Tag: breach

  • The Register: Court docs allege Meta trained its AI models on contentious trove of maybe-pirated content

    Source URL: https://www.theregister.com/2025/01/10/meta_libgen_allegation/ Source: The Register Title: Court docs allege Meta trained its AI models on contentious trove of maybe-pirated content Feedly Summary: Did Zuck’s definition of ‘free expression’ just get even broader? Meta allegedly downloaded material from an online source that’s been sued for breaching copyright, because it wanted the material to train its…

  • Slashdot: See the Thousands of Apps Hijacked To Spy On Your Location

    Source URL: https://yro.slashdot.org/story/25/01/10/0056202/see-the-thousands-of-apps-hijacked-to-spy-on-your-location?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: See the Thousands of Apps Hijacked To Spy On Your Location Feedly Summary: AI Summary and Description: Yes Summary: The report highlights a significant privacy concern involving popular apps that are being exploited to harvest sensitive location data through the advertising ecosystem. This data, which is aggregated by rogue…

  • Hacker News: Candy Crush, Tinder, MyFitnessPal: See the Apps Hijacked to Spy on Your Location

    Source URL: https://www.wired.com/story/gravy-location-data-app-leak-rtb/ Source: Hacker News Title: Candy Crush, Tinder, MyFitnessPal: See the Apps Hijacked to Spy on Your Location Feedly Summary: Comments AI Summary and Description: Yes Summary: The text exposes a significant privacy issue where popular applications are exploited to harvest sensitive location data through advertising networks without user or developer consent. The…

  • Hacker News: See the Thousands of Apps Hijacked to Spy on Your Location

    Source URL: https://www.404media.co/candy-crush-tinder-myfitnesspal-see-the-thousands-of-apps-hijacked-to-spy-on-your-location/ Source: Hacker News Title: See the Thousands of Apps Hijacked to Spy on Your Location Feedly Summary: Comments AI Summary and Description: Yes Summary: The article discusses the alarming exploitation of popular mobile apps by rogue advertisers who harvest sensitive location data without user or developer consent. It highlights how this data…

  • Rekt: Orange Finance – Rekt

    Source URL: https://www.rekt.news/orange-finance-rekt Source: Rekt Title: Orange Finance – Rekt Feedly Summary: First significant hack of 2025. Orange Finance got squeezed for $843.5k after their ‘multi-sig’ turned out to be uni-sig. Their contract is no longer Orange, their security was never golden. Another private key leaks, another protocol rots. AI Summary and Description: Yes Summary:…

  • Wired: Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location

    Source URL: https://www.wired.com/story/gravy-location-data-app-leak-rtb/ Source: Wired Title: Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location Feedly Summary: A hack of location data company Gravy Analytics has revealed which apps are—knowingly or not—being used to collect your information behind the scenes. AI Summary and Description: Yes Summary: The text highlights…

  • Cisco Talos Blog: Do we still have to keep doing it like this?

    Source URL: https://blog.talosintelligence.com/do-we-still-have-to-keep-doing-it-like-this/ Source: Cisco Talos Blog Title: Do we still have to keep doing it like this? Feedly Summary: Hazel gets inspired by watching Wendy Nather’s recent keynote, and explores ways to challenge security assumptions. AI Summary and Description: Yes **Summary:** The text discusses the ongoing challenges in information security as highlighted by expert…

  • Cloud Blog: Get ready for a unique, immersive security experience at Next ‘25

    Source URL: https://cloud.google.com/blog/products/identity-security/unique-immersive-security-experience-coming-to-next-25/ Source: Cloud Blog Title: Get ready for a unique, immersive security experience at Next ‘25 Feedly Summary: Few things are more critical to IT operations than security. Security incidents, coordinated threat actors, and regulatory mandates are coupled with the imperative to effectively manage risk and the vital business task of rolling out…

  • Slashdot: Hackers Are Exploiting a New Ivanti VPN Security Bug To Hack Into Company Networks

    Source URL: https://it.slashdot.org/story/25/01/09/1535218/hackers-are-exploiting-a-new-ivanti-vpn-security-bug-to-hack-into-company-networks?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Hackers Are Exploiting a New Ivanti VPN Security Bug To Hack Into Company Networks Feedly Summary: AI Summary and Description: Yes Summary: Ivanti has disclosed a critical zero-day vulnerability (CVE-2025-0282) in its widely utilized enterprise VPN appliance, which has been exploited to infiltrate the networks of corporate customers. This…

  • The Register: Japanese Police claim China ran five-year cyberattack campaign

    Source URL: https://www.theregister.com/2025/01/09/japan_mirrorface_china_attack/ Source: The Register Title: Japanese Police claim China ran five-year cyberattack campaign Feedly Summary: ‘MirrorFace’ group found ways to run malware in the Windows sandbox, which is worrying Japan’s National Police Agency and Center of Incident Readiness and Strategy for Cybersecurity have confirmed third party reports of attacks on local orgs by…