Sat.Dec 02, 2023

article thumbnail

Weekly Update 376

Troy Hunt

I'm irrationally excited about the new Prusa 3D printer on order, and I think that's mostly to do with planning for the NDC Oslo talk I plan to do with Elle, my 11-year old daughter. I'm all for getting the kids exposure not just to tech, but also to being able to talk to others about tech and involving them in conference talks since a young age has been a big part of that.

article thumbnail

Fortune-telling website WeMystic exposes 13M+ user records

Security Affairs

WeMystic, a website on astrology, numerology, tarot, and spiritual orientation, left an open database exposing 34GB of sensitive data about the platforms’ users. Telling the future is a tricky business, and failure to foretell your own mishaps doesn’t help. The content platform WeMystic is a good example of this, with the Cybernews research team discovering that it exposed its users’ sensitive data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Over 20,000 vulnerable Microsoft Exchange servers exposed to attacks

Bleeping Computer

Tens of thousands of Microsoft Exchange email servers in Europe, the U.S., and Asia exposed on the public internet are vulnerable to remote code execution flaws. [.

Internet 133
article thumbnail

Researchers devised an attack technique to extract ChatGPT training data

Security Affairs

Researchers devised an attack technique that could have been used to trick ChatGPT into disclosing training data. A team of researchers from several universities and Google have demonstrated an attack technique against ChetGPT that allowed them to extract several megabytes of ChatGPT’s training data. The researchers were able to query the model at a cost of a couple of hundred dollars. “By matching against this dataset, we recover over ten thousand examples from ChatGPT’s training dataset

Hacking 120
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Google Chrome's new cache change could boost performance

Bleeping Computer

Google is introducing a significant change to Chrome's Back/Forward Cache (BFCache) behavior, allowing web pages to be stored in the cache, even if a webmaster specifies not to store a page in the browser's cache. [.

115
115
article thumbnail

Security Affairs newsletter Round 448 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

More Trending

article thumbnail

sniffnet: Application to comfortably monitor your Internet traffic

Penetration Testing

sniffnet Sniffnet is a network monitoring tool to help you easily keep track of your Internet traffic. Sniffnet is a technical tool, but at the same time it strongly focuses on the overall user experience: most of... The post sniffnet: Application to comfortably monitor your Internet traffic appeared first on Penetration Testing.

Internet 101
article thumbnail

ChatGPT Spit Out Sensitive Data When Told to Repeat ‘Poem’ Forever

WIRED Threat Level

Plus: A major ransomware crackdown, the arrest of Ukraine’s cybersecurity chief, and a hack-for-hire entrepreneur charged with attempted murder.

Hacking 90
article thumbnail

WordPress Phishing Scam Exploits Fake CVE-2023-45124 Vulnerability

Penetration Testing

In the ever-evolving world of cybersecurity, vigilance is paramount. Recently, a cunning phishing scam has emerged, targeting unsuspecting WordPress users with a fabricated security flaw, CVE-2023-45124. This sophisticated ruse, uncovered by the Wordfence Threat... The post WordPress Phishing Scam Exploits Fake CVE-2023-45124 Vulnerability appeared first on Penetration Testing.

Scams 89
article thumbnail

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.

The Hacker News

Organizations in the Middle East, Africa, and the U.S. have been targeted by an unknown threat actor to distribute a new backdoor called Agent Racoon. "This malware family is written using the.

DNS 78
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

DEF CON 31 – War Stories – Taiiwo’s, Artorias’, Puck’s, TheClockworkBird’s ‘Cracking Cicada 3301’

Security Boulevard

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada ; via the organizations YouTube channel. Permalink The post DEF CON 31 – War Stories – Taiiwo’s, Artorias’, Puck’s, TheClockworkBird’s ‘Cracking Cicada 3301’ appeared first on Security Boulevard.

article thumbnail

China continues Pig-Butchering Crack-down

Security Boulevard

One of my techniques for keeping current on Cybercrime trends is having an "interesting" collection of international news ticklers. This story came to me via X:CyberScamMonitor via a QQ account called "onCambodia." @CyberScamMonitor is a Twitter/X account and Substack account dedicated to tracking online scam and gambling operations in Southeast Asia and documenting human trafficking and human rights abuses.