Post

Conversation

This is a good example of why the cybersecurity community should move away from 'hack and leak' as a blanket term and instead lean into 'breach and leak' as a more applicable term as it covers a broader scope of the type of ways threat actors are getting data from victim organisations. #cybersecurity #infosec
Quote
Lorenzo Franceschi-Bicchierai
@lorenzofb
SCOOP: There's another Dell breach. The same threat actor who said he scraped 49M customer records told me that he has now scraped data of around 30,000 customers (and counting). Data includes customer phone numbers, user-uploaded photos and more. techcrunch.com/2024/05/14/thr
Show more

New to X?

Sign up now to get your own personalized timeline!
Create account
By signing up, you agree to the Terms of Service and Privacy Policy, including Cookie Use.
Situational Awareness | Threat Intelligence | #cybertracker | Hacktivist tracker | Meme Farmer 🇦🇺🇦🇺 Posts and Opinions are my own
Real-time historian of the late cyber capitalist era . Writing a book on Hacking Team and the industry of government spyware. ☎️ +1 917 257 1382
Something went wrong. Try reloading.