Black belt in Mikado, Photo model, for the photos where they put under ‘BEFORE’

  • 54 Posts
  • 288 Comments
Joined 4 years ago
cake
Cake day: April 25th, 2021

help-circle




  • Google even in this way logs your activity, because half of the internet, apps and services, apart of YT, use Google APIs, like google-taskmanager, googleanalytics, doubleclick.net and others, not only the Google services. Google permiys to manage and delete all this data, naturally it don’t say it and only few user know it, in the Google Dashboard. but only if you have an account. It’s a mess, but Google (Alphabet INC) is everywhere, you can’t avoid it completly, even avoiding its services, except using exclusively i2p or other descentralized apps and services. Google has had too many years a complete freedom to dominate the internet and ending its “don’t be evil”.









  • It’s not so easy to detect a steganographic message in a photo, soundfile or video, it’s only detectable with specific apps. But the main reason is that goverments and security services first need a suspicion that these cute catphoto or an selfi of this guy in a beach is an secret message to make this analyse, much more likely to be suspicious of an encrypted message not feddable. This is surely more interesting to perform an in -depth analysis, instead of wasting time with thousands of vacations, selfies and kitten photos or analyzing the sound archive of your son playing Happy Birthday on his flute.












  • Andisearch Writeup

    A threat actor known as “Orange” has leaked nearly 500,000 Fortinet VPN login names and passwords, a move that has sent ripples through the cybersecurity community. These credentials were allegedly scraped from vulnerable FortiGate SSL-VPN devices, exploiting a known vulnerability, CVE-2018-13379, which had been patched since May 2019. Despite the availability of patches, many systems remained unpatched, leaving them susceptible to this breach.

    The leaked credentials were posted for free on the RAMP hacking forum, a platform managed by Orange, who was previously associated with the Babuk Ransomware operation. This leak is believed to be a promotional tactic for the RAMP forum and the Groove ransomware operation, aiming to attract other cybercriminals by offering a “freebie”.

    The breach has affected organizations across 74 countries, with a significant number of compromised devices located in the USA. The leaked data includes VPN credentials for 498,908 users over 12,856 devices. While some sources confirm the validity of these credentials, others provide mixed reports, indicating that not all credentials may be functional.

    Fortinet has acknowledged the breach, emphasizing the importance of patching and resetting passwords to mitigate the risk. They have urged affected users to upgrade their devices to the latest FortiOS versions and perform an organization-wide password reset. The incident underscores the critical need for timely patching and robust security practices to protect against such vulnerabilities.