Publié le Laisser un commentaire

Arts Commentary: Internet Archive Under Attack — Cultural History Under Threat – artsfuse.org

BOSTON’S PREMIER ONLINE ARTS MAGAZINE
Winter 2024 Appeal – Keep the Fuse lit!
By Jeremy Ray Jewell
The Internet Archive’s struggles highlight the challenges faced by nonprofit organizations operating in a digital world dominated by commercial and geopolitical interests.

The Internet Archive, a nonprofit organization dedicated to preserving digital history, is currently facing a series of severe disruptions. Over the past few weeks, it has been the target of multiple hacking incidents, legal battles, and aggressive Distributed Denial of Service (DDoS) attacks. These issues have led to intermittent downtime and limited functionality — and that puts the future of digital preservation at risk.
Founded in 1996 by digital librarian Brewster Kahle, the Internet Archive aims to provide “universal access to all knowledge.” Its “Wayback Machine” has been archiving snapshots of web pages (including HTML, CSS, JavaScript, and images) for nearly three decades. Today, it hosts over 900 billion web pages, amounting to almost 100 petabytes of data. Users can revisit the early days of the internet, from the humble beginnings of today’s tech giants to the quirky personal websites of Geocities. Reflecting the web’s previously diverse past, this is a crucial reminder in our age of internet monopolies that things can be different. The Internet Archive also provides access to a vast collection of videos, audio, and books, many pre-internet. Add a variety of software to that, and it is clear to see why many view it as an invaluable resource for historians, researchers, and the general public. However, recent incidents have threatened the security and functionality of this truly essential service.
The first major sign of trouble surfaced on September 30, 2024, when the data breach website “Have I Been Pwned” (HIBP) reported that the Internet Archive had been compromised. The hack was confirmed on October 5 and the Archive notified on October 6. By October 8, the public was informed that 31 million email addresses, usernames, and password hashes had been exposed. Security researcher Troy Hunt, founder of HIBP, clarified the extent of the compromised data: authentication tokens, consisting of screen names, password update timestamps, and Bcrypt-hashed password digests.
On October 9, attackers defaced the Internet Archive’s website by placing a JavaScript pop-up alert warning visitors about the breach. The alert read, “Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!” This message suggested that the attackers had gotten access to the platform’s codebase, which raised concerns about the security and integrity of the Archive’s data. There is no confirmation that hackers actually tampered with the historical web data, but the potential threat to digital preservation is significant.
The situation escalated with a series of DDoS attacks. On October 8, Brewster Kahle confirmed that the invaders had overwhelmed the Archive’s servers, eventually forcing the platform offline. Russian hacker group SN_BlackMeta claimed responsibility for these assaults, citing political motives related to pro-Palestinian causes and expressing anti-US and anti-Israeli sentiments. The group announced their intention to continue disrupting the Archive, claiming, “They are under attack because the archive belongs to the USA, and as we all know, this horrendous and hypocritical government supports the genocide that is being carried out by the terrorist state of Israel.” The charges have no merit: the Internet Archive is a nonprofit organization with no political affiliations. In a recent post on X, SN_BlackMeta similarly declared, “contrary to popular belief, we do not work and we are not associated to [sic] any government agency”.
Attacking the world’s single most important source of historical information that houses the internet’s history is obviously an absurd way to make a point about Israel-Palestine. For one thing, evidence of Israeli war crimes against Palestinians can be found on the Internet Archive. And, as we all know, conscription-age, politically passionate, tech-savvy Russian rebels are deeply concerned about Palestine at the moment. We need only recall Nazi book burnings and Stalinist purges of opponents from the historical record to see that we have been here before — acts of erasing history before rewriting it. When we consider the threats presented by AI, particularly regarding how it can alter the historical record to make it more palatable to its users, the current danger presented by such attacks on the most important records collection of the last 30 years is evident. If you wanted to harm a free people, you would first attack its freedom of information. Russia has already proven itself apt at undercutting credibility in our understanding of current affairs.
