informapirata, to informatica Italian
@informapirata@mastodon.uno avatar

Dropbox sarebbe stato violato. Rubati i dati dei clienti e i token di autenticazione

Dropbox ha affermato che gli sono penetrati nei di della piattaforma di firma elettronica . Hanno ottenuto l’accesso a di , di autenticazione a più fattori (), con hash e sui clienti.

@informatica

Notizia segnalata su @redhotcyber

https://www.sec.gov/Archives/edgar/data/1467623/000146762324000024/may2024exhibit991.htm

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Been reading about the case of Edward Austin Singh in the UK, a who was caught physically trespassing in a Teesside Polytechnic college computer lab, while connected to various computers, by UK police in 1988.

blog, to apple German
@blog@kaffeeringe.de avatar
realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Still combing through stories in news archives from 1987 & what the hell is this.

As reported in The Albany Herald in April of 1987, this cop had his conviction reversed, he'd managed to cyberstalk women in 1984! Unbelievable this was already a thing back then.

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Another release, this time on the 2004 'MyDoom' worm. This is 22 pages that had already been processed, I've asked for further records to be processed for later release.

https://archive.org/details/MyDoom-FBI-FOIA

tagesschau, to random German
@tagesschau@ard.social avatar

Hacker nahmen VW jahrelang ins Visier und stahlen Tausende Dateien

Die Vorfälle liegen schon einige Jahre zurück: Von 2010 an haben Hacker Tausende Dateien der Volkswagen-Gruppe erbeutet. Medienberichten zufolge soll die Spur Richtung China führen.

➡️ https://www.tagesschau.de/wirtschaft/unternehmen/vw-hacker-100.html?at_medium=mastodon&at_campaign=tagesschau.de

milanoup, to random Italian
@milanoup@mastodon.uno avatar

Il libro “Aggiustare il mondo” di Giovanni #Ziccardi sull’ #hacker Aaron #Swartz rappresenta un ottimo caso di applicazione della licenza #CreativeCommons CC BY-SA: pubblicato dalla nostra casa editrice in formato PDF e EPUB, è disponibile anche su #Wikimedia in formato HTML, un esempio concreto delle possibilità di condivisione e disseminazione offerte dalle pratiche di #OpenScience.

Leggilo qui in PDF o EPUB:

https://doi.org/10.54103/milanoup.100

o qui in HTML:

https://it.wikisource.org/wiki/Aggiustare_il_mondo_-_Aaron_Swartz

#AaronSwartz

mattotcha, to Cybersecurity
@mattotcha@mastodon.social avatar

Cisco: Hacker breached multifactor authentication message provider on April 1
https://therecord.media/cisco-duo-data-breach-mfa-telephony-provider

2600, to glasgow
@2600@glasgow.social avatar

Hack Thursday in The Rhoderick Dhu #Glasgow from 6pm tomorrow (Thu 17th Apr 2024).

https://hackthurs.day/

"Come and join likeminded infoseccers talk some cyber and non-cyber stuff. It doesn't matter if you're new to cyber, a veteran, or not in infosec at all – all we ask is you be curious."

Matrix chat: #hackthursday:glasgow.social (invite link: https://glasgow.social/matrix)

#infosec #cybersecurity #hacker

lsdm, to email French
@lsdm@mamot.fr avatar

Cette nouvelle cyberattaque montre qu’il ne faut surtout pas recycler ses mots de passe.

De nombreux internautes continuent d’utiliser un même mot de passe pour sécuriser tous leurs comptes en ligne.

https://lsdm.live/modules/news/article.php?storyid=5032

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Proof that people caught up in #hacking related investigations back in the day were not all young guys.

realhackhistory,
@realhackhistory@chaos.social avatar

I love these illustrations, this one from The Spokesman-Review, on the 24th of July, 1987.

Kids clustered around a computer screen, the skateboard that got them all busted even makes an appearance.

redhotcyber, to Symfony Italian
@redhotcyber@mastodon.bida.im avatar

Adobe Magneto: una pericolosa minaccia RCE per i siti di e-commerce

Gli specialisti di Sicurezza Informatica hanno avvertito che gli #hacker stanno già sfruttando una nuova #vulnerabilità in #Magento (CVE-2024-20720) e l'utilizzatore per implementare una #backdoor persistente sui siti di e-commerce.

#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity

https://www.redhotcyber.com/post/adobe-magneto-una-pericolosa-rce-minaccia-i-siti-di-e-commerce/

Sh4d0w_H34rt, to cyberpunk
@Sh4d0w_H34rt@cyberpunk.lol avatar

#cyberpunk #netrunner #hacker #edc

Once again, I'm stuck on the question, "What would a modern-day cyberpunk/netrunner/hacker have as their edc (everyday carry)?"

