchers discovered a botnet of over 130,000 devices that is conducting password-spray attacks against Microsoft 365 (M365) accounts worldwide. The attackers targeted accounts protected with basic authentication bypassing multi-factor authentication. The experts pointed out that organizations […]
It's one time it's okay to cheapen yourself.

Australia bans Kaspersky over national security concerns, citing risks of foreign interference, espionage,and sabotage of government networks

Australia bans Kaspersky software over national security concerns, citing risks of foreign interference, espionage, and sabotage of government networks. Australian Government banned products and services provided by Russian cybersecurity firm Kaspersky over national security concerns. The Secretary of the Department of Home Affairs has issued a mandatory directive under the Protective Security Policy Framework (PSPF) […]
Curl’s Daniel Stenberg on Securing 180,000 Lines of C Code
In his talk for this year’s annual open source conference FOSDEM, Curl creator Daniel Stenberg promised to show his audience The post Curl’s Daniel Stenberg on Securing 180,000 Lines of C Code appeared first on The New Stack.