Phishers who hit Twilio and Cloudflare stole 10k credentials from 136 others
Already regarded among the most advanced, the attacks were also done at a massive scale. Enlarge / This is definitely not a Razer mouse—but you get the idea. (credit: calvio via Getty Images) Two weeks ago, Twilio and Cloudf.....»»
Thief who stole $2 million of Apple gear faces a decade in prison
A Nashua man hired to transport $2 million worth of iPhones, iPads, and more Apple devices for a customer, has pleaded guilty to taking bribes to fake documents and reroute the shipment.Apple Pheasant Lane in NashuaAccording to the US Attorney's Offi.....»»
Cloudflare joins forces with Databricks to enable organizations collaborate on live data
Cloudflare has partnered with Databricks to enable organizations to safely, simply, and affordably share and collaborate on live data. With Cloudflare and Databricks, joint customers can eliminate the complexity and dynamic costs that stand in the wa.....»»
Compromised ChatGPT accounts garner rapid dark web popularity
Compromised credentials were found within the logs of info-stealing malware traded on illicit dark web marketplaces over the past year, according to Group-IB. The number of available logs containing compromised ChatGPT accounts reached a peak of 26,8.....»»
Zeera launches new MagSafe case with magnetic kickstand [Hands-on]
Zeera continues its streak of producing high-quality accessories for your Apple products. They stole the show earlier this year with the MagSafe Duo alternative, the 3 in 1 MegFold. The MegFold was less than half the price of the MagSafe Duo while a.....»»
The 6 biggest iOS 17 features that Apple stole from Android
Apple announced iOS 17 last week, with some cool new features coming later this year. But a few of those things will look very familiar to Android users......»»
Japan’s Largest Manga Piracy Site Shuts Down Following Cloudflare Probe
Japan's largest manga piracy site 13DL is no more. The site closed its doors shortly after a DMCA subpoena required CDN provider Cloudflare to uncover the identity of the site's operator. Anti-piracy group CODA says that Cloudflare has yet to hand o.....»»
AirTags reveal officials in Mexico stole items donated for earthquake relief in Turkey
Earlier this year, Reuters published an excellent report exposing the false recycling practices of Dow Inc. and the Singapore government using Apple’s AirTag item tracker. In a similar vein, journalist Pamela Cerdeira has now shared a new video in.....»»
Share passwords on iPhone: How to use Family Passwords in iOS 17
iCloud Keychain gets a major improvement with iOS 17 – the ability to seamlessly share credentials with anyone. Follow along for a look at how to share passwords on iPhone in iOS 17 with the new iCloud Keychain feature. more… The post Share pa.....»»
Germany returns "stolen" dinosaur fossil to Brazil
A fossil from a rare dinosaur that roamed South America 110 million years ago has been returned to Brazil from Germany, ending a diplomatic spat triggered by charges that researchers stole it......»»
Pandemic lessons: More health workers, less faxing—an Ars Frontiers recap
Amid science and tech triumphs, basic infrastructure problems hurt COVID responses. Our panel on pandemic lessons included Dr. Jennifer Nuzzo (center) and Dr. Caitlin Rivers (right). In many ways, modern advancements stole the show.....»»
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware
"Operation Triangulation" stole mic recordings, photos, geolocation, and more. Enlarge Moscow-based security firm Kaspersky has been hit by an advanced cyberattack that used clickless exploits to infect the iPhones of s.....»»
Kremlin says NSA and Apple are behind “clickless” exploits hitting Kaspersky iPhones
"Operation Triangulation" stole mic recordings, photos, geolocation, and more. Enlarge Moscow-based security firm Kaspersky has been hit by an advanced cyberattack that used clickless exploits to infect the iPhones of s.....»»
Infosec products of the month: May 2023
Here’s a look at the most interesting products from the past month, featuring releases from: Aqua Security, Axiado, Bitwarden, Cloudflare, ComplyAdvantage, Dashlane, Delinea, Enzoic, Feedzai, Immersive Labs, Intruder, Nebulon, NETSCOUT, Neurotechno.....»»
Former Tesla Employee Accused Of Leaking Thousands Of Company Files
A former Tesla employee allegedly stole gigabytes of files, including customer and employee data, from the car maker and leaked them to the press. A former Tesla em.....»»
Phishers use encrypted file attachments to steal Microsoft 365 account credentials
Phishers are using encrypted restricted-permission messages (.rpmsg) attached in phishing emails to steal Microsoft 365 account credentials. “[The campaigns] are low volume, targeted, and use trusted cloud services to send emails and host conte.....»»
Keeper can now automatically change up your passwords
Keeper's new Password Rotation feature ensures your credentials for popular enterprise services remain fresh......»»
Phishing campaign targets ChatGPT users
A clever phishing campaign aimed at stealing users’ business email account credentials by impersonating OpenAI, the company behind the ChatGPT chatbot, has been spotted by Inky researchers. The attack ChatGPT has quickly gained popularity and i.....»»
New infosec products of the week: May 19, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Bitwarden, Cloudflare, ComplyAdvantage, Enzoic, Neurotechnology, Nozomi Networks, and Satori. ComplyAdvantage Fraud Detection identifies and prevents transac.....»»
Concentric AI unveils deep-learning driven detection capabilities
Concentric AI announced a deep-learning driven detection capabilities to find any type of hardcoded secrets and key credentials (e.g. API keys, encryption keys, tokens, passwords, etc.) in today’s most popular enterprise on-premise and cloud data r.....»»
Infamous cybercrime marketplace offers pre-order service for stolen credentials
Infostealer malware, which consist of code that infects devices without the user’s knowledge and steals data, remains widely available to buy through underground forums and marketplaces, with the volume of logs, or collections of stolen data, avail.....»»