BlackBox (Security) Archiv
4.09K subscribers
183 photos
393 videos
167 files
2.67K links
πŸ‘‰πŸΌ Latest viruses and malware threats
πŸ‘‰πŸΌ Latest patches, tips and tricks
πŸ‘‰πŸΌ Threats to security/privacy/democracy on the Internet

πŸ‘‰πŸΌ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
What if Facebook Is the Real β€˜Silent Majority’?

Right-wing influencers are dominating the political discussion on Facebook, raising questions about whether it will translate into electoral success in November.

Listen, liberals. If you don’t think Donald Trump can get re-elected in November, you need to spend more time on Facebook.

Since the 2016 election, I’ve been obsessively tracking how partisan political content is performing on Facebook, the world’s largest and arguably most influential media platform. Every morning, one of the first browser tabs I open is CrowdTangle β€” a handy Facebook-owned data tool that offers a bird’s-eye view of what’s popular on the platform. I check which politicians and pundits are going viral. I geek out on trending topics. I browse the previous day’s stories to see which got the most reactions, shares and comments.

Most days, the leader board looks roughly the same: conservative post after conservative post, with the occasional liberal interloper. (If you want to see these lists for yourselves, you can check out @FacebooksTop10, a Twitter account I created that shows the top 10 most-interacted-with link posts by U.S. Facebook pages every day.)

It’s no secret that, despite Mr. Trump’s claims of Silicon Valley censorship, Facebook has been a boon to him and his allies, and hyperpartisan Facebook pages are nothing new. (In fact, my colleague John Herrman wrote about them four years ago this month.)

But what sticks out, when you dig in to the data, is just how dominant the Facebook right truly is. Pro-Trump political influencers have spent years building a well-oiled media machine that swarms around every major news story, creating a torrent of viral commentary that reliably drowns out both the mainstream media and the liberal opposition.

The result is a kind of parallel media universe that left-of-center Facebook users may never encounter, but that has been stunningly effective in shaping its own version of reality. Inside the right-wing Facebook bubble, President Trump’s response to Covid-19 has been strong and effective, Joe Biden is barely capable of forming sentences, and Black Lives Matter is a dangerous group of violent looters.

πŸ‘€ πŸ‘‰πŸΌ https://www.nytimes.com/2020/08/27/technology/what-if-facebook-is-the-real-silent-majority.html

#fb #DeleteFacebook #influencer #trump #ToddlerTrump #elections
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
BIG DATA - 3.0 - "L1ZY"

Introducing the most advanced artificial intelligence platform in modern history...BIG DATA - 3.0 - "L1ZY"

#BigData #L1ZY #video #thinkabout #why
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
OVPN - Update on court order

As I wrote in July, OVPN received a court order from the Rights Alliance (RA) at the request of AB Svensk Filmindustri and Nordisk Film A/S. RA wants to know which user was allocated a specific Public IPv4 address, at a specific time. Furthermore, RA wants to know the name, address, payment information as well as how long that specific user account was a paying subscriber to OVPN.

To be clear, OVPN can not provide the requested information as there are no logs related to which customer was historically allocated a specific IP address.

The case is still ongoing as we have sent responses back and forth throughout the summer. A final decision from the Patent and Market Court (PMC) should be received in September. However, a lot of interesting things have transpired so far, which I believe are worth mentioning.

OVPN won the application for security measures

The injunction consists of two parts, an information request as well as a security measure. The security measure means that OVPN would not be allowed to delete any information about the requested account until the court has decided regarding the information request.

Since OVPN has no information, the court decided on July 9 to side with OVPN and reject the request for security measures, as shown in the Swedish court document:

πŸ‘€ πŸ‘‰πŸΌ https://www.ovpn.com/en/blog/update-on-court-order

#ovpn #court #order
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Distributed Denial of Secrets: Questions wanted for an exclusive interview! (last call for ur questions !!)

