A Replit employee details a critical security flaw in web apps created using AI-powered app builder Lovable that exposes API keys and personal info of app users
A vulnerability exists in deployed Lovable-generated projects due … Matt Palmer / Matt's Website : Statement on CVE-2025-48757 — On March 20th, 2025, we discovered a critical vulnerability … Jon Vic...
Letter: the US Treasury says China-backed hackers gained access to some Treasury workstations and unclassified docs; a vendor notified it of the hack on Dec. 8
FBI Investigation Underway, China Suspected Huileng Tan / Business Insider : The US Treasury says some computers were breached by China-backed hackers United States Department of the Treasury : Dear C...
Microsoft says Russian hackers have sent “highly targeted spearphishing emails” to thousands of US officials, defense workers, and others during the past week
- Thousands targeted in spearphishing campaign during last week — Hackers said to impersonate Microsoft employees in some emails
Sources: China-linked hackers have broken into a handful of US ISPs in recent months in pursuit of sensitive info, in a campaign investigators call Salt Typhoon
It is latest intrusion into core U.S. infrastructure by entities linked to China — Hackers linked to the Chinese government … X: @dnvolz X: Dustin Volz / @dnvolz : New: Hackers linked to the Chinese...
The US is focusing on blocking North Korea's ability to launder its crypto stolen via cyberattacks, which the US thinks funds North Korea's weapons programs
While there were techies who naively bought the hype that the blockchain and decentralized would magically solve a host of problems, VCs like a16z were never that naive. … X: Jackie Singh / @hackingbu...
The US is focusing on blocking North Korea's ability to launder its crypto stolen via cyberattacks, which the US thinks funds North Korea's weapons programs
The Biden administration is doing more to counter North Korean hackers amid concerns their cryptocurrency heists are powering the country's weapons programs. Mastodon: @Free_Press@mstdn.social and @ca...
Microsoft starts naming threat actor groups after weather events, like typhoon, sandstorm, and blizzard; each name represents a nation state or a motivation
Microsoft has started naming hackers after the weather in a new naming taxonomy update. Hackers will now be named after events like storms …
LastPass says hackers stole a backup copy of users' encrypted and unencrypted vault data using cloud storage keys stolen from a LastPass employee in August 2022
If you have a LastPass account you should have received … Camila Foster / Sammy Fans : Samsung fans using LastPass should know, hackers stolen cloud data Fabian A. Scherschel / The Sleepy Fox : A Chri...
Uber takes some internal systems offline to investigate a network breach; Yuga Labs' Sam Curry says it appears the hacker pretty much has “full access to Uber”
what you need to know Msmash / Slashdot : Uber Investigating Breach of Its Computer Systems Prajeet Nair / BankInfoSecurity.com : Uber Probes Breach After Hacker Boasts About Intrusion Michael Hill / ...
2021 saw 20+ hacks where at least $10M in digital currencies were stolen from a crypto exchange or project, with $100M+ stolen in at least six cases
It's not just lucky investors getting rich from crypto. — Hackers have made off with billions of dollars in virtual assets in the past year … Tweets: @rich_goldberg , @eriksherman , and @kevincollie...