#cyber security
Explore tagged Tumblr posts
Text
36 notes
·
View notes
Text
BREAKING: #FuckStalkerware pt. 7 - israeli national police found trying to purchase stalkerware
for the first time ever, we can prove governments, intelligence companies and data brokers have tried to strike deals with mSpy, a stalkerware company
#fuckstalkerware#maia arson crimew#stalkerware#infosec#security#cyber security#governments#intelligence#spyware#journalism
6K notes
·
View notes
Text
Hackers (1995)
#hackers#cyberpunk aesthetic#macintosh#retro computing#cyber security#cyberpunk#cyberpunk movies#gifs#gifset#cybersecurity#cyberspace#macos#mac os#apple mac#hypercard#hacking#data security#e=mc2#floppy disk
3K notes
·
View notes
Text
Chancellor Palpatine uses the same passcode for every account, and refuses to set up Space Multifactor Authentication
his official government Space Social Media account is, naturally, hacked by someone planning to use it to make a meme post about how Palpatine did the Invasion of Naboo (a la "Bush did 9/11" memes), and so the hacker immediately tries that passcode on a bunch of other sites, and....well, hits the paydirt of the century, accessing all of the secret Banking Clan accounts and additional comms systems that Sidious has been hiding
they drop an anonymous tip to the Jedi, and then dump the information on the holonet, sending copies to every reputable news platform in the galaxy as they gather up all of their loved ones in order to disappear them all on the most obscure and inaccessible dirtball they can find to hide from the fallout
but not before using Palpatine's Space Social Media account to post "I literally actually did the Invasion of Naboo lol, and I've posted the proof online"
199 notes
·
View notes
Text
#mutual aid#direct action#opsec#opsec 101#cybersecurity#security#cyber security#anarchism#anarchist#anarchy
271 notes
·
View notes
Text
Hey Americans, I know there is a LOT happening, but please contact your house rep on KOSA. This will make it illegal for me to post my art online in order to "protect kids" cause those who sponsor it want to use it try to suppress LGBT content.
On a more cyber security side, I also don't trust website's having to use government issued IDs for age verification cause the chance for Identity theft will skyrocket through the roof. Since I keep my online stuff VERY separated, I will not use any website that requires ID.
446 notes
·
View notes
Text

"Eric Noonan, CEO of cybersecurity provider CyberSheath, told CNN it’s likely too early to tell if an attack caused the issues.
“One of the things that should always be taken with a grain of salt is any statements made in the short period of time, immediately after, or even in this case during an attack,” Noonan said.
Musk has a history of attributing technical snafus to cyberattacks. When his conversation with Donald Trump on X started 42 minutes late in August 2024, he said there was a “probability” of an attack."
CNN
Sky News
POLITICO
#destiel meme news#destiel meme#news#united states#us news#world news#elon musk#fuck elon#elongated muskrat#x twitter#twitter#x#cyber attack#cyberattack#cyber security#tech industry#computer technology#computer security#i hope it's just the gutted hollowed out shell of twitter's code finally giving out
189 notes
·
View notes
Text
International hackers have launched a dedicated website for releasing information obtained from recent breaches into sensitive Israeli databases, the Israeli newspaper Haaretz reported on Tuesday. The site has already posted thousands of documents reportedly acquired by infiltrating systems associated with the Israeli Ministry of Defense, the National Insurance, the Ministry of Justice, and the Dimona nuclear research facility, according to Haaretz. The leaks were reportedly attributed to a newly emerging hacker group dubbed ‘NetHunt3rs’, which demanded the release of 500 Palestinian prisoners in exchange for withholding the entirety of the disclosed information. While the Israeli Ministry of Defense acknowledged the breaches, labeling the affected websites as “non-sensitive websites,” an investigation by Haaretz reportedly revealed that the leaked materials included sensitive data from administrative portals, such as employee identification information, defense tenders, and details on Israeli military technological systems, including armored vehicles and satellite photography systems. According to the report, another group, named ‘Tafari HaNasser’, claimed responsibility for hacking into Israel’s National Insurance Institute. It said that it possesses personal data of 8 million Israeli citizens, including bank account details and residential addresses. Although the National Insurance denied any breach, the group circulated a video purportedly showcasing access to Israeli citizens’ personal information.
#yemen#jerusalem#tel aviv#current events#palestine#free palestine#gaza#free gaza#news on gaza#palestine news#news update#war news#war on gaza#palestinian hostages#cyber security#direct action
613 notes
·
View notes
Text
A little explainer on what happened with AO3:
Basically, someone or a group of someones decided to levy a DDoS attack. What this means is that they created a botnet (network of devices controlled by a bot, usually run in the background of an unsecured IoT device or computer being used for other things. Think data mining) to flood the servers with false requests for service.
What this does mean: AO3 might go back down, if the attack is relaunched. These types of attacks are usually used against businesses where traffic = money, thereby costing a company money. This isn't really an issue here since AO3 is entirely donation and volunteer based.
What this doesn't mean: stories, bookmarks, etc will be deleted and your anonymously published works will be linked back to you. No vulnerable points are breached during this process, so unless this group ends up doing something else, no data breaches will happen. You are safe, your content is safe.
#if you want any more of a breakdown on how this works lmk!#credentials: im a compsci major cyber security minor entering my senior year#ao3#computer science#cyber security
2K notes
·
View notes
Text