For an exclusive interview we have the makers of the collective DDoSecrets at hand. In contrast to other disclosure platforms, most leaks are not published on a website, but by telegram. Many actions are also announced on Twitter.

#DDoSecrets - Your Questions so far πŸ‘‡πŸΌ

1 ..
Since they shut down your data server at Hetzner in Frankfurt, most DirectDownloads are no longer running! Are there already concrete plans to replace it?

2 .. Do you only get your leaks from outside through third parties?

3 .. How do you verify the leaks that are delivered to you for authenticity from a technical point of view?

4 .. Can you rule out that your sources may not contain government services that act for their own benefit?

5 .. The current "wish list" on your site is quite long! Do you really have zero contact to the respective releasers?

6 .. Do you plan to take care of getting the desired data leaks yourself in the future? With a group from your own members?

7 .. In view of the progressive "degeneration of the authenticity of information", (including fake news, deliberate disinformation or propaganda, internet censorship, increasing number of conspiracy theories & followers of this "philosophy") how do you want to guarantee the truth of your leaked information? Today and in the future.

8 .. Before publication, are contents also checked to see what consequences could arise for people, for example, when publishing addresses, and is publication possibly waived?

9 .. How can we help?

10 .. whether and how the leaks can be checked for seriousness by the respective activists?

11 .. How many people are part of the collective? It looks like Till Kottmann is the only representative.

12 .. Why exactly did you choose to host BlueLeaks data on a German server? Was it some kind of joke/provocation or no specific reason?

πŸ’‘ This exclusive interview with DDoSecrets will be published in German and English. Questions can therefore be submitted in both languages.

Please ask your questions either in the Tarnkappe Forum, or use one of the following Telegram-Groups: πŸ‘‡πŸΌ

πŸ‘‰πŸΌ
Tarnkappe.info

πŸ‘‰πŸΌ NoGoolag

πŸ‘‰πŸΌ BlackBoxβ–ͺ️Security

‼️ Please do not forget to mark your question(s) with #DDoSecrets

πŸ‘€ πŸ‘‰πŸΌ https://t.iss.one/BlackBox_Archiv/1074

#DDoSecrets #interview
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Google is removing Fediverse apps from the Play Store because they can be used to access hate speech

A growing number of mobile apps meant to access the Fediverse are being removed from the Google Play Store. According to user reports, recently removed apps include Husky, Subway Tooter, and Fedilab. In a nutshell, a Fediverse is any combination of interconnected servers that can be used for web publishing and can manifest in something like Mastodon. Apps like Subway Tooter allow users to access Mastodon content which is hosted on individual servers in the Fediverse. The operators of the servers in the Fediverse (and often in the Internet at large) are responsible for moderating hate speech, not the operators of the apps used to access said servers.

Despite this established web browser model, The official reason given by Google for the removal of Fediverse apps is that these apps can be used to access servers which have microblogs or other content which are dedicated to hate speech. Newsflash: Mobile apps like Google Chrome can be used to access the exact same hate speech. That is the web browser model. Even out of the browser world that can take you to servers located in unknown corners of the world, such speech can be found on other front and center social media platforms such as Twitter and Facebook.

πŸ‘€ πŸ‘‰πŸΌ https://www.privateinternetaccess.com/blog/google-is-removing-fediverse-apps-from-the-play-store-because-they-can-be-used-to-access-hate-speech/

#google #DeleteGoogle #fediverse #hatespeech
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Surprise! Even Google's engineers don't understand its privacy controls

From their very inception, tech companies haven't been keen on privacy. They've also not been keen on making privacy controls easy. As court documents just revealed.

It's an empty feeling.

You discover that something you've always suspected to be true -- even when denied by a tech company -- turns out to be, oh, true.

In some way, you almost feel guilty. You want to beat yourself about the head muttering "I knew it. I just knew it."

So here we are finally seeing that Google's own engineers don't even understand the company's privacy controls.

