IllNess

joined 2 years ago
[–] IllNess 3 points 1 week ago

I understand parents can't be around their children 24/7. Companies and organizations have a lot of products already to restrict and limit internet access. Schools and libraries should use these tools as they or as their community sees fit.

If you want to compare it to tobacco products, the main difference is to identify as an adult all you need is an ID. One person at the cashier sees it and it's done. Online activity is more personal. It allows companies and social media to be even more toxic to adults by being able to identify adults better.

Also kids, no matter how restricted it is, will smoke if they wanted to. The same will happen with these social media restrictions excepts that adults will suffer. This will be only the beginning. More and more restrictions will come from this. That's just how governments work.

Red flags should go up automatically with these "save the children" laws.

[–] IllNess 13 points 1 week ago (2 children)

Parenting should stay with parents. The more power the government gets, the more they will abuse it. When companies are restricted, they will see this as an opportunity to better identify adults better.

[–] IllNess 1 points 1 week ago

I think Docker had an option to use Apple's VM over the Docker one. I think they were trying to say builtin

[–] IllNess 4 points 1 week ago

You too homie!

[–] IllNess 14 points 1 week ago
[–] IllNess 18 points 1 week ago (4 children)

Why do you have the same handwriting as me?

[–] IllNess 10 points 1 week ago

Java has been around a really long time and I was still surprised how well it did.

I am shocked Fortran didn't do better. I don't code in Fortran. I assumed languages closer machine would do well.

[–] IllNess 32 points 1 week ago (1 children)

By the end of the day, the Greene County Sheriff’s Department charged her and 15 other middle school cheerleaders with disorderly conduct for making and posting the video.

What ever happened to free speech in this country? Fascism.

[–] IllNess 1 points 2 weeks ago

Note: this isn't free but I use 1DM+. It has it's own browser that filters out the videos for download. It won't work with YouTube and a bunch of other websites because Google acts like a little bitch to the developer.

[–] IllNess 10 points 2 weeks ago (1 children)

Why would you allow any outsider to your code without using version control?

[–] IllNess 18 points 2 weeks ago (8 children)

I always thought these were more like walkie talkies for messaging than telephones that you can call anyone.

Like it would be good if cell serivce goes down.

[–] IllNess 40 points 2 weeks ago

You hear that everyone. So for AI to reject your content just put in facts about systemic racism and now you have an AI blocker.

 

The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown request, alleging that it violated its copyright.

 

Researchers Ian Carroll and Sam Curry discovered the vulnerability in FlyCASS, a third-party web-based service that some airlines use to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). KCM is a Transportation Security Administration (TSA) initiative that allows pilots and flight attendants to skip security screening, and CASS enables authorized pilots to use jumpseats in cockpits when traveling.

Definitions:

SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

-Wikipedia

 

North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM privileges using a Windows Kernel exploit.

Citrine Sleet targets financial institutions, focusing on cryptocurrency organizations and associated individuals, and has been previously linked to Bureau 121 of North Korea's Reconnaissance General Bureau.

 

In the watering-hole attacks, threat actors infected two websites, cabinet.gov[.]mn and mfa.gov[.]mn, which belong to Mongolia's Cabinet and Ministry of Foreign Affairs. They then injected code to exploit known flaws in iOS and Chrome on Android, with the ultimate goal of hijacking website visitors' devices.

Definitions:

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected.

-Wikipedia

Whereas zero-days are a class of vulnerability that is unknown to a software developer or hardware manufacturer, an N-day is a flaw that is already publicly known but may or may not have a security patch available.

-Dark Reading

 

cross-posted from: https://infosec.pub/post/16863645

This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code.

Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

 

This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code.

Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

 

Today, the Cybersecurity and Infrastructure Security Agency (CISA) announces its cyber incident reporting form moved to the new CISA Services Portal as part of its ongoing effort to improve cyber incident reporting.

CISA Services Portal

view more: ‹ prev next ›