accidentally
-
In a shocking turn of events, an unnamed company based in the UK has fallen victim to a sophisticated cyber attack after inadvertently hiring a North Korean hacker as a remote IT worker.
-
3 API Vulnerabilities Developers Accidentally Create – The New Stack
-
A Microsoft software engineer accidentally published internal PlayReady DRM source code on a publicly accessible developer forum. The 4GB data leak contains sufficient information to compile the required DLL from the source code, potentially opening the door for reverse engineering or cracking of the DRM protection technology.
-
Researchers observed a Kiosk mode bypass vulnerability in a remote hotel’s check-in terminal during their stay there while traveling to attend a threat modeling workshop.
-
Google Cloud Accidentally Deletes UniSuper’s Online Account Due To ‘Unprecedented Misconfiguration’
·
A “one-of-a-kind” Google Cloud “misconfiguration” resulted in the deletion of UniSuper’s account last week, disrupting the financial services provider’s than half a million members. “Services began being restored for UniSuper customers on Thursday, more than a week after the system went offline,” reports The Guardian. “Investment account balances would reflect last week’s figures and UniSuper…
-
How I Accidentally Discovered an Insecure Direct Object Reference (IDOR) Vulnerability on Coursera
·
I intercepted the request and I noticed that whenever I comment/reply to a comment, the endpoint API is using a PUT method when its trying to insert my comment. that time in my mind I was already thinking, what if I tried DELETE-ing it?
-
A cyber forensics expert who sold software to the police, Interpol and the FBI has been jailed after he accidentally gave his work a hard drive full of child pornography.
-
[This is a Guest Diary by Noah Pack, an ISC intern as part of the SANS.edu BACS program]
-
The Israel Defense Forces (IDF) announced that it mistakenly killed three Israeli hostages who were holding up a white flag in Gaza on Friday. The names of the hostages are Yotam Haim, Samer Talalka and Alon Shamriz.
-
This all happens very easily—you tap in the wrong place or on the wrong thumbnail, and suddenly that particular photo disappears from your gallery. What’s worse, you might not even notice right away, which means at some point down the line you’ll be frantically looking for that photo you know you took, but it’s not…
-
Warnings about including credentials, keys, and tokens when sharing code on publicly accessible repositories shouldn’t be necessary. It should speak for itself that you don’t just hand over the keys to your data. But what if a misconfiguration ends in a supposed internal storage account becoming suddenly accessible to everyone?
-
19 September 2023THNDData Security/Cyber Security
-
Sep 19, 2023THNData Safety / Cybersecurity Microsoft on Monday said it took steps to correct a glaring security gaffe that led to the exposure of 38 terabytes of private data.
-
(Bloomberg) — Microsoft Corp.’s AI research team accidentally exposed a large cache of private data on software development platform GitHub, according to new research from a cybersecurity firm.
-
Microsoft’s AI researchers have made a big mistake.
-
Microsoft AI research division accidentally exposed 38TB of sensitive data
-
Microsoft AI researchers accidentally exposed tens of terabytes of sensitive data, including private keys and passwords, while publishing a storage bucket of open source training data on GitHub. From a report: In research shared with TechCrunch, cloud security startup Wiz said it discovered a GitHub repository belonging to Microsoft’s AI research division as part of…
-
There’s a forum site I use that has a pretty easy sign up process. One of the things about the site is they ban a couple of words from being used in posts and usernames.
-
Part 1: The Search The start was simple, I just wanted to find an old site that used to have low traffic, so it probably wasn’t being maintained still. An easy target to find vulnerabilities, and then contact the webmaster and let them know what the vulnerabilities are. So I searched and found a subreddit…
-
Ironically, Google, known for inadvertent device leaks, has once again managed to unveil its upcoming smartphone, the Pixel 8 Pro, ahead of its official launch. The Pixel 8 Pro has been spotted on the official Google Store website, revealing interesting details about the device’s design, features, and color options.