Forwarded from Seditionist Distribution
One Week, No Prime, Don't Cross the Picket line. Sunday 7th - Sunday 14th.
Show solidarity with unionising workers.
Mo purchases.
No Prime TV.
No Audible.
Show solidarity with unionising workers.
Mo purchases.
No Prime TV.
No Audible.
The User Experience of Mobile Phone Numbers
In this post, I want to talk about the user experience of an archaic technology that we got used to live with. We donโt even consider it archaic and weโre numb to all the little nuances it has: The mobile phone numbers.
The Internet
Did you ever wonder how accessing a certain website works? Behind that familiar name like
Your browser doesnโt automatically know where facebook.com is located and needs to first find its โnumberโ. There are several Domain Name Servers (DNS) in the world that serve like an address book. Their numbers never change, so your browser can always call them to ask about โthe phone numberโ of facebook.com or google.com or any other website you visit. After the server gives the number, your browser โcallsโ to facebook.com.
Why is this not possible to do the same for mobile phone numbers? I donโt know. The technology is there. Itโs been there for years.
https://hackernoon.com/the-user-experience-of-mobile-phone-numbers-4507deee3495
#mobile #phone #numbers #experience #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
In this post, I want to talk about the user experience of an archaic technology that we got used to live with. We donโt even consider it archaic and weโre numb to all the little nuances it has: The mobile phone numbers.
The Internet
Did you ever wonder how accessing a certain website works? Behind that familiar name like
https://www.facebook.com/, thereโs a certain number, so-called IP address, that your browser needs to โdialโ.Your browser doesnโt automatically know where facebook.com is located and needs to first find its โnumberโ. There are several Domain Name Servers (DNS) in the world that serve like an address book. Their numbers never change, so your browser can always call them to ask about โthe phone numberโ of facebook.com or google.com or any other website you visit. After the server gives the number, your browser โcallsโ to facebook.com.
Why is this not possible to do the same for mobile phone numbers? I donโt know. The technology is there. Itโs been there for years.
https://hackernoon.com/the-user-experience-of-mobile-phone-numbers-4507deee3495
#mobile #phone #numbers #experience #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Hacker Noon
The User Experience of Mobile Phone Numbers
In this blog post I want to talk about the user experience of an archaic technology that we got used to live with. We donโt even consider it archaic and weโre numb to all the little nuances it hasโฆ
Cryptotelephone service Sky cracked in Belgium
Investigation services have again managed to crack a major provider of encrypted crypto phones. According to Belgian media, this is Sky ECC, a provider of these phones that is frequently used by criminals. Rumors that Sky would have been cracked had been circulating for some time.
The Belgian federal police raided 200 places in Belgium on Tuesday morning around 5:00 a.m. 1,500 officers would have been involved in this. According to Belgian media, it was already possible to crack the popular service in December 2020, after which the police and judicial authorities would have read live for a while with the messages that criminals sent each other. Large consignments of drugs allegedly intercepted in the port of Antwerp are attributed to reading along with these messages.
According to the Belgian newspaper Gazet van Antwerp even two lawyers would have been arrested in a major drug investigation.
New blow to the underworld
Sky was seen as โthe holy grailโ among encrypted communications providers. Providers such as Ennetcom and PGP-Safe were already cracked and dismantled by the Dutch police. Major criminal cases, such as the Marengo liquidation process, are largely based on the intercepted messages found by the police. In mid-2020, the underworld received another blow, when โ again the Dutch police โ messaging service managed to crack Encrochat. For three months, the police were able to read the millions of messages that were sent. Through these reports, the police discovered, among other things, the rolled up โtorture complexโ in Wouwse Plantage.
https://netherlandsnewslive.com/cryptotelephone-service-sky-cracked-in-belgium-tech/107208/
#cryptophone #sky #cracked #belgium
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Investigation services have again managed to crack a major provider of encrypted crypto phones. According to Belgian media, this is Sky ECC, a provider of these phones that is frequently used by criminals. Rumors that Sky would have been cracked had been circulating for some time.
The Belgian federal police raided 200 places in Belgium on Tuesday morning around 5:00 a.m. 1,500 officers would have been involved in this. According to Belgian media, it was already possible to crack the popular service in December 2020, after which the police and judicial authorities would have read live for a while with the messages that criminals sent each other. Large consignments of drugs allegedly intercepted in the port of Antwerp are attributed to reading along with these messages.
According to the Belgian newspaper Gazet van Antwerp even two lawyers would have been arrested in a major drug investigation.
New blow to the underworld
Sky was seen as โthe holy grailโ among encrypted communications providers. Providers such as Ennetcom and PGP-Safe were already cracked and dismantled by the Dutch police. Major criminal cases, such as the Marengo liquidation process, are largely based on the intercepted messages found by the police. In mid-2020, the underworld received another blow, when โ again the Dutch police โ messaging service managed to crack Encrochat. For three months, the police were able to read the millions of messages that were sent. Through these reports, the police discovered, among other things, the rolled up โtorture complexโ in Wouwse Plantage.
https://netherlandsnewslive.com/cryptotelephone-service-sky-cracked-in-belgium-tech/107208/
#cryptophone #sky #cracked #belgium
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Fire destroys servers at French data company OVHcloud (Update)
PARIS (Reuters) - A fire tore through a data complex housing servers run by cloud computing company OVHcloud in Strasbourg, eastern France, on Wednesday, destroying some units and forcing the temporary shutdown of others, the companyโs chief executive said.
