PhoneArena’s best iPhone and Android apps of the week

0
[ad_1]

Duolingo is like having a language-learning buddy right in your pocket. This app lets you dive into learning a new language at your own pace, whenever and wherever you want. Imagine having a fun and interactive way to pick up Spanish, French, or any other language you’ve been itching to learn.Instead of boring textbooks or stuffy classrooms, Duolingo spices things up with games and challenges. You’ll tackle bite-sized lessons that feel more like playing than studying. It’s all about matching words, completing sentences, and even speaking out loud to practice your pronunciation.

You can choose from a bunch of different languages, from the super popular ones to the more niche ones, such as Japanese, Hebrew, and Arabic, which you might not find elsewhere. Plus, you can track your progress, earn rewards, and even compete with friends to keep things interesting. The basic version is free, but if you want to dig deep, there’s a subscription called Super Duolingo that offers an ad-free experience with the option to review your mistakes.

Memrise

Platform: iOS, Android
Price: Free with in-app purchases
Get Memrise for iOS here
Get Memrise for Android here

Memrise is another language-learning app that’s gained popularity for its unique approach to teaching languages. Similar to Duolingo, Memrise offers courses in various languages, but it stands out with its focus on vocabulary acquisition through mnemonic techniques.The app utilizes spaced repetition and mnemonic devices to help users remember words and phrases more effectively. Mnemonics are memory aids, like visual imagery or associations with familiar words, that make it easier to recall new vocabulary. Memrise incorporates these techniques into its lessons, making language learning more engaging and memorable.

Memrise also offers features like interactive games, listening exercises, and pronunciation practice to enhance the learning process. Like Duolingo, it’s designed to be convenient and accessible, allowing users to learn at their own pace, anytime and anywhere.

LingoDeer


LingoDeer is yet another language-learning app that offers interactive lessons in various languages, but primarily focusing on Asian languages such as Japanese, Korean, Chinese, and Vietnamese.

What sets LingoDeer apart is its structured approach to language learning, which is tailored specifically to the grammar and vocabulary of each language it teaches. The app provides step-by-step lessons that cover essential language skills, including reading, writing, listening, and speaking.

One of the key features of LingoDeer is its clear explanations of grammar points and language concepts, which are presented in a way that’s easy to understand and remember. The app also incorporates a variety of interactive exercises and quizzes to reinforce learning and help users practice what they’ve learned.

The basic version is free, but you can buy different tiers of premium access, starting from a monthly subscription for $14.99 and going all the way up to a lifetime membership for $299 (often slashed down to $159.99).

Babbel


Babbel is one of the oldest language-learning tools on the internet, and it takes its name from the Babbel fish in the popular science-fiction book “The Hitchhiker’s Guide to the Galaxy.” The app does what other similar apps do but focuses more on the practical side of things, teaching you language skills that you can use in real-life situations.

That’s not to say that Babbel doesn’t offer a complete set of language learning tools, such as vocabulary, grammar, pronunciation, and cultural insights. It’s just that if you need to learn a couple of useful phrases for an upcoming short trip abroad, Babbel might be the right one for you.

Babbel also utilizes speech recognition technology to help you practice your pronunciation and ensure you’re speaking accurately, so you don’t make locals laugh on that upcoming trip. Plus, the app’s personalized review feature helps reinforce what you’ve learned, so it sticks with you for the long term.

Just like the other apps on that list, Babbel is free with some in-app purchases and subscriptions, starting at $8.99/mo.

Beelinguapp


Tired of the same repetitive language learning apps that use gamification and other similar techniques to make you come back and do your lessons? Prepare for something completely different! Beelinguapp is a unique language-learning app that offers an innovative approach to learning languages through reading. Imagine Beelinguapp as your cozy reading nook, where you can dive into captivating stories and articles while effortlessly picking up a new language.