As of October 14, the Archive has managed to restore partial functionality, allowing users to access the Wayback Machine in a “provisional, read-only manner.” Other services remain offline. Kahle stated that additional maintenance might require further suspensions, adding that the organization is “being cautious and prioritizing keeping data safe at the expense of service availability.”
The recent security challenges are not the only concern. The Internet Archive also faces legal challenges stemming from its “Open Library” project, co-founded by Kahle and the late Aaron Swartz (known for his advocacy of open access to information and his mysterious “suicide” while facing federal charges for downloading academic journal articles from JSTOR through MIT’s network). This project digitizes physical books in order to facilitate the lending of digital copies, adhering to a one-to-one ownership model. However, several major publishers sued the Archive, claiming that this practice constituted copyright infringement. The lawsuit ended in favor of the publishers. Not only does the Archive now face potential damages exceeding $600 million; the organization was forced to delete 500,000 digital books, highlighting an ongoing tension between digital preservation and copyright law.
This legal defeat has added to the strain on the Archive’s finances, threatening the sustainability of one of its core projects. A nonprofit, the Internet Archive operates on limited resources, and the convergence of legal and security crises has placed considerable pressure on its future viability. The recent breaches and attacks underscore the fragility of digital preservation. If attackers can erase or tamper with archived content, the loss to historical records is incalculable. The only other entity with a comparable digital archive is Google, which has stopped maintaining its own cached search results. It now redirects users to the Wayback Machine. At this point, losing the Internet Archive would mean erasing a crucial part of the web’s history, with far-reaching consequences for researchers, historians, and the public.
The Internet Archive’s struggles highlight the challenges faced by nonprofit organizations operating in a digital world dominated by commercial and geopolitical interests. Despite its invaluable service, the Archive has always had to operate on limited financial resources. Now, with legal and security crises converging, its future is more uncertain than ever. What began as a visionary project to create a “digital library” has now morphed into a battleground for contentious issues touching on privacy, intellectual property, and digital preservation. The outcome of these battles will have significant implications for how we remember the past in an increasingly “virtual” world.
The challenge is clear: preserving digital history is more critical than ever. If the Internet Archive cannot weather this storm, it will signal the beginning of an Orwellian world, where the internet’s past can be manipulated, revised, or erased, leaving future generations with a distorted or incomplete understanding of history. There are at least two parties who share responsibility for tooling up chaos here. And chances are good that these threats to the preservation of our historical record are on track to grow in the near future. On the one hand, there are the “unaffiliated” Russian hacktivists who are interested in turning the world’s attention away from atrocities in Ukraine and brewing coups in Moldova. On the other hand, large US-based publishers like Wiley have already demonstrated their willingness to transgress norms of academic rigor in order to facilitate collaboration with the informational dictates of totalitarian governments.
Our reboot-saturated market for nostalgia demands that history be appealing, a yen exploited by various ideologies who are hellbent on airbrushing the past for the sake of maintaining or taking power. That urge to remake the past for the sake of pleasing the present makes us increasingly vulnerable to those interested in trashing the historical record. For the sake of a reality-based future, an accurate past must be militantly defended.
Jeremy Ray Jewell writes on class and cultural transmission. He has an MA in history of ideas from Birkbeck College, University of London, and a BA in philosophy from the University of Massachusetts Boston. His website is www.jeremyrayjewell.com.
Thank you so much for this reporting. I wondered if anything had happened. I use this invaluable resource all the time and would happily pay for a subscription if need be. In any case I really appreciate this well-written article.