OVHcloud, which on Monday had launched the process for a potential IPO, urged clients to activate their disaster recovery plans.
โFire destroyed SBG2. A part of SBG1 is destroyed. Firefighters are protecting SBG3. No impact SBG4,โ Chief Executive Octave Klaba said on Twitter in reference to different units housing servers.
โWe donโt have access to the site. That is why SBG1, SBG3, SBG4 wonโt be restarted today,โ he added.
The data centre in Strasbourg is one of OVHcloudโs 17 data centres in France, out of 32 globally.
Founded by Klaba in 1999, OVHcloud is the biggest European-based cloud services provider, competing against U.S. giants Amazon Web Services, Microsoftโs Azure and Google Cloud, which dominate the market.
French politicians have championed OVHcloud as a possible alternative to U.S. cloud services providers, but it has so far lacked the scale and financial clout to dent their market share.
Klaba said the fire was over and that all employees were safe.
https://www.reuters.com/article/us-france-ovh-fire-idUSKBN2B20NU
https://nitter.nixnet.services/olesovhcom
Update:
https://nitter.nixnet.services/olesovhcom/status/1369621032131264514
#OVHcloud #fire #french #strasbourg
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
PARIS (Reuters) - A fire tore through a data complex housing servers run by cloud computing company OVHcloud in Strasbourg, eastern France, on Wednesday, destroying some units and forcing the temporary shutdown of others, the companyโs chief executive said.
OVHcloud, which on Monday had launched the process for a potential IPO, urged clients to activate their disaster recovery plans.
โFire destroyed SBG2. A part of SBG1 is destroyed. Firefighters are protecting SBG3. No impact SBG4,โ Chief Executive Octave Klaba said on Twitter in reference to different units housing servers.
โWe donโt have access to the site. That is why SBG1, SBG3, SBG4 wonโt be restarted today,โ he added.
The data centre in Strasbourg is one of OVHcloudโs 17 data centres in France, out of 32 globally.
Founded by Klaba in 1999, OVHcloud is the biggest European-based cloud services provider, competing against U.S. giants Amazon Web Services, Microsoftโs Azure and Google Cloud, which dominate the market.
French politicians have championed OVHcloud as a possible alternative to U.S. cloud services providers, but it has so far lacked the scale and financial clout to dent their market share.
Klaba said the fire was over and that all employees were safe.
https://www.reuters.com/article/us-france-ovh-fire-idUSKBN2B20NU
https://nitter.nixnet.services/olesovhcom
Update:
https://nitter.nixnet.services/olesovhcom/status/1369621032131264514
#OVHcloud #fire #french #strasbourg
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Reuters
Millions of websites offline after fire at French cloud services firm
A fire at a French cloud services firm has disrupted millions of websites, knocking out government agencies' portals, banks, shops, news websites and taking out a chunk of the .FR web space, according to internet monitors.
This media is not supported in your browser
VIEW IN TELEGRAM
Google and Facebook Killed Free
Is the mania for subscriptions a choice, or the only path in an ad system dominated by giants?
Weโre constantly being nudged to pay to subscribe.
There are all those paid streaming video and music services. News organizations, including The New York Times, want subscribers. Your favorite dating site, email service or messaging app might also ask you to pay for stuff you once got free. Paid subscriptions are nothing new, but increasingly they seem to be the future of everything.
https://www.nytimes.com/2021/03/09/technology/google-and-facebook-killed-free.html
#subscriptions #google #facebook #DeleteFacebook #DeleteGoogle #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Is the mania for subscriptions a choice, or the only path in an ad system dominated by giants?
Weโre constantly being nudged to pay to subscribe.
There are all those paid streaming video and music services. News organizations, including The New York Times, want subscribers. Your favorite dating site, email service or messaging app might also ask you to pay for stuff you once got free. Paid subscriptions are nothing new, but increasingly they seem to be the future of everything.
https://www.nytimes.com/2021/03/09/technology/google-and-facebook-killed-free.html
#subscriptions #google #facebook #DeleteFacebook #DeleteGoogle #thinkabout #why
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
DMCA Complaint Claims Copyright On The Word 'Outstanding', Wants Entries From Top Dictionaries De-Listed From Google
Techdirt readers are by now all too familiar with how broken the DMCA takedown system is. But a recent post on TorrentFreak introduces us to some interesting new examples. It concerns the software review site ThinkMobiles. Apparently, it's a company registered in Ukraine, and many of its authors seem to come from the region -- and nothing wrong with that.
As TorrentFreak notes, ThinkMobiles is very protective of its articles. The Lumen database, which collects and analyzes requests to remove material from the Web, has 376 results for the company, representing many hundreds of potential takedowns. But TorrentFreak spotted that some of the most recent ones are particularly unusual:
https://www.techdirt.com/articles/20210308/09034846381/dmca-complaint-claims-copyright-word-outstanding-wants-entries-top-dictionaries-de-listed-google.shtml
https://lumendatabase.org/faceted_search?sender_name=Thinkmobiles
#dmca #complaint #copyright #FuckDmca
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Techdirt readers are by now all too familiar with how broken the DMCA takedown system is. But a recent post on TorrentFreak introduces us to some interesting new examples. It concerns the software review site ThinkMobiles. Apparently, it's a company registered in Ukraine, and many of its authors seem to come from the region -- and nothing wrong with that.
