the initial access occurred after a Vercel employee's Google Workspace account was compromised via a breach at the AI platform Context.ai.
大多数人认为大型云平台的漏洞主要来自外部直接攻击,但作者暗示这次安全事件实际上是通过第三方AI平台Context.ai的漏洞间接导致的,这挑战了人们对供应链安全风险的普遍认知。
the initial access occurred after a Vercel employee's Google Workspace account was compromised via a breach at the AI platform Context.ai.
大多数人认为大型云平台的漏洞主要来自外部直接攻击,但作者暗示这次安全事件实际上是通过第三方AI平台Context.ai的漏洞间接导致的,这挑战了人们对供应链安全风险的普遍认知。
for - article - The Atlantic - Trump staff security breach - Yemen attack plans - shared on Signal
we need a new countercultural energy that rejects being quantified as data for Technofeudal lords. That rejection can come in many forms, from data-sovereignty to a push toward Web 3.0.
for - counterculture - fightback against technofeudalism - Indyweb - people-centered - Substack article - Best Served Cold: Luigi Mangione and The Age of Breach - Alexander Beiner
The assassination is a koan that brings to light the paradox at the heart of civilisation: what’s real is our experience of being alive, not how we can be quantified, but we pretend the opposite is true.
for - comparison - symbolosphere vs physiosphere - assassination of United Healthcare CEO Brian Thompson - Substack article - Best Served Cold: Luigi Mangione and The Age of Breach - Alexander Beiner
Algorithmic control of our lives is an expression of the rot at the heart of Western civilisation: quantitative values subsuming qualitative experience.
for - key insight - algorithmic control - quantitative values subsuming qualitative experience - Substack article - Best Served Cold: Luigi Mangione and The Age of Breach - Alexander Beiner
This is precisely what happens in breach events; when the imaginal meets the real, forces are unleashed that nobody can control.
for - breach events - unpredictability of - from Substack article - Best Served Cold: Luigi Mangione and The Age of Breach - Alexander Beiner
End Times
for - book - End Times - Peter Turchin - from Substack article - Best Served Cold: Luigi Mangione and The Age of Breach - Alexander Beiner
for - meme - the age of breach - Alexander Beiner - Article - Substack - Best Served Cold: Luigi Mangione and The Age of Breach Technofeudalism, accountability porn and the new counterculture - Alexander Beiner
for - Technofeudalism: What killed capitalism - Yanis Varoufakis - from - interview - 2008 was the West's 1991 moment - Yanis Varoufakis - from - Medium article - An Emerging Third Option: Reclaiming Democracy from Dark Money & Dark Tech Seven Observations On 2024 and What’s Next - Otto Scharmer - neo feudalism - from - Substack article - Best Served Cold: Luigi Mangione and The Age of Breach - Technofeudalism, accountability porn and the new counterculture - Alexander Beiner
from - interview - 2008 was the West's 1991 moment - Yanis Varoufakis - https://hyp.is/BZ88pKj5Ee-k86snmHsbnQ/www.youtube.com/watch?v=8nTBWf4JgYQ - Medium article - An Emerging Third Option: Reclaiming Democracy from Dark Money & Dark Tech Seven Observations On 2024 and What’s Next - Otto Scharmer - neo feudalism - https://hyp.is/cVix6KtFEe-zA8PBZvgw8w/medium.com/presencing-institute-blog/an-emerging-third-option-reclaiming-democracy-from-dark-money-dark-tech-3886bcd0469b - Substack article - Best Served Cold: Luigi Mangione and The Age of Breach - Technofeudalism, accountability porn and the new counterculture - Alexander Beiner - https://hyp.is/8V9iTrsaEe-Dqq_Oz0oc_Q/beiner.substack.com/p/best-served-cold-luigi-mangione-and
Shoss, M., Hootegem, A. V., Selenko, E., & Witte, H. D. (2022). The Job Insecurity of Others: On the Role of Perceived National Job Insecurity During the COVID-19 Pandemic. PsyArXiv. https://doi.org/10.31234/osf.io/qhpu5
Shortly after Citrix initially disclosed the intrusion in March 2019, a little-known security company Resecurity claimed it had evidence Iranian hackers were responsible, had been in Citrix’s network for years, and had offloaded terabytes of data. Resecurity also presented evidence that it notified Citrix of the breach as early as Dec. 28, 2018, a claim Citrix initially denied but later acknowledged.
Hundreds of millions of phone numbers linked to Facebook accounts have been found online.
As a recap, Chegg discovered on September 19th a data breach dating back to April that "an unauthorized party" accessed a data base with access to "a Chegg user’s name, email address, shipping address, Chegg username, and hashed Chegg password" but no financial information or social security numbers. The company has not disclosed, or is unsure of, how many of the 40 million users had their personal information stolen.
A file containing personal information of 14.8 million Texas residents was discovered on an unsecured server. It is not clear who owns the server, but the data was likely compiled by Data Trust, a firm created by the GOP.
Upon receipt of notification, the Authority shall determine whether such breach should be reported by the data fiduciaryto the data principal, taking into account the severity of the harm that may be caused to such data principal or whether some action is required on the part of the data principal to mitigate suchharm.
This means that users aren't always informed about a breach of data. That's the prerogative of the Data Protection Authority, and not mandatory, in the interest of the user.
“Personal data breach”means any unauthorised or accidental disclosure, acquisition, sharing, use, alteration, destruction, loss of access to, of personal data that compromises the confidentiality, integrity or availability of personal data to a data principal;
Personal data breach here includes "accidental disclosure" as well.
The Justice Department has announced charges against four people, including two Russian security officials, over cybercrimes linked to a massive hack of millions of Yahoo user accounts. [500M accounts, in 2014]
Two of the defendants — Dmitry Dokuchaev and his superior Igor Sushchin — are officers of the Russian Federal Security Service, or FSB. According to court documents, they "protected, directed, facilitated and paid" two criminal hackers, Alexsey Belan and Karim Baratov, to access information that has intelligence value. Belan also allegedly used the information obtained for his personal financial gain.
A company that sells internet-connected teddy bears that allow kids and their far-away parents to exchange heartfelt messages left more than 800,000 customer credentials, as well as two million message recordings, totally exposed online for anyone to see and listen.
Thousands of poorly secured MongoDB databases have been deleted by attackers recently. The attackers offer to restore the data in exchange for a ransom -- but they may not actually have a copy.
A large database of blood donors' personal information from the AU Red Cross was posted on a web server with directory browsing enabled, and discovered by someone scanning randomly. It is unknown whether anyone else downloaded the file before it was removed.
DNC email hack, and possible Russian involvement.
The IRS has been having problems with identity theft.
Linode Cloud Service has been under DDoS attack for a few days. Now they've discovered some stolen passwords. It is not yet known whether the same attacker is responsible for both.
A security investigation into the unauthorized login of three accounts has led us to the discovery of two Linode.com user credentials on an external machine. This implies user credentials could have been read from our database, either offline or on, at some point.<br> . . .<br> The entire Linode team has been working around the clock to address both this issue and the ongoing DDoS attacks. We've retained a well-known third-party security firm to aid in our investigation. Multiple Federal law enforcement authorities are also investigating and have cases open for both issues.
So it looks like the Juniper security flaw does have something to do with an NSA backdoor that was exploited by attackers.
https://rpw.sh/blog/2015/12/21/the-backdoored-backdoor/
http://blog.cryptographyengineering.com/2015/12/on-juniper-backdoor.html
Big security breach at Juniper Networks, a hardware company that works with government agencies and large businesses. Someone installed a backdoor that went undiscovered for three years.
http://www.businessinsider.com/fbi-investigates-juniper-hack-attack-2015-12
“Confirmed and looks good… Its legit.”
Second Data Breach from Ashley Madison is legit