Remove tag twitter
article thumbnail

Sending Spammers to Password Purgatory with Microsoft Power Automate and Cloudflare Workers KV

Troy Hunt

So, earlier this year I created Password Purgatory with the singular goal of putting spammers through the hellscape that is attempting to satisfy really nasty password complexity criteria. I opened-sourced it, took a bunch of PRs, built out the API to present increasingly inane password complexity criteria then left it at that.

Passwords 145
article thumbnail

Mar 06- Mar 12 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective. Threat actors are spreading password-stealing malware disguised as a security tool to target Ukraine’s IT Army. March 8 – Google TAG: Russia, Belarus-linked APTs targeted Ukraine. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft: North Korea-linked Zinc APT targets security experts

Security Affairs

Microsoft, like Google TAG, observed a cyber espionage campaign aimed at vulnerability researchers that attributed to North Korea-linked Zinc APT group. ” This week, Google Threat Analysis Group (TAG) also warned of North Korea-linked hackers targeting security researchers through social media.

Security 127
article thumbnail

Analysing the (Alleged) Minneapolis Police Department "Hack"

Troy Hunt

I've now seen several versions of the same set of email addresses and passwords albeit with different attribution up the top of the file. They're simple passwords most likely cracked from other breaches. It's difficult to imagine someone creating an MPD account with that password. Not convinced?

Passwords 145
article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

So what if you accidentally forget the password? We’ve all been there-- locked out of some account because we can’t remember the clever password we used. Vranken: Yes, some of them are tagged as evidence of Bitcoin databases, basically clones, but also, audits implement an entirely new system.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

And I’m not talking about services that can quote remove your buddy’s Instagram photos where you are tagged doing something Not Safe For Work. What this means is that proving that you were at the keyboard when an event occurred. Don't use familiar passwords seriously. is often difficult.

Privacy 52
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111