ninjaowl Bot , to Cybersecurity
@ninjaowl@mastodon.social avatar

Homeland Security has collected DNA data from 1.5 million immigrants in four years, researchers find https://therecord.media/homeland-security-collected-dna-millions-immigrants

babe , to Linux
@babe@glitterkitten.co.uk avatar

People keep saying 'you shouldn't do this', 'you shouldn't do that' and just scold you to try and get you to be better at securing your information and no matter what it doesn't seem like enough

I've got a password manager! Yubikeys! I browse the net using a mullvad VPN. Hell, I've replaced every damn gadget in my house with a smart equivalent! What more do you want me to do??

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🐛 NEW SECURITY CONTENT 🐛

📺 tvOS 17.5.1 - no CVE entries

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar
DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

💡EyeSpy💡is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.

https://github.com/Miiden/EyeSpy

https://x.com/DarkWebInformer/status/1792967282106245323

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

🚨DATA BREACH🚨Notorious threat actor, Ddarknotevil, has allegedly breached dewy-sa[.]com🇸🇦. 19k compromised rows of data.

https://x.com/DarkWebInformer/status/1792956019506655522

JosephMenn , to Cybersecurity
@JosephMenn@infosec.exchange avatar

Scooplet: pioneer Kevin Mandia is stepping down from leading the famed company he founded 20 years ago, , which Google bought in Sept. 2022. He will remain an advisor. The onetime Air Force investigator all but created the deep "threat intelligence" part of the security private sector, developing and sometimes publishing detailed information tying specific breaches to non-U.S. governments or even individual foreign hackers. Mandia told the Post earlier this month that he would never retire. But he has spent more of his time in the past year investing in and advising other security companies, while Mandiant functions have been absorbed into Google's cloud business. "I will transition to an advisory role, effective May 31," Mandia said in an internal email Tuesday. "We will continue to move the mission forward-preventing and countering cyber attacks-and hopefully imposing greater risk to the criminals who hide behind anonymity and safe harbors."

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

🚨🚨SuperMarket Darknet Market admin has drained all wallets. SuperMarket was a top 5 market. Sad to see it.

https://x.com/DarkWebInformer/status/1792905407968453089

mattis , to Law
@mattis@eupolicy.social avatar

Big fan of this: smart curtains company Slide is shutting down, but they offer one last update which enables its consumers to keep their curtains running through a local API. Great solution for an increasingly prevalent situation in which consumers are left with IoT devices that no longer function because the manufacturer stops existing (see VanMoof, Gigaset, and more).

https://mailchi.mp/62a41d08c384/important-service-message-slide-is-closing-its-doors?e=d537a73017

vwbusguy , to Random stuff
@vwbusguy@mastodon.online avatar

Found by two UC students!

The Verge: Two students find security bug that could let millions do laundry for free
https://www.theverge.com/2024/5/19/24160383/students-security-bug-laundry-machines-csc-serviceworks

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

posts for today (2024-05-20). If something happens after this post.. sorry.

  1. Allied Mechanical Services🇺🇸 (INC Ransom)
  2. Schuette Metals🇺🇸 (Cactus)
  3. Continuing Healthcare Solutions🇺🇸 (INC Ransom)
  4. Sterling Transportation🇺🇸 (INC Ransom)
  5. Specialty Market Managers🇺🇸 (INC Ransom)
  6. Delano Adult School🇺🇸 (INC Ransom)
  7. Regional Obstetrical Consultants🇬🇪 (INC Ransom)
  8. Quality Plumbing Associates🇺🇸 (LockBit)
  9. California Highway Patrol🇺🇸 (INC Ransom)
  10. Berge Bulk🇺🇸 (RansomHouse)
  11. LEMKEN🇩🇪 (8Base)
  12. Embellir🇫🇷 (8Base)
  13. Crooker Construction🇺🇸 (8Base)
  14. GE Aerospace🇺🇸 (MEOW Leaks)
  15. Marigin🇨🇭 (Akira)
  16. MAH Machine🇺🇸 (BianLian)
  17. Jess-Link Products🇹🇼 (Hunters)
  18. Oriux🇺🇸 (RansomHub)
  19. American Clinical Solutions🇺🇸 (RansomHub)
  20. Matadero de Gijón🇪🇸 (RansomHub)
  21. Lactanet🇨🇦 (Black Basta)
  22. Le Vian🇺🇸 (Black Basta)

https://x.com/DarkWebInformer/status/1792688031058567372

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar
DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

🚨UNVERIFIED🚨A threat actor has allegedly leaked the database of , which was leaked originally by the owner Arion Krutaj aka White aka Breachbase.

