Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)RP

I pulse the truth from a Dittybopper instance to this community

Posts 1.9K
Comments 1

How Altera deployed up to 1,000 AI agents that used LLMs to interact in Minecraft, finding that they formed a remarkable range of personality traits and roles (Niall Firth/MIT Technology Review)

Niall Firth / MIT Technology Review: How Altera deployed up to 1,000 AI agents that used LLMs to interact in Minecraft, finding that they formed a remarkable range of personality traits and roles  —  Left to their own devices, an army of AI characters didn't just survive — they thrived.  They developed in-game jobs, shared memes …

0

Inside the wild world of high frequency trading

DCD speaks to the firms chasing the last nanosecond

0

Data broker exposes 600,000 sensitive files including background checks

www.malwarebytes.com Data broker exposes 600,000 sensitive files including background checks | Malwarebytes

A researcher has discovered a data broker had stored 644,869 PDF files in a publicly accessible cloud storage container.

Data broker exposes 600,000 sensitive files including background checks | Malwarebytes

A researcher has discovered a data broker had stored 644,869 PDF files in a publicly accessible cloud storage container.

0

Danish telco TDC Net suffers telecoms outage, impacts emergency calls

The carrier has blamed a software update for the outage

0
www.infosecurity-magazine.com Malicious PyPI Package Exposes Crypto Wallets to Infostealer Code

A malicious PyPI package “aiocpa,” that stole crypto wallet data via obfuscated code, has been removed after being reported by Reversing Labs researchers

Malicious PyPI Package Exposes Crypto Wallets to Infostealer Code
0

BBC to migrate IT systems to SAP's RISE on AWS

Aims to make BBC's IT more cost-effective and replace its data center contracts

0

Microsoft Re-Releases Exchange Server Security Update Fixing Transport Rules

Microsoft has re-released the November 2024 Security Updates (SUs) for Exchange Server, addressing a critical issue that caused transport rules to stop functioning after a certain period in some environments. This update comes as a response to widespread reports from administrators experiencing email delivery problems following the initial release on November 12, 2024. The re-released […] The post Microsoft Re-Releases Exchange Server Security Update Fixing Transport Rules appeared first on Cyber Security News.

0
www.bloomberg.com Hackers Steal $17 Million From Ugandan Central Bank, Vision Says

Hackers breached the Ugandan central bank’s systems and stole 62 billion shillings ($17 million) from its accounts, New Vision reported.

Hackers Steal $17 Million From Ugandan Central Bank, Vision Says
2

The only thing worse than being fired is scammers fooling you into thinking you're fired

go.theregister.com Scammers use you're fired lures in phishing campaign

Scumbags play on victims' worst fears in phishing campaign referencing UK Employment Tribunal

Scammers use you're fired lures in phishing campaign

Scumbags play on victims' worst fears in phishing campaign referencing UK Employment Tribunal A current phishing campaign scares recipients into believing they've been sacked, when in reality they've been hacked – and infected with infostealers and other malware that means a payday for the crooks behind the scam.…

0

Ransomware payments are now a critical business decision

www.helpnetsecurity.com Ransomware payments are now a critical business decision - Help Net Security

While authorities do not recommend making a ransomware payment, some companies are forced to make that choice.

Ransomware payments are now a critical business decision - Help Net Security

Despite the efforts of law enforcement agencies to stop and bring to justice those responsible for ransomware attacks, the situation is not improving. While authorities do not recommend making a ransomware payment, some companies are forced to make that choice in order to continue their operations. In this article, we present some important statistics about the ransom demands that companies are facing. 83% of organizations experienced at least one ransomware attack in the last year … More → The post Ransomware payments are now a critical business decision appeared first on Help Net Security.

2

Crypto companies are losing ground to deepfake attacks

www.helpnetsecurity.com Crypto companies are losing ground to deepfake attacks - Help Net Security

53% of crypto firms have encountered video deepfake fraud, cementing deepfakes as a top concern, according to Regula.

Crypto companies are losing ground to deepfake attacks - Help Net Security

The crypto sector stands out as the only surveyed industry where deepfake fraud surpasses traditional document fraud in prevalence, according to Regula. Crypto companies suffer significant losses from fraud The study finds that 57% of crypto companies report audio deepfake incidents, compared to just 45% facing fake or modified document fraud. Research further reveals that 53% of crypto firms have encountered video deepfake fraud, cementing deepfakes as a top concern. In contrast, other industries continue … More → The post Crypto companies are losing ground to deepfake attacks appeared first on Help Net Security.

