Show more

38TB of data accidentally exposed by Microsoft AI researchers

Wiz Research found a data exposure incident on Microsoft’s AI GitHub repository, including over 30,000 internal Microsoft Teams messages – all caused by one misconfigured SAS token

wiz.io/blog/38-terabytes-of-pr

Thread:

twitter.com/hillai/status/1703

California state Legislature has passed the Delete Act to allow individuals to order data brokers to delete their personal data — and to cease acquiring and selling it in the future.

The Delete Act isn’t law yet. Democratic Gov. Gavin Newsom still has to decide whether to sign the measure, whose impact could potentially extend well beyond state lines given California’s history of setting similar trends.

What the Bill Does

securityweek.com/imagine-makin

Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware

eff.org/deeplinks/2023/09/appl

If you use Google 2fa authentication app you probably should turn OFF the sync to cloud option

Retool blames breach on Google Authenticator MFA cloud sync feature

Software company Retool says the accounts of 27 cloud customers were compromised following a targeted and multi-stage social engineering attack.

bleepingcomputer.com/news/secu

Google Wallet Exploit Reveals Credit Card Details to NFC Devices

A fix is included with the September 2023 security patch, which is still being deployed.

A strange Google Wallet bug, which affects smartphones running Android 5.0 and up, may expose your credit card details under a very specific set of circumstances.

demonstrated by MrTiz on GitHub and YouTube, the CVE-2023-35671 vulnerability is due to a loophole in Android's Screen Pinning tool.

github.com/MrTiz/CVE-2023-3567

Google, Mozilla, Microsoft, and Brave have each issued critical security patches, reports Stack Diary. The patches address a vulnerability that an attacker could use to gain access to or run malicious code on your computer

stackdiary.com/critical-vulner

update EVERYTHING - every app that has an update

The Greater Manchester police force has become the latest entity to fall victim to a now well-established form of cyberattack: the ransomware hack

theguardian.com/technology/202

Exclusively for Startpage users - get 50% OFF your StartMail account!

PGP encrypted emails
Seamlessly migrate emails and contacts
Password protected email
Unlimited custom aliases
20GB of storage

SAVE 50%
per month, billed annually
First year at $29.98 | Renews at $59.95

startmail.com/startpage/

counter.social/@ecksmc/1110339

Update Notepad++ now

Notepad++ version 8.5.7 has been released with fixes for multiple buffer overflow zero-days, with one marked as potentially leading to code execution by tricking users into opening specially crafted files.

bleepingcomputer.com/news/secu

TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in Notepad++, the most severe of which could allow for arbitrary code execution. Details of these vulnerabilities are as follows:

cisecurity.org/advisory/multip

Online security is no longer a luxury but an absolute necessity in today's digital age. For the average internet user, spotting the reassuring green padlock symbol and the "https://" prefix in their browser's address bar has become a common sight, indicating a secure connection.

However, hidden beneath this facade of security lurks a menacing threat known as "HTTPS spoofing"

Understanding HTTPS Spoofing: A Deceptive Online Threat

cysecurity.news/2023/09/unders

Researchers at the University of Wisconsin–Madison have demonstrated that Chrome browser extensions can steal passwords from the text input fields in websites, even if the extension is compliant with Chrome's latest security and privacy standard, Manifest V3.

bleepingcomputer.com/news/secu

{PDF URL}

arxiv.org/pdf/2308.16321.pdf

Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android.

You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment

cuckoosandbox.org/

Useful resources for SOC Analyst and SOC Analyst candidates.

github.com/LetsDefend/awesome-

Make privacy easy with Incogni

The cybersecurity firm Surfshark recognized the negative impacts of data brokers and formed Incogni to give people a chance to take their information off the Internet and reclaim their privacy.

Incogni is a subscription service that confronts the data brokers on your behalf.

incogni.com/

Use code “9to5google” for 55% off with an Incogni annual plan

30-day money-back guarantee

Modern cars are a privacy nightmare, and there’s no way to opt out

According to a new report from Mozilla, every major car brand has glaring privacy concerns — so much so that Mozilla ranked cars as “the official worst category of products for privacy.” That’s below notoriously privacy-unaware product categories, like mental health apps and sex toys.

foundation.mozilla.org/en/priv

Google’s Threat Analysis Group (TAG) has shed light on a cyber campaign originating from North Korea, targeting security researchers engaged in vulnerability research and development.

the team has discovered the exploitation of at least one zero-day vulnerability in the last few weeks, prompting TAG to promptly report the issue to the affected vendor

North Korean threat actors used social media sites like X to build rapport with their targets

blog.google/threat-analysis-gr

A Windows 7 machine belonging to a high-security fencing company was the stunning weak link in a shocking cybersecurity incident that exposed vital military data. This hack not only underlines the need for organizations, including those that don't seem to be in the military industry, to maintain strong digital defenses, but it also raises questions about the health of cybersecurity policies.

UK Military Data Breach via Outdated Windows 7 System

cysecurity.news/2023/09/uk-mil

DNS Security & You: What is DNS Protection?

blog.controld.com/dns-security

I use CTRL-D it's a good service if you are interested in using a secure DNS service I'd say try CTRL-D - it's not just for organizations or businesses anyone can use it

See Tickets, recently reported a data breach that exposed the payment card information of over 300,000 customers.

The compromised information includes:

Customer names
Addresses
Debit or credit card numbers in combination with security codes, access codes, passwords, or PINs

This attack reveals the prevalence of credit card skimming malware, in which criminals insert malicious code into a website’s checkout pages to steal users’ payment card info

apps.web.maine.gov/online/aevi

"The following is my 0day. This code, when executed on any website, disconnects the AtlasVPN linux client and leaks the users IP address. I am not yet aware of it being used in the wild. However, it shows that AtlasVPN does not take their users safety serious, because their software security decisions suck so massively that its hard to believe this is a bug rather than a backdoor"

AtlasVPN Linux Client 1.0.3 IP Leak Exploit

seclists.org/fulldisclosure/20

Show more

⇄ Σ = Mᄃ² ⇆

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.