Here’s the magic: Beelinguapp lets you choose from a library of texts in different languages, so you can find something that piques your interest, whether it’s a thrilling story or a fascinating article. You get to read these texts side by side, with the original language on one side and a translation in your native language on the other.

Additionally, Beelinguapp offers audio recordings of the texts, allowing users to listen to native speakers read the text aloud. This feature helps improve pronunciation and listening comprehension skills. It’s one of the more organic ways of learning a language, and for some people, it might work better than puzzles, games, and achievements.

Bonus: Brilliant


Learning a language is fun and all, but what about learning something different? How about delving into the deep and complex world of quantum physics or mathematics if you feel up for the challenge? There’s no need to go back to Uni and start a major in astronomy. There’s an app for that, and it’s called Brilliant.

Actually, Brilliant is a whole learning platform with a strong focus on math, science, and computer science, but before you click away, this platform is designed to explain complex subjects as intuitively as possible. It also provides learning at different levels, starting with beginner and going all the way up to expert, and it also features a range of interactive puzzles, quizzes, and challenges that encourage users to think creatively and apply their knowledge to real-world scenarios.

The downside is that the app requires a subscription. There’s a trial version that offers a glimpse at what you might achieve with the Problems of the Week feature, but if you want to get access to all the courses at a deeper level, you need to get Brilliant Premium.

[ad_2]
Source link

A week in security (April 1 – April 7)

0
[ad_1]

A list of topics we covered in the week of April 1 to April 7 of 2024

Last week on Malwarebytes Labs:

Stay safe!


Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.


[ad_2]
Source link

Gemini toggle finally in the works for the Android version of the Google app

0
[ad_1]

Google keeps working on improving its app for Android and iOS. Now, Android Police reports that the company is developing a new toggle to switch between Search and Gemini AI for Android. The toggle already exists in the iOS version, and it’s long overdue for the Android version of the app.

Google working on a toggle for Gemini for its Android app


So far, generative AI has made its way into multiple Google services, including Gmail. Recently, the Google app on iOS got a useful toggle that allows you to switch between a standard search and using Gemini AI. However, the Android app doesn’t have the toggle.

This might change soon though, based on evidence found within an under-development version of the app. Leaker AssembleDebug has found the new toggle in the Google app for Android. The version of the app isn’t clear, but screenshots and videos show it works similarly to the iOS version.

So far, it is unclear when the toggle will be officially released. It could take weeks or even months for Google to refine it. Firstly, users on the beta version of the Google app should be getting a feel of it.

As for right now, Android users can access Gemini through the standalone app, while iOS users can access it directly via the Google app.


[ad_2]
Source link

Cloudflare Acquires Baselime to Enhance Serverless Performance

0
[ad_1]

Cloudflare has announced its acquisition of Baselime, a pioneering observability platform designed to simplify the complexities of serverless application development.

This acquisition marks a milestone in Cloudflare’s journey towards creating a more intuitive and efficient cloud computing environment.

It leverages Baselime’s innovative approach to solving the behavior of distributed systems.

Revolutionizing Serverless Computing

The cloud computing paradigm has radically transformed over the past few years, with serverless architectures taking center stage.

This shift has enabled developers to build applications with remarkable speed and flexibility, eliminating the need to manage underlying infrastructure.

Cloudflare has been at the forefront of this revolution, offering services that simplify the development process for serverless applications.

However, the adoption of serverless technologies has introduced new challenges, particularly in understanding and managing the behavior of distributed systems.

Baseline was founded to address these challenges, providing developers with the tools to build, ship, and learn from their serverless applications effectively.

Cloudflare recently tweeted that they have integrated Baselime into their developer ecosystem.

A Synergistic Partnership

Cloudflare and Baselime’s synergy is evident in their commitment to enhancing the developer experience in the cloud.

Document
Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Cloudflare’s extensive portfolio of cloud computing services, including Workers, D1, R2, Queues, KV, Durable Objects, and AI, complements Baselime’s observability platform, which is designed to provide deep insights into the behavior of cloud applications.