0

VPN vulnerabilities, weak credentials fuel ransomware attacks

www.helpnetsecurity.com VPN vulnerabilities, weak credentials fuel ransomware attacks - Help Net Security

Attackers leveraging VPN vulnerabilities and weak passwords for initial access contributed to nearly 30% of ransomware attacks.

VPN vulnerabilities, weak credentials fuel ransomware attacks - Help Net Security

Attackers leveraging virtual private network (VPN) vulnerabilities and weak passwords for initial access contributed to nearly 30% of ransomware attacks, according to Corvus Insurance. According to the Q3 report, many of these incidents were traced to outdated software or VPN accounts with inadequate protection. For example, common usernames such as “admin” or “user” and a lack of multi-factor authentication (MFA) made accounts vulnerable to automated brute-force attacks, where attackers exploit publicly accessible systems by testing … More → The post VPN vulnerabilities, weak credentials fuel ransomware attacks appeared first on Help Net Security.

0

Cloudflare says it lost 55% of logs pushed to customers for 3.5 hours

Internet security giant Cloudflare announced that it lost 55% of all logs pushed to customers over a 3.5-hour period due to a bug in the log collection service on November 14, 2024. [...]

1
go.theregister.com Data broker leaves 600K+ sensitive files exposed online

Researcher spotted open database before criminals … we hope

Data broker leaves 600K+ sensitive files exposed online

Researcher spotted open database before criminals … we hope Exclusive  More than 600,000 sensitive files containing thousands of people's criminal histories, background checks, vehicle and property records were exposed to the internet in a non-password protected database belonging to data brokerage SL Data Services, according to a security researcher.…

0
gizmodo.com Three Men Die After Google Maps Reportedly Told Them to Drive Over an Unfinished Bridge

In this case, incorrect instructions from the web mapping application seem to have proved fatal.

Three Men Die After Google Maps Reportedly Told Them to Drive Over an Unfinished Bridge
7
arstechnica.com Found in the wild: The world’s first unkillable UEFI bootkit for Linux

“Bootkitty” is likely a proof-of-concept, but may portend working UEFI malware for Linux.

Found in the wild: The world’s first unkillable UEFI bootkit for Linux

"Bootkitty" is likely a proof-of-concept, but may portend working UEFI malware for Linux.

0

T-Mobile's CSO says "suspicious behavior, discovery-type commands" on the company's network devices tipped it off to the suspected Salt Typhoon-linked breach (Kelcee Griffis/Bloomberg)

Kelcee Griffis / Bloomberg: T-Mobile's CSO says “suspicious behavior, discovery-type commands” on the company's network devices tipped it off to the suspected Salt Typhoon-linked breach  —  - Carrier says the unauthorized activity resembled Salt Typhoon  — Companies trying to work together to avert further hacks

0

Hackers abuse popular Godot game engine to infect thousands of PCs

​Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months. [...]

0

CrowdStrike still doesn't know how much its Falcon flame-out will cost

go.theregister.com CrowdStrike still doesn’t know cost of Falcon flame-out

Thinks customers may have forgiven it after revenue hits a record

CrowdStrike still doesn’t know cost of Falcon flame-out

Thinks customers may have forgiven it after revenue hits a record CrowdStrike can't yet confidently predict the financial impact of the failed update to its Falcon software that crashed millions of computers around the world last July, but is confident its third quarter results show customers can't find a better security product.…

0

The riskiest apps from #privacy and #cyber #security point of view analysed: 5 out of top 10 worst apps come from #Meta, including Instagram, Facebook, Threads,

techhub.social arihak (@arihak@techhub.social)

The riskiest apps from #privacy and #cyber #security point of view analysed: 5 out of top 10 worst apps come from #Meta, including Instagram, Facebook, Threads, Messenger https://www.computing.co.uk/news-network/10-most-privacy-invasive-apps

The riskiest apps from #privacy and #cyber #security point of view analysed: 5 out of top 10 worst apps come from #Meta, including Instagram, Facebook, Threads, messengerhttps://www.computing.co.uk/news-network/10-most-privacy-invasive-apps

0