Posts

Showing posts from October, 2023

23AndMe Hacker Leaks New Tranche of Stolen Data

Image
  Two weeks after the first data leak from the DNA ancestry service, the threat actor produces an additional 4 million user records they purportedly stole. A threat actor who claimed responsibility for the compromise of the 23AndMe site earlier this month has released a new dataset, including the records of more than 4 million people's genetic ancestry. The cybercriminal, known by the handle Golem, alleges in a cybercrime Dark Web forum the stolen data includes information on, "the wealthiest people living in the US and Western Europe," according to reports. 23andMe spokesperson Andy Kill said in a statement the organization is still trying to confirm whether the most recently leaked data is genuine. Prior to this most recent leak, an Oct. 1 post on a Dark Web forum by Golem claimed they have a total of 20 million individual pieces of 23andMe data and leaked 1 million lines of data as a teaser, along with an offer to bulk sell data profiles. 23andMe confirmed in early Oct

More Okta Customers Hacked

Image
  Attackers compromised customer support files containing cookies and session tokens, which could result in malicious impersonation of valid Okta users. Okta, an identity and access management services provider, disclosed that its customer support case management system was recently compromised, exposing sensitive customer data including cookies and session tokens. Attackers could potentially use the information to impersonate valid users contacting support. The customer support case management system is separate from the Okta service itself and the incident only impacted customers with recent support cases, the company's  Chief Security Officer David Bradbury  stressed in a blog post  on Oct. 20.  Impacted customers have been notified, he said. " Okta has worked with impacted customers to investigate, and has taken measures to protect our customers, including the revocation of embedded session tokens," Bradbury added. In its blog post, Okta listed IP addresses and user-a

Internet-Wide Zero-Day Bug Fuels Largest-Ever DDoS Event

Image
  An Internet-wide security vulnerability is at the root of a zero-day attack dubbed "HTTP/2 Rapid Reset," which resulted in a distributed denial-of-service (DDoS) flood that was orders of magnitude larger than any previous attack ever recorded. It marks a new chapter in the evolution of DDoS threats, researchers noted. Amazon Web Services, Cloudflare, and Google Cloud each independently observed the attack in question, which featured multiple waves of traffic that lasted for just minutes each. They targeted cloud and Internet infrastructure providers, and the attack took place over Aug. 28–29. Unknown perpetrators are behind the event, but it's clear that they exploited a bug in the  HTTP/2 protocol , which is used in about 60% of all Web applications. AWS, Cloudflare, and Google worked with other cloud, DDoS security, and infrastructure vendors in a coordinated effort to minimize any real-world impact of the Rapid Reset attacks, mainly with load balancing and other edge

We Finally Have Proof That the Internet Is Worse

Image
  High-profile lawsuits against Google and Amazon have revealed Silicon Valley’s vise grip on our lives. By  Charlie Warzel Living online means never quite understanding what’s happening to you at a given moment. Why  these  search results? Why  this  product recommendation? There is a feeling—often warranted, sometimes conspiracy-minded—that we are constantly manipulated by platforms and websites. So-called dark patterns, deceptive bits of web design that can trick people into certain choices online, make it harder to unsubscribe from a scammy or unwanted newsletter; they nudge us into purchases. Algorithms optimized for engagement shape what we see on social media and can goad us into participation by showing us things that are likely to provoke strong emotional responses. But although we know that all of this is happening in aggregate, it’s hard to know  specifically  how large technology companies exert their influence over our lives. This week,  Wired  published a story by the for

Samsung Galaxy A53 5G Review and Price

Image
NETWORK Technology GSM / HSPA / LTE / 5G LAUNCH Announced 2022, March 17 Status Available. Released 2022, March 24 BODY Dimensions 159.6 x 74.8 x 8.1 mm (6.28 x 2.94 x 0.32 in) Weight 189 g (6.67 oz) Build Glass front (Gorilla Glass 5), plastic frame, plastic back SIM Single SIM (Nano-SIM) or Hybrid Dual SIM (Nano-SIM, dual stand-by)   IP67 dust/water resistant (up to 1m for 30 min) DISPLAY Type Super AMOLED, 120Hz, 800 nits (HBM) Size 6.5 inches, 102.0 cm 2  (~85.4% screen-to-body ratio) Resolution 1080 x 2400 pixels, 20:9 ratio (~405 ppi density) Protection Corning Gorilla Glass 5 PLATFORM OS Android 12, upgradable to Android 13, One UI 5.1 Chipset Exynos 1280 (5 nm) CPU Octa-core (2x2.4 GHz Cortex-A78 & 6x2.0 GHz Cortex-A55) GPU Mali-G68 MEMORY Card slot microSDXC (uses shared SIM slot) Internal 128GB 4GB RAM, 128GB 6GB RAM, 128GB 8GB RAM, 256GB 6GB RAM, 256GB 8GB RAM MAIN CAMERA Quad 64 MP, f/1.8, 26mm (wide), 0.8µm, PDAF, OIS 12 MP, f/2.2, 123˚ (ultrawide), 1.12µm 5 MP, f/2.4,