For those being notified or first learning about the #WIRED #databreach:
On December 25, I broke the story of how I had been contacted in November by "Lovely," who claimed to have discovered a vulnerability. They asked for help getting Condé Nast to respond to them. They claimed they were not seeking any bounty or payment and had only downloaded a few profiles as proof.
They showed me my own data.
Trying to help, I reached out to Condé Nast corporate as well as to a contact at #WIRED.
Condé Nast never responded to me -- or to "Lovely" who eventually showed their true colors as someone trying to extort Condé Nast.
Do they have more data? Yes, it appears they do.
@troyhunt verified the data leak and #HIBP has been notifying its affected subscribers.
Read more details in my blog post at https://databreaches.net/2025/12/25/conde-nast-gets-hacked-and-databreaches-gets-played-christmas-lump-of-coal-edition/
@zackwhittaker @campuscodi @gcluley @euroinfosec @ValeryMarchive
#databreach #dataleak #infosec #cybersecurity #incidentresponse
"Search advertising continues to be the largest form of internet advertising. Search revenue grew nearly 16% year on year."
$103B in search ad revenue (in U.S alone!) means results are ranked by who pays most, not what's most relevant.
This is the model Kagi Search rejects.
There's a new Fediverse music streaming service showing music videos by small independent artists with their permission. You can view the channel at:
It's like the old-style MTV but for the Fediverse 🙂
You can follow the channel at:
➡️ @TIBtv
The service runs on @owncast and you can find out more about OwnCast at:
➡️ https://fedi.tips/owncast-live-streaming-and-chat-on-the-fediverse
Want to know how Apple's Low Latency WiFi works?
Today, 3:40pm CET, Hall 1, #39c3.
More details: https://events.ccc.de/congress/2025/hub/event/detail/cracking-open-what-makes-apple-s-low-latency-wifi-so-fast
Stream: https://streaming.media.ccc.de/39c3/one
https://gpg.fail IS ONLINE
TALK VOD IS ONLINE (preliminary recording, not yet edited) #39c3
The worst part of Christmas, where everyone is at #39c3 and I am not
I was away for a while, dropping my current side-project here.
Password cracking in your browser. Think of it as a mini-@hashcat it uses WebGPU to perform the cracking.
NT/LM/DCC/DCC2/MD5 currently implemented with bruteforce/mask/wordlist/hybrid attacks.
https://webcrack.octopwn.com/
RE: https://infosec.exchange/@zak/115793005915790340
This is a metaphor about cybersecurity products.
🔺This is the first talk I've given in 6 years – featuring formal verification of post-quantum cryptography, the evolution of the Secure Page Table Monitor, a view into Memory Integrity Enforcement, updates to Apple Security Bounty… and a personal note.
https://bird.makeup/users/hexacon_fr/statuses/2002020791865532704
At the https://gpg.fail talk and omg #39c3
You can just put a \0 in the Hash: header and then newlines and inject text in a cleartext message.
Won’t even blame PGP here. C is unsafe at any speed.
gpg has not fixed it yet.
Disobedience in Helsinki coming soon! #Disobey2026 https://disobey.fi/2026/