Kelly Haywood and Gary Adshead report: One of Western Australia’s biggest privacy breaches, which involves the interception of thousands of State Government communications, is under investigation. Nine News revealed on Monday evening that the most sensitive information to be hacked and posted to a public website relates to the management of the Covid-19 crisis in…
Category: Of Note
Iranian Spies Accidentally Leaked Videos of Themselves Hacking
Andy Greenberg reports: WHEN SECURITY RESEARCHERS piece together the blow-by-blow of a state-sponsored hacking operation, they’re usually following a thin trail of malicious code samples, network logs, and connections to faraway servers. That detective work gets significantly easier when hackers record what they’re doing and upload the video to an unprotected server on the open internet….
Inside REvil Extortionist “Machine”: Predictive Insights
A new paper by AdvIntel is out, and it looks at the psychology of REvil, something that it obviously of great interest to me: We have investigated REvil’s discourse and behavior by applying the methodologies and concepts of criminal psychology to identify the group’s unique characteristics revealed by their recent involvement in large, ethically questionable…
A hacker used Twitter’s own ‘admin’ tool to spread cryptocurrency scam
Zack Whittaker reports: A hacker allegedly behind a spate of Twitter account hacks on Wednesday gained access to a Twitter “admin” tool on the company’s network that allowed them to hijack high-profile Twitter accounts to spread a cryptocurrency scam, according to a person with direct knowledge of the incident. The account hijacks hit some of the most prominent…
No-Log VPNs Exposed Users’ Logs and Personal Details for All to See
Ugh. vpnMentor reports: A group of free VPN (virtual private network) apps left their server completely open and accessible, exposing private user data for anyone to see. ….. Each of these VPNs claims that their services are “no-log” VPNs, which means that they don’t record any user activity on their respective apps. However, we found multiple…
Google Cloud steps up privacy, security with Confidential VMs and Assured Workloads
Stephanie Condon reports: Google Cloud on Tuesday announced two new security offerings designed for customers with highly-regulated or sensitive data that requires extra protection in the cloud. The first, Confidential VMs, is the initial product in Google’s Confidential Computing portfolio, which promises to let customers keep data encrypted while in use. The second, Assured Workloads for Government,…