As TorrentFreak notes, ThinkMobiles is very protective of its articles. The Lumen database, which collects and analyzes requests to remove material from the Web, has 376 results for the company, representing many hundreds of potential takedowns. But TorrentFreak spotted that some of the most recent ones are particularly unusual:
https://www.techdirt.com/articles/20210308/09034846381/dmca-complaint-claims-copyright-word-outstanding-wants-entries-top-dictionaries-de-listed-google.shtml
https://lumendatabase.org/faceted_search?sender_name=Thinkmobiles
#dmca #complaint #copyright #FuckDmca
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Techdirt
DMCA Complaint Claims Copyright On The Word 'Outstanding', Wants Entries From Top Dictionaries De-Listed From Google
Techdirt readers are by now all too familiar with how broken the DMCA takedown system is. But a recent post on TorrentFreak introduces...
DR 2021.pdf
4.3 MB
Autocratization Turns Viral - DEMOCRACY REPORT 2021
V-Dem is a unique approach to measuring democracy โ historical, multidimensional, nuanced, and disaggregated โ employing state-of-the-art methodology.
Varieties of Democracy (V-Dem) produces the largest global dataset on democracy with almost 30 million data points for 202 countries from 1789 to 2020. Involving over 3,500 scholars and other country experts, V-Dem measures hundreds of different attributes of democracy. V-Dem enables new ways to study the nature, causes, and consequences of democracy embracing its multiple meanings.
https://www.v-dem.net/files/25/DR%202021.pdf
#vdem #worldwide #democracy #report #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
V-Dem is a unique approach to measuring democracy โ historical, multidimensional, nuanced, and disaggregated โ employing state-of-the-art methodology.
Varieties of Democracy (V-Dem) produces the largest global dataset on democracy with almost 30 million data points for 202 countries from 1789 to 2020. Involving over 3,500 scholars and other country experts, V-Dem measures hundreds of different attributes of democracy. V-Dem enables new ways to study the nature, causes, and consequences of democracy embracing its multiple meanings.
https://www.v-dem.net/files/25/DR%202021.pdf
#vdem #worldwide #democracy #report #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The Robots Are Coming for Phil in Accounting
Workers with college degrees and specialized training once felt relatively safe from automation. They arenโt.
The robots are coming. Not to kill you with lasers, or beat you in chess, or even to ferry you around town in a driverless Uber.
These robots are here to merge purchase orders into columns J and K of next quarterโs revenue forecast, and transfer customer data from the invoicing software to the Oracle database. They are unassuming software programs with names like โAuxiliobits โ DataTable To Json String,โ and they are becoming the star employees at many American companies.
Some of these tools are simple apps, downloaded from online stores and installed by corporate I.T. departments, that do the dull-but-critical tasks that someone named Phil in Accounting used to do: reconciling bank statements, approving expense reports, reviewing tax forms. Others are expensive, custom-built software packages, armed with more sophisticated types of artificial intelligence, that are capable of doing the kinds of cognitive work that once required teams of highly-paid humans.
White-collar workers, armed with college degrees and specialized training, once felt relatively safe from automation. But recent advances in A.I. and machine learning have created algorithms capable of outperforming doctors, lawyers and bankers at certain parts of their jobs. And as bots learn to do higher-value tasks, they are climbing the corporate ladder.
https://www.nytimes.com/2021/03/06/business/the-robots-are-coming-for-phil-in-accounting.html
#thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Workers with college degrees and specialized training once felt relatively safe from automation. They arenโt.
The robots are coming. Not to kill you with lasers, or beat you in chess, or even to ferry you around town in a driverless Uber.
These robots are here to merge purchase orders into columns J and K of next quarterโs revenue forecast, and transfer customer data from the invoicing software to the Oracle database. They are unassuming software programs with names like โAuxiliobits โ DataTable To Json String,โ and they are becoming the star employees at many American companies.
Some of these tools are simple apps, downloaded from online stores and installed by corporate I.T. departments, that do the dull-but-critical tasks that someone named Phil in Accounting used to do: reconciling bank statements, approving expense reports, reviewing tax forms. Others are expensive, custom-built software packages, armed with more sophisticated types of artificial intelligence, that are capable of doing the kinds of cognitive work that once required teams of highly-paid humans.
White-collar workers, armed with college degrees and specialized training, once felt relatively safe from automation. But recent advances in A.I. and machine learning have created algorithms capable of outperforming doctors, lawyers and bankers at certain parts of their jobs. And as bots learn to do higher-value tasks, they are climbing the corporate ladder.
https://www.nytimes.com/2021/03/06/business/the-robots-are-coming-for-phil-in-accounting.html
#thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
NY Times
The Robots Are Coming for Phil in Accounting (Published 2021)
Workers with college degrees and specialized training once felt relatively safe from automation. They arenโt.
New Algorithm Generates Synthetic Human Genetic Code
They say the fake DNA is indistinguishable from the real thing.
Weโve seen AI algorithms create mostly-believable pictures of peopleโs headshots, works of art, news articles, and even pokรฉmon. But now a team of scientists is taking things a step further, with an algorithm to generate the entire genetic code of nonexistent people.
Using a type of AI called a Generative Adversarial Network (GAN), in which two algorithms rapidly generate some sort of output, check their work against real-world examples, and refine things as they go, the team has managed to replicate realistic human genomes that they say are indistinguishable from the real thing, according to research first spotted by The Next Web.
Unlike other GAN projects โ like those horrifying pokรฉmon โ that are meant to be fun little AI oddities, the team of researchers from Estoniaโs University of Tartu and Franceโs Paris-Saclay University who developed the artificial genome project say that their fake genetic sequences have real value as a tool for research geneticists.
They argue in their paper, which was published Thursday in the journal PLOS Genetics, that these DNA codes could help further genetic experimentation โ without compromising the privacy of actual people who would need to give up their genetic data.
https://futurism.com/algorithm-generates-synthetic-human-genetic-code
https://thenextweb.com/neural/2021/02/08/this-human-genome-does-not-exist-researchers-taught-an-ai-to-generate-fake-dna/
https://journals.plos.org/plosgenetics/article?id=10.1371/journal.pgen.1009303
#algorithm #ai #synthetic #human #genetic #dna #research
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
They say the fake DNA is indistinguishable from the real thing.
Weโve seen AI algorithms create mostly-believable pictures of peopleโs headshots, works of art, news articles, and even pokรฉmon. But now a team of scientists is taking things a step further, with an algorithm to generate the entire genetic code of nonexistent people.
Using a type of AI called a Generative Adversarial Network (GAN), in which two algorithms rapidly generate some sort of output, check their work against real-world examples, and refine things as they go, the team has managed to replicate realistic human genomes that they say are indistinguishable from the real thing, according to research first spotted by The Next Web.
Unlike other GAN projects โ like those horrifying pokรฉmon โ that are meant to be fun little AI oddities, the team of researchers from Estoniaโs University of Tartu and Franceโs Paris-Saclay University who developed the artificial genome project say that their fake genetic sequences have real value as a tool for research geneticists.
They argue in their paper, which was published Thursday in the journal PLOS Genetics, that these DNA codes could help further genetic experimentation โ without compromising the privacy of actual people who would need to give up their genetic data.
https://futurism.com/algorithm-generates-synthetic-human-genetic-code
https://thenextweb.com/neural/2021/02/08/this-human-genome-does-not-exist-researchers-taught-an-ai-to-generate-fake-dna/
https://journals.plos.org/plosgenetics/article?id=10.1371/journal.pgen.1009303
#algorithm #ai #synthetic #human #genetic #dna #research
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Futurism
New Algorithm Generates Synthetic Human Genetic Code
"As far as 'compiling' this into a human โ I definitely don't see the path to that."
Swiss Police Raid Apartment of Verkada Hacker, Seize Devices
Swiss authorities raided the apartment Friday of a hacker who claimed credit for breaching the Silicon Valley security camera company Verkada and gaining access to its customersโ surveillance feeds, according to the hacker and a search warrant seen by Bloomberg News.
Tillie Kottmann said their apartment in Lucerne, Switzerland, was raided and that police seized the hackerโs electronic devices. The warrant was based on an alleged hack that took place last year and not on the recent breach of Verkada.
After being notified of the breach by Bloomberg News, Verkada referred the matter to the FBI. The breach exposed live camera feeds of companies like Tesla Inc., as well as hospitals, jails, and schools.
According to a copy of the search warrant provided to Bloomberg News, the search was conducted as part of a U.S criminal case against Kottmann in the Western District of Washington. The warrant requested documents related to hacking as well as information on cryptocurrency holdings. Kottmann has been accused of unauthorized access to protected computers, identify theft, and fraud.
Kottmann has previously claimed credit for hacking carmaker Nissan Motor Co. and leaking documents from U.S. chipmaker Intel Corp.
The search warrant said that the raid was in connection with an FBI investigation into โthe hacking of computer databases and the subsequent theft and distribution of information including source code, confidential documents and internal user data.โ
https://www.bloomberg.com/news/articles/2021-03-12/swiss-police-raid-apartment-of-verkada-hacker-seize-devices
#swiss #police #raid #hacker #verkada #Kottmann #busted
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Swiss authorities raided the apartment Friday of a hacker who claimed credit for breaching the Silicon Valley security camera company Verkada and gaining access to its customersโ surveillance feeds, according to the hacker and a search warrant seen by Bloomberg News.
Tillie Kottmann said their apartment in Lucerne, Switzerland, was raided and that police seized the hackerโs electronic devices. The warrant was based on an alleged hack that took place last year and not on the recent breach of Verkada.
After being notified of the breach by Bloomberg News, Verkada referred the matter to the FBI. The breach exposed live camera feeds of companies like Tesla Inc., as well as hospitals, jails, and schools.
According to a copy of the search warrant provided to Bloomberg News, the search was conducted as part of a U.S criminal case against Kottmann in the Western District of Washington. The warrant requested documents related to hacking as well as information on cryptocurrency holdings. Kottmann has been accused of unauthorized access to protected computers, identify theft, and fraud.
Kottmann has previously claimed credit for hacking carmaker Nissan Motor Co. and leaking documents from U.S. chipmaker Intel Corp.
