Kontaktdaten erbeutet: Zehntausende BVG-Kunden von Hackerangriff betroffen

My God thank you Underscore, I hope that all of these LinkedIn Bullshitors of French Cyber will all be highlighted, missing more than Saax and I would be totally with angels !
So much history on the internet is hilarious, all this band of fakes, hilarious
Mayke [10/31] - Stealthy hat tricks for the fashion conscious hacker.
Got a new M4 MacBook Air for a personal laptop. The best part about it is getting to test my chezmoi dot files environment from scratch!
It was a lot of work to move to chezmoi, but it has been a huge life saver with all of its built-in templates and scripting. I've done so much that makes my life easier maintaining a shell environment across multiple devices.
I have different profiles for work, personal, and servers. It installs different apps or withholds secrets if need be.
The integration with 1Password is awesome as well. All of my secrets are store in 1P and chezmoi simply pulls them out on my personal systems.
Who says that #AI isn't helping people in real-life situations?
Consider yourself a bad #hacker, breaking in a company #SharePoint server. With #Microsoft #CoPilot, you're able to determine recent #pentesting reports, plain text #passwords and other crucial information for your attack right away. As if you get direct help by an insider. Amazing.
If you find an interesting sensitive file you don't have reading permission for, you can ask CoPilot to show it to you, overriding all the #security permission measures. Even better: this is not even logged as a file access. No need to clean up afterward.
Exactly the software you will need for your work. #Pentester and attackers could not have asked for a better tool. Your victims will pay for this handy service themselves. Great to get that kind of important support by Microsoft.
Read about that on: https://www.pentestpartners.com/security-blog/exploiting-copilot-ai-for-sharepoint/
Made a glitchy, grungy voxel variation upon my black hat hacker pixel art.
Here's the isometric pixel art version:
#TeleMessage, that app used by the #Trump administration to archive Signal messages, has been #hacked. The #hacker managed to get some users' #Signal group chats and messages too. This is a hugely significant #breach not just for those individual customers, but also for the U.S. government more widely. #natsec #nationalsecurity https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/ #government #democracy #trump #hegseth
A russian #hacker group attacked several Romanian government and presidential candidates’ websites on Sunday as the country votes for its next president, #Romanian news outlet G4media reported.
https://www.politico.eu/article/russia-hacker-group-romania-election-day-constitutional-court-vote
New instance, new #introduction.
I'm Luke, a #programmer/ #Hacker. I'm involved with #Parabola #GNU/ #LinuxLibre since 2011 and so contribute to a bunch of upstream projects. The Parabola build server is in my living room. #homelab.
Sort-of on pause co-founding a
#OpenSourceHardware/ #FreeSoftware #coop. Currently working on building a dirt-cheap KVM-over-IP.
Hace 5 años publicamos una reseña sobre la novela de Cory Doctorow @pluralistic que toca temas muy actuales...
‘Little brother’: cuando el futuro se convierte en presente.
#vigilancia #Privacidad #ResistenciaDigital #Hacktivismo #Hacker
https://sursiendo.org/2020/06/little-brother-cuando-el-futuro-se-convierte-en-presente/
What if I told you that #Linux runs 100% of the top 500 #supercomputers, but your friends still think it’s “that #hacker thing that can’t run #games.”
Ist eine ethnische Beurteilung des Chaos anhand eines einzigen Events wie der #Easterhegg wirklich sinnvoll oder nicht vielmehr Teil des gleichen kulturellen Problems? Wann hören wir eigentlich auf, #Hacker nach dem zu beurteilen, wer oder was sie sind oder woher sie kommen, und wann fangen wir endlich an, sie nach dem zu beurteilen, was sie tun? #EH22 #Manifest
We're delighted to welcome Wendy Nather as keynote speaker at our event! A great player in the world of IT security, having been inducted into Europe's Infosecurity Hall of Fame in 2021. We can't wait to hear her!
Seeking a very specific kind of #hacker help here... Does anyone know how to override the temperature limits on this Honeywell Home thermostat?
@deviantollam I've heard you mention it for hotel thermostats - any idea if it can be done for consumer-grade?
Update: answer is here! https://upgradedhome.com/honeywell-thermostat-wont-go-below-70/
Going to write a blog about how I view this as a major turning point in the #hacking subculture. Erik Bloodaxe publicly stated at Summercon #hacker convention in 1992 that ratting out fellow #hackers to the FBI over hacker beef was actually the correct and proper thing to do.
https://phrack.org/issues/40/11
Zwecks Auffindbarkeit ein paar Hastags dazu:
Untersuchte Hersteller: #Huawei #Sungrow #GinlongSolis #Goodwatt #GoodWe #SMA
Allgemein: #PV #WR #Wechselrichter #Solar #Inverter #SunDown #Forescout #China #Hacker #SmartHome #IoT
https://www.forescout.com/research-labs/sun-down-a-dark-side-to-solar-energy-grids/
@bsi
Recommendations
Manufacturers
Development • Devices: holistic security architecture including secure boot, binary hardening, anti-exploitation features, permission separation etc
• Applications: proper authorization checks on web applications, mobile applications and cloud backends
Testing • Regular penetration testing on applications and devices • Consider bug bounty programs
Monitoring Web Application Firewalls Remember that a WAF does not protect against logical flaws
Users
Residential and commercial users • Change default passwords and credentials • Use role-based access control • Configure the recording of events in a log • Update software regularly • Backup system information • Disable unused features • Protect communication connections
Commercial and utility installations (in addition) •
Include security requirements into procurement considerations
• Conduct a risk assessment when setting up devices • Ensure network visibility into solar power systems • Segment these devices into their own sub-networks • Monitor those network segments