In court documents unsealed last week in Arizona, a (sadly unnamed) Google engineer offers this 2018 email about the company's location tracking controls: "Location off should mean location off, not 'except for this case or that case.' The current UI feels like it is designed to make things possible, yet difficult enough that people won't figure it out."

Who would ever believe a company that flouted privacy more enthusiastically and more often than a flasher could make privacy controls so impenetrable that even the company's own large brains couldn't figure them out?

Those tech companies were run by such wily young people in days of yore. Ever since Facebook CEO Mark Zuckerberg insisted in 2010 that people didn't want privacy, you had a feeling that you were never going to get any.

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/surprise-even-googles-engineers-dont-understand-its-privacy-controls/

#google #DeleteGoogle #privacy #controls #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
aria2 - The ultra fast download utility

aria2 is a utility for downloading files. The supported protocols are HTTP(S), FTP, SFTP, BitTorrent, and Metalink. aria2 can download a file from multiple sources/protocols and tries to utilize your maximum download bandwidth.

It supports downloading a file from HTTP(S)/FTP/SFTP and BitTorrent at the same time, while the data downloaded from HTTP(S)/FTP/SFTP is uploaded to the BitTorrent swarm. Using Metalink's chunk checksums, aria2 automatically validates chunks of data while downloading a file like BitTorrent.

πŸ’‘ Features:

πŸ‘‰πŸΌ Multi-Connection Download.
aria2 can download a file from multiple sources/protocols and tries to utilize your maximum download bandwidth. Really speeds up your download experience.

πŸ‘‰πŸΌ Lightweight. aria2 doesn’t require much memory and CPU time. When disk cache is off, the physical memory usage is typically 4MiB (normal HTTP/FTP downloads) to 9MiB (BitTorrent downloads). CPU usage in BitTorrent with download speed of 2.8MiB/sec is around 6%.

πŸ‘‰πŸΌ Fully Featured BitTorrent Client. All features you want in BitTorrent client are available: DHT, PEX, Encryption, Magnet URI, Web-Seeding, Selective Downloads, Local Peer Discovery and UDP tracker.

πŸ‘‰πŸΌ Metalink Enabled. aria2 supports The Metalink Download Description Format (aka Metalink v4), Metalink version 3 and Metalink/HTTP. Metalink offers the file verification, HTTP/FTP/SFTP/BitTorrent integration and the various configurations for language, location, OS, etc.

πŸ‘‰πŸΌ Remote Control. aria2 supports RPC interface to control the aria2 process. The supported interfaces are JSON-RPC (over HTTP and WebSocket) and XML-RPC.

πŸ‘‰πŸΌ πŸ‘€ The project page is located at:
https://aria2.github.io/

#aria2 #download #tool #utility #linux #windows
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Episode 17: Determining Lies by Body Language with Traci Brown
The AnglerPhish Podcast - Determining Lies by Body Language with Traci Brown (Episode 17)

Top Body Language Expert Traci Brown visits AnglerPhish to discuss the science of reading body language to determine if someone is lying or committing fraud. Traci has spoken and trained on this subject for over 20 years. She also discusses how these lessons translate to an online environment as well. Not to be missed!

🎧 πŸ‘‰πŸΌ The #AnglerPhish #truecrime #podcast (Episode 17)

πŸ“‘
@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Predictions on Empire Market User Migration After $30 Million Exit Scam

Experts have predicted that White House, Versus, and Icarus Markets stand to be the most probable candidates to absorb victims of the $30 million Empire Market exit scam

Like weather, the dark web is defined by clear cycles that denote the natural stages of darknet markets and how they respond to law enforcement, DDoS attacks and several other so-called β€œenemies”.

Being fuelled by illicit operations, dark web markets have continuously failed to provide the much-needed user protection to shield buyers and vendors from losses resulting from law enforcement seizures and exit scams.

