by iDemonix on 5/15/20, 8:15 AM with 148 comments
by throwaway9993 on 5/15/20, 12:26 PM
Similar data structure: https://stackblitz.com/edit/angular-soswe4?file=src%2Fapp%2F...
Owner works for: https://covve.com
Covve: This simple yet state-of-the-art app will revolutionise your business relations like you've never seen.
Edit: Response: https://twitter.com/covve/status/1261287954967941120
by alexproto on 5/15/20, 1:49 PM
by xenophonf on 5/15/20, 2:53 PM
by Nextgrid on 5/15/20, 8:32 AM
by dgellow on 5/15/20, 10:26 AM
To be fair, you’re asking your followers on twitter. That’s as biased as you can have, I would be really surprised if the majority would say no.
by numpad0 on 5/15/20, 10:17 AM
by londons_explore on 5/15/20, 9:25 AM
Given that, surely Troy can contact those people and ask "who knew this info?". Not many people would know who replaced my bathroom vanity top...
by typpo on 5/15/20, 11:54 PM
The email contained in this breach is the one I provided to Facebook. It was probably hacked or sold from one of the handful of apps I've connected with FB over the years.
by secfirstmd on 5/15/20, 9:58 AM
"Pwned on 19 breached sites and found 5 pastes.
If this is public breaches, I would guess in reality I can probably assume it's on double/triple that for sites that have been breached but the data hasn't been posted online.
by wincent on 5/15/20, 11:20 AM
What am I supposed to do whenever I'm involved in a new breach? Burn all my accounts and start again?
by polote on 5/15/20, 3:49 PM
by r1ch on 5/15/20, 8:55 AM
by guessmyname on 5/15/20, 8:38 AM
I just got the email notification from HIBP (Have I Been Pwned) a few minutes ago [1], but I am not worried about the compromised data because 1) my personal email address, job title and phone number are all visible in my resume which is publicly available in my website, I actually encourage people —mostly tech recruiters— to download the PDF and contact me via email or phone all the time and 2) my physical address is irrelevant because I have been moving houses every year for the last seven (7) years (even across countries a couple of times. All the social media accounts I have are completely empty, I just keep them around to get a hold on to my nickname.
I recently found, in my website’s HTTP logs, several requests from a web crawler controlled by ZoomInfo [3] an American subscription-based software as a service (SaaS) company that sells access to its database of information about business people and companies to sales, marketing and recruiting professionals. I was going to configure my firewall to block these requests but then I remembered —hey! my website only has information I am comfortable sharing, so it doesn’t matter— but I’ve been thinking it is just a matter of time before someone hacks one of their systems and leaks their database.
In my previous-previous job I found a fairly simple (persistent) XSS vulnerability in BambooHR that allowed non-authorized users to access data from all employees registered in the website including Social Security Numbers (SSN). I told my boss and we immediately edited everything before migrating to a different system. We never knew if BambooHR fixed the vulnerabilities and I wouldn’t be surprised if the data was leaked before or after I found the security hole.
Software security is such a Whac-A-Mole game, even if you get the budget to conduct security audits on your code, there is always going to be a weak link somewhere in the chain and that will be your doom. This is one of the many reasons why I left that job as a Security Engineer, the other reasons were Meltdown [3] and Spectre [4] they both made me realize I was fighting for a lost cause.
[1] https://haveibeenpwned.com/NotifyMe
[2] https://en.wikipedia.org/wiki/ZoomInfo
[3] https://en.wikipedia.org/wiki/Meltdown_%28security_vulnerabi...
[4] https://en.wikipedia.org/wiki/Spectre_%28security_vulnerabil...
by throwaway834792 on 5/15/20, 2:07 PM
I know this because almost everyone in the domain search stopped working for the company on or after 2014. Everyone else has worked at the company since 2013 or earlier.
by tru3_power on 5/15/20, 6:30 PM
https://github.com/acalvoa/SRID_CHANGER/blob/da367e68433b3fd...
Stored secret:
https://github.com/acalvoa/SRID_CHANGER/blob/master/config.p...
Will look more into this later
by killswitched on 5/16/20, 3:22 PM
by forgotmypw23 on 5/15/20, 11:56 AM
by cm2187 on 5/15/20, 1:26 PM
by wnevets on 5/15/20, 5:34 PM
isNonIndividual, IsNonVisibleToOthers, ShowableNonVisibleToOthers
by wjnc on 5/15/20, 10:47 AM
by voidmain0001 on 5/15/20, 6:16 PM
by jonykakarov on 5/18/20, 12:30 AM
by bluesign on 5/15/20, 12:13 PM