By integrating Baselime’s capabilities into the Cloudflare ecosystem, developers will access built-in observability for every aspect of their serverless applications, from Workers to AI calls.

This integration promises to streamline the development process, enabling developers to detect, troubleshoot, and resolve issues in production quickly.

Core Concepts Behind Baselime’s Success

High Cardinality and Dimensionality

Baselime’s approach to observability is built on high cardinality and dimensionality, allowing developers to navigate their applications’ complexities easily.

Baseline offers a comprehensive view of application behavior by enabling detailed analysis of logs and distributed tracing with OpenTelemetry, facilitating faster and more accurate resolution of issues.

OpenTelemetry Integration

The adoption of OpenTelemetry, a set of standards for instrumenting applications, has been a game-changer for Baselime.

This integration gives developers a holistic view of their applications, from HTTP API performance to database query efficiency.

Cloudflare’s commitment to embedding OpenTelemetry directly into its Workers’ runtime further enhances the observability capabilities available to developers.

Figure 1Baselime is OpenTelemetry native, and it is built from the ground up to leverage OpenTelemetry data.
Baselime is a native OpenTelemetry built from the ground up to leverage OpenTelemetry data.

At the heart of Baselime’s philosophy is the belief that observability should not only be about collecting data but also about improving the developer experience.

By offering an exploratory solution that surfaces insights and facilitates real-time error tracking, Baselime aims to reduce the friction associated with traditional observability tools, making it easier for developers to identify and resolve issues.

As Cloudflare and Baselime embark on this exciting new chapter, the focus remains on pushing the boundaries of modern observability.

Integrating Baselime’s core capabilities into the Cloudflare ecosystem is just the beginning.

Plans include introducing advanced AI capabilities, direct codebase connections, and enhanced observability for large language models.

Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor - Try Here


[ad_2]
Source link

Auto tracking security camera: Explore top options

0
[ad_1]

For optimal security, auto-tracking security cameras are preferred. This exceptional feature offers more details of the incident that happened and the persons involved. But the question is: which security camera should you choose from dozens of options?

In this article, we will explore auto-tracking security cameras and the benefits they offer to help you understand whether you need them or not. We will also share the top picks you can go with for incredible features and surveillance.

What is Auto Tracking Security Camera?

An auto tracking security camera is equipped with a special feature called auto-tracking. It can automatically detect persons, pets, and vehicles using advanced sensors and algorithms.
After detection, it starts tracking the movement. It captures the object’s movement within its field of view so you can understand what happened.

Some PTZ cameras can pan and tilt according to the object’s movement. They cover a wider area than normal cameras and reduce blind spots.

Benefits of Using Auto Tracking Security Camera

Auto-tracking cameras are preferred due to the following benefits.

Enhanced Surveillance Coverage

Auto-tracking cameras can cover a wider area and track every movement of the object. They focus on the right thing and offer better surveillance of the area.

If there is a PTZ feature, the cameras can rotate left, right, up, and down to a certain extent. They can rotate along with the object and capture more details of its movement.

If you install auto-tracking PTZ cameras, you will need fewer cameras than normal cameras. Some cameras even have an auto-patrol option that automatically rotates the camera between certain points.

Improved Accuracy

The cameras can move with the object to capture every detail of its movement. They reduce the blind spots, which is the common reason for no detection.
They are equipped with advanced sensors and algorithms. So they can accurately detect the movement and start tracking.

Active Monitoring and Real-time Response

Auto-tracking cameras capture everything during the day and night. They also have color night vision or black-and-white to offer clear videos in low-light conditions.

You can actively monitor the movement of objects in the area. They accurately detect moving objects and send instant alerts to your device. You can check the live preview of the camera from any location and anytime through your smartphone.

Improved Incident Response Capabilities

After detecting any object, you get a notification in real-time. It is possible to prevent incidents and take action at the right time.

