mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#darkweb

2 posts2 participants0 posts today

Update:

Doesn't appear to be a breach, but, ya know, it's still good security practice to change your password and use 2FA anyway.

Original:

Two-factor your accounts, too, if you haven't!

You should probably change your Steam password: data from over 89 million Steam users is reportedly on the dark web following a vendor breach

vg247.com/steam-vendor-data-br

Mapping China’s Fentanyl Supply Chain to the U.S.

This 16-page OSINT report exposes real vendors, domestic Chinese platforms, and digital trafficking infrastructure — far beyond what Google can see.
We dug into the real China’s internal ecosystem — domains, seller communications, logistics tactics — and mapped how fentanyl flows toward the U.S.

📄 Read the full report here:
🔗 epcyber.com/blog/f/mapping-chi

Have you ever walked into a supermarket, pharmacy, or department store looking to buy a specific item, only to find the layout confusing? Perhaps you ended up aimlessly strolling around, purchasing other items? This is deliberate, and known as the Gruen Transfer. The 'Transfer' part is the moment that you, as a consumer surrounded by a deliberately confusing layout, lose track of your original intentions.
We've all experienced it, and now it's starting to consume the internet. #Internet #GruenTransfer #DarkWeb #WWW #Enshitification

sebs.website/blog/the%20gruen-

sebs.websiteThe Gruen Transfer is consuming the internet<p>The Gruen Transfer is taking over social media. What is it and how can we avoid it?</p>

I had the pleasure of presenting at #FIRSTCTI25 in Berlin:

"The Art of Pivoting – How You Can Discover More from Adversaries with Existing Information."

The talk explored how unconventional indicators, like cookie names, QR codes, HTTP headers (HHHash), DOM structures, and reused Google Analytics IDs, can reveal surprising links across threat actor infrastructure and behavior.

We also shared real-world insights from our crawling and analysis with AIL, including:

  • How “weak” indicators can gain strength through composite correlation
  • Unexpected metadata reuse across Tor services and social platforms
  • How AIL enables more creative and effective pivoting workflows

🔗 Slides ail-project.org/assets/img/sli

#threatintel #threatintelligence #cti #opensource #cybersecurity #darkweb

@misp @ail_project @circl

Thanks to @terrtia for the crazy discussions around correlations!

⚠️ Major AI data breach: DeepSeek leaks 1M+ records to the Dark Web 🧠💥

China-based AI startup DeepSeek just exposed a staggering volume of sensitive data:
💬 1M+ chat logs
🔐 API keys, backend metadata
📡 Unencrypted traffic via iOS app (ATS disabled)
🔓 Open ClickHouse database with full control

This wasn’t just a lapse — it was a floodgate.

🛡️ AI companies (and anyone integrating LLMs) must:
🔍 Audit storage configs
🔐 Enforce secure transport policies
📊 Monitor for unintentional data exposure

The future of AI relies on building trust. That starts with securing it.

#AI #CyberSecurity #DataBreach #DarkWeb #InfoSec
darkreading.com/cyberattacks-d