A real piece of art and the “Performance of the Year” by the beautiful, smart, and very gifted Angelina Jolie.…
I have not read Jonathan Petropoulos’ Göring’s Man in Paris: The Story of a Nazi Art Plunderer and His World, but…
I hear you, though didactic plays tend to set good versus evil, or just versus unjust. That is not what…
The Arsonists was so god awfully obvious. Ironically, the most interesting character was the maid. Didactic is rarely provocative, at…
Always well researched, concise and informative it’s so nice to know true journalists still exist. It is our job to…
About Us
Advertising/Underwriting
Syndication
Media Resources
Editors and Contributors
Boston’s online arts magazine since 2007. Powered by 70+ experts and writers.
“Use the point of your pen, not the feather.” -Jonathan Swift
© 2024 The Arts Fuse. All Rights Reserved. Site by AuthorBytes.

source

Publié le Laisser un commentaire

Government should not pick which religions to favor | Daily Gate City – Keokuk, Iowa – Mississippi Valley Publishing

Overcast. High 51F. Winds S at 5 to 10 mph..
Cloudy skies during the evening. Fog developing overnight. Slight chance of a shower late. Low 41F. Winds NE at 5 to 10 mph.
Updated: December 28, 2024 @ 12:24 am
When it comes to freedom of religion and the rights enshrined in the 45 words of the First Amendment, the devil is in the details in Iowa.
Gov. Kim Reynolds’ administration recently revoked permission for the Satanic Temple of Iowa to place a display in the Capitol and host a holiday celebration around it. The government said the event would harm minors.
A year ago, the governor took the opposite stance on the Satanic Temple’s holiday display. Although she said in 2023 that it was “absolutely objectionable,” she explained then why the display was allowed: “In a free society, the best response to objectionable speech is more speech, and I encourage all those of faith to join me in praying over the Capitol and recognizing the nativity scene that will be on display.”
The reaction from Reynolds’ faithful supporters was quick back then. A state representative called the 2023 display unconstitutional. Some critics said tolerance has its limits. One conservative commentator said, “Promoting evil isn’t freedom of speech.”
That was then. Now is now. The Reynolds administration moved from private prayer against last year’s display to state action this year.
Yet, the First Amendment did not change in the past 12 months. But Reynolds’ views of freedom of speech and freedom of religion certainly sound different. They sound like a politician now guided by the views of her faithful, not by the meaning of the First Amendment.
Adam Steen, a Reynolds appointee who heads the Department of Administrative Services, explained that he banned the Satanic Temple from erecting its display this year and holding its holiday celebration in the Capitol because “the totality of the event,” in his judgment, would “include elements that are harmful to minors.”
Reynolds elaborated in a statement: “The Iowa State Capitol complex is a place that is open to the public, where children and families routinely visit. Because of this, the state’s event policy takes into consideration conduct that would be harmful to minors. This satanic event, which specifically targets children, is harmful to minors and so it was denied.”
The organizers’ description of their “Satanic Holiday Joy” celebration does not come near the governor’s view of the event. In a post on Facebook, organizers wrote, “Our goal was to promote tolerance and acceptance of diverse religious beliefs, with a theme of finding light in the darkness and welcoming the darkest nights of the year with joy and camaraderie.”
The statement added: “As a peaceful law-abiding organization, we will embody the spirit of wisdom and compassion in the face of injustice.”
Kim Reynolds and Adam Steen lack the authority to decide what constitutes a religion or which faith groups are worthy of access to the Iowa Capitol and which are not. The First Amendment requires even-handed treatment of everyone.
As organizers explained, the only difference between the traditional Christmas celebrations that occur inside the Capitol and the Satanic Temple’s event is that one is about celebrating Jesus, while one is not.
Iowa is not alone in facing this controversy. A holiday display by the Minnesota Satanists was vandalized this month at the State Capitol in St. Paul. A spokesman for Minnesota Gov. Tim Walz said the governor does not agree with the display. But the official told the Minnesota Star Tribune, “The First Amendment means that he does not police speech in the State Capitol. That’s true whether it’s a religious display, a political protest, or a Minnesotan advocating for a policy.”
Steen, the Iowa official who nixed the Satanic Temple event this year, apparently based his decision on organizers’ plans for costumed characters around the display to carry sticks as symbolic weapons. And Steen believed either the sticks or the images could harm children.
There is certain amount of irony in the position of state officials. State government is disregarding the First Amendment and prohibiting a religious display that does not square with the religious views of the governor and Steen. In contrast, officials often point to the Second Amendment’s right to bear arms as the reason for not doing more to combat the danger of school shootings.
There have been far more students killed or wounded in gun violence in Iowa public schools than in celebrations hosted by the Satanic Temple at a government building.
What this boils down to is the group’s name. Were the Satanic Temple called the People’s Faith Community, it is unlikely public outcry would follow.
The seven tenets of the Satanic Temple include this one that might help guide Gov. Reynolds and Director Steen: “People are fallible. If one makes a mistake, one should do one’s best to rectify it and resolve any harm that might have been caused.”
Admission of error does not appear forthcoming, so the courts may need to resolve this disagreement over the meaning of the First Amendment. And resolving any harm likely will include the payment of thousands of dollars to the temple’s lawyers if they succeed in educating state officials on one of America’s foundational freedoms.