What would be the criteria for the tech? How would counter surveillance affect those choices?

rml, (edited ) to Magic
@rml@functional.cafe avatar

A little over a year ago, originally due to an interest in the deeper history of , I started diving deep into the , studying , , and doing etc in what has become my deepest engagement with the rabbinic corpus yet -- the Talmud isn't a compiler but rather an extensible interpreter, compiled by compilers over the course of many centuries (build times have gotten significantly faster, my G-d), with novel extensions in the form of rabbinic commentary, glossia and the like being added nearly every century by publishers competing to compile the most elegant editions (Vilna Shaws being paradigmatic). And through studying Talmud and the greater body of rabbinic literature I've found myself encountering /sorcery occasionally, and I just gotta say -- the metaphor of programming as pure magic, with the as a sorcerer, goes insanely deep when you start to dig into it.

filippodb, (edited ) to random Italian
@filippodb@mastodon.uno avatar

Stacca Stacca!
Chi c'è dietro la maschera?

https://i.devol.it/watch?v=OFHQJmvgM8A

I Neo de noantri, scena hacker-demenziale immortale 😂

2600, to glasgow
@2600@glasgow.social avatar

Hackers, crackers, geeks, hats of any colour, technology enthusiasts, hacktivists, and other like-minded folks are most welcome. We do not judge anyone and everyone has something to contribute, no matter their level of expertise.

We're meeting tomorrow (Fri 5th Apr) at a new #Glasgow #hackerspace - @thegamerclub 153 Bath Lane from 6pm 'til late - all welcome!

Also join us in Matrix at #2600:glasgow.social (invite link: https://glasgow.social/matrix)

#infosec #hacker #computersecurity

bsm, to linux German
@bsm@swiss.social avatar
UnicornRiot, to security
@UnicornRiot@mastodon.social avatar

New video: https://www.youtube.com/watch?v=bRPfl8kueSQ
‘xz utils’ Software #Backdoor Uncovered in Years-Long Hacking Plot #shorts #hacker #security

simplenomad, to security
@simplenomad@rigor-mortis.nmrc.org avatar

I remember when buffer overflows became a thing, and how since it was being discussed on the open Internet in circles that it got a lot of attention. Seemed so bleeding edge and exciting back then, now it's just a thing we deal with.

I wonder if this whole thing is similar - in that an attacker has embedded a payload that triggers via a specific key pair. It's so clever and exciting, I mean all the calls are already inside of ssh for the key pair processing, I mean what a perfect way to implement it. Yes it is scary, but from an attacker perspective I think every on the planet is slightly envious and wishes they had thought of it first.

Now imagine a day when this is the new normal. What a time to be alive.

Loewenmama, to random German
@Loewenmama@chaos.social avatar

Frage an die Hacker-Eltern (gerne Boost):

Wie lange dürfen eure Kinder Zocken?
Macht es dabei für euch einen Unterschied, was sie Zocken?
(Hilfreich wäre natürlich wie alt die entsprechenden Kinder ca sind. Also z.B. Kindergarten, Grundschule, Teenager…)
Habt ihr unterschiedliche Regeln für Wochentags und Wochenende bzw. Ferien?

Hintergrund: Es ist hier immer wieder Thema und ich hab keine 100% klare Haltung bin aber lockerer als andere Eltern im Umfeld.

jcarlson, to hacking
@jcarlson@mapstodon.space avatar

Time for an post.

My son, 11 years old, has stated an interest in , wants things like the Flipper Zero or Pwnagotchi for his birthday. The kid loves picking up old tech and messing with it.

Not a myself, but I see enough of y'all on here that I wish I were! I can't help beyond getting him comfortable using the terminal.

I've seen some "getting started with (ethical) hacking" articles out there, but thought I'd ask some humans, too. Any suggestions on where to start?

drahardja, to retrocomputing
@drahardja@sfba.social avatar

Face it, you’ll never be this cool.

#retroComputing #hacker #nintendo

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

As I stray closer to the present day in my #FOIA requests this is the first one of these I’ve gotten, from the #FBI. Request was for records on poodlecorp.
#hacking #hacker #history

kubikpixel, to ai
@kubikpixel@chaos.social avatar

's can read private assistant chats even though they’re .
All non-Google chat 's affected by side channel that 's responses sent to 's.

🗣️ https://arstechnica.com/security/2024/03/hackers-can-read-private-ai-assistant-chats-even-though-theyre-encrypted/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines