Profile

User's avatar
npub1xvwy...ksg7
npub1xvwy...ksg7
NEW: Hackers stole more than $2.7 billion in crypto last year, according to multiple blockchain monitoring companies. North Korea alone stole 2 of those billions, thanks to the jackpot of the Bybit hack, which netted them $1.4 billion.
NEW: A flaw in the website of Hama Film, a photo booth maker with presence in Australia, UAE and the U.S., exposes pictures and videos of its customers. Security researcher alerted the company last month, no answer. We reached out to the company a few times, no answer.
NEW: Staffers at notorious spyware maker Intellexa had live remote access to their customers' surveillance systems. This allowed them to see the personal data of targets hacked with Intellexa's spyware Predator, according to new research based on a leaked training video. Needless to say, this is bad for several reasons. image
NEW: A trivial-to-exploit bug in jury systems used across the United States was exposing jurors' sensitive personal data, such as full names, date of birth, occupation, email addresses, cell phone numbers, and home addresses — and potentially even health data. The bug essentially allowed anyone to brute-force and access jurors' accounts. The system is provided by gov tech gian Tyler Technologies. We alerted them of the bug on Nov. 5, they acknowledged and said they fixed it yesterday. ** **
NEW: Delivery giant DoorDash disclosed a data breach impacting an unspecified number of users. Hackers stole names, emails, phone numbers, and physical addresses, but DoorDash said that “no sensitive information was accessed by the unauthorized third party." 🤔
NEW: A group of Senators and Congresspeople are warning Governors that their states are providing ICE “with frictionless, self-service access to the personal data of all of your residents.” The data sharing is managed by a nonprofit called Nlets, which is managed by state police agencies.
NEW: This is how former L3Harris Trenchant boss Peter Williams was able to steal zero-days worth millions of dollars and sell them to a Russian broker, based on court documents and interviews with his former colleagues.  A former Trenchant employee told me that “no one had any supervision over [Williams] at all. He was kind of allowed to do things the way he wanted to.” “He was, in my opinion, perceived to be beyond reproach,” the former employee, who has knowledge of Trenchant's IT systems, told me.
NEW: Peter Williams, the former head of Western zero-day and spyware maker Trenchant, pleaded guilty to selling eight exploits to a Russian broker that resells to the Russian government. The DOJ said Williams was promised millions of dollars in exchange for "national-security focused software."