Sat.Dec 02, 2023

article thumbnail

Weekly Update 376

Troy Hunt

I'm irrationally excited about the new Prusa 3D printer on order, and I think that's mostly to do with planning for the NDC Oslo talk I plan to do with Elle, my 11-year old daughter. I'm all for getting the kids exposure not just to tech, but also to being able to talk to others about tech and involving them in conference talks since a young age has been a big part of that.

article thumbnail

Fortune-telling website WeMystic exposes 13M+ user records

Security Affairs

WeMystic, a website on astrology, numerology, tarot, and spiritual orientation, left an open database exposing 34GB of sensitive data about the platforms’ users. Telling the future is a tricky business, and failure to foretell your own mishaps doesn’t help. The content platform WeMystic is a good example of this, with the Cybernews research team discovering that it exposed its users’ sensitive data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Over 20,000 vulnerable Microsoft Exchange servers exposed to attacks

Bleeping Computer

Tens of thousands of Microsoft Exchange email servers in Europe, the U.S., and Asia exposed on the public internet are vulnerable to remote code execution flaws. [.

Internet 122
article thumbnail

Researchers devised an attack technique to extract ChatGPT training data

Security Affairs

Researchers devised an attack technique that could have been used to trick ChatGPT into disclosing training data. A team of researchers from several universities and Google have demonstrated an attack technique against ChetGPT that allowed them to extract several megabytes of ChatGPT’s training data. The researchers were able to query the model at a cost of a couple of hundred dollars. “By matching against this dataset, we recover over ten thousand examples from ChatGPT’s training dataset

Hacking 142
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google Chrome's new cache change could boost performance

Bleeping Computer

Google is introducing a significant change to Chrome's Back/Forward Cache (BFCache) behavior, allowing web pages to be stored in the cache, even if a webmaster specifies not to store a page in the browser's cache. [.

111
111
article thumbnail

Security Affairs newsletter Round 448 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

More Trending

article thumbnail

US Health Dept urges hospitals to patch critical Citrix Bleed bug

Bleeping Computer

The U.S. Department of Health and Human Services (HHS) warned hospitals this week to patch the critical 'Citrix Bleed' Netscaler vulnerability actively exploited in attacks. [.

article thumbnail

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.

The Hacker News

Organizations in the Middle East, Africa, and the U.S. have been targeted by an unknown threat actor to distribute a new backdoor called Agent Racoon. "This malware family is written using the.

DNS 94
article thumbnail

WordPress Phishing Scam Exploits Fake CVE-2023-45124 Vulnerability

Penetration Testing

In the ever-evolving world of cybersecurity, vigilance is paramount. Recently, a cunning phishing scam has emerged, targeting unsuspecting WordPress users with a fabricated security flaw, CVE-2023-45124. This sophisticated ruse, uncovered by the Wordfence Threat... The post WordPress Phishing Scam Exploits Fake CVE-2023-45124 Vulnerability appeared first on Penetration Testing.

Scams 91
article thumbnail

ChatGPT Spit Out Sensitive Data When Told to Repeat ‘Poem’ Forever

WIRED Threat Level

Plus: A major ransomware crackdown, the arrest of Ukraine’s cybersecurity chief, and a hack-for-hire entrepreneur charged with attempted murder.

Hacking 89
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

DEF CON 31 – War Stories – Taiiwo’s, Artorias’, Puck’s, TheClockworkBird’s ‘Cracking Cicada 3301’

Security Boulevard

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada ; via the organizations YouTube channel. Permalink The post DEF CON 31 – War Stories – Taiiwo’s, Artorias’, Puck’s, TheClockworkBird’s ‘Cracking Cicada 3301’ appeared first on Security Boulevard.

article thumbnail

China continues Pig-Butchering Crack-down

Security Boulevard

One of my techniques for keeping current on Cybercrime trends is having an "interesting" collection of international news ticklers. This story came to me via X:CyberScamMonitor via a QQ account called "onCambodia." @CyberScamMonitor is a Twitter/X account and Substack account dedicated to tracking online scam and gambling operations in Southeast Asia and documenting human trafficking and human rights abuses.