/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@bleepincomputer

@bleepincomputer
60 posts
2024-07-12
At the time, a Signal employee stated in a reply to a forum post about our story: “The core premise of the article is completely mistaken. The database key was never intended to be a secret.”
2024-07-12 View on X
BleepingComputer

Signal plans to roll out a beta version of its desktop apps that tightens the security of how it stores plain text encryption keys, after downplaying the issue

Signal is finally tightening its desktop client's security by changing how it stores plain text encryption keys for the data store after downplaying the issue since 2018.

2024-07-05
Twilio says that the API endpoint has now been secured and has released new versions of the Authy app.
2024-07-05 View on X
TechCrunch

Twilio says “threat actors” identified its 2FA app Authy users' phone numbers; last week, ShinyHunters claimed to have stolen 33M phone numbers from Twilio

It's not even about the data breaches - although important, Authy also sends data about which websites you're logging into. … X: Matthew Green / @matthew_d_green : The first rule o...

An unauthenticated Authy API endpoint allowed threat actors to feed a massive list of phone numbers to the endpoint and verify if they are registered with the MFA platform. The threat actors claimed to verify over 33 million phone numbers (unconfirmed) used with Authy.
2024-07-05 View on X
TechCrunch

Twilio says “threat actors” identified its 2FA app Authy users' phone numbers; last week, ShinyHunters claimed to have stolen 33M phone numbers from Twilio

It's not even about the data breaches - although important, Authy also sends data about which websites you're logging into. … X: Matthew Green / @matthew_d_green : The first rule o...

2024-07-04
An unauthenticated Authy API endpoint allowed threat actors to feed a massive list of phone numbers to the endpoint and verify if they are registered with the MFA platform. The threat actors claimed to verify over 33 million phone numbers (unconfirmed) used with Authy.
2024-07-04 View on X
TechCrunch

Twilio says “threat actors” identified its 2FA app Authy users' phone numbers; last week, ShinyHunters claimed to have stolen 33M phone numbers from Twilio

Last week, a hacker claimed to have stolen 33 million phone numbers from U.S. messaging giant Twilio.

Twilio says that the API endpoint has now been secured and has released new versions of the Authy app.
2024-07-04 View on X
TechCrunch

Twilio says “threat actors” identified its 2FA app Authy users' phone numbers; last week, ShinyHunters claimed to have stolen 33M phone numbers from Twilio

Last week, a hacker claimed to have stolen 33 million phone numbers from U.S. messaging giant Twilio.

2024-06-22
Penske Automotive and Sonic issued Friday night FORM 8-K filings with the SEC about the attack on CDK, which they are both a customer. Penske's is the same they sent us yesterday. https://sec.gov/... https://sec.gov/...
2024-06-22 View on X
Bloomberg

Source: a group that claims to have hacked car dealership software provider CDK Global has demanded tens of millions of dollars in ransom, and CDK plans to pay

- Eastern European cybercrime group demanding extortion payment  — CDK down for several days as dealerships experience fallout

2024-05-25
Apple wasn't storing deleted iOS photos in iCloud after all - @billtoulas https://www.bleepingcomputer.com/ ... https://www.bleepingcomputer.com/ ...
2024-05-25 View on X
9to5Mac

Apple says that users' deleted photos that resurfaced after installing iOS 17.5 weren't synced to iCloud Photos and could have persisted after restoring backups

what you need to know MacDailyNews : This is why deleted iPhone photos returned to some iOS 17.5 users David Phelan / Forbes : iOS 17.5.1 iPhone Photos Bug: Apple Reveals What Happ...

2024-04-12
OpenTable is adding your first name to previously anonymous reviews - @LawrenceAbrams https://www.bleepingcomputer.com/ ... https://www.bleepingcomputer.com/ ...
2024-04-12 View on X
BleepingComputer

OpenTable plans to display members' first names and profile photos on all past and future reviews, starting on May 22, in a bid to provide more transparency

Lawrence Abrams / BleepingComputer :

2023-09-30
As there is no patch available for the Exim CVE-2023-42115 zero-day, the only mitigation is to restrict access to the server or turn it off.
2023-09-30 View on X
Ars Technica

Researchers report critical vulnerabilities in the Exim mail transfer agent allowing remote code execution; Exim is used by as many as 253K servers

Remote code execution requiring no authentication fixed. 2 other RCEs remain unpatched.  —  Thousands of servers running the Exim mail transfer agent …

A Shodan query shows that are just over 3.5 million Exim servers exposed online, with most of them in the United States, followed by Russia and Germany. [image]
2023-09-30 View on X
Ars Technica

Researchers report critical vulnerabilities in the Exim mail transfer agent allowing remote code execution; Exim is used by as many as 253K servers

Remote code execution requiring no authentication fixed. 2 other RCEs remain unpatched.  —  Thousands of servers running the Exim mail transfer agent …

2023-06-05
Atomic Wallet hacks lead to over $35 million in crypto stolen - @LawrenceAbrams https://www.bleepingcomputer.com/ ...
2023-06-05 View on X
BleepingComputer

Atomic Wallet investigates user reports of compromised accounts and tries to block stolen crypto from being sold; a researcher says the hack could exceed $35M+

The developers of Atomic Wallet are investigating reports of large-scale theft of cryptocurrency from users' wallets, with over $35 million in crypto reportedly stolen.

