Telnet - User Names & Passwords to 515k Servers, Home Routers, and "Smart" Devices
https://www.zdnet.com/article/hacker...d-iot-devices/
Telnet - User Names & Passwords to 515k Servers, Home Routers, and "Smart" Devices
https://www.zdnet.com/article/hacker...d-iot-devices/
MGM Resorts - Names, Phone Numbers, & Emails of 10.6M Guests, 1600 Passport Numbers Also Exposed
https://www.bbc.com/news/technology-51568885
Department of Defense's Defense Information Systems Agency - 200k Names & Social Security Numbers
https://www.bbc.com/news/technology-51580925
Tesco - 600k Usernames & Passwords for Club Cards
https://www.bbc.com/news/technology-51710687
Network Rail (UK) - 10k Phone Numbers, Email Addresses, DOB's, Travel Data
https://www.bbc.com/news/technology-51682280
Virgin Media - 900k User's Phone Numbers, Email Addresses, & Home Addresses
https://www.bbc.com/news/business-51760510
https://www.marketwatch.com/story/ma...?mod=home-page
Marriot, again - 5.2M names, addresses, phone numbers, birthdays, loyalty information for linked companies like airlines, and room preferences
As long as there's no repercussions for having shit security 'again' is never a surprise.
https://www.washingtonpost.com/techn...dumped-online/
https://www.vice.com/en_au/article/a...-who-employees
https://ent.siteintelgroup.com/Dark-...ed-online.html
Passwords and emails from;
- World Health Organization - 2,732 (48 of those use password as their password)
- The World Bank - 5,120
- Centers for Disease Control and Prevention - 6,857
- National Institutes of Health - 9,938
- The Gates Foundation
- The Wuhan Institute of Virology
Far Right extremists are taking responsibility for the breach.
Anyone have a TL;DR about all the Epstein shit that anonymous is supposedly exposing to the world?
Florida teen arrested in connection with massive Twitter hack
A Florida teen has been arrested in connection with the massive Twitter hack earlier this month that impacted the accounts of Barack Obama, Elon Musk, Kanye West and other high-profile users.
The 17-year-old Tampa resident, who was arrested Friday, was hit with 30 felony charges in connection with the hack, according to Hillsborough State Attorney Andrew Warren.
"These crimes were perpetrated using the names of famous people and celebrities, but they’re not the primary victims here," Warren said in a statement. "This 'Bit-Con' was designed to steal money from regular Americans from all over the country, including here in Florida. This massive fraud was orchestrated right here in our backyard, and we will not stand for that."
Did some digging apparently he did a phone spear phishing attack (I am going to guess it was a fake sms appearing to come from management to coax an employee to give up their credentials), and gained access to internal tools which gives access to twitter accounts. He then used his access to post the bitcoin scam on behalf of celebrities' / politicians and also accessed their DMs.
$50 the feds or cia offer him a job.
Why? His best work wasn't really tech related he just took advantage of poor security and idiots. Great work ethic, but meh sic em boys
Sent from my SM-G975U using Tapatalk
That's generally all it takes
My question is that why does Twitter's internal software allow employees the ability to post tweets on any account? I can understand tools to delete tweets or add specific foot notes saying that the tweet was in violation of rules or adding a fact check, but giving full posting access seems a bit of an oversight.
Major hospital system hit with cyberattack, potentially largest in U.S. history
Computer systems for Universal Health Services, which has more than 400 locations, primarily in the U.S., began to fail over the weekend.A major hospital chain has been hit by what appears to be one of the largest medical cyberattacks in United States history.
Computer systems for Universal Health Services, which has more than 400 locations, primarily in the U.S., began to fail over the weekend, and some hospitals have had to resort to filing patient information with pen and paper, according to multiple people familiar with the situation.
Universal Health Services did not immediately respond to requests for comment, but posted a statement to its website that its company-wide network “is currently offline, due to an IT security issue. One person familiar with the company’s response efforts who was not authorized to speak to the press said that the attack “looks and smells like ransomware.”https://www.nbcnews.com/tech/securit...ystem-n1241254Hackers seeking to deploy ransomware often wait until the weekend, when a company is likely to not have as many technical staff members present.
Two Universal Health Services nurses, who requested to not be named because they weren’t authorized by the company to speak with the media, said that the attack began over the weekend and had left medical staff to work with pen and paper.
One of the nurses, who works in a facility in North Dakota, said that computers slowed and then eventually simply would not turn on in the early hours of Sunday morning. “As of this a.m., all the computers are down completely,” the nurse said.
Another registered nurse at a facility in Arizona who worked this weekend said “the computer just started shutting down on its own.”
“Our medication system is all online, so that's been difficult,” the Arizona nurse said.
Not sure what kinda charges they’d face, but if they ever find the people responsible they should be charged with attempted murder and for actual murder if anyone dies as a result.
Theyre probably not even in north america.
Hospitals have notoriously bad IT security, they pay admins shit and don't have enough to keep up with anything and some of their software is worse then the shit we use at NASA where things can't be fucking updated for 5-10yrs. Probably running shit written in COBAL by some dude who's been dead 20yrs but no one knows it, they don't wanna pay for someone who does, and it works so "Why do we pay you system admins for anyways?"