The cameras also have warning systems. They can turn on spotlights and ring the siren to deter intruders. Moreover, you can also talk to the person in front of the camera through two-way audio. There are microphones and speakers in the camera that facilitate communication through mobile applications.

Reolink Innovation in Auto Tracking Security Camera

Reolink has taken auto-tracking to the next level. They have introduced three tracking modes in their certain cameras.

The first mode is Digital Tracking. The camera tracks the object when it is within the range of the wide-angle lens. It does not pan or tilt if the object moves out of the range. It is recommended for a small area with a field of view less than 100⁰.

The second mode is Digital Tracking First. The camera starts to pan when the object reaches the edge of the wide-angle lens. It is recommended for large areas with more than 100⁰ field of view and within a 10m distance.

The third mode is PT Tracking First. The camera starts to pan and tilt when the object reaches the edge of the telephoto lens. It keeps the object at the center of the view. It is suitable for areas with more than 100⁰ field of view and within 10-15m distance.

Best Auto Tracking Security Camera: Unveiling the Top Models

Wireless Auto Tracking Security Camera – Argus Track

Reolink Argus Track is a 4K battery/solar-powered camera with auto-zoom. It tracks the motion of moving objects and zooms into them automatically to capture close-up views and important details.

You can see the normal and zoomed tracking video on the screen. Its PTZ offers 355⁰ pan and 50⁰ tilt, and 6X zoom for intricate details. Even at night, it captures true colors with optimal clarity.

It is a dual-band Wi-Fi camera for a smooth and stable viewing experience. It has a built-in rechargeable battery, so you can use the camera anywhere. It can also be connected to a solar panel and work as a standalone device.

Pros:

– Accurate detection of persons, vehicles, and pets
– Instant alerts on your devices
– Double-warning system to deter intruders
– 355⁰ pan, 50⁰ tilt, and 6X hybrid zoom; a perfect PTZ camera
– 10 minutes of solar charge offers 24 hours of uninterrupted performance
– Compatible with Google Home

Cons:

– Not IP67 rated but still weatherproof for harsh conditions

Auto Tracking Outdoor Security Camera – E1 Outdoor Pro

Reolink E1 Outdoor Pro is a 4K Wi-Fi 6 PTZ camera. Its Wi-Fi 6 compatibility ensures low latency, super-fast transfer, and higher stability.

It offers 4K clear videos and 3X zoom to unveil intricate details. Its 355⁰ pan and 50⁰ tilt cover a wider area. It can do auto-tracking and capture every movement of the object. It also allows you to adjust the pan and tilt manually.

Pros:
– Excellent colors and clarity at night
– Equipped with spotlights and a siren to prevent theft
– Real-time alerts and audio communication
– Customized motion zones to send accurate alerts

Cons:
– Requires a power cord (DC), so it is not suitable for places without power supply outlets nearby

Reolink image 873984378343

Auto Tracking Security Camera System – RLK12-800WTM4

RLK12-800WTM4 is a complete auto-tracking security camera system with four cameras and one NVR.

All cameras offer 4K videos with normal and zoomed views. They use dual-band Wi-Fi for a smoother visual experience.

The NVR has 2TB storage, which can be expanded to 16 TB. It can connect up to 12 cameras, which makes scaling easier.

Pros:
– Covers a wider area
– Dual-tracking of the object for normal and close-up view
– Gives clear videos at night through color night vision
– Stable and fast dual-band Wi-Fi
– Secure storage

Cons:
– Not Wi-Fi 6, but it offers incredible speed and stability

Reolink image 873984378341

FAQs

1. Are all PTZ cameras auto-tracking?

No, not all PTZ cameras have auto-tracking. The PTZ of some cameras has to be adjusted manually. It is better to look for the auto-tracking feature before buying.

2. What is intelligent tracking on a security camera?

Intelligent tracking uses advanced algorithms. It uses AI to detect objects and distinguish between persons, vehicles, and pets. After detection, it starts tracking the object and sends an instant alert to devices.