Randy Evans is executive director of the Iowa Freedom of Information Council and can be reached at DMRevans2810@gmail.com.
{{description}}
Email notifications are only sent once a day, and only if there are new matching items.
The Daily Gate mobile app brings you the latest local breaking news, updates, and more. Read the Daily Gate on your mobile device just as it appears in print.


Overcast. High 51F. Winds S at 5 to 10 mph.
Cloudy skies during the evening. Fog developing overnight. Slight chance of a shower late. Low 41F. Winds NE at 5 to 10 mph.
Cloudy skies. High 46F. Winds NW at 5 to 10 mph.
Your browser is out of date and potentially vulnerable to security risks.
We recommend switching to one of the following browsers:

source

Publié le Laisser un commentaire

Internet Archive Slowly Revives After DDoS Barrage – Dark Reading

TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa
Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.
Days after facing a major breach, the site is still struggling to get fully back on its feet.
October 17, 2024
The Internet Archive, a nonprofit digital library website, is beginning to come back online after a data breach and distributed denial-of-service (DDoS) attacks, prompting a week of its systems going offline.
Founded in 1996 by Brewster Kahle, the archive offers users free access to a historical Web collection, known as the Wayback Machine. This including access to more than 150 billion webpages, nearly 250,000 movies, 500,000 audio items, and more.
This free access to these seemingly unlimited resources all came to a halt on Oct. 9, when hackers stole and leaked the account information of a reported 31 million users. 
The users were met with a pop-up that read, "Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!"
HIBP is the "Have I Been Pwned" site that allows users to look up whether their personal information has been compromised in a data breach.
The Internet Archive site went offline in an effort to try to prevent such attacks from continuing to happen. Founder Brewster Kahle reported on social platform X that this process would take days, if not weeks.
"The @internetarchive's Wayback Machine resumed in a provisional, read-only manner. …. Please be gentle."
And in an update yesterday, he reported that Wayback Machine is running strong, though the team is still working to bring Internet Archive items and other services online safely.
Netscout, which has conducted analyses on the breach, reported that its researchers observed 24 DDoS attacks against the Autonomous System Number (ASN) 7941, the ASN used by the Internet Archive project. The first attack lasted more than three hours, and during the attack, three IP addresses used by Internet Archive received DDoS attack traffic.
"These kinds of attacks energize adversaries, and they often attempt to replicate the feat," the Netscout researchers reported
Bruno Kurtic, co-founder, president, and CEO of Bedrock Security, notes that perhaps these kind of breaches are inevitable.
"Perimeters will be breached, vulnerabilities will be exploited … attackers will eventually be at the front door of your data stores," he says. "For most enterprises, the first and fundamental gap is not knowing where their data is. Data is fluid, it moves, it sprawls, and it is created at an exponential rate."
To protect that data, Kurtic advises "proactive policy management," as well as detection of movement, encryption, and hashing.
"Monitoring access and continuously scanning to update classifications at hundreds-of-petabytes scale is hard but essential," he adds.