June 19, 2024
171/366 Days of Growth
Keeping with my 3AM-4AM morning study sessions. I must admit it is harder after some years waking up this early, but I can do it.
I am grateful for the colder weather, it was hard to study with that heat, even at dawn.
Wednesday today, and it looks like the whole week has gone 🤨
#study blog#studyblr#study#daily life#dailymotivation#study motivation#studying#study space#productivity#study desk#online mba#cyber security#cybersecurity#food
185 notes
·
View notes
Text
The same company Hillary Clinton and the DNC hired to burry the Wikileaks dump and frame Trump to seed the fake Russia Collusion narrative for 10 years, is now global news for the largest cyber blackout across the planet affecting banks, news stations, airports, 911 services, hospitals etc…
Nothing to see here 🤔
#pay attention#educate yourselves#educate yourself#knowledge is power#reeducate yourself#reeducate yourselves#think about it#think for yourselves#think for yourself#do your homework#do your own research#do some research#ask yourself questions#question everything#news#cyber security#government corruption
209 notes
·
View notes
Text
Real talk, feels bad for anyone who had a flight or train ride scheduled, or works in healthcare, banking, apparently the malaysian stock exchange and other mission critical areas which rely on "CrowdStrike."
Supposedly a fix is being pushed but no ETA on deployment.
164 notes
·
View notes
Text
Hackers (1995)
#hackers#cyberpunk aesthetic#macintosh#retro computing#cyber security#cyberpunk#cyberpunk movies#gifs#gifset#cyberspace#mac os#apple mac#hypercard#hacking#data security#e=mc2#floppy disk#dial up#90s#judge dredd
2K notes
·
View notes
Text

Oh yes — that’s the legendary CIA Triad in cybersecurity. It’s not about spies, but about the three core principles of keeping information secure. Let’s break it down with some flair:
⸻
1. Confidentiality
Goal: Keep data private — away from unauthorized eyes.
Think of it like locking away secrets in a vault. Only the right people should have the keys.
Examples:
• Encryption
• Access controls
• Two-factor authentication (2FA)
• Data classification
Threats to it:
• Data breaches
• Shoulder surfing
• Insider threats
⸻
2. Integrity
Goal: Ensure data is accurate and trustworthy.
No tampering, no unauthorized changes — the data you see is exactly how it was meant to be.
Examples:
• Checksums & hashes
• Digital signatures
• Version control
• Audit logs
Threats to it:
• Malware modifying files
• Man-in-the-middle attacks
• Corrupted files from system failures
⸻
3. Availability
Goal: Data and systems are accessible when needed.
No point in having perfect data if you can’t get to it, right?
Examples:
• Redundant systems
• Backup power & data
• Load balancing
• DDoS mitigation tools
Threats to it:
• Denial-of-service (DoS/DDoS) attacks
• Natural disasters
• Hardware failure
⸻
Why it matters?
Every cybersecurity policy, tool, and defense strategy is (or should be) built to support the CIA Triad. If any one of these pillars breaks, your system’s security is toast.
Want to see how the CIA Triad applies to real-world hacking cases or a breakdown of how you’d protect a small business network using the Triad? I got you — just say the word.
24 notes
·
View notes