#dataleakage — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #dataleakage, aggregated by home.social.
-
@cloudflare
1.) During the cloudflare customer data breach, were clients from the European Union, including the Republic of Poland, also affected?2.) Have all customers impacted by the issue already been informed?
#cloudflare #NET #security #soc #databreach #database #customersdata #leak #dataleakage -
HoyoVerse Subsidiary Sues Leaker Over Early Honkai: Star Rail Character Reveal
#dataleakage #Discord #gaming #HonkaiStarRail #lawsuit
https://blazetrends.com/hoyoverse-subsidiary-sues-leaker-over-early-honkai-star-rail-character-reveal/?fsp_sid=52664 -
AI Arms Race Fuels Surge in Cybercrime and Data Leaks
https://www.webpronews.com/ai-arms-race-fuels-surge-in-cybercrime-and-data-leaks/
#cybersecurity #AI #dataleakage #ChatGPT #GenAI #threats #ShadowAI #3rdPartyTools -
#AI in #LifeSciences is confronted with challenges such as #DataLeakage, where training data unintentionally influences test results. Researchers stress that understanding data complexity and fostering interdisciplinary work are essential for reliable applications: https://go.tum.de/787419
📷A.Eckert
-
Why, #Signal? Why must you undermine my trust in you by repeatedly insisting on asking for access to my contacts? Why is it not sufficient for me to say no and MEAN no? Take a hint! NO CONTACTS. EVAR!!
-
Video - Hacking Azure: From OSINT to Full Compromise!
Scenario:
A seemingly innocuous post by a new manager at Mega Big Tech, showcasing their new workstation, inadvertently leaked sensitive Azure credentials. This oversight allowed attackers to gain unauthorized access, escalating privileges through a compromised Azure Logic App Automation, leading to potential data breaches.Learning points:
- Oversharing can lead to security breaches: Even a photo of your workstation can reveal critical information like VM names, subscription IDs, and public IP addresses.
- Validate and secure internal automation: Ensure that systems like password reset bots are restricted to only necessary permissions, preventing unauthorized access or privilege escalation.
- Implement conditional access: Use conditional access policies to safeguard access, ensuring only managed devices can interact with sensitive systems.
-
#USA #Cybersecurity #ATT #DataLeakage: "Phone giant AT&T has reset millions of customer account passcodes after a huge cache of data containing AT&T customer records was dumped online earlier this month, TechCrunch has exclusively learned.
The U.S. telco giant initiated the passcode mass-reset after TechCrunch informed AT&T on Monday that the leaked data contained encrypted passcodes that could be used to access AT&T customer accounts.
A security researcher who analyzed the leaked data told TechCrunch that the encrypted account passcodes are easy to decipher. TechCrunch alerted AT&T to the security researcher’s findings.
In a statement provided Saturday, AT&T said: “AT&T has launched a robust investigation supported by internal and external cybersecurity experts. Based on our preliminary analysis, the data set appears to be from 2019 or earlier, impacting approximately 7.6 million current AT&T account holders and approximately 65.4 million former account holders.”
“AT&T does not have evidence of unauthorized access to its systems resulting in exfiltration of the data set,” the statement said." https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/
-
One of the biggest challenges in #IRL #datascience and #machinelearning versus what you learn in school is labeling errors: When you create your own dataset from sources you may not be measuring the outcomes and connecting them to prediction data correctly! If you have labeling errors you are either unable to predict anything or worse - good model performance metrics, but terrible real world performance. Possibly #dataleakage, but possibly other forms of incoherence. 🤯
-
#ML #Science #Reproducibility #DataLeakage: "To minimize errors in ML-based science, and to make it more apparent when errors do creep in, we propose REFORMS (Reporting standards for Machine Learning Based Science) in a preprint released today. It is a checklist of 32 items that can be helpful for researchers conducting ML-based science, referees reviewing it, and journals where it is submitted and published.
The checklist was developed by a consensus of 19 researchers across computer science, data science, social sciences, mathematics, and biomedical research. The disciplinary diversity of the authors was essential to ensure that the standards are useful across many fields. A majority of the authors were speakers or organizers at a workshop we organized last year titled "The Reproducibility Crisis in ML-Based Science." (Videos of the talks and discussions are available on the workshop page.)
The checklist and the paper introducing it are available on our project website. The paper also provides a review of past failures, as well as best practices for avoiding such failures."
https://www.aisnakeoil.com/p/introducing-the-reforms-checklist
-
Leverage Generative AI Advantages While Safeguarding Your Future - Generative AI has a transformative impact across nearly all industries and applica... - https://readwrite.com/leverage-generative-ai-advantages-while-safeguarding-your-future/ #dataandsecurity #generativeai #dataleakage #security #bigdata #ai
-
My fingerprint was leaked by a hackers who obtained them from vulnerable voting system of our Government, should I avoid using biometric features?
https://security.stackexchange.com/questions/268504/my-fingerprint-was-leaked-by-a-hackers-who-obtained-them-from-vulnerable-voting
#dataleakage #fingerprint #government -
How to find out which data breach my password was in?
https://security.stackexchange.com/questions/267386/how-to-find-out-which-data-breach-my-password-was-in
#haveibeenpwned #databreaches #dataleakage #passwords #breach -
What is the most secure way to transfer untrusted data between containers?
https://security.stackexchange.com/questions/267371/what-is-the-most-secure-way-to-transfer-untrusted-data-between-containers
#datatransfer #dataleakage #docker #linux