Tag: keys

  • Slashdot: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days

    Source URL: https://it.slashdot.org/story/25/01/14/0141238/ransomware-crew-abuses-aws-native-encryption-sets-data-destruct-timer-for-7-days?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days Feedly Summary: AI Summary and Description: Yes Summary: The emergence of the ransomware group Codefinger highlights a novel and dangerous method of exploiting AWS S3 buckets by using compromised AWS keys and AWS’s SSE-C (Server-Side Encryption with…

  • Rekt: Moby Trade – Rekt

    Source URL: https://www.rekt.news/mobytrade-rekt Source: Rekt Title: Moby Trade – Rekt Feedly Summary: When your private keys become the white whale, who’s really hunting whom? Moby Trade loses roughly $1 million to a compromised key, while white hats rescue $1.47M from the depths. Some lessons of the sea only need to be learned once. AI Summary…

  • Simon Willison’s Weblog: Codestral 25.01

    Source URL: https://simonwillison.net/2025/Jan/13/codestral-2501/ Source: Simon Willison’s Weblog Title: Codestral 25.01 Feedly Summary: Codestral 25.01 Brand new code-focused model from Mistral. Unlike the first Codestral this one isn’t (yet) available as open weights. The model has a 256k token context – a new record for Mistral. The new model scored an impressive joint first place with…

  • The Register: Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI

    Source URL: https://www.theregister.com/2025/01/13/microsoft_sues_foreignbased_crims_seizes/ Source: The Register Title: Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI Feedly Summary: Crooks stole API keys, then started a hacking-as-a-service biz Microsoft has sued a group of unnamed cybercriminals who developed tools to bypass safety guardrails in its generative AI tools. The tools were used to create harmful…

  • The Register: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

    Source URL: https://www.theregister.com/2025/01/13/ransomware_crew_abuses_compromised_aws/ Source: The Register Title: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days Feedly Summary: ‘Codefinger’ crims on the hunt for compromised keys A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up…

  • Schneier on Security: Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme

    Source URL: https://www.schneier.com/blog/archives/2025/01/microsoft-takes-legal-action-against-ai-hacking-as-a-service-scheme.html Source: Schneier on Security Title: Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme Feedly Summary: Not sure this will matter in the end, but it’s a positive move: Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed to allow the creation of harmful and illicit…

  • Hacker News: Superior Internet Privacy with Whonix

    Source URL: https://www.whonix.org/wiki/Homepage Source: Hacker News Title: Superior Internet Privacy with Whonix Feedly Summary: Comments AI Summary and Description: Yes Summary: Whonix is a privacy-focused operating system that offers robust anonymity and security features, primarily by routing internet traffic through the Tor network. Its architecture and numerous security measures provide advanced protection against various online…