Posts filtered by tags: Shodan[x]


 

System Shock TV Series Will Bring The Classic Video Game To A New Medium

The cyberpunk survival horror game "System Shock" is being made into a new live-action TV series courtesy of the upcoming gaming entertainment streaming platform Binge. Nightdive, the gaming studio behind the 2021 "System Shock" PC remake, are onboard to help create the new streaming series, which is about a space station thrown into chaos. If "System Shock" sounds familiar but you're not much of a PC gamer, that might be because the series is the spiritual predecessor to the wildly successful "...
Tags: Television, Movies, News, Earth, William Gibson, Binge, Ubisoft, Philip K Dick, Citadel, Shodan, Ungar, Nightdive, Stephen Kick, Larry Kuperman, Citadel Station, Allan Ungar Kick


Indian tech startup exposed Byju’s student data

India-based technology startup Salesken.ai has secured an exposed server that was spilling private and sensitive data on one of its customers, Byju’s, an education technology giant and India’s most valuable startup. The server was left unprotected since at least June 14, according to historical data provided by Shodan, a search engine for exposed devices and databases. Because the server was without a password, anyone could access the data inside. Security researcher Anurag Sen found the exposed...
Tags: Security, Education, Privacy, Government, India, Tech, Spokesperson, United States, Search Engine, Bengaluru, Shodan, Byju, Sequoia Capital India, Byju's, Online Tutoring, Anurag Sen


An internal code repo used by New York State’s IT office was exposed online

A code repository used by the New York state government’s IT department was left exposed on the internet, allowing anyone to access the projects inside, some of which contained secret keys and passwords associated with state government systems. The exposed GitLab server was discovered on Saturday by Dubai-based SpiderSilk, a cybersecurity company credited with discovering data spills at Samsung, Clearview AI and MoviePass. Organizations use GitLab to collaboratively develop and store their sourc...
Tags: Amazon, Security, New York, Attorney General, Government, India, Samsung, Tech, Spokesperson, Information Technology, Software, Password, Dubai, Venture Capital, Search Engine, Jamaica


US Scrambles to Keep Fuel Flowing After Pipeline Cyberattack. Russian Cybercriminals Suspected (slashdot)

A ransomware attack affecting a pipeline that supplies 45% of the fuel supplies for the Eastern U.S. has now led U.S. president Biden to declare a regional emergency providing "regulatory relief" to expand fuel delivery by other routes. Axios reports: Friday night's cyberattack is "the most significant, successful attack on energy infrastructure" known to have occurred in the U.S., notes energy researcher Amy Myers Jaffe, per Politico. It follows other significant cyberattacks on the federal ...
Tags: New York, Texas, London, News, Microsoft, Washington Post, Russia, Nbc News, US, Atlanta, Bloomberg, Iran, Bbc, Cnn, Tennessee, Kremlin


US Scrambles to Keep Fuel Flowing After Pipeline Cyberattack. Russian Cybercriminals Suspected

A ransomware attack affecting a pipeline that supplies 45% of the fuel supplies for the Eastern U.S. has now led U.S. president Biden to declare a regional emergency providing "regulatory relief" to expand fuel delivery by other routes. Axios reports: Friday night's cyberattack is "the most significant, successful attack on energy infrastructure" known to have occurred in the U.S., notes energy researcher Amy Myers Jaffe, per Politico. It follows other significant cyberattacks on the federal ...
Tags: New York, Texas, London, Microsoft, Washington Post, Russia, Nbc News, US, Tech, Atlanta, Bloomberg, Iran, Bbc, Cnn, Tennessee, Kremlin


A single, mysterious server exposed 1.2 billion user records

No one knows who owns the Google Cloud drive that exposed 1.2 billion user records, seemingly merged from data-brokers like People Data Labs and Oxydata, who may have simply sold the data to a customer that performed the merge operation and then stuck the resulting files on an unprotected server, which was discovered in October by researcher Vinny Troia using Binaryedge and Shodan. The data merges home and cell numbers, social media profiles, work histories and email addresses; as Troia say...
Tags: Google, Post, News, Privacy, Leaks, Richard, Vinny, Shodan, PDL, Troia, Binaryedge, Lily Hay Newman, Google Cloud, Vinny Troia, Haveibeenpwned, Data brokers