3. What is auto-tracking mode?

The auto-tracking mode automatically detects the movement of objects. It follows the movement within its field of view and captures every detail.

Conclusion

Auto-tracking security cameras are ideal for optimal surveillance and security. They can detect the motion of objects and start tracking movement. You can see the details of every movement along with instant alerts on the devices. They can cover a wider area and offer fine details of the object through zoom. They can also deter intruders and help you take action at the right time. Instead of a normal camera, you should go with auto-tracking. We have shared some of the best auto-tracking cameras you can select for incredible features and performance.


[ad_2]
Source link

Spotify testing a fancy AI playlist feature that will let AI pick songs for you based on a prompt

0
[ad_1]
Generative AI is the trend these days, and for around a year and a half, the tech has been making its way into apps, phones, and what-have-you. Now, AI is also getting added to Spotify, and the tech will be helping you make playlists with a prompt, reports Android Authority.

Spotify testing generative AI to help you with playlist


The new feature is in its beta testing period and is currently available only to Premium users in Australia and the UK. Spotify announced the feature for Premium users on April 7. The new capability will allow you to create playlists with a prompt.

Examples of prompts include “relaxing music to tide me over during allergy season” and “a playlist that makes me feel like the main character”. As you can see, those are far from simple commands, and it would be very interesting what AI can include in such playlists.


Prompts for the AI can consist of places, animals, activities, colors, emojis, and even movie characters. The best prompts combine moods, artists, genres, and decades. The playlists can be further refined with follow-up prompts. Of course, Spotify has measures to prevent offensive prompts, but at this point, it is not clear what those are.

For now, the launch is in beta, so don’t get too hyped that it will come to you soon. We do hope more markets will be getting this fun and useful feature soon though, but Spotify has not disclosed a timeline for its release just yet.


[ad_2]
Source link

Microsoft Two-Step Phishing Attack LinkedIn Users

0
[ad_1]

The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly used for work communication. Their integration creates cybersecurity vulnerabilities. 

Threat actors can target employees on social media using their accounts accessed from work devices.

These accounts act as attack vectors, allowing unauthorized access to the organization’s systems. 

– Advertisement –

A new LinkedIn threat combines breached users’ accounts and an evasive 2-step phishing attack.

A recent Python-based infostealer called Snake targets Facebook users with malicious messages.

By tricking users into downloading malware, Snake steals sensitive browsing data to hijack accounts. 

It highlights how social media is a potential attack vector for stealing credentials and compromising corporate systems. 

“Sales Proposal” Office Word document hosted on onedrive.live.com
“Sales Proposal” Office Word document hosted on onedrive.live.com

LinkedIn is a social media platform for professional networking that is vulnerable to attacks due to the abundance of publicly available user data. 

Attackers can harvest email addresses for surveys and use fake profiles to deliver malware through phishing attacks. Perception Point recently discovered a new attack that combines compromised user accounts with a 2-step phishing scheme to bypass detection. 

Document
Run Free Threat Scan on Your Mailbox to Stop Phishing

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Compromised LinkedIn accounts had been exploited to launch social engineering attacks. The attackers sent messages to the victim’s network, pretending to be a trusted connection (1st degree). 

An example of a deceptive message from a compromised account
An example of a deceptive message from a compromised account

The messages contain a malicious link disguised as a legitimate OneDrive document link, often using the lure of a confidential project to trick the victim into clicking it, leading to an account takeover. 

Attackers use a hidden JavaScript payload that shows fake protection DDoS display screen
Attackers use a hidden JavaScript payload that shows fake protection DDoS display screen

Phishing actors utilize a two-step attack. First, they trick victims into clicking a URL that leads to a legitimate OneDrive page hosting a malicious Word document. 

Free Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register for Free

Second, the document embeds a URL redirecting victims through a fake Cloudflare verification prompt before landing on a phishing webpage designed to steal Microsoft 365 credentials. 

