Remove what-is-this-log
article thumbnail

Inside the Massive Naz.API Credential Stuffing List

Troy Hunt

Here's what I found: 319 files totalling 104GB 70,840,771 unique email addresses 427,308 individual HIBP subscribers impacted 65.03% of addresses already in HIBP (based on a 1k random sample set) That last number was the real kicker; when a third of the email addresses have never been seen before, that's statistically significant.

Passwords 354
article thumbnail

Computer Repair Technicians Are Stealing Your Data

Schneier on Security

Laptop technicians routinely violate the privacy of the people whose computers they repair: Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs from 12 commercial shops. As noted earlier, two of the visits resulted in the logs the researchers relied on being unrecoverable.

Antivirus 328
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Decoupled SIEM: Brilliant or Stupid?

Anton on Security

Actually, you can decouple even more, such as into buckets like log collection/normalization, then storage/retention, and then detection content and hunting/investigations (What about the workflow? Frankly, not sure why I am writing this, I get a sense that this esoteric topic is of interest to a very small number of people.

article thumbnail

Sending Spammers to Password Purgatory with Microsoft Power Automate and Cloudflare Workers KV

Troy Hunt

Nasty stuff, off to hell for them it is, and it all begins with filing the spam into a special folder called "Send Spammer to Password Purgatory": That's the extent of work involved on a spam-by-spam basis, but let's peal back the covers and look at what happens next.

Passwords 363
article thumbnail

Log Centralization: The End Is Nigh?

Anton on Security

well, the other year as this blog has lingered ] with the scary thought: what if we will run out of the opportunities to centralize logs for security (and compliance) purposes at some point in the future. So you perhaps centralize per cloud, but what if we include SaaS services into this? So I woke up the other day [A.C. — well,

Media 130
article thumbnail

Safe, Secure, Anonymous, and Other Misleading Claims

Troy Hunt

At the very least, you're probably going to provide your own email address, your IP will be logged somewhere and payment info will be provided that links back to you (Bitcoin was one of many payment options and is still frequently traceable to an identity). I wonder what other information might be captured during a purchase.

Internet 329
article thumbnail

Debating SIEM in 2023, Part 1

Anton on Security

The reality of what SIEM was just five years ago is starting to detach from what SIEM is and provides today.” Some organizations built incredibly sophisticated log analysis platforms for security that they don’t call “SIEM.” Guess what market that would be? Hey, it is 2023, let’s debate SIEM again! Debate SIEM?

Marketing 233