buc.ci is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
abucci@bucci.onl
Admin account
@abucci@buc.ci

Search results for tag #breach

AodeRelay boosted

[?]PrivacyDigest » 🌐
@PrivacyDigest@mas.to

Act Now to Stop ’s Paternalistic & -Destroying Ban

That means, all Californians would be required to submit highly sensitive gov-issued ID or info to private companies simply to participate in the modern public square. In the name of “safety,” this bill would destroy online , expose sensitive personal data to & abuse, & replace parental decision-making with state-mandated

eff.org/deeplinks/2026/04/act-

    AodeRelay boosted

    [?]PrivacyDigest » 🌐
    @PrivacyDigest@mas.to

    France's 'Secure' ID agency probes claimed 19M record • The Register

    Gov admits 'incident' as forum sellers boast of fresh haul covering up to a third of the population

    theregister.com/2026/04/22/fra

      3 ★ 2 ↺
      #tech boosted

      [?]Anthony » 🌐
      @abucci@buc.ci

      One of the things I'm finding stunning about the Vercel breach is how many people are saying "I had $VERY_LARGE_NUMBER of OAuth apps authorized to my $VERY_IMPORTANT_ACCOUNT and had to go through them all". I have like 2 OAuth apps authorized on any account that matters to me, and I review them fairly regularly and remove ones I don't use or don't remember. I also never accept "allow all" for any app. Apparently I'm weird in this way? I just feel like not doing this is akin to using "password" for all your passwords.


        AodeRelay boosted

        [?]Hacker News » 🤖 🌐
        @h4ckernews@mastodon.social

        AodeRelay boosted

        [?]hbrpgm » 🤖 🌐
        @hbrpgm@adalta.social

        📺 peer.adalta.social/w/mv38QAYdk
        🔗 [🇩🇪🇺🇸🇫🇷](adalta.info/articles/prstn_sec)
        🔗 [ℹ️](nubo.email/blogs/password-mana")

        La convergence de ces deux outils est devenue impérative face à un paysage de menaces où les identifiants compromis sont le vecteur d'attaque prédominant.

          AodeRelay boosted

          [?]hbrpgm » 🤖 🌐
          @hbrpgm@adalta.social

          📺 peer.adalta.social/w/rA8nSZQVG
          🔗 [🇩🇪🇺🇸🇫🇷](adalta.info/articles/prstn_sec)
          🔗 [ℹ️](nubo.email/blogs/password-mana")

          The majority of modern data breaches originate from the intersection of weak password hygiene and unsecured email communications.

            AodeRelay boosted

            [?]hbrpgm » 🤖 🌐
            @hbrpgm@adalta.social

            📺 peer.adalta.social/w/qFLKtusXC
            🔗 [🇩🇪🇺🇸🇫🇷](adalta.info/articles/prstn_sec)
            🔗 [ℹ️](nubo.email/blogs/password-mana")

            Die Kombination aus Passwort-Manager und E-Mail-Sicherheit ist nicht nur sinnvoll, sondern eine strategische Notwendigkeit für den Schutz sensibler Daten.

              AodeRelay boosted

              [?]Simon Zerafa » 🌐
              @simonzerafa@infosec.exchange

              RE: social.lansky.name/@hn50/11621

              Yet another reason why ID verification is unsafe at any speed 😕🤦‍♂️

                AodeRelay boosted

                [?]PrivacyDigest » 🌐
                @PrivacyDigest@mas.to

                Investigates That May Have Hit Its Tools

                The FBI is investigating a breach affecting systems tied to wiretapping and data, after abnormal logs revealed possible unauthorized access to law-enforcement-sensitive information. "The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond,"

                yro.slashdot.org/story/26/03/0

                  AodeRelay boosted

                  [?]Jonathan Kamens 86 47 » 🌐
                  @jik@federate.social

                  @cR0w Yup, I got two emails from them too, and I checked my email archive and I have indeed used them before.
                  The emails are legitimately coming from inside HungerRush, so not only have they got the data, they still have at least some unauthorized access to internal systems.
                  @troyhunt @zackwhittaker here's one for you to look into. 😉

                  Subject: 	Important Security Concern
Date: 	Wed, 04 Mar 2026 06:25:52 +0000 (UTC)
From: 	support@hungerrush.com

Dear HungerRush,

You cannot ignore all my requests and expect me not to take malicious actions. You still have time. Every restaurant and customer of said restaurants' data which is in the millions is in jeopardy here and I can't even get a response back. Not to worry, there's still time left.

You know where to contact me. (p********p****@protonmail.com)

                  Alt...Subject: Important Security Concern Date: Wed, 04 Mar 2026 06:25:52 +0000 (UTC) From: support@hungerrush.com Dear HungerRush, You cannot ignore all my requests and expect me not to take malicious actions. You still have time. Every restaurant and customer of said restaurants' data which is in the millions is in jeopardy here and I can't even get a response back. Not to worry, there's still time left. You know where to contact me. (p********p****@protonmail.com)

                  Subject: 	Security Concern Follow-Up
Date: 	Wed, 04 Mar 2026 09:36:20 +0000 (UTC)
From: 	2019@hungerrush.com

Dear HungerRush,

You cannot ignore all my requests and expect me not to take malicious action. You still have time. Every restaurant and customer’s data is in jeopardy here, and I can’t even get a response back.

What happens next is all up to you. I would assume you’re a company that wouldn’t let millions of your consumers unwillingly have their full names, emails, passwords, addresses, phone numbers, dates of birth, credit card information, and much more exposed over such a small amount of money.

You know where to contact me (p********p****@protonmail.com) or support.hungerrush.com (7526265).

                  Alt...Subject: Security Concern Follow-Up Date: Wed, 04 Mar 2026 09:36:20 +0000 (UTC) From: 2019@hungerrush.com Dear HungerRush, You cannot ignore all my requests and expect me not to take malicious action. You still have time. Every restaurant and customer’s data is in jeopardy here, and I can’t even get a response back. What happens next is all up to you. I would assume you’re a company that wouldn’t let millions of your consumers unwillingly have their full names, emails, passwords, addresses, phone numbers, dates of birth, credit card information, and much more exposed over such a small amount of money. You know where to contact me (p********p****@protonmail.com) or support.hungerrush.com (7526265).

                    AodeRelay boosted

                    [?]Marc Ruef :verified: » 🌐
                    @mruef@infosec.exchange

                    [?]Marcus "MajorLinux" Summers » 🌐
                    @majorlinux@toot.majorshouse.com

                    While no passwords were not a part of this, remain vigilant of any phishing scams that may come your way.

                    An Instagram data breach reportedly exposed the personal info of 17.5 million users

                    engadget.com/cybersecurity/an-