The search warrant said that the raid was in connection with an FBI investigation into โthe hacking of computer databases and the subsequent theft and distribution of information including source code, confidential documents and internal user data.โ
https://www.bloomberg.com/news/articles/2021-03-12/swiss-police-raid-apartment-of-verkada-hacker-seize-devices
#swiss #police #raid #hacker #verkada #Kottmann #busted
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Bloomberg.com
Swiss Police Raid Apartment of Verkada Hacker, Seize Devices
Swiss authorities raided the apartment Friday of a hacker who claimed credit for breaching the Silicon Valley security camera company Verkada and gaining access to its customersโ surveillance feeds, according to the hacker and a search warrant seen by Bloombergโฆ
Thereโs a vexing mystery surrounding the 0-day attacks on Exchange servers
A half-dozen groups exploiting the same 0-days is unusual, if not unprecedented.
The Microsoft Exchange vulnerabilities that allow hackers to take over Microsoft Exchange servers are under attack by no fewer than 10 advanced hacking groups, six of which began exploiting them before Microsoft released a patch, researchers reported Wednesday. That raises a vexing question: how did so many separate threat actors have working exploits before the security flaws became publicly known?
Researchers say that as many as 100,000 mail servers around the world have been compromised, with those for the European Banking Authority and Norwegian Parliament being disclosed in the past few days. Once attackers gain the ability to execute code on the servers, they install web shells, which are browser-based windows that provide a means for remotely issuing commands and executing code.
When Microsoft issued emergency patches on March 2, the company said the vulnerabilities were being exploited in limited and targeted attacks by a state-backed hacking group in China known as Hafnium. On Wednesday, ESET provided a starkly different assessment. Of the 10 groups ESET products have recorded exploiting vulnerable servers, six of those APTsโshort for advanced persistent threat actorsโbegan hijacking servers while the critical vulnerabilities were still unknown to Microsoft.
Itโs not often that a so-called zero-day vulnerability is exploited by two groups in unison, but it happens. A zero-day under attack by six APTs simultaneously, on the other hand, is highly unusual, if not unprecedented.
https://arstechnica.com/gadgets/2021/03/security-unicorn-exchange-server-0-days-were-exploited-by-6-apts/
#microsoft #exchange #server #attack #zeroday #exploited #apt #hacked #hacking
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A half-dozen groups exploiting the same 0-days is unusual, if not unprecedented.
The Microsoft Exchange vulnerabilities that allow hackers to take over Microsoft Exchange servers are under attack by no fewer than 10 advanced hacking groups, six of which began exploiting them before Microsoft released a patch, researchers reported Wednesday. That raises a vexing question: how did so many separate threat actors have working exploits before the security flaws became publicly known?
Researchers say that as many as 100,000 mail servers around the world have been compromised, with those for the European Banking Authority and Norwegian Parliament being disclosed in the past few days. Once attackers gain the ability to execute code on the servers, they install web shells, which are browser-based windows that provide a means for remotely issuing commands and executing code.
When Microsoft issued emergency patches on March 2, the company said the vulnerabilities were being exploited in limited and targeted attacks by a state-backed hacking group in China known as Hafnium. On Wednesday, ESET provided a starkly different assessment. Of the 10 groups ESET products have recorded exploiting vulnerable servers, six of those APTsโshort for advanced persistent threat actorsโbegan hijacking servers while the critical vulnerabilities were still unknown to Microsoft.
Itโs not often that a so-called zero-day vulnerability is exploited by two groups in unison, but it happens. A zero-day under attack by six APTs simultaneously, on the other hand, is highly unusual, if not unprecedented.
https://arstechnica.com/gadgets/2021/03/security-unicorn-exchange-server-0-days-were-exploited-by-6-apts/
#microsoft #exchange #server #attack #zeroday #exploited #apt #hacked #hacking
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Ars Technica
Thereโs a vexing mystery surrounding the 0-day attacks on Exchange servers
A half-dozen groups exploiting the same 0-days is unusual, if not unprecedented.
7-Zip developer releases the first official Linux version
An official version of the popular 7-zip archiving program has been released for Linux for the first time.
Linux already had support for the 7-zip archive file format through a POSIX port called p7zip but it was maintained by a different developer.
As the p7zip developer has not maintained their project for 4-5 years, 7-Zip developer Igor Pavlov decided to create a new official Linux version based on the latest 7-Zip source code.
Pavlov has released 7-Zip for Linux in AMD64, ARM64, x86, and armhf versions, which users can download at the following links:
๐๐ผ 7-Zip for 64-bit Linux x86-64 (AMD64)
๐๐ผ 7-Zip for 64-bit Linux ARM64
๐๐ผ 7-Zip for 32-bit Linux x86
๐๐ผ 7-Zip for 32-bit Linux armhf
This first version of 7-Zip for Linux is released as a console application and has similar, but not identical, command-line arguments as p7zip.
https://sourceforge.net/p/sevenzip/discussion/45797/thread/cec5e63147/
https://www.bleepingcomputer.com/news/software/7-zip-developer-releases-the-first-official-linux-version/
#7zip #sevenzip #official #linux #tools
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
An official version of the popular 7-zip archiving program has been released for Linux for the first time.
Linux already had support for the 7-zip archive file format through a POSIX port called p7zip but it was maintained by a different developer.