Two years after WannaCry, a million computers remain at risk

Two years ago today, a powerful ransomware began spreading across the world. WannaCry spread like wildfire, encrypting hundreds of thousands of computers in over 150 countries in a matter of hours. It was the first time that ransomware, a malware that encrypts a user’s files and demands cryptocurrency in ransom to unlock them, had spread across the world in what looked like a coordinated cyberattack. Hospitals across the U.K. declared a “major incident” after they were knocked offline by the mal...
Tags: Microsoft, North Korea, Nsa, US, Tech, Atlanta, Sony, US Treasury, National Security Agency, Beaumont, Shodan, Kevin Beaumont, Jake Williams, Hutchins, DoublePulsar, Marcus Hutchins


We finally get a glimpse of System Shock 3 — and it was worth the wait

The Game Developers Conference began yesterday, and it got off to an unexpectedly good start by finally revealing footage of a game long-rumored to be in development, System Shock 3. Previously glimpsed only in bits, it’s good to finally see the return of one of the old masters of gaming in full glory. The teaser trailer is fairly brief, showing the series’ trademark desolate space location and a glimpse of creepy antagonist SHODAN, in glossy new graphics. Given that it was shown during the Unit...
Tags: Startups, Gaming, Shodan, Warren Spector


It's Shodan embarrassing: Red-faced Rubrik blames public-facing DB on developer ballsup

Sandbox test environment door left wide open Rubrik has fingered one of its developers after a database packed with customer information was left exposed. Security researcher Oliver Hough spotted the database, which apparently was not protected by a password.…
Tags: Software, Rubrik, Shodan, Oliver Hough


Daily Crunch: Munchery shuts down

The Daily Crunch is TechCrunch’s roundup of our biggest and most important stories. If you’d like to get this delivered to your inbox every day at around 9am Pacific, you can subscribe here: 1. After raising $125M, Munchery fails to deliver On-demand food delivery startup Munchery is ceasing operations, effective immediately. The company laid off 30 percent of its workforce in May, after shutting down its Seattle, Los Angeles and New York operations. At the time, Munchery said it planned to dou...
Tags: Apple, Google, TC, New York, US, Samsung, San Francisco, Tech, Netflix, Munchery, Roma, Samsung Galaxy, Black Panther, Mexico City Mexico, Marie Kondo, Shodan


An unsecured database exposed the personal details of 202M job seekers in China

The personal details belonging to more than 202 million job seekers in China, including information like phone numbers, email addresses, driver licenses and salary expectations, were freely available to anyone who knew where to look for as long as three years due to an insecure database. That’s according to findings published by security researcher Bob Diachenko who located an open and unprotected MongoDB instance in late December which contained 202,730,434 “very detailed” records. The database...
Tags: Security, Asia, Craigslist, China, Tech, Spokesperson, Password, Computing, Search Engine, Driver, Github, Mongodb, Nosql, Edge, Data Management, IPS


MindBody-owned FitMetrix exposed millions of user records — thanks to servers without passwords

FitMetrix, a fitness technology and performance tracking company owned by gym booking giant Mindbody, has exposed millions of user records because it left several of its servers without a password. The company builds fitness tracking software for gyms and group classes — like CrossFit and SoulCycle — that displays heart rate and other fitness metric information for interactive workouts. FitMetrix was acquired by gym and wellness scheduling service Mindbody earlier this year for $15.3 million, ac...
Tags: Amazon, Security, Email, Server, Internet, Tech, Hack, Computing, Cryptocurrencies, Crossfit, Digital Currencies, Shodan, Amazon Web Service, Mindbody, Diachenko, Bob Diachenko Hacken


Cryptocurrency mining attacks using leaked NSA hacking tools are still highly active a year later

It’s been over a year since highly classified exploits built by the National Security Agency were stolen and published online. One of the tools, dubbed EternalBlue, can covertly break into almost any Windows machine around the world. It didn’t take long for hackers to to run ransomware on thousands of computers, grinding hospitals and businesses to a halt. Two separate attacks in as many months used WannaCry and NotPetya ransomware, which spread like wildfire. Once a single computer in a netwo...
Tags: Microsoft, North Korea, Nsa, Boston, US, Tech, Sony, US Treasury, National Security Agency, Shodan, Cybereason, Amit Serper, Cybereason Once


Can a script kiddie pwn your SD-WAN? Better check the config, friend

Unpatched, outdated software abounds, say researchers Russian researchers armed with Shodan and Censys have identified nearly 5,000 SD-WANs with vulnerable management interfaces.…
Tags: Software, Shodan, Censys


Welp, even ships are hackable now

Large shipping vessels and aircraft are often equipped with VSAT systems, allowing crewmembers to send and receive messages and access the Internet during voyages. Turns out, some of these VSAT systems are profoundly insecure, and could allow an attacker to gain access, and disrupt communications. Security researcher x0rz discovered that many VSAT systems can be reached from the public Internet. Not only does this mean they can be tracked through services like Shodan, but some are configured in ...
Tags: Startups, Insider, Welp, Shodan


Insecure Hadoop Servers Expose Over 5 Petabytes of Data

An anonymous reader quotes the security news editor at Bleeping Computer: Improperly configured HDFS-based servers, mostly Hadoop installs, are exposing over five petabytes of information, according to John Matherly, founder of Shodan, a search engine for discovering Internet-connected devices. The expert says he discovered 4,487 instances of HDFS-based servers available via public IP addresses and without authentication, which in total exposed over 5,120 TB of data. According to Matherly, 47,82...
Tags: China, US, Tech, Shodan, John Matherly, Matherly, Bleeping Computer


Is another big data ransomware apocalypse on the horizon?

Last year, thousands of MongoDB instances were hacked, and their contents ransomed for a small sum in bitcoin. This episode wasn’t just a troubling reminder that people are terrible at securing the things they expose to the Internet, but a demonstration that ransomware developers were shifting their focus from systems to services. Could another big data ransomware nightmare be on the horizon? Perhaps. Shodan, which develops the “search engine for computers,” just published an interesting article...
Tags: Security, Startups, Tech, Insider, Shodan, John Matherley


New Shodan Tool Tracks Down Botnet Command-And-Control Servers

An anonymous reader quotes The Stack: Search engine Shodan has announced a tool to help businesses hunt out and block traffic from malware command-and-control servers. The new Malware Hunter service, which has been designed in a collaborative project with threat intelligence company Recorded Future, continuously scans the internet to locate control panels for different remote access Trojans, including Gh0st RAT, Dark Comet, njRAT, XtremeRAT, Net Bus and Poison Ivy. The internet crawler identifie...
Tags: Tech, Shodan, United States Read


Malware Hunter — Shodan's new tool to find Malware C&C Servers

Rapidly growing, insecure internet-connected devices are becoming albatross around the necks of individuals and organizations with malware authors routinely hacking them to form botnets that can be further used as weapons in DDoS and other cyber attacks. But now finding malicious servers, hosted by attackers, that control botnet of infected machines gets a bit easier. Thanks to Shodan and [Author: [email protected] (Mohit Kumar)]
Tags: Tech, Search Engine, Cyber Attacks, Ddos, Botnet, Iot Search Engine, Shodan Search Engine, Mohit Kumar, Shodan, Botnet Detection, Malware Hunter


>10,000 Windows computers may be infected by advanced NSA backdoor (ars technica)

Enlarge / A script scanning the Internet for computers infected by DoublePulsar. On the left, a list of IPs Shodan detected having the backdoor installed. On the right are pings used to manually check if a machine is infected. (credit: Dan Tentler) Security experts believe that tens of thousands of Windows computers may have been infected by a highly advanced National Security Agency backdoor. The NSA backdoor was included in last week's leak by the mysterious group known as Shadow Brokers. Do...
Tags: News, Nsa, Switzerland, National Security Agency, Dan Goodin, Shodan, Rob Graham, Dan Tentler, Errata Security


Analysis of internet-connected devices reveals millions are vulnerable to attack

Shodan is a search engine that scans online systems and "cyber assets" looking for any that possess security flaws. Trend Micro conducted its own analysis of Shodan data for February 2016, reporting its findings on their blog. The post Analysis of internet-connected devices reveals millions are vulnerable to attack appeared first on Digital Trends.
Tags: Security, Trends, Malware, Computing, Ddos, Trend Micro, Shodan