Data: User:Email combo (45,611 lines), User:Password combo (4,237 lines). The passwords are in cleartext, not hashes.

https://x.com/DarkWebInformer/status/1792645893021213157

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar
DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

GIF won't post, please see on X.

💡Linux💡Important Linux Commands for Security Teams.

https://x.com/DarkWebInformer/status/1792616719640363133

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🐛 NEW SECURITY CONTENT 🐛

📱 iOS and iPadOS 17.5.1 - no CVE entries

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

BTW there is some good password managers out there, that you and your teams should probably be using; 1Password, BitWarden, KeypassXC, to name a few. A Reddit user put together this good comparison sheet.

https://docs.google.com/spreadsheets/d/1b2zEEU8_YPsgo3nY1BJ72qgLXteP7Yt0_mnlYJ8m0RI/edit#gid=0

https://x.com/DarkWebInformer/status/1792605989155258464

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

💡MyIP💡"Easy to check what's your IPs, IP geolocation, check for DNS leaks, examine WebRTC connections, speed test, ping test, MTR test, check website availability, whois search & more!" GitHub: https://github.com/jason5ng32/MyIP

https://x.com/DarkWebInformer/status/1792590273991594274

LeeArchinal , to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Monday everyone!

A recent report from Rapid7 highlights a malvertising campaign that has targeted IT professionals which, is some cases, led to ransomware deployment. In these attacks, WinSCP (a remote file transfer tool) and PuTTY (a secure SSH client) were abused. The adversary included a Malicious DLL with the legitimate copy of the applications and used the technique of DLL-Sideloading to infect the victim. Another tactic that was observed is the abuse of locations not commonly used by employees, the C:\Users\Public\Downloads directory. By dropping their tools and malware in this location the adversary has a better chance to hide. This is a great technical analysis of this campaign and I barely did it any justice! Go check out the rest of the details!

If you are on the hunt for , check out this Cyborg Security Community hunt package to capture the evidence of files with common ransomware note file extensions. Enjoy and Happy Hunting!

Excessive File Write or Modifications With Common Ransomware Note Extensions
https://hunter.cyborgsecurity.io/research/hunt-package/6ecf68c9-355d-4c29-b55f-b23bee57c78c

Article Source:
https://www.rapid7.com/blog/post/2024/05/13/ongoing-malvertising-campaign-leads-to-ransomware/

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

🚨Database For Sale🚨A threat actor is allegedly selling access to a database that specializes in selling 3D printers and components mainly for companies. Most buyers are from 🇺🇸. 370MB full dump.

https://x.com/DarkWebInformer/status/1792587348313612575

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

🚨Major Breach🚨Allegedly, has named a new victim.

Country: 🇺🇸
Threat Actor: Meow Leaks
Company: GE Aerospace
Industry: Aerospace & Defense
Revenue: $26.1 Billion
Data Amount: Unknown
Ransom Price: $100,000
Date: 2024-05-20

https://x.com/DarkWebInformer/status/1792570073237917910

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

🚨MAJOR DATA BREACH🇪🇸🚨Notorious threat actor, Chucky, has allegedly breached the database of atSistemas aka knowmad mood. The leaked data is from their CRM system & includes various types of information.

https://x.com/DarkWebInformer/status/1792559728268038266

image/png

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

⚠️Telegram⚠️Astounding from SecretForums has announced that they are giving ex BreachForums members a similar rank to what they had on site. secretsmt222qvdg6rcmgvx4dqqc2673yzyxjrrnabwklnn6qddyv5ad[.]onion

https://x.com/DarkWebInformer/status/1792551912518173122

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

🚨150 CC For Sale🇺🇸🚨A threat actor is allegedly selling 150 CC for sale with full details. 50-60% Valid.

https://x.com/DarkWebInformer/status/1792549688517808344

dumbpasswordrules Bot , to Cybersecurity
@dumbpasswordrules@botsin.space avatar

This dumb password rule is from Merrill Lynch.

Passwords must be between 8 and 20 characters, and some special characters are allowed. Users with randomly-generated passwords may find it particularly annoying to generate a password that works for their password safe.

https://dumbpasswordrules.com/sites/merrill-lynch/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • supersentai
  • WatchParties
  • Rutgers
  • steinbach
  • Lexington
  • cragsand
  • mead
  • RetroGamingNetwork
  • mauerstrassenwetten
  • loren
  • xyz
  • PowerRangers
  • AnarchoCapitalism
  • kamenrider
  • Mordhau
  • itdept
  • neondivide
  • space_engine
  • AgeRegression
  • WarhammerFantasy
  • Teensy
  • learnviet
  • bjj
  • khanate
  • electropalaeography
  • MidnightClan
  • jeremy
  • fandic
  • All magazines