article thumbnail

A Retrospective on the 2015 Ashley Madison Breach

Krebs on Security

It’s been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. It’s also a complete lie,” the hacking group wrote. 18, 2015, the Impact Team posted a “Time’s up!” “Full Delete netted ALM $1.7mm in revenue in 2014.

article thumbnail

Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Krebs on Security

Also on July 3, security incident response firm Mandiant notified Kaseya that their billing and customer support site — portal.kaseya.net — was vulnerable to CVE-2015-2862 , a “directory traversal” vulnerability in Kaseya VSA that allows remote users to read any files on the server using nothing more than a Web browser.

Software 326
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When AIs Start Hacking

Schneier on Security

Hacking is as old as humanity. To date, hacking has exclusively been a human activity. After hacking humanity, AI systems will then hack other AI systems, and humans will be little more than collateral damage. Most of these hacks don’t even require major research breakthroughs in AI. Not for long.

Hacking 363
article thumbnail

More Detail on the Juniper Hack and the NSA PRNG Backdoor

Schneier on Security

Here’s me in 2015 about this Juniper hack. We knew the basics of this story , but it’s good to have more detail. Here’s me in 2007 on the NSA backdoor.

Hacking 303
article thumbnail

Sendgrid Under Siege from Hacked Accounts

Krebs on Security

But this also means when a Sendgrid customer account gets hacked and used to send malware or phishing scams, the threat is particularly acute because a large number of organizations allow email from Sendgrid’s systems to sail through their spam-filtering systems. . ”

article thumbnail

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

The Hacker News

Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of wallets spanning several blockchain platforms.

Hacking 144
article thumbnail

Hacking the Tax Code

Schneier on Security

That’s not hacking the tax code. It’s hacking the processes that create them: the legislative process that creates tax law. This provision didn’t come into force in 2018, so someone came up with the clever hack to prepay 2018 property taxes in 2017. A hack subverts the intent of a system. The tax code can be hacked.

Hacking 244