Danielle Goodman reports: Personal data from current and former students in Boone and Kenton County school districts may have been accessed and copied in cyber attacks earlier this month, according to school district announcements. School district officials said the data breaches appear to have stemmed from phishing schemes, where cybercriminals trick users into providing sensitive…
Author: Dissent
Conversation with a “Nam3L3ss” Watchdog: Preface
This is a multi-part interview with the individual known as “Nam3L3ss,” who leaked more than 100 databases on a popular hacking forum and will soon be leaking many more. In Part 1, he answers some questions about his background and what motivated him to do what he does. In Part 2, we talk a bit…
Conversation with a “Nam3L3ss” Watchdog, Part 1: Background
This is a multi-part interview with the individual known as “Nam3L3ss” who leaked more than 100 databases on a popular hacking forum and will soon be leaking many more. Read the Preface. In this part, we talk about his background and what motivated him to do what he does. In Part 2, we talk about…
Conversation with a “Nam3L3ss” Watchdog, Part 2: Methods
This is a multi-part interview with the individual known as “Nam3L3ss” who leaked more than 100 databases on a popular hacking forum and will soon be leaking many more. Read the Preface. In Part 1, he answered some questions about his background and what motivated him to do what does. In this part, we talk…
Conversation with a “Nam3L3ss” Watchdog, Part 3: Ethics and Goals
This is a multi-part interview with the individual known as “Nam3L3ss” who leaked more than 100 databases on a popular hacking forum and will soon be leaking many more. Read the Preface. In Part 1, we talked about his background and what motivated him to do what he does. In Part 2, we talked about…
New FlowerStorm Microsoft phishing service fills void left by Rockstar2FA
Bill Toulas reports: A new Microsoft 365 phishing-as-a-service platform called “FlowerStorm” is growing in popularity, filling the void left behind by the sudden shutdown of the Rockstar2FA cybercrime service. First documented by Trustwave in late November 2024, Rockstar2FA operated as a PhaaS platform facilitating large-scale adversary-in-the-middle (AiTM) attacks targeting Microsoft 365 credentials. The service offered advanced evasion mechanisms, a user-friendly…