Symantec says NSA’s Equation group tools were hacked by Buckeye in 2016 way before they were leaked by Shadow Brokers in 2017

In a report released yesterday by Symantec, the popular cybersecurity software and services company, it revealed that Chinese intelligent agents acquired the National Security Agency’s hacking tools, which they repurposed in 2016 and used them to… Continue reading Symantec says NSA’s Equation group tools were hacked by Buckeye in 2016 way before they were leaked by Shadow Brokers in 2017

Microsoft Build 2019: Microsoft showcases new updates to MS 365 platfrom with focus on AI and developer productivity

At the ongoing Microsoft Build 2019 conference, Microsoft has announced a ton of new features and tool releases with a focus on innovation using AI and mixed reality with the intelligent cloud and the intelligent edge. In his opening keynote, Microsoft… Continue reading Microsoft Build 2019: Microsoft showcases new updates to MS 365 platfrom with focus on AI and developer productivity

Attackers wiped many GitHub, GitLab, and Bitbucket repos with ‘compromised’ valid credentials leaving behind a ransom note

Last week, Git repositories were hit by a suspicious activity where attackers targeted GitHub, GitLab, and Bitbucket users, wiping code and commits from multiple repositories. The surprising fact is that attackers used valid credentials, i.e. a passwor… Continue reading Attackers wiped many GitHub, GitLab, and Bitbucket repos with ‘compromised’ valid credentials leaving behind a ransom note

DuckDuckGo proposes “Do-Not-Track Act of 2019” to require sites to respect DNT browser setting

DuckDuckGo, the browser known for its privacy protection policies, has proposed draft legislation which will require sites to respect the Do Not Track browser setting. Called, the “Do-Not-Track Act of 2019”, this legislation will mandate we… Continue reading DuckDuckGo proposes “Do-Not-Track Act of 2019” to require sites to respect DNT browser setting

DockerHub database breach exposes 190K customer data including tokens for GitHub and Bitbucket repositories

On Friday, DockerHub informed its users of a security breach in its database, via email written by Kent Lamb, Director of Docker Support. The breach exposed sensitive information including some usernames and hashed passwords, as well as tokens for GitH… Continue reading DockerHub database breach exposes 190K customer data including tokens for GitHub and Bitbucket repositories

Listen: We discuss what it means to be a hacker with Adrian Pruteanu [Podcast]

With numerous high profile security breaches in recent years, cybersecurity feels like a particularly urgent issue. But while the media – and, indeed, the wider world – loves stories of modern vulnerabilities and mischievous hackers, there&… Continue reading Listen: We discuss what it means to be a hacker with Adrian Pruteanu [Podcast]

Stripe updates its product stack to prepare European businesses for SCA-compliance

On Tuesday, Stripe, the online payments platform provider, announced that it has upgraded its products to be compliant with Strong Customer Authentication (SCA) under the second Payment Services Directive (PSD2). This announcement comes just after Stri… Continue reading Stripe updates its product stack to prepare European businesses for SCA-compliance

Liz Fong-Jones on how to secure SSH with Two Factor Authentication (2FA)

Over the weekend, Liz Fong-Jones, a Developer Advocate at honeycomb.io posted her experience with the security hardening of honeycomb.io’s infrastructure. In her post, on GitHub, Liz explains how SSH keys, which provide authentication between hos… Continue reading Liz Fong-Jones on how to secure SSH with Two Factor Authentication (2FA)

Hacker destroys Iranian cyber-espionage data; leaks source code of APT34’s hacking tools on Telegram

On Wednesday, ZDNet reported that hacker with the online name Lab Dookhtegan leaked a set of hacking tools belonging to Iran’s espionage groups, often identified as the APT34, Oilrig, or HelixKitten, on Telegram. The leaks started somewhere in th… Continue reading Hacker destroys Iranian cyber-espionage data; leaks source code of APT34’s hacking tools on Telegram

Keybase’s new proof system is now available for all Mastodon servers

Last week, Mastodon 2.8, a self-hosted social media service, was shipped with Keybase’s brand new proof system. Yesterday, the team behind Keybase announced that this new proof system is now available for all Mastodon servers. With this update, a… Continue reading Keybase’s new proof system is now available for all Mastodon servers