Kristina Beek, Associate Editor, Dark Reading

Skilled writer and editor covering cybersecurity for Dark Reading.
You May Also Like
Securing Your Cloud Data Across the Attack Timeline
The Artificial Future Trend Micro Security Predictions for 2025
Managing Third-Party Risk Through Situational Awareness
2024 InformationWeek US IT Salary Report
Securing Your Cloud Data Across the Attack Timeline
The Artificial Future Trend Micro Security Predictions for 2025
IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows
Solution Brief: Introducing the runZero Platform
Top 10 CI/CD Security Risks: The Technical Guide
6 Key Requirements of Multicloud Security
The State of Cloud Native Security Report 2024
Copyright © 2024. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.

source

Publié le Laisser un commentaire

Internet Archive and Wayback Machine Resurrect After DDoS Wave – Infosecurity Magazine

Reporter, Infosecurity Magazine
Most of Internet Archive’s services have resumed after a series of distributed denial-of-service (DDoS) attacks took the world’s largest digital library’s website offline several times over the past few days.
In a blog post published on October 18, the non-profit confirmed that many services are now up and running, including its Wayback Machine, Archive-It, scanning and national library crawls, email, blog, helpdesk and social media communications.
“Our team is working around the clock across time zones to bring other services back online. In coming days more services will resume, some starting in read-only mode as full restoration will take more time,” the organization added.
The digital library also suffered a JavaScript-based website defacement showing a message in which a mysterious threat actor claimed to have breached 31 million unique records from the Internet Archive’s IT systems, including email addresses, screen names and bcrypt password hashes.
The breach was confirmed on October 9 by data breach notification service Have I Been Pwned, and later by Internet Archive itself.
However, Internet Archive founder Brewster Kahle said on X October 11 that “data is safe.”
In its latest blog post, the non-profit further confirmed that “the stored data of the Internet Archive is safe.”
Neither Kahle nor the non-profit communicated the measures they took to ensure the previously exposed data was now safe.
“We’re taking a cautious, deliberate approach to rebuild and strengthen our defenses. Our priority is ensuring the Internet Archive comes online stronger and more secure,” said the non-profit in its public statement.
“As a library community, we are seeing other cyber-attacks—for instance the British Library, Seattle Public Library, Toronto Public Library, and now Calgary Public Library. We hope these attacks are not indicative of a trend,” it added.
On X, Kahle also prompted his community to donate to Internet Archive.

source

Publié le Laisser un commentaire

College football games on TV today: Full schedule, times, channels, live streams to watch Saturday bowl games – Sporting News