3rr0r Hun73r – the threat actor behind the phishing website
3rr0r Hun73r – the threat actor behind the phishing website

The phishing page’s HTML code reveals it originates from a group called “3rr0r Hun73r” that creates and sells phishing kits. 

Social media’s popularity creates a vulnerability for enterprises where hackers exploit employees’ social media use within work browsers to steal personal and corporate data. 

Secure your emails in a heartbeat! Take our free 30-second assessment and get matched with your ideal email security vendor.


[ad_2]
Source link

Sunbird returns to allow Android users to use iMessage features including blue bubbles

0
[ad_1]
Back in November, the Sunbird messaging app, which powered the Nothing Chats messaging app, shut down due to security concerns. The Sunbird app allowed Android users to use iMessage for messaging even down to having blue bubbles, high-quality images, read receipts, typing indicators, and more. While Sunbird promised users that they would have end-to-end encryption for user messages and files, users’ Apple login info was not encrypted obviously creating a huge security concern.
With 630,000 files vulnerable to this exploit, Sunbird decided to halt all of its services including its Play Store app. But Sunbird is re-launching its iMessage for Android app. In a press release, Sunbird announced that its messaging app has been relaunched and 165,000 Android users are on the waitlist. A small number of invitations have been disseminated.
Video Thumbnail

Sunbird has updated its AV1 Message system which is now AV2 and it is designed to keep messages safe. As Sunbird notes, “Unencrypted messages are never stored anywhere on disk or in a database. When messages are decrypted to be passed to the iMessage and RCS/Google Messages network, they exist in that state only within memory for a limited period of time. In the front-end app, messages are only stored in an encrypted state within the in-app database.”

The bottom line as far as Sunbird is concerned is that “Since November, the Sunbird team has worked to migrate the iMessage implementation off of AV1 to the AV2 architecture. With the adoption of AV2, we believe that we’ve not only resolved the security vulnerabilities previously identified but also provided a secure and privacy-oriented foundation for Sunbird’s iMessage integration moving forward.”

You can join the Waitlist for Sunbird by tapping on this link and pressing on “Join the Waitlist.” You might wonder why this is necessary if Apple will support RCS later this year. The answer is simple; despite Apple adding support for RCS, those using the latter will still have green text bubbles. For those Android users concerned about getting teased for being green, outside of buying an iPhone, using Sunbird might be the next best solution. 
The developers admitted that they could have used the downtime since November to release a quick fix to patch the vulnerabilities. But Sunbird said, “We recognized that such an approach would not align with our core values or our unwavering commitment to the privacy and security of our users.”Sunbird added, “We decided to take the opportunity to thoroughly reevaluate both our technical implementations and our organizational processes from the foundation up. This decision was driven by our belief in the paramount importance of trust and safety in our platform. It reflects our dedication to not just resolving the immediate issues at hand but also to ensuring that we uphold the highest standards of security and privacy for our community in the long term.”

[ad_2]
Source link

US Environmental Protection Agency Allegedly Hacked, 8.5M User Data Leaked

0
[ad_1]
Hacker Claims Breach at US Environmental Protection Agency, Leaks 8.5M User Database

The U.S. Environmental Protection Agency (EPA) is suffering a major data breach allegedly by a hacker known as USDoD. The breach, affecting over 8.5 million users, raises concerns about identity theft, cyber espionage, and the chilling effect on environmental reporting.

The U.S. Environmental Protection Agency (EPA) is facing a significant security breach, carried out by a hacker operating under the alias USDoD. This alleged breach has resulted in the exposure of personal and sensitive information belonging to more than 8.5 million users, containing both customers and contractors.

The data breach brought to light on the morning of Sunday, April 7, 2024. Notably, USDoD has a history of engaging in high-profile data breaches, with previous incidents including the exposure of data from 87,000 members of InfraGard, a sensitive security program funded by the FBI and dedicated to safeguarding critical infrastructure in the United States.

“Hello Breachforums, this is your favorite TA and today Im proud to say that Im releasing epa.gov database of contact list. This is their entire contact of Critical Infra not only for the USA but for the entire globe.”

