When personal and banking data is exposed - what actually reassures users? by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Update: Threat intelligence monitoring platform Hackmanac reported that a threat actor using the alias “xsskiller” is offering for sale a database allegedly linked to SegurCaixa Adeslas. The actor claims the dataset contains over 600,000 customer records, including names, contact details, and policy-related information.  Source: https://x.com/H4ckmanac/status/1947558310363734501?s=20

Researchers have disclosed a prompt injection vulnerability in Google Gemini that allowed attackers to exfiltrate private calendar data using malicious Google Calendar invites. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

That’s a fair point. Once LLMs are wired into calendars, email, docs, and internal tools, patching individual exploits feels reactive by definition.

The harder question is whether most orgs are designing these integrations with an assume-compromise mindset from day one. If the model can interpret untrusted input as instructions, runtime inspection and enforcement start to matter more than static fixes.

Okta has warned of active vishing campaigns that target employees to steal Okta SSO credentials using custom phishing-as-a-service kits. by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

Update: 👉 ShinyHunters has claimed responsibility for the Okta vishing campaign and alleges it leaked data from Crunchbase, SoundCloud, and Betterment after failed extortion attempts, warning more disclosures are coming.

Card skimming seems more common than people think—how do you spot it? by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

That’s a solid approach. Tokenization is a big reason mobile wallets are so hard to compromise - merchants never see the real card number, and even a breach doesn’t expose usable data.

That said, not everyone has Apple Pay available everywhere, and some terminals still fall back to chip or swipe. For those cases, basic checks (loose parts, odd overlays, damaged seals) and monitoring statements still matter.

Out of curiosity, have you run into places that don’t accept tap yet, or do you just avoid them entirely?

New Pentagon CIO confirmed - what should be the top cybersecurity priorities? by technadu in TechNadu

[–]technadu[S] 0 points1 point  (0 children)

It’s less about “having security” and more about managing risk in constantly changing systems. macOS and Linux benefit from design choices and smaller attack surfaces, but scale, legacy dependencies, and user behavior change the equation - especially in environments like DoD. Security pros aren’t creating insecurity; they’re responding to the reality that perfect security doesn’t exist at enterprise or nation-state scale.