#leak

anonymiss@despora.de

#Microsoft employees exposed internal passwords in #security lapse

source: https://techcrunch.com/2024/04/09/microsoft-employees-exposed-internal-passwords-security-lapse/

Security researchers Can Yoleri, Murat Özfidan and Egemen Koçhisarlı with #SOCRadar, a #cybersecurity company that helps organizations find security weaknesses, discovered an open and public storage server hosted on Microsoft’s #Azure #cloud service that was storing internal information relating to Microsoft’s #Bing search engine.

#fail #password #leak #problem #news

anonymiss@despora.de

Exclusive: #YossiSariel unmasked as head of #Unit8200 and architect of #AI #strategy after book written under pen name reveals his #Google account

Source: https://www.theguardian.com/world/2024/apr/05/top-israeli-spy-chief-exposes-his-true-identity-in-online-security-lapse

The embarrassing #security lapse is linked to a book he published on #Amazon, which left a digital trail to a private Google account created in his name, along with his unique ID and links to the #account’s maps and calendar profiles.

#Israel #internet #Anonymity #privacy #spy #military #CyberSecurity #news #online #leak #identity

abdominals@diasp.eu

Warning !!! Secret Intelligence Leak - Planned April 8th Solar Eclipse Biological Attack

Uncle Intel: They are planning a biological attack on April 8th, just before the totality of the eclipse. This is how it’s going to go down. Planes will be delivering their payload at three intervals. First will be 2 hours before totality, 1 hour before totality and final one 30 mins before totality. The planes will be deploying a dry powder (bacterial bioweapon). It will not be visible. You won’t see it from the planes or the sky. It’s meant to infect through aerosol delivery. The first two planes will be at standard altitude, the final plane will be at approximately 10,000 - 15,000 feet. The path of flight will begin from the northeast, and they will travel down the central path of totality heading west-south-west, keeping in pace with the totality of the eclipse.

They are doing this to take advantage of the event because they know there will be guaranteed targets that will be infected, and thus be the vectors to spread the contagion. Symptoms will begin appearing 7 - 10 days after infection. 30 days after infection the media will notice. 60 days after infection the panic will at all-time highs. 90 days after infection the newly agreed upon UN/WHO pandemic powers will be enacted. And you know what will happen next.

People in the path of totality should not go outside. Bacterial payload will lose effectiveness within 6 hours post deployment. Half-life of powder with vary on humidity and temperature. The staring point is in Canada, the end point is in Mexico. Winds are the unpredictable factor, as is rain. Both of which will negatively impact the operation.

https://www.youtube.com/watch?v=DCOZOOO4SUY

#leak #pandemic #plandemic #depopulation #aerosols #bacteria #biological #attack

deutschlandfunk@squeet.me

Grüne zur Taurus-Abhöraffäre: Hybride Kriegsführung ernst nehmen

Taurus-Abhöraffäre - Von Notz (Grüne): Bessere Abwehr der hybriden Kriegsführung nötig

Es brauche eine bessere Analysefähigkeit der Gesellschaft für "Kampagnen der Spaltung", sagt der Grüne Konstantin von Notz zum geleakten Bundeswehr-Gespräch.#KrieginderUkraine #BUNDESWEHR #Taurus #Leak #abgehört #HybrideKriegsführung
Grüne zur Taurus-Abhöraffäre: Hybride Kriegsführung ernst nehmen

deutschlandfunk@squeet.me

Bundeswehr-Leak

Politologe Nico Lange - "Taurus trifft einen wunden Punkt"

Gespräche über Taurus hätten schon 2023 geführt werden sollen, sagt Sicherheitsexperte Nico Lange. Das Leak zeige aber, dass Taurus einen wunden Punkt treffe.#Taurus #NicoLange #MünchnerSicherheitskonferenz #SICHERHEIT #Spionage #Leak #RUSSLAND #KRIEG #UKRAINE
Bundeswehr-Leak

anonymiss@despora.de

#HewlettPackard Data #Breach: IntelBroker Alleges Sale of Sensitive Information

source: https://thecyberexpress.com/hewlett-packard-enterprise-data-breach-claims/

Network configuration details, including IP addresses, subnet masks, gateways, and DNS settings, are provided under the “networks” key. The code also contains a section for “test_clients,” offering insights into capabilities, credentials, and networks, showcasing an example entry for an SMTP server.

#hack #privacy #security #hp #darknet #news #leak