NFL
Home
News
Teams
Scores
Schedule
Standings
Buffalo Bills
Miami Dolphins
New England Patriots
New York Jets
Baltimore Ravens
Cincinnati Bengals
Cleveland Browns
Pittsburgh Steelers
Houston Texans
Indianapolis Colts
Jacksonville Jaguars
Tennesse Titans
Denver Broncos
Kansas City Chiefs
Las Vegas Raiders
Los Angeles Chargers
Dallas Cowboys
New York Giants
Philadelphia Eagles
Washington Commanders
Chicago Bears
Detroit Lions
Green Bay Packers
Minnesota Vikings
Atlanta Falcons
Carolina Panthers
New Orleans Saints
Tampa Bay Buccaneers
Arizona Cardinals
Los Angeles Rams
San Francisco 49ers
Seattle Seahawks
NBA
Home
News
Teams
Scores
Schedule
Standings
Boston Celtics
Brooklyn Nets
New York Knicks
Philadelphia 76ers
Toronto Raptors
Chicago Bulls
Cleveland Cavaliers
Detroit Pistons
Indiana Pacers
Milwaukee Bucks
Atlanta Hawks
Charlotte Hornets
Miami Heat
Orlando Magic
Washington Wizards
Denver Nuggets
Minnesota Timberwolves
Oklahoma City Thunder
Portland Trail Blazers
Utah Jazz
Golden State Warriors
LA Clippers
Los Angeles Lakers
Phoenix Suns
Sacramento Kings
Dallas Mavericks
Houston Rockets
Memphis Grizzlies
New Orleans Pelicans
San Antonio Spurs
MLB
Home
News
Teams
Scores
Schedule
Standings
Baltimore Orioles
Boston Red Sox
New York Yankees
Tampa Bay Rays
Toronto Blue Jays
Chicago White Sox
Cleveland Guardians
Detroit Tigers
Kansas City Royals
Minnesota Twins
Athletics
Houston Astros
Los Angeles Angels
Seattle Mariners
Texas Rangers
Atlanta Braves
Miami Marlins
New York Mets
Philadelphia Phillies
Washington Nationals
Chicago Cubs
Cincinnati Reds
Milwaukee Brewers
Pittsburgh Pirates
St. Louis Cardinals
Arizona Diamondbacks
Colorado Rockies
Los Angeles Dodgers
San Diego Padres
San Francisco Giants
NCAAF
Home
News
Teams
Playoff Bracket
Scores
Schedule
Standings
Rankings
ACC
Big 12
Big Ten
SEC
Arizona State
Boise State
Clemson
Georgia
Indiana
Notre Dame
Ohio State
Oregon
Penn State
SMU
Tennessee
Texas
NHL
Soccer
NCAAMB
NCAAWB
WNBA
Boxing
MMA
WWE
F1
NASCAR
Golf
Tennis
College
High School
Horse Racing
More Sports
fubo
Sling
Paramount+
Peacock
ESPN+
Apple TV
DAZN
Best Streaming Services
Best VPN Services
SiriusXM
Tickets
Stadium Guides
NCAAF
NFL
NBA
MLB
NCAAF
Jared Greenspan
Saturday features the busiest day of the college football bowl season, with eight games — and some of the best players in the country — on the docket. 
Heisman Trophy winner Travis Hunter and star quarterback Shedeur Sanders will suit up one last time for No. 23 Colorado. The Buffaloes vie for their first 10-win season since 2016 in the Alamo Bowl against No. 17 BYU. 
Cam Ward, poised to be one of the first quarterbacks off the board in April’s NFL Draft, readies for his collegiate finale in the much-anticipated Pop-Tarts Bowl. Ward and the 13th-ranked Hurricanes take on No. 18 Iowa State. 


WATCH:Saturday's college football bowl games LIVE with Fubo (free trial)
Elsewhere, North Carolina plays its first game since hiring legendary head coach Bill Belichick as its new head man. The Tar Heels take on UConn in the Fenway Bowl, with Freddie Kitchens serving as the interim head coach. 
The Sporting News gets you set with everything that you need to know about Saturday’s slate of college football bowl games. 
The majority of Saturday’s college football bowl games will be split amongst ABC and ESPN. 
The CW Network will have exclusive coverage of the Arizona Bowl, with Colorado State taking on Miami (OH). 
Viewers can stream all of the games live with Fubo, which offers a free trial, so you can try before you buy. 

WATCH THE NCAAF LIVE. START YOUR FREE TRIAL TODAY.
For a limited time, you can get your first month of Fubo for as low as $49.99, a $30 savings. Stream ESPN, ABC, CBS, Fox, NBC and 200+ top channels of live TV and sports without cable. (Participating plans only. Taxes and fees may apply.)
Listen to Saturday’s bowl games live with SiriusXM
Get SiriusXM for free for your first month. Listen to live NBA, NFL, MLB and NHL games, plus NASCAR, college sports and more. Stay updated with all the news and get all the analysis on multiple sport-specific channels.
See team-specific channels for each game below. 
If you purchase a product or register for an account through one of the links on our site, we may receive compensation. Learn more >
Jared Greenspan is a contributing writer for The Sporting News. Before joining The Sporting News, he covered University of Michigan football and basketball for The Michigan Daily and spent two summers working for the New York Post. Even though they often test his strength, he enjoys rooting for his favorite teams — the New York Mets, New York Knicks and New York Jets.

