Break The Air Gap With Ultrasound https://hackaday.com/2025/06/29/break-the-air-gap-with-ultrasound/ #dataexfiltration #computerhacks #SecurityHacks #ultrasound #airgap

Break The Air Gap With Ultrasound https://hackaday.com/2025/06/29/break-the-air-gap-with-ultrasound/ #dataexfiltration #computerhacks #SecurityHacks #ultrasound #airgap
Break The Air Gap With Ultrasound - In the world of information security, much thought goes into ensuring that no info... - https://hackaday.com/2025/06/29/break-the-air-gap-with-ultrasound/ #dataexfiltration #computerhacks #securityhacks #ultrasound #airgap
Critical AI vulnerability EchoLeak exposed in Microsoft 365 Copilot! Learn about the zero-click attack and its implications. #DataExfiltration #AI #Cybersecurity https://redoracle.com/News/AI-Data-Leaks-EchoLeak-Vulnerability-Exposed.html
EchoLeak – 0-Click AI Vulnerability Enabling Data Exfiltration from 365 Copilot
Coca-Cola Europacific Partners Allegedly Suffers Major Salesforce Data Breach https://dailydarkweb.net/coca-cola-europacific-partners-allegedly-suffers-major-salesforce-data-breach/ #CocaColaEuropacificPartners #dataexfiltration #CyberSecurity #DataBreaches #databreach #Salesforce #CocaCola
MisCloud is just retired! Walkthrough disclosure - right from the clouds
Google Cloud Services logs
Intense PCAP analysis
Really nice real-life scenario
https://blog.cyberethical.me/htb-sherlock-miscloud
Want to try investigations yourself?
Open-source malware doubles, data exfiltration attacks dominate https://www.helpnetsecurity.com/2025/04/03/open-source-malware-index-q1-2025/ #Dataexfiltration #cybercrime #opensource #Don'tmiss #Sonatype #malware #report #News
Code #deobfuscation
hashtag#Telegram data exfiltration
Malware behavioral analysis
https://blog.cyberethical.me/htb-ctf-2025-forensics-tales-for-the-brave
PCAP (network capture) analysis
Python bytecode, marshalling, decompiling
@mwdawson Yeah, just like #CloudAct demands from anyone residing within the #USA, conducting business in the USA or having a parent/subsidiary operating in the #US.
Something #GAFAMs work hard to let people do: KEEP #selfCustody of their data!
Cybersecurity researchers have uncovered two malicious packages, zebo and cometlogger, on the Python Package Index (PyPI) that exfiltrate sensitive data from compromised systems! With over 280 downloads before removal, these packages employ advanced techniques for surveillance and credential theft. Always verify code before running!
#Cybersecurity #Malware #Python #DataExfiltration #Fortinet #newz
https://thehackernews.com/2024/12/researchers-uncover-pypi-packages.html
Keep an eye on unexpected #WinRAR activity—legitimate software doesn't always mean legitimate use. Identifying unusual command-line options can help uncover potential threats early.
@gurkanctn @nazgul not just invading, but illegal...
/home/
directory and preemptively upload all the PDFs and OOXML files to OneDrive just in case you want to sent them from your laptop...This is called an "info stealer" and it's classified as a malware for very good reasons!
@nickali @nazgul that's because they never faced actual accountability nor consequences.
https://infosec.space/@kkarhan/113413999824933801
https://infosec.space/@kkarhan/113414012396154242
@femme_mal @Catawu @DamonWakes @lrhodes @nazgul either way I'm convinced this shit is so flatout illegal in the EU that it's literally a felony in places like Germany, where even having such functionality may fall under "production, possession, distribution and use of tools to facilitate data manipulation and/or extraction against the owners' consent" (§202c penal code)...
But that's just my opinion, and #NotLegalAdvice!
@jodmentum @nazgul why is there no "no thanks" option with a tickbox "don't ask me again" next to it?
Information Exfiltration from AI chatbot using obfuscated prompt.
Investigating data exfiltration: key digital artifacts across Windows, Linux, and macOS: https://www.magnetforensics.com/blog/investigating-data-exfiltration-key-digital-artifacts-across-windows-linux-and-macos/
@briankrebs The best way to prevent #dataexfiltration when breached is not to collect or store unnecessary data in the first place. That makes many of the current spate of #databreaches avoidable, self-inflicted incidents for which large companies are never held accountable in any truly meaningful way.
You're spot on when you say that #databrokers rely on large #datalakes of sensitive data they don't need directly. They also rely on large data sets where any typical datum may be harmless in itself, but often becomes sensitive or dangerous when aggregated, and often exponentially more so when connected to intrinsically sensitive data such as #PII, #PHI, or identity.
Setting aside the financial incentives and lack of accountability for the data brokers, how do #businessleaders, #regulatoryagencies, and #electedpoliticians justify this state of affairs to you? It's not like the public and private sectors don't also have data they want to protect, so why allow this shadow industry to prosper? This seems even more mystifying when it's so clearly a double-edged sword even for the brokerages' paying customers!
Earth Baku Using Customized Tools To Maintain Persistence And Steal Data https://gbhackers.com/earth-baku-custom-tools-data-theft/ #APT(AdvancedPersistentThreat) #DataExfiltration #NetworkSecurity #cybersecurity #CyberAttack #Malware