Toggle light / dark theme

24,649,096,027 (24.65 Billion) Account Usernames And Passwords Have Been Leaked

Credential abuse is something that happens only to CEOs or very rich people or employees of fortune 500 companies right? Nope. It’s everywhere, and your compromised passwords and usernames are enabling all kinds of cyber criminals to perform all kinds of account takeover (ATO) attacks. 24,649,096,027 account usernames and passwords have been leaked by cyber-threat actors, as of this year. That’s a big number―one that should shake the cyber security community at its core. But despite this number, which increases exponentially each year, and the deluge of reports highlighting the risk of insecure credentials, you still have a friend or an officemate or boss, who’s carefully typing 123,456 into a password field right now.

The Digital Shadow team collated more than 24 billion leaked credentials from the dark web. That’s a 65 percent increase from 2020, likely caused by an enhanced ability to steal credentials through new ransomwares, dedicated malware and social engineering sites, plus improved credential sharing. Within this leaked usernames and passwords, approximately 6.7 billion credentials had a unique username-and-password pairing, indicating that the credential combination was not duplicated across other databases. This number was 1.7 billion more than found in 2020, highlighting the rate of data breach across completely new credential combinations.

The most common password, 123,456, represented 0.46 percent of the total of the 6.7 billion unique passwords. The top 100 most common passwords represented 2.77 percent of this number. Information-stealing malware and ransomware persists as an important threat to your privacy. Some of these malwares can be bought for as little as $50, and some go for thousands, depending on features.

When Botnets Attack

By Chuck Brooks


Our Growing Digital Connected World — Made For Botnets

There are dire implications of having devices and networks so digitally interconnected when it comes to bot nets. Especially when you have unpatched vulnerabilities in networks. The past decade has recorded many botnet cyber-attacks. Many who are involved in cybersecurity will recall the massive and high profile Mirai botnet DDoS attack in 2016. Mirai was an IoT botnet made up of hundreds of thousands of compromised IoT devices, It targeted Dyn—a domain name system (DNS) provider for many well-known internet platforms in a distributed denial-of-service (DDoS) attack. That DDoS attack sent millions of bytes of traffic to a single server to cause the system to shut down. The Dyn attacks leveraged Internet of Things devices and some of the attacks were launched by common devices like digital routers, webcams and video recorders infected with malware.

As chemical fertilizer shortages persist, peecycling — the process of recycling human urine — could increase the yield of nutrient-rich crops

The need to find alternative sources for fertilizer have become urgent as chemical fertilizer shortages from the Ukrainian war threaten countries globally.


A Chinese military analyst suggested countermeasures for the Starlink satellite system developed by Musk’s SpaceX – including ways to hack or destroy the service.

China analyst urges possible attacks on Elon Musk’s Starlink satellites

😳!


A Chinese military analyst suggested that Beijing should develop countermeasures for the Starlink satellite system developed by Elon Musk’s SpaceX — including ways to hack or even destroy the service during a time of conflict.

In a recent paper published in a China-based academic journal called Modern Defense Technology, analyst Ren Yuanzhen argued that China’s military needs to develop the capability of tracking each of the thousands of satellites set to comprise the Starlink constellations in the coming years.

Ren’s paper noted that Starlink could be a key resource for the US military, both as a means of providing internet connectivity for troops and as a source of intelligence through satellite imagery.

A simple tool to make websites more secure and curb hacking

An international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyberattacks.

The black box assessment prototype, tested by engineers in Australia, Pakistan and the UAE, is more effective than existing web scanners which collectively fail to detect the top 10 weaknesses in web applications.

UniSA mechanical and systems engineer Dr. Yousef Amer is one of the co-authors of a new international paper that describes the development of the tool in the wake of escalating global cyberattacks.

A Synthetic Lattice in a Cold Atomic Cloud

Defining a fermionic lattice using spin and momentum instead of spatial coordinates opens the door for interacting-fermion simulations with more complex lattice geometries.


Amazon Linux server can be hacked easily. Critical Privilege Escalation vulnerability in Log4j Hotpatch released to fix Log4j vulnerabilities — Vulnerabilities — Information Security Newspaper | Hacking News.

AI Safety Researcher, Roman Yampolskiy | The Human Podcast #12

Roman Yampolskiy is an AI safety & security researcher. He’s a tenured associate professor at the University of Louisville and the director of the Cyber Security Laboratory.

The Human Podcast is a new show that explores the lives and stories of a wide range of individuals. New episodes are released every week — subscribe to stay notified.

AUDIO:
Spotify — Online Shortly.
Apple Podcasts — Online Shortly.

SOCIAL:
Twitter — https://twitter.com/heyhumanpodcast.
Instagram — https://www.instagram.com/heythehumanpodcast/

GUEST:
Roman’s Twitter — https://twitter.com/romanyam.
Roman’s Wikipedia — https://en.wikipedia.org/wiki/Roman_Yampolskiy.
Roman’s Webpage — http://cecs.louisville.edu/ry/
Roman’s Books — https://www.amazon.co.uk/Roman-V-Yampolskiy/e/B00DBE57XM
Roman’s Papers — https://scholar.google.com/citations?user=0_Rq68cAAAAJ&hl=en.

ORDER OF CONVERSATION:

/* */