source

Publié le Laisser un commentaire

Bitget Expands User Opportunities with PoolX Lock-to-Get Airdrops – Block Telegraph

Victoria, Seychelles, December 28th, 2024, Chainwire

Bitget, the leading cryptocurrency exchange and Web3 company has announced the introduction of PoolX, an advanced lock-to-get airdrop platform designed to provide users with hourly token rewards. PoolX allows participants to lock specific coins and earn popular token airdrops based on their contributions to designated pools.
The latest PoolX activity enables users to lock Bitcoin (BTC) and Ethereum (ETH) to receive BGB token airdrops. This activity, running from December 27, 2024, 10:00 UTC, to December 31, 2024, 10:00 UTC, features a total reward pool of 15,000 BGB tokens. Token distribution is calculated hourly based on the proportion of an individual’s locked amount relative to the total locked amount in the pool.
The BTC locking pool offers a total of 7,500 BGB for distribution, with a minimum locking amount of 0.0001 BTC and a maximum of 2 BTC. Similarly, the ETH locking pool provides 7,500 BGB in rewards, with a minimum locking amount of 0.002 ETH and a maximum of 15 ETH. Users’ individual rewards are determined by their locked amount in relation to the total locked amount in each pool.
Participants must complete identity verification to be eligible. Sub-accounts, institutional users, and market makers are not permitted to join this promotion. Bitget reserves the right to disqualify users who engage in fraudulent activities or violate the promotion’s terms and conditions. The company may revise or cancel the promotion at its sole discretion and without prior notice.
About Bitget
Established in 2018, Bitget is the world’s leading cryptocurrency exchange and Web3 company. Serving over 45 million users in 150+ countries and regions, the Bitget exchange is committed to helping users trade smarter with its pioneering copy trading feature and other trading solutions, while offering real-time access to Bitcoin price, Ethereum price, and other cryptocurrency prices. Formerly known as BitKeep, Bitget Wallet is a world-class multi-chain crypto wallet that offers an array of comprehensive Web3 solutions and features including wallet functionality, token swap, NFT Marketplace, DApp browser, and more.
Bitget is at the forefront of driving crypto adoption through strategic partnerships, such as its role as the Official Crypto Partner of the World’s Top Football League, LALIGA, in EASTERN, SEA and LATAM market, as well as a global partner of Turkish National athletes Buse Tosun Çavuşoğlu (Wrestling world champion), Samet Gümüş (Boxing gold medalist) and İlkin Aydın (Volleyball national team), to inspire the global community to embrace the future of cryptocurrency.
For more information, visit: Website | Twitter | Telegram | LinkedIn | Discord | Bitget Wallet
For media inquiries, please contact: media@bitget.com
Risk Warning: Digital asset prices are subject to fluctuation and may experience significant volatility. Investors are advised to only allocate funds they can afford to lose. The value of any investment may be impacted, and there is a possibility that financial objectives may not be met, nor the principal investment recovered. Independent financial advice should always be sought, and personal financial experience and standing carefully considered. Past performance is not a reliable indicator of future results. Bitget accepts no liability for any potential losses incurred. Nothing contained herein should be construed as financial advice. For further information, please refer to the Terms of Use.

Public Relations
Media
Bitget
media@bitget.com

BlockTelegraph is the leading source of blockchain and cryptocurrency news for industry outsiders with digestable coverage and influencer opinions.
© Grit Daily Group. All Rights Reserved.

