Category: Data

  • F-117 Nighthawk Flight Manual Added to the List of War Thunder Leaked Documents  

    The list of export-restricted military documents leaked by players of the popular free-to-play game War Thunder just got longer. The flight manual for the F-117 Nighthawk, a stealth aircraft manufactured by Lockheed Martin, was posted on the War Thunder official site forum, a place for community discussion about various War Thunder related topics like in-game…

  • 38 TB of Private Company Data was Leaked by Microsoft AI Researchers

    38 Terabytes. That’s the amount of storage it takes to store 7600 hours of HD video, enough to watch for 316 days without repeating anything. It’s also the amount of private company data that Microsoft AI researchers accidentally exposed, including over 30,000 internal Teams messages, according to cloud security company Wiz. The Microsoft Azure Leak…

  • Apple Releases Patch for Zero-Day iOS, macOS Vulnerabilities BLASTPASS

    Apple has just rolled out a crucial security update for iPhones and iPads in response to the discovery of newly identified vulnerabilities CVE-2023-41064 and CVE-2023-41061 in their system software. These vulnerabilities, also known as “BLASTPASS,” were found by researchers at the University of Toronto’s Citizen Lab, who revealed that the flaw was actively being exploited…

  • Prompt Injection: Generative AI’s Largest Vulnerability

    With the popularization of generative AI tools like ChatGPT, information has become increasingly easy to retrieve. Ask it anything, and ChatGPT will respond to the best of its ability, modifying itself to your prompt’s specifications as best it can. The more detailed the prompt, the more specific of a response you can get from an…

  • Protecting Your MSSQL Databases: Defending Against the FreeWorld Ransomware Threat

    A new cyberattack campaign named “DB#JAMMER” has emerged, specifically targeting exposed Microsoft SQL Server (MSSQL) databases. The implications of this campaign are nothing short of severe, especially for organizations relying on this technology, as DB#JAMMER is no ordinary cyberattack; it’s a well-choreographed assault that employs intricate tactics, including relentless brute-force attacks aimed at breaching MSSQL…

  • Overview: Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors and come in many different forms. In this instance, we see a phishing scam targeting PayPal users with what appears to be a link that’s supposed to “reactivate your account.” PayPal says that our account…

  • Google Dorking: How a Simple Google Search Can Expose Your Sensitive Data

    Google Dorking leverages search operators to narrow down results. While useful, it can also expose vulnerabilities, as demonstrated by Hamid Firoozi’s breach of a dam’s computer system. To mitigate such risks, conduct security audits, restrict search engine access, and educate your team. Netizen offers cybersecurity solutions to safeguard your digital infrastructure.

  • FDA plans to improve medical device cybersecurity

    The US Food and Drug Administration (FDA) plans to tackle security issues related to medical devices and has released a plan of action it means to implement in the near future. Read More………….

  • U.S. and U.K. Warn of Cybersecurity Threat From Russia

    LONDON — The United States and Britain on Monday issued a first-of-its-kind joint warning about Russian cyberattacks against government and private organizations as well as individual homes and offices in both countries, a milestone in the escalating use of cyberweaponry between major powers. Read More………

  • That Time Of Year Again: Cisco Systems Releases Its Annual Cybersecurity Report

    Last week, Cisco Systems released the 2018 edition of its Annual Cybersecurity Report (ACR) you can find here. The report, compiled from a survey of 3,600 chief security officers (CSOs) and security operations leaders from across the globe, seeks to highlight emerging threats in the rapidly evolving landscape of cybersecurity. With 53% of all attacks…