Nonetheless, the widespread uncertainty has not prevented the dark web ecosystem from wielding unmatched dynamism, which is evidenced by emergence of new markets and migration of users to adjust to the already-mentioned enemies of the darknet.

πŸ‘€ πŸ‘‰πŸΌ https://tapeucwutvne7l5o.onion/predictions-on-empire-market-user-migration-after-30-million-exit-scam

πŸ‘€ πŸ‘‰πŸΌ https://www.vice.com/en_in/article/z3e533/online-drug-market-empire-disappears-with-dollar30-million-of-users-money

πŸ‘€ πŸ‘‰πŸΌ https://cryptoslate.com/darknet-marketplace-empire-exit-scams-with-30-million-in-bitcoin/

#empire #exitscam #darknet #predictions #migration
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Forwarded from NoGoolag
🐱 t.iss.one/qd_invitations

Groups about:

_______________

Chromium [ungoogled] | CHAT
https://t.iss.one/joinchat/TiTqiBWT8rxC47ykrK2rCg

Chromium [ungoogled] | CHANNEL
https://t.iss.one/joinchat/AAAAAFlST2c_v9iorWhtIQ

_______________

dnscrypt-proxy-android | CHAT
https://t.iss.one/joinchat/TiTqiA2laARw651mYHwKcg

dnscrypt-proxy-android | CHANNEL
https://t.iss.one/dnscrypt_proxy

_______________

MiXplorer | UPDATES
https://t.iss.one/MiXplorer_updates

_______________

⛔️ GROUPS ARE PROTECTED WITH CAPTCHA VERIFICATION


#groups #qd
Russian internet trolls hired U.S. journalists to push their news website, Facebook says

Facebook said the website is run by people affiliated with the Internet Research Agency, which inflamed political tensions in the 2016 election through social media.

Some of Russia’s most notorious internet trolls have launched a news website that hired real-life journalism freelancers β€” including Americans β€” to contribute, Facebook said Tuesday.

The site, called Peace Data, launched this year with coverage focused largely on the environment and corporate and political corruption. Facebook learned through a tip from the FBI that people formerly associated with the Russian Internet Research Agency, which created a number of influential Twitter and Facebook personas to inflame political tensions in the 2016 election, ran Peace Data and has taken down its known affiliated accounts. It had yet to gain a serious following, said Nathaniel Gleicher, the company’s head of cybersecurity policy.

β€œIt confirms what I think we’ve all thought: Russian actors are trying to target the 2020 elections and public debate in the U.S., and they’re trying to be creative about it,” Gleicher said.

β€œBut the second thing that it confirms is, it’s not really working,” he said. β€œYou can run a loud, noisy influence campaign like the one we saw in 2016, and you get caught very quickly. Or you can try to run a much more subtle campaign, which is what this looks like. And A, you still get caught, and B, when you run a subtle influence campaign, you’re sort of working at cross-purposes with yourself. You don’t get a lot of attention for it.”

πŸ‘€ πŸ‘‰πŸΌ https://www.nbcnews.com/tech/tech-news/russian-internet-trolls-hired-u-s-journalists-push-their-news-n1239000

#usa #influencing #facebook #DeleteFacebook #elections #russia #trolls #journalists
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Russia spreads fake news to disrupt elections in the USA

As it was to be expected, Russia is also trying to disrupt these elections in the USA. The following example shows how easy it is to fall for fake news.

‼️ ... Fake News:
https://www.themoscowtimes.com/2020/09/01/millions-of-us-voters-details-leak-to-russias-dark-web-kommersant-a71307

πŸ‘€ πŸ‘‰πŸΌ michiganvoters.info - voterrecords.com

So be attentive, and don't let yourself be led up the slippery slope ;)

#fakenews #russia #usa #elections
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
US Authorities Can Now Track the Privacy-Focused Monero Cryptocurrency

The leading crypto intelligence firm CipherTrace has developed a toolset to assist U.S. law enforcement to track the privacy-centric Monero cryptocurrency.