USDoD

Regarding the alleged data breach at the EPA, the hacker claims that they have successfully compromised and leaked the entire database of the agency. Analysis conducted by Hackread.com indicates that the data provided by USDoD appears to be legitimate; however, conclusive verification can only be provided by the U.S. Environmental Protection Agency.

Hacker Claims Breach at US Environmental Protection Agency,  Leaks 8.5M User Database
USDoD on Breach Forums (Screenshot credit: Hackread.com)

Meanwhile, review of the leaked file reveals a 500MB Zip archive containing three CSV files labeled as “Contact,” “Inter_Contact,” and “Staff.” An assessment of these files reveals the presence of the following information:

Contact File (3,726,130 Records)

  • Zipcodes
  • Full names
  • Fax numbers
  • Phone numbers
  • Email addresses
  • Mailing addresses
  • Country, city, States

Inter_Contact File (9,952,374 Records)

  • Zipcodes
  • Full names
  • Phone numbers
  • Email addresses
  • Email domains
  • Country, City, State
  • Company name and address

Staff File (3,325,973 Records)

  • Zipcodes
  • Fill names
  • Job titles
  • Company names
  • Email addresses
  • Business Addresses
  • Phone numbers
  • Related industries
  • Country, city and States

Following the removal of duplicate records, the total number of accounts involved in the breach stands at nearly 8.5 million, specifically 8,460,182. Hackread.com has notified the U.S. Environmental Protection Agency (EPA) and CISA regarding the data breach. Any response received from either of the agencies will lead to an update to this article.

Hacker Claims Breach at US Environmental Protection Agency,  Leaks 8.5M User Database
Screenshot from the leaked data (Credit: Hackread.com)

The Good and Bad news

The good news amidst this breach is the absence of passwords. However, the seriousness of the situation can be understood by the fact that the leaked data is now circulating within Russian hacker and cybercrime forums. This development not only open doors for state-sponsored cyber espionage but also poses a serious risks of identity theft, phishing scams, and targeted marketing campaigns.

Furthermore, the exposure of information regarding facilities or individuals reporting environmental violations raises serious concerns. Such disclosures could potentially deter future reporting and impede the EPA’s effectiveness in enforcing regulatory measures.

Devastating First Quarter of 2024 for US So Far

The first quarter of 2024 has proven to be quite challenging for the United States, a nation that holds influential global power and consequently becomes an attractive target for cybercriminals. Despite ongoing efforts to strengthen its critical infrastructure, the country has faced a surge in successful cyber attacks, resulting in widespread disruption and compromise.

In January, EquiLend, a prominent financial technology firm, fell victim to a large-scale ransomware attack. As a result, it was confirmed that the incident also led to a data breach, exposing sensitive employee information.

March witnessed the cyber attack from IntelBroker hacker against Acuity Inc., a federal contractor, resulting in the exposure of critical records belonging to U.S. Citizenship and Immigration Services (USCIS) and U.S. Immigration and Customs Enforcement (ICE). Although initially denied, Acuity Inc. eventually acknowledged the hack.

In February, the same hacker targeted the security of Los Angeles International Airport, compromising the personal data of 2.5 million private plane owners. Shortly thereafter, in March, American Express disclosed a significant data breach involving third-party contractors, impacting its cardholders.

The latest alleged data breach occurred on April 4, 2024, when the IntelBroker hacker leaked personal data belonging to over 22,000 Home Depot employees on BreachForums.

  1. Data Sec: Congress Bans Staff Use of Microsoft’s AI Copilot
  2. US, China Exposed Most Databases Among 308,000 Found
  3. Sony Data Breach via MOVEit Flaw Affects Thousands in US
  4. Vietnamese DarkGate Malware Targets META Accounts in US
  5. Adobe ColdFusion Flaw Used by Hackers to Access US Govt Servers

[ad_2]
Source link