source

Publié le Laisser un commentaire

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers – GBHackers

Published on
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised EXE installer, as analysis revealed a parent-child relationship between these samples, all of which communicated with the same C2 server.
The Lumma Stealer Trojan, observed in the provided sample, employs advanced techniques to exfiltrate sensitive data from popular browsers and applications, which targets a wide range of information, including browser credentials, cryptocurrency wallet details, and user profiles from platforms like Steam and Discord, posing a significant threat to user privacy and security.
The collection includes three files: a PowerShell script (“Trigger.ps1”), another PowerShell script (“BMB1tcTf.txt”) significantly larger in size, and an executable (“hhh.exe”), while SHA1 hashes are provided for each file for identification and integrity verification.
Trigger.ps1 is a PowerShell script that downloads a file (BMB1tcTf.txt) and executes it if the environment is legitimate, which appears to be malicious as it attempts to download and execute another file (hhh.exe).
The malware sample, identified as GHOSTPULSE, gathers system information including operating system details, hardware specifications, loaded modules, and active processes after execution.
It creates a new process using more.com (an MS DOS command to display text content) and injects its payload using the Process Doppelgänging technique and then drops two files: one named more.com and another with a random lowercase letter combination filename.
Malware disguised as an AutoIt script (AutoIt3.exe) was delivered and contained a PNG image embedded with a malicious payload using the Ghostpulse technique, where the extracted payload indicates it can steal cryptocurrency and password-related data.
According to Tianqiong sandbox analysts, Lumma Stealer is a Trojan that uses process injection (Heaven’s Gate technique) to execute 32-bit APIs in a 64-bit environment to steal system information, clipboards, browser passwords, etc. and send it to the C2 server.
It utilizes a multipart/form-data communication protocol with a unique boundary string to exfiltrate sensitive data, such as Firefox passwords, by establishing a session with a C2 server using a specific lifeID and transmitting stolen data in a compressed format, demonstrating advanced evasion techniques.

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.
Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.
GBHackers on Security is a top cybersecurity news platform, delivering up-to-date coverage on breaches, emerging threats, malware, vulnerabilities, and global cyber incidents.
Company
Trending
Categories
Copyright @ 2016 – 2024 GBHackers On Security – All Rights Reserved

source

Publié le Laisser un commentaire

Cybersecurity in Local Government: A Call for Vigilance – MarketScale

Extreme Networks, Inc. provides software-driven networking solutions worldwide. It designs, develops, and manufactures wired and wireless network infrastructure equipment; and develops software for network management, policy, analytics, security, and access controls.
Extreme Networks
Failed to copy link!
Failed to copy link!

Local governments face unique cybersecurity challenges, balancing compliance mandates like Texas’ House Bill 3834 with critical operational needs. Systems such as CJIS demand rigorous audits, yet resources often stretch thin between maintaining essential services and securing digital assets. Success stories, like Seguin’s award-winning program, highlight the importance of prioritizing cyber readiness. In this digital age, vigilance and continual adaptation are non-negotiable—start strengthening your cybersecurity framework today!
Share Show
Failed to copy link!
Faced with managing 30,000 devices amid budget and staffing challenges, Kenosha Unified School District turned to Extreme Networks for a transformative solution. With the WINGS system, network managers now monitor issues in real-time, analyze data, and resolve incidents in minutes rather than hours. Swiftly deployed across 42 buildings with zero downtime, the platform reduces workload…
Share Show
Failed to copy link!
In an exclusive interview, Volker Kull of BELL Computer-Netzwerke GmbH shares how Extreme Networks is revolutionizing industries with cutting-edge solutions. With robust security, AI-driven insights, and seamless network management tools, Extreme Networks simplifies complex environments across healthcare, education, and government sectors. Kull highlights their meticulous attention to performance and user experience, making them a trusted…
Share Show
Failed to copy link!
Andre Vuch of Klinikum Freudenstadt – IT highlights how Extreme Networks transformed their network management, turning complexity into simplicity. With centralized management, secure end-device integration, and stable system redundancy, the hospital now operates seamlessly, even under demanding conditions. Early adoption of Network Access Control (NAC) proved a game-changer, streamlining device relocation and integration. Extreme Networks’…
Engage your audience with original, industry-specific content.
At MarketScale, we harness the power of our AI-driven platform alongside a vibrant community of B2B content creators.

source