Please turn JavaScript on
header-image

Bite Sized Cyber Crime

Want to keep yourself up to date with the latest news from Bite Sized Cyber Crime?

Subscribe using the "Follow" button below and we provide you with customized updates, via topic or tag, that get delivered to your email address, your smartphone or on your dedicated news page on follow.it.

You can unsubscribe at any time painlessly.

Title of Bite Sized Cyber Crime: "Bite Sized Cyber Crime"

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.12 / day

Message History

Outlook add ins can really improve the user experience of the application, allowing for extended capabilities. However if a developer abandons an add in project and leaves it without updates without properly removing it or discontinuing support it could lead to threat actors hijacking a trusted add in and using it to steal information.

 

Sources: https://pa...


Read full story

The Shiny Hunters failed to extort Panera in a data theft attack and leaked the data found. Thankfully the damage seems rather minimal as the information is, for the most part, not all that sensitive.

Sources: https://pastebin.com/EXKcrrDL


Read full story

They say never to pay a ransomware, but this one you should especially never pay because you will definitely not get anything back if you do. As it turns out vibe coding can lead to mistakes that end up with threat actors losing the keys to their own ransomware.

Sources: https://pastebin.com/VuSZpJKQ


Read full story

Bug bounty programs are a good way to practice your hacking skills while contributing to the greater good, but unfortunately some people want the rewards without having the skills, which have resulted in cURL being overwhelmed by completely nonsensical AI slop bug reports.

Sources: https://pastebin.com/ZBdpci1U


Read full story

Bluetooth is the standard these days for listening to audio but it presents some issues that wired doesn't, and I don't mean sound quality. Implementations of Bluetooth protocols can have vulnerabilities and when those hit it could mean you're being listened to.

Sources: https://pastebin.com/Kq9TieQC


Read full story