home.social

#breaches — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #breaches, aggregated by home.social.

  1. How would you like to #verify your age? Take a pic? Or search for your ID in #security #breaches?

  2. How would you like to #verify your age? Take a pic? Or search for your ID in #security #breaches?

  3. How would you like to your age? Take a pic? Or search for your ID in ?

  4. How would you like to #verify your age? Take a pic? Or search for your ID in #security #breaches?

  5. How would you like to #verify your age? Take a pic? Or search for your ID in #security #breaches?

  6. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  7. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  8. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  9. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  10. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  11. The EU is suffering a hacking crisis. Here’s what we know. – POLITICO

    European governments are increasingly encouraging their officials to move away from Signal and similar services like WhatsApp and…
    #Europe #EU #Breaches #Cloud #Communications #Cybercrime #cybersecurity #Data #EuropeanUnion #Hackers #Infrastructure #Intelligence #Mobile #Software #Telecoms
    europesays.com/europe/5101/

  12. Japan's Nikkei set to plunge over 7% as oil breaches $100 mark

    misryoum.com/us/world-news/jap

    Fire breaks out at the Shahran oil depot after U.S. and Israeli attacks, leaving numerous fuel tankers and vehicles in the area unusable in Tehran, Iran, on March 8, 2026.Anadolu | Anadolu | Getty ImagesAsia-Pacific markets were set to tumble...

    #Japans #Nikkei #set #plunge #over #oil #breaches #100 #mark #US_News_Hub #misryoum_com

  13. #DataBroker #Breaches Fueled Nearly $21 Billion in Identity-Theft Losses

    A report copublished by WIRED sparked a probe into opt-out pages hidden by data brokers. Now congressional #Democrats say breaches tied to the industry have cost people tens of billions of dollars.
    #security #privacy #optout #identity #identitytheft

    wired.com/story/data-broker-br

  14. #DataBroker #Breaches Fueled Nearly $21 Billion in Identity-Theft Losses

    A report copublished by WIRED sparked a probe into opt-out pages hidden by data brokers. Now congressional #Democrats say breaches tied to the industry have cost people tens of billions of dollars.
    #security #privacy #optout #identity #identitytheft

    wired.com/story/data-broker-br

  15. #DataBroker #Breaches Fueled Nearly $21 Billion in Identity-Theft Losses

    A report copublished by WIRED sparked a probe into opt-out pages hidden by data brokers. Now congressional #Democrats say breaches tied to the industry have cost people tens of billions of dollars.
    #security #privacy #optout #identity #identitytheft

    wired.com/story/data-broker-br

  16. #DataBroker #Breaches Fueled Nearly $21 Billion in Identity-Theft Losses

    A report copublished by WIRED sparked a probe into opt-out pages hidden by data brokers. Now congressional #Democrats say breaches tied to the industry have cost people tens of billions of dollars.
    #security #privacy #optout #identity #identitytheft

    wired.com/story/data-broker-br

  17. breach.txt is a password wordlist built from real-world passwords found in breaches, forum dumps, leaked logs, and other underground sources. Interesting to check if you’re into password forensics. weakpass.com/wordlists/breach. #infosec #passwords #breaches

  18. breach.txt is a password wordlist built from real-world passwords found in breaches, forum dumps, leaked logs, and other underground sources. Interesting to check if you’re into password forensics. weakpass.com/wordlists/breach. #infosec #passwords #breaches

  19. breach.txt is a password wordlist built from real-world passwords found in breaches, forum dumps, leaked logs, and other underground sources. Interesting to check if you’re into password forensics. weakpass.com/wordlists/breach. #infosec #passwords #breaches

  20. 💾 The Worst #DataBreaches of 2025—And What You Can Do | EFFector 38.1

    So many data #breaches happen throughout the year that it can be pretty easy to gloss over not just if, but how many different breaches compromised your data. We're diving into these data breaches and more with our latest EFFector newsletter.
    #privacy #security #breach

    eff.org/deeplinks/2026/01/wors

  21. 💾 The Worst #DataBreaches of 2025—And What You Can Do | EFFector 38.1

    So many data #breaches happen throughout the year that it can be pretty easy to gloss over not just if, but how many different breaches compromised your data. We're diving into these data breaches and more with our latest EFFector newsletter.
    #privacy #security #breach

    eff.org/deeplinks/2026/01/wors

  22. 💾 The Worst #DataBreaches of 2025—And What You Can Do | EFFector 38.1

    So many data #breaches happen throughout the year that it can be pretty easy to gloss over not just if, but how many different breaches compromised your data. We're diving into these data breaches and more with our latest EFFector newsletter.
    #privacy #security #breach

    eff.org/deeplinks/2026/01/wors

  23. 💾 The Worst #DataBreaches of 2025—And What You Can Do | EFFector 38.1

    So many data #breaches happen throughout the year that it can be pretty easy to gloss over not just if, but how many different breaches compromised your data. We're diving into these data breaches and more with our latest EFFector newsletter.
    #privacy #security #breach

    eff.org/deeplinks/2026/01/wors