As the p7zip developer has not maintained their project for 4-5 years, 7-Zip developer Igor Pavlov decided to create a new official Linux version based on the latest 7-Zip source code.
Pavlov has released 7-Zip for Linux in AMD64, ARM64, x86, and armhf versions, which users can download at the following links:
๐๐ผ 7-Zip for 64-bit Linux x86-64 (AMD64)
๐๐ผ 7-Zip for 64-bit Linux ARM64
๐๐ผ 7-Zip for 32-bit Linux x86
๐๐ผ 7-Zip for 32-bit Linux armhf
This first version of 7-Zip for Linux is released as a console application and has similar, but not identical, command-line arguments as p7zip.
https://sourceforge.net/p/sevenzip/discussion/45797/thread/cec5e63147/
https://www.bleepingcomputer.com/news/software/7-zip-developer-releases-the-first-official-linux-version/
#7zip #sevenzip #official #linux #tools
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
BleepingComputer
7-Zip developer releases the first official Linux version
An official version of the popular 7-zip archiving program has been released for Linux for the first time.
How to Implement DDoS Attack Prevention & Mitigation Without Jeopardizing Latency
TL;DR โ With real-time traffic in mind, Subspace can prevent DDoS attacks across any real-time application from occurring without incurring latency and can mitigate attack traffic closer to the source without servers going offline.
Towards the end of 2020, nearly 77% of all DDoS attacks targeted the online gambling and gaming industries, and that number continues to rise.
Online games have traditionally been an easy target, especially compared to traditional web services, as players and attackers alike immediately see the effects. Usually, protection isnโt a priority for newer game titles that arenโt expected to succeed and arenโt initially well-funded. Budgets and resources typically go toward making the game rather than protecting their network.
In addition, gambling is a highly competitive industry that may be susceptible to attacks from rival sites, or those looking to extort companies and their user bases. Online gambling providers, in some instances, may prioritize security, but that does not negate the persistence of those who specifically target gambling apps and services.
Many of these attacks come from weaknesses in protocols designed 30โ50 years ago when the internet was a friendlier place, and real-time apps were only a dream. Existing solutions work wonderfully for traditional web traffic that doesnโt require low-latency response times. Real-time gaming and gambling are now a reality, but current DDoS mitigation and protection providers arenโt focused on real-time security. That leaves real-time apps with latency-inducing security protocols or exposed to attacks.
https://subspacepowered.medium.com/how-to-implement-ddos-attack-prevention-mitigation-without-jeopardizing-latency-e8bcdd70a57
#ddos #attack #prevention #mitigation
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
TL;DR โ With real-time traffic in mind, Subspace can prevent DDoS attacks across any real-time application from occurring without incurring latency and can mitigate attack traffic closer to the source without servers going offline.
Towards the end of 2020, nearly 77% of all DDoS attacks targeted the online gambling and gaming industries, and that number continues to rise.
Online games have traditionally been an easy target, especially compared to traditional web services, as players and attackers alike immediately see the effects. Usually, protection isnโt a priority for newer game titles that arenโt expected to succeed and arenโt initially well-funded. Budgets and resources typically go toward making the game rather than protecting their network.
In addition, gambling is a highly competitive industry that may be susceptible to attacks from rival sites, or those looking to extort companies and their user bases. Online gambling providers, in some instances, may prioritize security, but that does not negate the persistence of those who specifically target gambling apps and services.
Many of these attacks come from weaknesses in protocols designed 30โ50 years ago when the internet was a friendlier place, and real-time apps were only a dream. Existing solutions work wonderfully for traditional web traffic that doesnโt require low-latency response times. Real-time gaming and gambling are now a reality, but current DDoS mitigation and protection providers arenโt focused on real-time security. That leaves real-time apps with latency-inducing security protocols or exposed to attacks.
https://subspacepowered.medium.com/how-to-implement-ddos-attack-prevention-mitigation-without-jeopardizing-latency-e8bcdd70a57
#ddos #attack #prevention #mitigation
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Medium
How to Implement DDoS Attack Prevention & Mitigation Without Jeopardizing Latency
TL;DRโโโWith real-time traffic in mind, Subspace can prevent DDoS attacks across any real-time application from occurring withoutโฆ
Tesla investor sues Elon Musk over his tweets
Elon Musk's tweets are driving up stock prices. An investor fears that he is endangering the company's well-being and is suing the Tesla CEO.
Not only the U.S. Securities and Exchange Commission has had enough of Elon Musk's tweets. A Tesla investor fears for the well-being of the company and wants to put an end to the boss' Twitter activities. Chase Gharrity has filed a lawsuit against Elon Musk in the administrative court of the US state of Delaware.
The lawsuit says Musks risks fines and penalties from regulators with his "erratic tweets" and thus falling share prices.
https://www.bloomberglaw.com/public/desktop/document/CONFCOMPLAINTChaseGharrityvElonMusketalDocketNo20210199DelChMar08?1615625301
#ElonMusk #tesla #complaint
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Elon Musk's tweets are driving up stock prices. An investor fears that he is endangering the company's well-being and is suing the Tesla CEO.
Not only the U.S. Securities and Exchange Commission has had enough of Elon Musk's tweets. A Tesla investor fears for the well-being of the company and wants to put an end to the boss' Twitter activities. Chase Gharrity has filed a lawsuit against Elon Musk in the administrative court of the US state of Delaware.
The lawsuit says Musks risks fines and penalties from regulators with his "erratic tweets" and thus falling share prices.
https://www.bloomberglaw.com/public/desktop/document/CONFCOMPLAINTChaseGharrityvElonMusketalDocketNo20210199DelChMar08?1615625301
#ElonMusk #tesla #complaint
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
EPRS_STU(2021)656336_EN.pdf
3.6 MB
Online platforms: Economic and societal effects
Online platforms such as #Google, #Amazon, and #Facebook play an increasingly central role in the economy and society. They operate as digital intermediaries across interconnected sectors and markets subject to network effects. These firms have grown to an unprecedented scale, propelled by data-driven business models. Online platforms have a massive impact on individual users and businesses, and are recasting the relationships between customers, advertisers, workers and employers.
https://www.europarl.europa.eu/RegData/etudes/STUD/2021/656336/EPRS_STU(2021)656336_EN.pdf
#online #platforms #study #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Online platforms such as #Google, #Amazon, and #Facebook play an increasingly central role in the economy and society. They operate as digital intermediaries across interconnected sectors and markets subject to network effects. These firms have grown to an unprecedented scale, propelled by data-driven business models. Online platforms have a massive impact on individual users and businesses, and are recasting the relationships between customers, advertisers, workers and employers.
https://www.europarl.europa.eu/RegData/etudes/STUD/2021/656336/EPRS_STU(2021)656336_EN.pdf
#online #platforms #study #pdf
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Mass Extraction: The Widespread Power of U.S. Law Enforcement to Search Mobile Phones
Every day, law enforcement agencies across the country search thousands of cellphones, typically incident to arrest. To search phones, law enforcement agencies use mobile device forensic tools (MDFTs), a powerful technology that allows police to extract a full copy of data from a cellphone โ all emails, texts, photos, location, app data, and more โ which can then be programmatically searched. As one expert puts it, with the amount of sensitive information stored on smartphones today, the tools provide a โwindow into the soul.โ
This report documents the widespread adoption of MDFTs by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia. We found that state and local law enforcement agencies have performed hundreds of thousands of cellphone extractions since 2015, often without a warrant. To our knowledge, this is the first time that such records have been widely disclosed.
Every American is at risk of having their phone forensically searched by law enforcement.
https://www.upturn.org/reports/2020/mass-extraction/
๐ก Read as well:
https://www.eff.org/deeplinks/2021/03/fbi-should-stop-attacking-encryption-and-tell-congress-about-all-encrypted-phones
#usa #fbi #lawenforcement #massextraction #MDFT #mobilephones #cellphones #encryption #decryption #study #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Every day, law enforcement agencies across the country search thousands of cellphones, typically incident to arrest. To search phones, law enforcement agencies use mobile device forensic tools (MDFTs), a powerful technology that allows police to extract a full copy of data from a cellphone โ all emails, texts, photos, location, app data, and more โ which can then be programmatically searched. As one expert puts it, with the amount of sensitive information stored on smartphones today, the tools provide a โwindow into the soul.โ
This report documents the widespread adoption of MDFTs by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia. We found that state and local law enforcement agencies have performed hundreds of thousands of cellphone extractions since 2015, often without a warrant. To our knowledge, this is the first time that such records have been widely disclosed.
Every American is at risk of having their phone forensically searched by law enforcement.
https://www.upturn.org/reports/2020/mass-extraction/
๐ก Read as well:
https://www.eff.org/deeplinks/2021/03/fbi-should-stop-attacking-encryption-and-tell-congress-about-all-encrypted-phones
#usa #fbi #lawenforcement #massextraction #MDFT #mobilephones #cellphones #encryption #decryption #study #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Upturn
Mass Extraction | Upturn
This report is the most comprehensive examination of U.S. law enforcementโs use of mobile device forensic tools.
After months of stalling, Google finally revealed how much personal data they collect in Chrome and the Google app. No wonder they wanted to hide it.
Spying on users has nothing to do with building a great web browser or search engine. We would know (our app is both in one).
https://nitter.nixnet.services/DuckDuckGo/status/1371509053613084679
#duckduckgo #google #DeleteGoogle #personal #data #yourdata
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Spying on users has nothing to do with building a great web browser or search engine. We would know (our app is both in one).
https://nitter.nixnet.services/DuckDuckGo/status/1371509053613084679
#duckduckgo #google #DeleteGoogle #personal #data #yourdata
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
$5.7M stolen in Roll crypto heist after hot wallet hacked
A security breach at cryptocurrency platform Roll allowed a hacker to obtain the private key to its hot wallet and steal its contents โ worth about $5.7 million.
In a statement, the company said it was investigating the breach, which happened early Sunday.
"As of this writing, it seems like a compromise of the private keys [sic] of our hot wallet and not a bug in the Roll smart contracts or any token contracts," the statement said. Roll said the attacker had already sold the tokens for Ethereum.
"There is no further user action suggested at this stage. We are temporarily disabling withdraw from the Roll wallet of all social money until we have migrated our hot wallet," the statement added.
