article thumbnail

Inside the DemandScience by Pure Incubation Data Breach

Troy Hunt

As I said, our IT department recently notified me that some of my data was leaked and a pre-emptive password reset was enforced as they didn't know what was leaked.    It would be good to see it as an informational notification in case there's an increase in attack attempts against my email address.

article thumbnail

CIA Dirty Laundry Aired

Schneier on Security

The password for the Confluence virtual machine that held all the hacking tools that were stolen and leaked? Those passwords were shared by the entire team and posted on the group's intranet. Those passwords were shared by the entire team and posted on the group's intranet. And the answer is: absolutely terrible. mysweetsummer.

InfoSec 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 206

Troy Hunt

More on that in the video, plus some actual infosec content too! Having said that, some parts have been hard because I've made simple mistakes , but the nature of the IoT ecosystem as it stands today predisposes you to mistakes because there's so freakin' many moving parts that all need to be aligned. More on all of that next week ??

InfoSec 311
article thumbnail

World Password Day and the importance of password integrity

Webroot

Passwords have become a common way to access and manage our digital lives. Having a password allows you to securely access your information, pay bills or connect with friends and family on various platforms. However, having a password alone is not enough. Your passwords also need to be managed and protected.

Passwords 131
article thumbnail

How Spoutible’s Leaky API Spurted out a Deluge of Personal Data

Troy Hunt

” This one, as far as infosec stories go, had me leaning and muttering like never before. That's not unprecedented, but this is: password: "$2y$10$B0EhY/bQsa5zUYXQ6J.NkunGvUfYeVOH8JM1nZwHyLPBagbVzpEM2", No way! Is that genuinely a bcrypt hash of my own password? Weak passwords like. "spoutible"

Passwords 364
article thumbnail

SolarWinds blaming intern for leaked password is symptom of ‘security failures’

SC Magazine

House Oversight and Homeland Security committees last week, SolarWinds’s former and current CEOs blamed an intern for creating a weak FTP server password and leaking it on GitHub – an act which may or may not have contributed to a supply chain hack that impacted users of the tech firm’s Orion IT performance monitoring platform.

Passwords 129
article thumbnail

Still Using Passwords? Get Started with Phishing-Resistant, Passwordless Authentication Now!

Cisco Security

. “Over the last few years, we have increased our password complexities and required 2FA wherever possible. With this approach, employees had more password lock outs, password fatigue, and forgetting their longer passwords due to password rotations. Phishing resistant passwordless authentication with FIDO2.