More than 10,000 website databases taken hostage by cybercriminals

Several groups of hackers have taken tens of thousands of website databases that were exposed and vulnerable online hostage and are demanding bitcoin ransoms for their return. More than 10,000 sites have been affected. The post More than 10,000 website databases taken hostage by cybercriminals appeared first on Digital Trends.
Tags: Trends, Web, Ransomware, Computing, Hackers, Mongodb, Shodan


Cybercriminals hold more than 10,000 website databases for ransom

Several groups of hackers have taken hostage tens of thousands of website databases that were exposed and vulnerable online and are demanding bitcoin ransoms for their return. More than 10,000 sites have been affected. The post Cybercriminals hold more than 10,000 website databases for ransom appeared first on Digital Trends.
Tags: Trends, Web, Ransomware, Computing, Hackers, Mongodb, Shodan


Cybercriminals hold over 10,000 website databases for ransom

Several groups of hackers have taken hostage tens of thousands of website databases that were exposed and vulnerable online and are demanding bitcoin ransoms for their return. More than 10,000 sites have been affected. The post Cybercriminals hold over 10,000 website databases for ransom appeared first on Digital Trends.
Tags: Trends, Web, Ransomware, Computing, Hackers, Mongodb, Shodan


AVTECH Shuns Security Firm and Leaves All Products Vulnerable Without a Patch

An anonymous reader writes: AVTECH, a Taiwanese CCTV equipment manufacturer, has failed to respond to Search-Lab, a Hungarian security firm, who spent more than a year trying to inform the company about 14 security bugs affecting the firmware of ALL its products. Almost a year after it first contacted the hardware maker, Search-Lab published a public advisory about the vulnerabilities it discovered, warning sysadmins that their AVTECH products may be in danger of exploitation and remote takeover...
Tags: Tech, Cctv, Github, Shodan


414,949 D-Link cameras, IoT devices can be hijacked over the net

Waiting for the worms to come Shodan has turned up half a million D-Link devices exposed to the internet, and subject to easy hijacking using zero-day vulnerabilities.…
Tags: Shodan


Qadium Reaps $20M Venture Round For IoT Device Search Engine

Tim Junio was a young security consultant for DARPA, the tech research division of the U.S. Department of Defense, when the agency called for responses to an interesting challenge. That was: Propose a way that a bad actor could cause catastrophic harm to the nation’s economy just by tapping into data that is generally available. Junio already had an idea in mind. The former CIA analyst had been inspired by University of Michigan researchers who in 2012 reported on their quick new method to ...
Tags: Deals, Startups, Mobile, Hardware, Internet, Entrepreneurship, Funding, Connected Devices, San Francisco, Trends, Web, It, Cybersecurity, Devices, Vc, Software


New Surveillance System May Let Cops Use All Of The Cameras (slashdot)

An anonymous reader quotes a report from Wired: [Computer scientists have created a way of letting law enforcement tap any camera that isn't password protected so they can determine where to send help or how to respond to a crime.] The system, which is just a proof of concept, alarms privacy advocates who worry that prudent surveillance could easily lead to government overreach, or worse, unauthorized use. It relies upon two tools developed independently at Purdue. The Visual Analytics Law Enfor...
Tags: Purdue, Shodan, BeauHD


New Surveillance System May Let Cops Use All Of The Cameras

An anonymous reader quotes a report from Wired: [Computer scientists have created a way of letting law enforcement tap any camera that isn't password protected so they can determine where to send help or how to respond to a crime.] The system, which is just a proof of concept, alarms privacy advocates who worry that prudent surveillance could easily lead to government overreach, or worse, unauthorized use. It relies upon two tools developed independently at Purdue. The Visual Analytics Law Enfor...
Tags: Purdue, Shodan


Using IPv6 with Linux? You've likely been visited by Shodan and other scanners

One of the benefits of the next-generation Internet protocol known as IPv6 is the enhanced privacy it offers over its IPv4 predecessor. With a staggering 2128 (or about 3.4?1038) theoretical addresses available, its IP pool is immune to the types of systematic scans that criminal hackers and researchers routinely perform to locate vulnerable devices and networks with IPv4 addresses.
Tags: Shodan