The hottest Data Breach Substack posts right now

And their main takeaways
Category
Top Technology Topics
Metacurity 1434 implied HN points 31 Jan 24
  1. The New York Attorney General sued Citibank for insufficient data security measures and failure to address scams.
  2. Citibank is accused of not doing enough to prevent unauthorized account takeovers and misleading customers about their rights after being hacked.
  3. The lawsuit alleges that Citibank has overpromised and underdelivered on security measures and failed to respond to red flags.
SuperJoost Playlist 216 implied HN points 21 Dec 23
  1. The business of hacking video game publishers is growing, with recent incidents showing flaws in hackers' business fundamentals.
  2. Hacking video game companies does not always result in financial gain for the hackers, as evidenced by unsuccessful attempts to sell stolen data.
  3. Leaking information about upcoming video games may actually generate more excitement and interest in the games rather than spoil the experience for players.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Distributed Email of Secrets 455 implied HN points 03 May 23
  1. Data leak from the American College of Pediatricians reveals sensitive information like donor details and passwords
  2. The leaked files include internal documents about ACPeds donors, finances, and members' information
  3. ACPeds has faced rejection as an Amazon Smile charity and scrutiny for using questionable sources for information
Metacurity 39 implied HN points 22 Jan 24
  1. Russian hacking group MidnightBlizzard, also known as Nobelium, breached Microsoft networks and stole emails from executives and employees.
  2. The breach was detected in November but Microsoft began notifying affected staff in January.
  3. Hackers used a password spray attack on an old test account to access multiple email streams.
Rod’s Blog 39 implied HN points 23 Aug 23
  1. A Model Inversion attack against AI involves reconstructing training data by only having access to the model's output, posing risks to data privacy.
  2. There are two main types of Model Inversion attacks: black-box attack and white-box attack, differing in the level of access the attacker has to the AI model.
  3. Model Inversion attacks can have severe consequences like privacy violation, identity theft, loss of trust, legal issues, and misuse of sensitive information, emphasizing the need for robust security measures.
Natto Thoughts 19 implied HN points 30 Jun 23
  1. The German television miniseries 'The Billion Dollar Code' on Netflix captures the excitement of early hacker culture.
  2. Distributed denial-of-service (DDoS) attacks are evolving in sophistication and targeting new entities, posing significant cyber risks.
  3. China's potential support for Ukraine in reclaiming disputed territories, like Crimea, signifies a shift in geopolitical dynamics and requires careful observation.
The Nibble 14 implied HN points 18 Jun 23
  1. CoWIN experienced an alleged data breach involving sensitive personal information like Aadhar and passport details.
  2. Google recently sold its domain business to Squarespace.
  3. OpenAI released new updates, including powerful API enhancements and feature additions.
Links I Would Gchat You If We Were Friends 0 implied HN points 23 Nov 15
  1. Tech-site intrigue includes a story about Tinder executive Whitney Wolfe and a Sony hack experience.
  2. Comments from the internet's comments section show interesting confessions and the hidden humanity of commenters.
  3. Other interesting snippets include details about the Russian version of Telegram, toxic remains in Silicon Valley, and quirky GPS directions.