It's not clear how the attacker broke in and obtained the private key โ akin to the password for Roll's hot wallet. Hot wallets are designed to be connected to the internet to send and receive cryptocurrency, but typically only store a fraction of a cryptocurrency owner's total reserves, given the inherent security risk of an internet-connected wallet. A cold wallet, or storage device that isn't connected to the internet, is typically used for holding the bulk of an owner's cryptocurrency for longer-term periods.
https://finance.yahoo.com/news/5-7m-stolen-roll-crypto-141924662.html
https://tryroll.com/security-incident/
#breach #crypto #cryptocurrency #wallet #hacker #attack #tryroll
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
A security breach at cryptocurrency platform Roll allowed a hacker to obtain the private key to its hot wallet and steal its contents โ worth about $5.7 million.
In a statement, the company said it was investigating the breach, which happened early Sunday.
"As of this writing, it seems like a compromise of the private keys [sic] of our hot wallet and not a bug in the Roll smart contracts or any token contracts," the statement said. Roll said the attacker had already sold the tokens for Ethereum.
"There is no further user action suggested at this stage. We are temporarily disabling withdraw from the Roll wallet of all social money until we have migrated our hot wallet," the statement added.
It's not clear how the attacker broke in and obtained the private key โ akin to the password for Roll's hot wallet. Hot wallets are designed to be connected to the internet to send and receive cryptocurrency, but typically only store a fraction of a cryptocurrency owner's total reserves, given the inherent security risk of an internet-connected wallet. A cold wallet, or storage device that isn't connected to the internet, is typically used for holding the bulk of an owner's cryptocurrency for longer-term periods.
https://finance.yahoo.com/news/5-7m-stolen-roll-crypto-141924662.html
https://tryroll.com/security-incident/
#breach #crypto #cryptocurrency #wallet #hacker #attack #tryroll
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Yahoo Finance
$5.7M stolen in Roll crypto heist after hot wallet hacked
A security breach at cryptocurrency platform Roll allowed a hacker to obtain the private key to its hot wallet and steal its contents โ worth about $5.7 million. "As of this writing, it seems like a compromise of the private keys [sic] of our hot wallet andโฆ
87: Guild of the Grumpy Old Hackers
Darknet Diaries - EP 87: Guild of the Grumpy Old Hackers
In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story. Listen to Victor, Edwin, and Mattijs tell their story.
https://darknetdiaries.com/episode/87/
#truecrime #darknetdiaries #podcast
๐@cRyPtHoN_INFOSEC_FR
๐@cRyPtHoN_INFOSEC_EN
๐@cRyPtHoN_INFOSEC_DE
๐@BlackBox_Archiv
๐@NoGoolag
In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story. Listen to Victor, Edwin, and Mattijs tell their story.
https://darknetdiaries.com/episode/87/
#truecrime #darknetdiaries #podcast
๐@cRyPtHoN_INFOSEC_FR
๐@cRyPtHoN_INFOSEC_EN
๐@cRyPtHoN_INFOSEC_DE
๐@BlackBox_Archiv
๐@NoGoolag
The most invasive apps: which apps are sharing your personal data?
Apps form a part of our everyday life. From catching up with our friends to playing games, watching films, investing in stocks and banking, thereโs not much we do without them.
But what price do we pay for the ease they offer?
๐กApps can collect and share anything from your personal information and user content, to search and browsing history, to analyse you as a โprofileโ for themselves and other apps.
https://blog.pcloud.com/invasive-apps/
#invasive #apps #data #sharing #profiling #bigdata #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Apps form a part of our everyday life. From catching up with our friends to playing games, watching films, investing in stocks and banking, thereโs not much we do without them.
But what price do we pay for the ease they offer?
๐กApps can collect and share anything from your personal information and user content, to search and browsing history, to analyse you as a โprofileโ for themselves and other apps.
https://blog.pcloud.com/invasive-apps/
#invasive #apps #data #sharing #profiling #bigdata #thinkabout
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Pcloud
The webโs most invasive apps | pCloud
Which apps are sharing your details with others? Our report finds out, looking at the information they collect, store and share for their own gain.
Computer giant Acer hit by $50 million ransomware attack
Computer giant Acer has been hit by a REvil ransomware attack where the threat actors are demanding the largest known ransom to date, $50,000,000.
Acer is a Taiwanese electronics and computer maker well-known for laptops, desktops, and monitors. Acer employs approximately 7,000 employees and earned $7.8 billion in 2019.
Yesterday, the ransomware gang announced on their data leak site that they had breached Acer and shared some images of allegedly stolen files as proof.
https://www.bleepingcomputer.com/news/security/computer-giant-acer-hit-by-50-million-ransomware-attack
#acer #ransomware #attack
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Computer giant Acer has been hit by a REvil ransomware attack where the threat actors are demanding the largest known ransom to date, $50,000,000.
Acer is a Taiwanese electronics and computer maker well-known for laptops, desktops, and monitors. Acer employs approximately 7,000 employees and earned $7.8 billion in 2019.
Yesterday, the ransomware gang announced on their data leak site that they had breached Acer and shared some images of allegedly stolen files as proof.
https://www.bleepingcomputer.com/news/security/computer-giant-acer-hit-by-50-million-ransomware-attack
#acer #ransomware #attack
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
BleepingComputer
Computer giant Acer hit by $50 million ransomware attack
Computer giant Acer has been hit by a REvil ransomware attack where the threat actors are demanding the largest known ransom to date, $50,000,000.