kid

joined 1 year ago
MODERATOR OF
 

The database company said its Oracle Cloud Infrastructure (OCI) was not involved in the breach. And at least one law firm seeking damages is already on the case.

 

This month, Microsoft has released patches addressing a total of 125 vulnerabilities. Among these, 11 are classified as critical, highlighting the potential for significant impact if exploited. Notably, one vulnerability is currently being exploited in the wild, underscoring the importance of timely updates. While no vulnerabilities were disclosed prior to this patch release, the comprehensive updates aim to fortify systems against a range of threats, including remote code execution and privilege escalation. Users are encouraged to apply these patches promptly to enhance their security posture.

[–] [email protected] 2 points 3 weeks ago (1 children)

Leak extortion is the main issue nowadays, not covered by backups, I'm afraid.

[–] [email protected] 4 points 1 month ago

I didn't know about that tool. Apparently, it is a CDR, which I like very much. I'm not aware of any good open-source implementations.

[–] [email protected] 9 points 1 month ago (1 children)

Very nice approach!

Some points about the article:

Nature of the Vulnerability: The vulnerability is a security flaw that allows leaking the email associated with a YouTube channel by exploiting endpoints from both YouTube and Google Pixel Recorder.

Impact: It allows an attacker to obtain the email associated with any YouTube channel, which can lead to phishing attacks, privacy invasion, and other malicious activities. This potentially affects all YouTube users who own a channel.

Fix Status: The vulnerability has been fixed by Google. Both parts of the exploit were resolved by 02/09/2025, and the report was disclosed on 02/12/2025.

[–] [email protected] 51 points 3 months ago

Apparently was not related to a cyber attack, as stated in status page (https://status.proton.me/)

We have resolved all service outages, and the situation has been stable for some time. We have identified the root cause of the problem, implemented a fix, and are now monitoring the results. Jan 09, 2025 - 19:27 CET

[–] [email protected] 1 points 4 months ago (1 children)

For now, the threat actor is just claiming that they hacked BT. No prove whatsoever. Groups usually post a sample of the data when they claim a victim, but that is not the case, for now.

[–] [email protected] 4 points 4 months ago

If you are asking if the main attack vector was phishing, they are not clear on that:

According to statements released by Brain Cipher, they have exploited critical weaknesses within Deloitte UK’s cybersecurity infrastructure.

[–] [email protected] 3 points 4 months ago

Welcome! I dont know you background, but I would suggest get into selfhosting. There are several projects related to cybersecurity, fun and useful. Ex: MISP, Pihole, The Hive.

[–] [email protected] -1 points 5 months ago

That's why I don't use Kaspersky :)

[–] [email protected] -1 points 5 months ago (2 children)

In my opinion, you will always be at the mercy of a government in this context: US, China, Russia. In the end it's a matter of choosing which one. FOSS maybe a little less, but in the end it's almost the same. That's my view, of course. That doesn't mean you can't give them a hard time ;)

view more: next ›