The cryptocurrency analytics firm CipherTrace has made the announcement that they have created a toolset designed to help trace transactions made using the privacy-centric Monero virtual currency – stating that they did so under contract with the U.S. Department of Homeland Security (DHS).

‼️ Monero Can Now Be Tracked

A press release by CipherTrace stated that the goal behind development of the tracing tools was harnessed from the U.S. law enforcement need to track the transactions made across criminal networks using the Monero cryptocurrency.

The firm reflected on the fact that Monero has since grown to become the second most popular digital coin in the dark web – with estimate figures indicating that about 45 percent of dark web platforms have adopted Monero integration.

It is for the above reason that law enforcement interest has developed around the digital currency as the facilitator of darknet-backed cybercriminal enterprises. As mentioned already, Monero offers far better features than Bitcoin, including the ring signature mechanism to ensure user anonymity.

Ring signatures work to mix transactions so that when third party actors try to figure out the source of funds sent in Monero, it will appear as though multiple users participated in the transaction. The feature makes it virtually impossible for law enforcement agencies to identify the true sources of such funds.

πŸ‘€ πŸ‘‰πŸΌ https://tapeucwutvne7l5o.onion/us-authorities-can-now-track-the-privacy-focused-monero-cryptocurrency

πŸ‘€ πŸ‘‰πŸΌ https://ciphertrace.com/ciphertrace-announces-worlds-first-monero-tracing-capabilities/

#monero #cryptocurrency #ciphertrace #usa #authorities #tracing #Privacy #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Norway: E-mail accounts of members of parliament hacked

Emails of some members of the Norwegian parliament have apparently been hacked. The exact extent of the data outflow is still unclear.

The Norwegian Parliament announced on Tuesday that data had leaked from the e-mail accounts of some members and staff. The parliamentary administration had reported the incident to the police and was working closely with the relevant security authorities, the press release said. The incident had apparently already been noticed last week.

πŸ‘€ πŸ‘‰πŸΌ https://www.stortinget.no/no/Hva-skjer-pa-Stortinget/Nyhetsarkiv/Pressemeldingsarkiv/2019-2020/it-angrep-mot-stortinget/

πŸ‘€ πŸ‘‰πŸΌ πŸ‡©πŸ‡ͺ https://www.golem.de/news/norwegen-e-mail-accounts-von-abgeordneten-gehackt-2009-150627.html

#norway #hacker #hacked #representatives
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
53: Shadow Brokers
Darknetdiaries - EP 53: Shadow Brokers

The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong person’s hands? Well, that happened.

🎧 πŸ‘‰πŸΌ Darknetdiaries - EP 53: Shadow Brokers
https://darknetdiaries.com/episode/53/

#darknetdiaries #truecrime #podcast
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
73: WannaCry
Darknetdiaries - EP 73: WannaCry

πŸ’‘
It is recommend to listen to episodes 53 β€œShadow Brokers”, 71 β€œFDFF”, and 72 β€œBangladesh Bank Heist” before listening to this one.

In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UK’s national health service. Security researchers scrambled to try to figure out how to stop it and who was behind it.

🎧 πŸ‘‰πŸΌ https://darknetdiaries.com/episode/73/

#darknetdiaries #truecrime #podcast
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Threema Goes Open Source, Welcomes New Partner

Strengthened Through Partnership

After an intense startup phase, Threema lays the foundation for continuity, further growth, and an acceleration of the product development thanks to the entry of the German-Swiss investment company Afinum Management AG.

Afinum fully shares our values regarding security and privacy protection. The additional resources gained through this partnership enable Threema to grow beyond the German-speaking part of Europe, and we can use our energy for visionary new ideas and projects. That said, Threema’s founders – Manuel Kasper, Silvan Engeler, and Martin Blatter, all software developers – will continue to lead the company and still retain a significant ownership interest.