2023-03-20
A Microsoft spokesperson provided the following statement when asked for more details on the Microsoft Edge Crypto Wallet feature. “At Microsoft, we regularly test new features to explore new experiences for our customers. We look forward to learning and collecting feedback from customers but have nothing further to share at this time.”
2023-03-20 View on X
BleepingComputer

Early screenshots show Microsoft is testing a non-custodial Ethereum crypto wallet built into Edge that lets users send and receive cryptocurrencies and NFTs

2023-03-05
Bing Chat can also assume the role of fictional “celebrities”. Here is Bing Chat talking as Gollum. This took an interesting turn at the end of the conversation. 🤔 https://twitter.com/...
2023-03-05 View on X
BleepingComputer

Bing Chat appears to have a hidden Celebrity mode, in which the chatbot answers questions while impersonating Biden, Trump, Tom Cruise, and other famous people

A secret Bing Chat ‘Celebrity’ mode allows users to instruct the AI to impersonate celebrities, answering questions and talking like the person it imitates.

When imitating politicians and saying negative things about other people, Bing Chat appeared to catch what it was doing and would delete the message.
2023-03-05 View on X
BleepingComputer

Bing Chat appears to have a hidden Celebrity mode, in which the chatbot answers questions while impersonating Biden, Trump, Tom Cruise, and other famous people

A secret Bing Chat ‘Celebrity’ mode allows users to instruct the AI to impersonate celebrities, answering questions and talking like the person it imitates.

Microsoft tried to add safeguards around this feature to prevent Bing Chat from impersonating politicians, heads of state, or activists. https://twitter.com/...
2023-03-05 View on X
BleepingComputer

Bing Chat appears to have a hidden Celebrity mode, in which the chatbot answers questions while impersonating Biden, Trump, Tom Cruise, and other famous people

A secret Bing Chat ‘Celebrity’ mode allows users to instruct the AI to impersonate celebrities, answering questions and talking like the person it imitates.

While this #celebrity mode is still in development, you can enable it in Bing Chat by simply asking about the new bing chat mode. Once enabled you can have it impersonate a wide range of musicians, actors, and athletes to have a conversation as if it was them. https://twitter.com/...
2023-03-05 View on X
BleepingComputer

Bing Chat appears to have a hidden Celebrity mode, in which the chatbot answers questions while impersonating Biden, Trump, Tom Cruise, and other famous people

A secret Bing Chat ‘Celebrity’ mode allows users to instruct the AI to impersonate celebrities, answering questions and talking like the person it imitates.

2023-03-01
As part of today's disclosure, LastPass also released a complete list of the wide and varied data that was accessed by the threat actors. https://twitter.com/...
2023-03-01 View on X
BleepingComputer

LastPass says hackers stole password vault data in 2022 by exploiting an RCE flaw in third-party software to install a keylogger on a DevOps engineer's computer

Lawrence Abrams / BleepingComputer :

2023-02-28
As part of today's disclosure, LastPass also released a complete list of the wide and varied data that was accessed by the threat actors. https://twitter.com/...
2023-02-28 View on X
BleepingComputer

LastPass says hackers stole password vault data in 2022 by exploiting an RCE flaw in third-party software to install a keylogger on a DevOps engineer's computer

LastPass revealed more information on a “coordinated second attack,” where a threat actor accessed and stole data …

2023-02-18
SCOOP: GoDaddy says unknown threat actors have installed malware on its hosting servers and stolen source code after breaching its cPanel shared environment - @serghei https://www.bleepingcomputer.com/ ...
2023-02-18 View on X
BleepingComputer

GoDaddy discovered a multiyear security breach in early December 2022 in which unknown attackers stole some source code and installed malware on its servers

Web hosting giant GoDaddy says they suffered a breach where unknown attackers have stolen source code and installed malware …

2023-01-21
The attacker started stealing data using one of T-Mobile's APIs around November 25, 2022. T-Mobile detected the malicious activity on January 5, 2023, and cut off the threat actor's access to the API one day later.
2023-01-21 View on X
Bloomberg

SEC filing: T-Mobile says a hacker stole the data of ~37M customers, including names, addresses, and phone numbers, but not passwords, SSNs, or credit cards

here's what to do if you're ever worried that your data was leaked Chris Velazco / Washington Post : Here's what to do if you think you're affected by T-Mobile's latest data breach...