shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

284
active users

#dataleaks

0 posts0 participants0 posts today
Calishat<p><a href="https://researchbuzz.masto.host/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://researchbuzz.masto.host/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://researchbuzz.masto.host/tags/DataLeaks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataLeaks</span></a> <a href="https://researchbuzz.masto.host/tags/SexualContent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SexualContent</span></a> </p><p>'Researchers have discovered nearly 1.5 million pictures from specialist dating apps – many of which are explicit – being stored online without password protection, leaving them vulnerable to hackers and extortionists.</p><p>Anyone with the link was able to view the private photos from five platforms developed by M.A.D Mobile: kink sites BDSM People and Chica, and LGBT apps Pink, Brish and Translove.'</p><p><a href="https://www.bbc.com/news/articles/c05m5m5v327o" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bbc.com/news/articles/c05m5m5v</span><span class="invisible">327o</span></a></p>
Miguel Afonso Caetano<p>"Hackers leaked thousands of files from Lexipol, a Texas-based company that develops policy manuals, training bulletins, and consulting services for first responders.</p><p>The manuals, which are crafted by Lexipol’s team of public sector attorneys, practitioners, and subject-matter experts, are customized to align with the specific needs and local legal requirements of agencies across the country.</p><p>But the firm also faces criticism for its blanket approach to police policies and pushback on reforms.</p><p>The data, a sample of which was given to the Daily Dot by a group referring to itself as “the puppygirl hacker polycule,” includes approximately 8,543 files related to training, procedural, and policy manuals, as well as customer records that contain names, usernames, agency names, hashed passwords, physical addresses, email addresses, and phone numbers.</p><p>Among the manuals seen by the Daily Dot, agencies include police departments, fire departments, sheriff’s offices, and narcotics units."</p><p><a href="https://www.dailydot.com/debug/lexipol-data-leak-puppygirl-hacker-polycule/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">dailydot.com/debug/lexipol-dat</span><span class="invisible">a-leak-puppygirl-hacker-polycule/</span></a></p><p><a href="https://tldr.nettime.org/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> <a href="https://tldr.nettime.org/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://tldr.nettime.org/tags/Lexipol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lexipol</span></a> <a href="https://tldr.nettime.org/tags/DataLeaks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataLeaks</span></a> <a href="https://tldr.nettime.org/tags/PoliceState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoliceState</span></a></p>
ChiefGyk3D<p>If whistleblower protections are your concern, know that they only apply in specific contexts. Most terminations for leaking non-public data fall outside those protections. The idea that this is unique to TikTok is laughable.<br><a href="https://social.chiefgyk3d.com/tags/Whistleblowers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Whistleblowers</span></a> <a href="https://social.chiefgyk3d.com/tags/DataLeaks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataLeaks</span></a> <a href="https://social.chiefgyk3d.com/tags/CyberLaw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberLaw</span></a><br>5/10</p>
Paul Shread<p>Between Google Cloud Storage and AWS, we found more than 500,000 exposed cloud storage buckets. Getting to use Cyble's threat intelligence and attack surface management tools in my work is possibly the most interesting thing I’ve done in my career. Cool technology. <br><a href="https://masto.ai/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://masto.ai/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://masto.ai/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://masto.ai/tags/GCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GCP</span></a> <a href="https://masto.ai/tags/GoogleCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleCloud</span></a> <a href="https://masto.ai/tags/DataLeaks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataLeaks</span></a> <a href="https://masto.ai/tags/Storage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Storage</span></a> <a href="https://masto.ai/tags/Data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Data</span></a> <a href="https://masto.ai/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://masto.ai/tags/Compliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Compliance</span></a> <a href="https://masto.ai/tags/GRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GRC</span></a> <a href="https://masto.ai/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://masto.ai/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://masto.ai/tags/AttackSurfaceManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AttackSurfaceManagement</span></a> <a href="https://masto.ai/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://masto.ai/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> </p><p><a href="https://cyble.com/blog/cloud-storage-bucket-security-pii-leak-brings-renewed-focus-to-storage-bucket-access-controls/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyble.com/blog/cloud-storage-b</span><span class="invisible">ucket-security-pii-leak-brings-renewed-focus-to-storage-bucket-access-controls/</span></a></p>
IT News<p>New attack steals AI secrets from GPUs made by Apple, AMD, and Qualcomm - Enlarge (credit: MEHAU KULYK/Getty Images) </p><p>As more companies r... - <a href="https://arstechnica.com/?p=1996672" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1996672</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/syndication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>syndication</span></a> <a href="https://schleuss.online/tags/dataleaks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataleaks</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/llms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llms</span></a> <a href="https://schleuss.online/tags/gpu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gpu</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>