Open Source and Multi Device

Security and privacy protection are deeply ingrained in Threema’s DNA, which is why our code gets reviewed externally on a regular basis. Within the next months, the Threema apps will become fully open source, supporting reproducible builds. This is to say that anyone will be able to independently review Threema’s security and verify that the published source code corresponds to the downloaded app.

In the future, it will be possible to use multiple devices in parallel thanks to an innovative multi-device solution. In contrast to other approaches, no trace of personal data will be left behind on a server. Thanks to this technology, Threema can be used on a PC without a smartphone.

In conclusion, Threema will become even more trustworthy and even more convenient to use.

πŸ‘€ πŸ‘‰πŸΌ https://threema.ch/en/blog/posts/open-source-and-new-partner

#threema #opensource #afinum #swiss #germany
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
To Surveil and Predict - A Human Rights Analysis of Algorithmic Policing in Canada

This publication is the result of an investigation by the Citizen Lab at the Munk School of Global Affairs & Public Policy and the University of Toronto’s International Human Rights Program (IHRP) at the Faculty of Law. Read the full report and our explanatory guide that provides a summary of research findings as well as questions and answers from the research team.

πŸ‘€ πŸ‘‰πŸΌ Read the full report (PDF)
https://citizenlab.ca/wp-content/uploads/2020/09/To-Surveil-and-Predict.pdf

πŸ‘€ πŸ‘‰πŸΌ Algorithmic Policing in Canada Explained
https://citizenlab.ca/2020/09/algorithmic-policing-in-canada-explained/

πŸ‘€ πŸ‘‰πŸΌ https://citizenlab.ca/2020/09/to-surveil-and-predict-a-human-rights-analysis-of-algorithmic-policing-in-canada/

#algorithmic #policing #canada #study #analysis #pdf
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Warner Music Group finds hackers compromised its online stores

NOTICE OF DATA BREACH

On August 5, 2020, we learned that an unauthorized third party had compromised a number of US-based e-commerce
websites WMG operates but that are hosted and supported by an external service provider. This allowed the unauthorized third party to potentially acquire a copy of the personal information you entered into one or more of the affected website(s) between April 25, 2020 and August 5, 2020.

While we cannot definitively confirm that your personal information was affected, it is possible that it might have been
as your transaction(s) occurred during the period of compromise. If it was, this might have exposed you to a risk of
fraudulent transactions being carried out using your details.

πŸ‘€ πŸ‘‰πŸΌ https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.txt

πŸ‘€ πŸ‘‰πŸΌ (PDF)
https://assets.documentcloud.org/documents/7201631/Warner-Music-Group-Breach-Letter-BC.pdf

πŸ‘€ πŸ‘‰πŸΌ https://www.bleepingcomputer.com/news/security/warner-music-group-finds-hackers-compromised-its-online-stores/

#warner #music #breach #hackers
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
rC3 – remote Chaos Experience

This year, CCC hosts the Remote Chaos Experience (rC3) instead of an on-site event in Leipzig.

πŸ’‘ This endeavor requires creativity, joy of experimentation and active support.

A face-to-face event with 17,000 people will be neither responsible nor legally feasible this year. But after this tedious and painful 2020, we really deserve a nice finale!

This is why the rC3 – Remote Chaos Experience will be held.
As much as virtually possible, we want to convey the joy, content, togetherness and wonderful madness that make up a Chaos Communication Congress.

Hackers are used to remote work and online meetings. This makes our annual face-to-face meetings all the more important. Of course, it will be difficult to re-enact online all the things that make Congress what it is for us.
But then someone said it would be impossible. Our ambition was aroused.
Just like every year, we want to see the concentrated energy and creativity of hackers with dedication.

πŸ‘€ πŸ‘‰πŸΌ https://events.ccc.de/2020/09/04/rc3-remote-chaos-experience/#english

#rC3 #CCC #RemoteChaosExperience
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag