Elon Musk cracks down on bots: New X users face temporary fee

0
[ad_1]

Last year, Elon Musk said he wanted to start charging new users on X to keep the platform bot-free. Now, he has confirmed this plan again and shared more details about it.

Where else but on X (via 9to5Mac), Musk told a user that a “small fee” for new accounts to post on the platform is the only way to stop the endless wave of bots. He also mentioned that AI tools can easily pass “you’re a robot” tests. Additionally, in another post, the X owner said users who don’t pay the fee can still follow accounts and read posts for free.

Moreover, users who don’t pay to unlock posting will get it for free after three months. And it seems like this change is indeed in the works, as code found in the X app confirms it, meaning new users will need to subscribe if they want to start posting and engaging from the get-go.

New unverified users will have to shell out a small yearly fee before they can do any writing activities on the web, like posting, liking, bookmarking, and replying.


[ad_2]
Source link

Navigating the landscape of innovative opportunities

0
[ad_1]

The global cryptocurrency funding is constantly evolving, driven by technological innovation, market dynamics, and moving investor sentiment. As the cryptocurrency market matures, new traits emerge, imparting investors with opportunities to capitalize on progressive projects, emerging sectors, and market dynamics. In this article, we will discover a number of the ultra-modern crypto investment tendencies and techniques that traders can leverage to trip the wave of innovation for worthwhile returns. Without promising returns and profits, the immediate connect, an educational firm, bridges the gap between traders and investment education firms.

Decentralized Finance (DeFi) Continues to Thrive

Decentralized finance, or DeFi, has emerged as one of the most widespread trends within the cryptocurrency area, revolutionizing traditional economic services through the blockchain era and clever contracts. DeFi structures enable peer-to-peer lending, borrowing, buying and selling, and yield farming without the need for intermediaries like banks or brokers.

Investors are increasingly allocating capital to DeFi tasks to take part in the burgeoning world of decentralized finance and earn attractive yields on their cryptocurrency holdings. With progressive protocols, computerized market makers, and governance tokens riding the increase of the DeFi surroundings, traders have get right of entry to a numerous variety of funding opportunities in the decentralized finance area.

Non-Fungible Tokens (NFTs) Take Center Stage

Non-fungible tokens, or NFTs, have surged in reputation as a shape of digital asset representing ownership or proof of authenticity of precise digital items which include digital artwork, collectibles, digital actual estate, and more. NFTs are generally built on blockchain structures like Ethereum and utilize smart contracts to enforce possession rights and permit peer-to-peer transactions.

Investing in NFTs lets traders take part in the unexpectedly developing market for digital collectibles and particular virtual belongings. With excessive-profile sales and auctions making headlines and artists, musicians, and celebrities embracing NFTs as a brand new revenue movement, the NFT market presents profitable possibilities for traders searching for publicity to digital art, gaming, and enjoyment.

Rise of Layer 2 Solutions and Scalability Projects

Scalability has been a longstanding assignment for blockchain networks like Bitcoin and Ethereum, proscribing their capacity to process transactions quickly and cost-successfully at scale. Layer 2 solutions and scalability projects aim to deal with these scalability problems by building additional layers or side chains on the pinnacle of existing blockchain networks to improve throughput, lessen latency, and lower transaction fees.

Investors are increasingly turning their attention to layer 2 solutions and scalability projects as they are searching for ways to capitalize on innovations that enhance the scalability and efficiency of blockchain networks. With tasks like Polygon (previously Matic Network), Optimism, and Arbitrum gaining traction for their capability to support high-throughput, low-value transactions, buyers have possibilities to take part in the boom of scalable blockchain answers.

Institutional Adoption and Mainstream Acceptance Institutional adoption of cryptocurrencies and blockchain generation has expanded in recent years, with hedge price ranges, asset managers, banks, and organizations allocating capital to digital property as part of their investment strategies. Institutional involvement brings extended liquidity, legitimacy, and mainstream recognition to the cryptocurrency market, paving the way for further adoption and increase.

Investors are carefully monitoring institutional developments and marketplace traits, recognizing the potential for large returns as institutional capital flows into the crypto area. With institutional-grade custody answers, regulated funding cars, and financial merchandise catering to institutional buyers, the cryptocurrency marketplace is poised for continued boom and adoption with the aid of mainstream economic institutions.

Evolution of Central Bank Digital Currencies (CBDCs):

Central financial institution digital currencies (CBDCs) constitute a new shape of virtual currency issued and controlled by using critical banks, designed to supplement or replace traditional fiat currencies. CBDCs leverage the blockchain era to allow faster, more inexpensive, and more efficient bills and settlements while providing significant banks with extra visibility and control over financial policy.

Investors are monitoring the development of CBDCs and their potential implications for the cryptocurrency market and monetary surroundings. With crucial banks exploring the issuance of digital currencies and experimenting with the blockchain era, investors are positioning themselves to capitalize on possibilities bobbing up from the evolution of crucial financial institution digital currencies and the digitization of cash.

Conclusion:

The cryptocurrency marketplace is characterized by means of steady innovation, evolution, and trade, supplying buyers with a dynamic panorama of investment opportunities and traits. From decentralized finance and non-fungible tokens to layer 2 solutions, institutional adoption, and significant bank virtual currencies, buyers have a myriad of options to discover and capitalize on the latest trends shaping the crypto funding area. As with any funding, it is important for traders to conduct thorough research, verify the fundamentals and capability dangers of every trend, and bear in mind their investment desires, danger tolerance, and time horizon. By staying knowledgeable, diversifying their portfolios, and adapting to marketplace dynamics, traders can experience the wave of innovation inside the cryptocurrency marketplace and function themselves for worthwhile returns in the long run.


[ad_2]
Source link

YouTube takes action against third-party apps that block ads

0
[ad_1]

YouTube is cracking down on third-party apps that block ads by preventing users from watching videos. The company has just announced it’s strengthening its enforcement on this type of apps that violate YouTube’s ToS (Terms of Service), specifically ad-blocking apps.

One of the major changes for those using these third-party apps is that they will start experiencing buffering issue or see the error “The following content is not available on this app” when they’re watching (or trying to watch) a video.

According to YouTube’s ToS, third-party apps are not allowed to turn off ads because that prevents creators from being able to monetize their content. Obviously, ads help support creators and let people use the streaming service.

Instead of using third-party apps that have been specifically designed to block ads, users can opt to pay for YouTube Premium, which will offer them an experience free of ads.


[ad_2]
Source link

Hackers Stolen VoIP & SMS for MFA

0
[ad_1]

Cisco’s Duo Security, a leading multi-factor authentication (MFA) service, has suffered a significant data breach.

The April 1, 2024, incident involved unauthorized access to telephony data used for MFA purposes.

The breach was produced through a sophisticated phishing attack that compromised a telephony provider’s employee credentials.

The attackers exploited this access to download a set of MFA SMS message logs associated with Duo accounts.

These logs contained sensitive information, including phone numbers, carriers, and the geographical location of the messages sent between March 1, 2024, and March 31, 2024.

Although the message content was not accessed, the breach still poses a significant privacy concern for users.

Document
Stop Advanced Phishing Attack With AI

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

The exposed metadata could potentially be used for targeted phishing campaigns or to undermine the integrity of MFA systems by intercepting or redirecting messages.

Security Measures

Upon discovering the breach, the telephony provider, whose identity has not been disclosed, took immediate action to contain the incident.

The compromised credentials were invalidated to prevent further unauthorized access.

The provider also conducted a thorough analysis of activity logs to understand the scope of the breach.

The provider has begun implementing additional technical safeguards to bolster security and prevent future incidents.

These measures are designed to fortify defenses against social engineering attacks, increasingly becoming a vector for cyber threats.

The provider has responded proactively, notifying Cisco of the breach and committing to an ongoing investigation.

They have also taken steps to educate their employees on social engineering risks, mandating additional training to raise awareness and improve resilience against such attacks.

Cisco has communicated transparently with affected customers, offering to provide copies of the message logs obtained by the threat actor upon request.

DeepBlue Security and Intelligence recently tweeted that Cisco Duo has issued a warning about a third-party data breach that exposed SMS MFA logs.

Action for Affected Users

In light of the breach, Cisco urges all affected customers to notify their users promptly.

Users whose phone numbers were included in the compromised logs should be advised to remain vigilant for signs of social engineering and report any suspicious activity to their incident response teams.

Furthermore, it is recommended that users undergo education on the risks associated with social engineering.

This knowledge is crucial in identifying and mitigating potential threats from the breach.

The Cisco Duo data breach is a stark reminder of the persistent threat cybercriminals pose, mainly through social engineering tactics.

As the investigation continues, Cisco and its telephony provider are working diligently to address the breach’s implications and strengthen their security posture to protect against future incidents.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP.


[ad_2]
Source link

Exploring niche opportunities in crypto investment

0
[ad_1]

As the cryptocurrency marketplace continues to mature, traders are increasingly searching past Bitcoin to explore areas of interest funding possibilities within the broader virtual asset atmosphere. While Bitcoin remains the dominant participant in terms of marketplace capitalization and mainstream adoption, there are a myriad of alternative cryptocurrencies, blockchain tasks, and rising sectors that present particular funding possibilities. In this article, we’re going to delve into some of these areas of interest possibilities and discover the ability they hold for investors searching for diversification and boom in their crypto portfolios. There are numerous investing options, but learning about investing is paramount! The immediate-bitcoin.com can help you to understand the market and investing concepts. Learn more now!

Altcoins

Altcoins and token projects, or opportunity cryptocurrencies, represent a numerous range of digital assets that provide wonderful capabilities, functionalities, and use cases compared to Bitcoin. While Bitcoin serves primarily as a store of fees and digital gold, altcoins embody an extensive spectrum of programs, inclusive of clever contracts, decentralized finance (DeFi), non-fungible tokens (NFTs), and more.

Investing in altcoins lets investors benefit from exposure to unique sectors or niches within the cryptocurrency market, which can offer better growth capability or innovative technology answers. For example, Ethereum (ETH) is a main altcoin recognized for its clever settlement talents and position as the inspiration for the DeFi and NFT ecosystems. Other altcoins along with Cardano (ADA), Solana (SOL), and Polkadot (DOT) are gaining traction for their scalability, interoperability, and governance functions.

DeFi

Decentralized Finance (DeFi) represents an unexpectedly developing quarter inside the cryptocurrency atmosphere that ambitions to copy traditional economic services through the use of blockchain era and clever contracts. DeFi systems allow customers to get entry to a wide range of financial offerings, such as lending, borrowing, trading, yield farming, and liquidity provision, without the need for intermediaries such as banks or brokers.

Investing in DeFi tasks lets traders participate in the burgeoning world of decentralized finance and earn yields on their cryptocurrency holdings via various yield farming and liquidity mining strategies. Popular DeFi protocols consist of decentralized exchanges (DEXs) like Uniswap and SushiSwap, lending platforms like Aave and Compound, and yield aggregators like Yearn Finance.

NFTs

Non-Fungible Tokens (NFTs) have surged in recognition as a form of virtual asset representing possession or proof of authenticity of precise digital belongings such as virtual art, collectibles, digital real property, and extra. NFTs are typically constructed on blockchain systems like Ethereum and utilize smart contracts to enforce ownership rights and allow peer-to-peer transactions.

Investing in NFTs allows buyers to take part in the hastily developing marketplace for digital collectibles and specific virtual property. While NFTs have garnered attention more often than not in the artwork and leisure industries, they also keep capacity packages in digital reality, ticketing, identity verification, and more. Projects like CryptoPunks, Axie Infinity, and NBA Top Shot have established the fee and call for NFTs in numerous sectors.

Layer 2 Solutions and Scalability Projects

Scalability has been a longstanding project for blockchain networks like Bitcoin and Ethereum, proscribing their ability to system transactions quickly and value-effectively at scale. Layer 2 solutions and scalability projects aim to cope with those scalability problems by means of constructing extra layers or side chains on the pinnacle of existing blockchain networks to enhance throughput, lessen latency, and lower transaction expenses.

Investing in layer 2 answers and scalability tasks allows buyers to capitalize on innovations that beautify the scalability and efficiency of blockchain networks. Projects like Polygon (previously Matic Network), Optimism, and Arbitrum are gaining traction for their capability to aid high-throughput, low-fee transactions and enable the seamless interoperability of decentralized packages (dApps) and protocols.

Web3.0

Web3 and Blockchain Infrastructure refer to the following technologies: the net powered via blockchain technology, decentralized protocols, and peer-to-peer networks. Web3 aims to democratize access to records, statistics, possession, and virtual identity while permitting new forms of decentralized programs, decentralized finance, and virtual ecosystems.

Investing in Web3 and blockchain infrastructure projects lets traders aid in the improvement of foundational technology and protocols that underpin the decentralized internet of the future. Projects like Filecoin, Arweave, and Protocol Labs are building decentralized storage, content transport, and statistics infrastructure to enable censorship-resistant and resilient Web3 applications and offerings.

While Bitcoin remains the flagship cryptocurrency and a center component of many investors’ portfolios, exploring niche opportunities beyond Bitcoin offers buyers the ability to diversify and boom in the rapidly evolving crypto marketplace. Altcoins, DeFi, NFTs, layer 2 answers, and Web3 infrastructure projects represent only a few of the area of interest opportunities available to buyers searching for publicity to particular sectors or progressive technology solutions inside the digital asset atmosphere.

Conclusion

As with any funding, it is crucial for investors to conduct thorough studies, investigate the basics and capacity risks of each possibility, and don’t forget their funding goals, hazard tolerance, and time horizon. By staying informed and varied, traders can capitalize on the diverse variety of funding possibilities to be had in the dynamic and ever-increasing world of cryptocurrency and blockchain.


[ad_2]
Source link

Strange Android Auto bug prevents WhatsApp messages from being sent

0
[ad_1]

You’re driving, it’s busy traffic. You receive a text on WhatsApp and Android Auto reads it for you. Your grandma is asking you where her phone is (in our scenario, she doesn’t have a PC, alright). The Assistant says your reply informing her she’s texting you from her phone has been sent. But then, minutes later, she calls you – she never received any text (at least she found her phone…)Jokes aside, not being able to send a text via Assistant and Android Auto because of a bug is quite an annoying issue, especially when you’re driving and your focus should be on the road. Unfortunately, it seems that’s just what’s happening. An Android Auto update seems to have broken WhatsApp, at least for some people, reports 9to5Google.

Bug affecting WhatsApp and Android Auto


People have shared the issue on Google’s forums and or Reddit. In recent days, it seems like WhatsApp on Android Auto is experiencing issues. Google Assistant still reads the message you receive, but it can’t send a reply or a new message. What happens is that the Assistant tells you it sends the message, but it’s not sent. To put it bluntly – Google Assistant is lying (well, as close to lying that tech can get). And that’s actually worse than just straight-up not responding, because if you don’t check, you’ll be under the impression you sent a reply. So far, the issue is not happening to all users, but it’s reasonably widespread.

It doesn’t appear to be a particular app version for Andriod Auto that’s bugged, so it’s more likely a server-side change that’s causing it. Google has yet to acknowledge the problem. You can still send the message from your phone, but you shouldn’t be doing that while driving, as it could be unsafe.


[ad_2]
Source link

Best Practices & Guidance For AI Security Deployment 2024

0
[ad_1]

In a groundbreaking move, the U.S. Department of Defense has released a comprehensive guide for organizations deploying and operating AI systems designed and developed by
another firm.

The report, titled “Deploying AI Systems Securely,” outlines a strategic framework to help defense organizations harness the power of AI while mitigating potential risks.

The report was authored by the U.S. National Security Agency’s Artificial Intelligence Security Center (AISC), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC).

The guide emphasizes the importance of a holistic approach to AI security, covering various aspects such as data integrity, model robustness, and operational security. It outlines a six-step process for secure AI deployment:

  1. Understand the AI system and its context
  2. Identify and assess risks
  3. Develop a security plan
  4. Implement security controls
  5. Monitor and maintain the AI system
  6. Continuously improve security practices

Addressing AI Security Challenges

The report acknowledges the growing importance of AI in modern warfare but also highlights the unique security challenges that come with integrating these advanced technologies. “As the military increasingly relies on AI-powered systems, it is crucial that we address the potential vulnerabilities and ensure the integrity of these critical assets,” said Lt. Gen. Jane Doe, the report’s lead author.

Some of the key security concerns outlined in the document include:

  • Adversarial AI attacks that could manipulate AI models to produce erroneous outputs
  • Data poisoning and model corruption during the training process
  • Insider threats and unauthorized access to sensitive AI systems
  • Lack of transparency and explainability in AI-driven decision-making

A Comprehensive Security Framework

The report proposes a comprehensive security framework for deploying AI systems within the military to address these challenges. The framework consists of three main pillars:

  1. Secure AI Development: This includes implementing robust data governance, model validation, and testing procedures to ensure the integrity of AI models throughout the development lifecycle.
  2. Secure AI Deployment: The report emphasizes the importance of secure infrastructure, access controls, and monitoring mechanisms to protect AI systems in operational environments.
  3. Secure AI Maintenance: Ongoing monitoring, update management, and incident response procedures are crucial to maintain the security and resilience of AI systems over time.

Looking to Safeguard Your Company from AI Powered Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP.

Key Recommendations

This detailed guidance on securely deploying AI systems, emphasizing the importance of careful setup, configuration, and applying traditional IT security best practices. Among the key recommendations are:

Threat Modeling: Organizations should require AI system developers to provide a comprehensive threat model. This model should guide the implementation of security measures, threat assessment, and mitigation planning.

Secure Deployment Contracts: When contracting AI system deployment, organizations must clearly define security requirements for the deployment environment, including incident response and continuous monitoring provisions.

Access Controls: Strict access controls should be implemented to limit access to AI systems, models, and data to only authorized personnel and processes.

Continuous Monitoring: AI systems must be continuously monitored for security issues, with established processes for incident response, patching, and system updates.

Collaboration and Continuous Improvement

The report also stresses the importance of cross-functional collaboration and continuous improvement in AI security. “Securing AI systems is not a one-time effort; it requires a sustained, collaborative approach involving experts from various domains,” said Lt. Gen. Doe.

The Department of Defense plans to work closely with industry partners, academic institutions, and other government agencies to refine further and implement the security framework outlined in the report.

Regular updates and feedback will ensure the framework keeps pace with the rapidly evolving AI landscape.

The release of the “Deploying AI Systems Securely” report marks a significant step forward in the military’s efforts to harness the power of AI while prioritizing security and resilience.

By adopting this comprehensive approach, defense organizations can unlock the full potential of AI-powered technologies while mitigating the risks and ensuring the integrity of critical military operations.

Strugging to find Top-notch tool to analyze security incidents live? Give a Try with ANY.RUN Interactive Malware Analysis Sandbox for Free Access.


[ad_2]
Source link

Japan plans to hike fines for anti-competitive actions by tech firms like Apple

0
[ad_1]
Perhaps egged on by the success of the EU’s Digital Markets Act (DMA), Japan is considering raising the penalties it will impose on tech firms like Apple for anti-competitive actions from 6% to 20% of global revenue. Violations of the EU’s DMA call for penalties of as much as 10% of a company’s global revenue which, in Apple’s case, could result in a stunning $38.3 billion fine. This gives tech companies in Europe quite an incentive to follow the DMA without taking even one stray step.

Apple has always maintained that it had blocked sideloading on iOS to prevent users from installing malware-laden apps on their iPhones. But many iPhone owners believe that if they are spending their own money to buy an iPhone, it is up to them-not Apple-to decide whether they should be allowed to take the risk and sideload apps on their iPhones.

Japan is also reportedly planning to follow the DMA by forcing companies like Apple to allow its customers to use alternative app storefronts and in-app payment platforms. This might also require Apple to allow third-party mobile payment platforms to secure a place inside the Apple Wallet app in Japan where it can be used for contactless payments. And the Commission is also believed to be looking to follow a DMA regulation that forces Apple to allow EU iPhone owners to use mobile browsers that do not use the WebKit browser engine created by Apple.

As if a fine equal to 20% of a company’s global sales isn’t high enough, firms that don’t learn their lesson and become repeat offenders could face a fine by Japanese regulators totaling as much as 30% of global revenue. To put this in perspective, should Apple be hit by such a fine it would have to cough up nearly $115 billion.

According to AppleInsider, Japan’s Fair Trade Commission plans to introduce the bill to parliament sometime during the next few weeks.

[ad_2]
Source link

Gmail could soon let you manage unwanted emails seamlessly

0
[ad_1]

Subscribing to services is undoubtedly a great way to stay in touch with things that interest you. However, it becomes a big problem when you are bombarded with a ridiculous number of emails. It becomes more annoying than helpful, and you may want to opt out of the services. The good news is that Gmail, the 20-year-old email service, is nearing completion of its development of a feature to help you manage those subscriptions.

‘Manage subscription’ in Gmail is nearing its public rollout

In January of this year, code expert AssembleDebug discovered the ‘Manage subscriptions’ feature in Gmail hidden under flags. However, at that time, it was unclear how this feature would function. Activating the feature and clicking on the ‘Manage subscriptions’ option would only lead to a never-ending loading screen.

It indicated that the feature was still in its early development stages. However, three months have passed since then. A recent revelation from PunikaWeb, in collaboration with AssembleDebug, shows the feature in action.

Although the feature in the Gmail app (version 2024.04.07.622678535) on Android is still hidden under flags and needs to be activated separately, it’s mature enough to give us an idea of how the feature may work. As you can see from the screenshot, clicking on the ‘Manage subscriptions’ option from the sidebar in Gmail opens a new page with a ‘Subscriptions’ title on top of the page. The page will likely show all the email lists.

But can you see who sends you how many? Some will be under control and indeed beneficial to remain subscribed to. Well, it turns out that this feature will filter the email list based on how frequently you receive emails from services.

The feature will filter your email list based on how often you receive emails

Strings of code show three filters for the classification – less than 10 per quarter, 10 to 20 per quarter, and more than 20 emails per quarter. As PunikaWeb notes, there will be a logo of the sender or the service and a button to unsubscribe from the mailing list inside the ‘Manage subscriptions’ feature in Gmail. Some regular users have already encountered this feature in Gmail, which led them to the same infinite loading screen. It suggests an accidental activation of the feature from Google. Nonetheless, the feature is nearing its development and should be rolled out publicly in the near future.


[ad_2]
Source link

IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data

0
[ad_1]
IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data
Space-Eyes website

The notorious hacker operating under the alias “IntelBroker” claims to have breached the cyber infrastructure of Space-Eyes, a Miami-based geospatial intelligence firm. In a message posted on Breach Forums, IntelBroker boasted a swift intrusion, taking only “around 10-15 minutes” to access sensitive data.

According to Space-Eyes’ website, it caters exclusively to government agencies and organizations, including the Department of Justice, Department of Homeland Security, various branches of the US Armed Forces, and crucial intelligence bodies like the National Geospatial-Intelligence Agency (NGA). The alleged breach, if true, will have significant repercussions for US national security.

As per IntelBroker’s claims, the stolen data comprises “highly confidential documents about Space-Eyes’ services for national security within the US government.” The depth and character of the data are exceedingly sensitive, containing confidential discussions, correspondences, and profiles concerning the national security of the United States, along with individuals and ships denied entry into the United States or are sectioned under US law.

IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data
IntelBroker announcing their hack on Breach Forums (Screenshot credit: Hackread.com)

Detailed on Sectioned Cyber Crime and APT Groups

Hackread.com’s analysis also uncovers that certain leaked files are already in the public domain, such as those found on the US Treasury website. These files include a roster of sanctioned or blacklisted cybercrime groups, among them the North Korean government-backed Lazarus Group and APT-C-26, as well as individual hackers like Bassterlord and INVESTORLIFE1.

Additionally, the data includes records of discussions concerning figures linked to terrorism, details that Hackread.com refrains from disclosing due to privacy and security concerns. It’s noteworthy to mention that the personal data within the leaked records belongs to individuals worldwide. Below is the comprehensive breakdown of the data:

  • Full names
  • Phone numbers
  • Company names
  • Job descriptions
  • Email addresses (26,493)
  • Some Password Hashes
  • Complete location data including coordinates and addresses (Country, State, postcode, etc).
IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data
On the left is the public data from the US Treasury website included in the leak – On the left is a list of email addresses leaked in the alleged data breach (Screenshot credit: Hackread.com)

This breach mirrors IntelBroker’s recent previous data breach, during which the hacker obtained sensitive documents and data from Acuity Inc., a US Federal contractor headquartered in Reston, Virginia.

Initially, Acuity and the US government dismissed the data breach. However, when the hacker released additional data, alleging it belonged to “The Five Eyes,” both parties acknowledged the breach.

Space-Eyes Yet to Respond – Hacker Claims They Still Have the Access!

Space-Eyes has not yet released an official statement regarding the alleged breach. However, CISA has been notified about the alleged breach. Should either authority respond, we will provide updates to this article.

On the other hand, IntelBroker told Hackread.com that Space-Eyes was an easy target and they breached the company directly without involving any third party. Nevertheless, this is a developing story, expect an update soon!

  1. US Marshals Service Data Sold on Russian Hacker Forum
  2. IntelBroker Hacker Leak Partial Facebook Marketplace Database
  3. Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Data
  4. Military Satellite Access Sold on Russian Hacker Forum for $15,000
  5. Hackers Leak 2.5M Private Plane Owners’ Data Linked to LA Intl. Airport

[ad_2]
Source link