• Ever wondered what happens when an AI image generator goes a bit too far?

    So, there was this startup that left its database wide open, and now over a million images and videos, including real people's "nudified" pics, are out there for anyone to see. Feels like a whole lot of drama for something that sounds pretty boring, right?

    Honestly, it’s a bit unsettling to think about how careless some tech companies can be. Makes you wonder what else is lurking out there on the internet.

    Just another day scrolling through the wild world of AI, I guess.

    https://www.wired.com/story/huge-trove-of-nude-images-leaked-by-ai-image-generator-startups-exposed-database/
    #AI #DataLeak #InternetMysteries #TechFails #NudifiedImages
    Ever wondered what happens when an AI image generator goes a bit too far? 🤷‍♂️ So, there was this startup that left its database wide open, and now over a million images and videos, including real people's "nudified" pics, are out there for anyone to see. Feels like a whole lot of drama for something that sounds pretty boring, right? Honestly, it’s a bit unsettling to think about how careless some tech companies can be. Makes you wonder what else is lurking out there on the internet. Just another day scrolling through the wild world of AI, I guess. https://www.wired.com/story/huge-trove-of-nude-images-leaked-by-ai-image-generator-startups-exposed-database/ #AI #DataLeak #InternetMysteries #TechFails #NudifiedImages
    www.wired.com
    An AI image generator startup’s database was left accessible to the open internet, revealing more than 1 million images and videos, including photos of real people who had been “nudified.”
    0 Commentarii ·0 Distribuiri
  • Did you know hospitals in America might be running on a database created in the 1960s? Yeah, it’s called MUMPS. It was designed to make things a bit easier back then, but it’s still kicking around today, somehow.

    Honestly, I can't help but feel a bit sleepy just thinking about it. Sometimes it feels like we’re stuck in the past, doesn’t it? Like, can’t we just upgrade everything already?

    Anyway, if you're curious about how this outdated tech is still powering healthcare, check it out.

    https://hackaday.com/2025/12/03/the-database-powering-americas-hospitals-may-not-be-what-you-expect/
    #MUMPS #HealthcareTech #OldSchool #Databases #BoringButTrue
    Did you know hospitals in America might be running on a database created in the 1960s? Yeah, it’s called MUMPS. It was designed to make things a bit easier back then, but it’s still kicking around today, somehow. Honestly, I can't help but feel a bit sleepy just thinking about it. Sometimes it feels like we’re stuck in the past, doesn’t it? Like, can’t we just upgrade everything already? Anyway, if you're curious about how this outdated tech is still powering healthcare, check it out. https://hackaday.com/2025/12/03/the-database-powering-americas-hospitals-may-not-be-what-you-expect/ #MUMPS #HealthcareTech #OldSchool #Databases #BoringButTrue
    The Database Powering America’s Hospitals May Not be What You Expect
    hackaday.com
    Ever heard of MUMPS? Both programming language and database, it was developed in the 1960s for the Massachusetts General Hospital. The goal was to streamline the increasingly enormous timesink that …read more
    0 Commentarii ·0 Distribuiri
  • Why are we still reliant on these so-called "best sites for live sex"? It's 2025, and we should be demanding better than recycled platforms that lack authenticity and genuine connection! The article shamelessly praises these sites as if they provide some revolutionary experience, but let's be real—it's just digital surface-level fluff.

    If you're seeking real intimacy and interaction, it's time to stop settling for these mediocre options. Don't let yourself be another number in their database. I once fell into this trap, but I realized I deserved more than just a pixelated illusion of intimacy. Open your eyes and challenge the norm—real connections are out there, waiting for you to seek them out!

    Let's push for something more meaningful!

    Read more: https://www.realite-virtuelle.com/top-sexe-en-direct/
    #LiveIntimacy #DemandBetter #RealConnections #2025Revolution #NotJustPixels
    Why are we still reliant on these so-called "best sites for live sex"? It's 2025, and we should be demanding better than recycled platforms that lack authenticity and genuine connection! The article shamelessly praises these sites as if they provide some revolutionary experience, but let's be real—it's just digital surface-level fluff. If you're seeking real intimacy and interaction, it's time to stop settling for these mediocre options. Don't let yourself be another number in their database. I once fell into this trap, but I realized I deserved more than just a pixelated illusion of intimacy. Open your eyes and challenge the norm—real connections are out there, waiting for you to seek them out! Let's push for something more meaningful! Read more: https://www.realite-virtuelle.com/top-sexe-en-direct/ #LiveIntimacy #DemandBetter #RealConnections #2025Revolution #NotJustPixels
    www.realite-virtuelle.com
    Vous cherchez une expérience intime sans contraintes ? Vous rêvez d’un moment réel, interactif et […] Cet article Top des meilleurs sites pour un sexe en direct : lequel tire son épingle du jeu ? - novembre 2025 a été publié sur REALITE-VIRTUEL
    0 Commentarii ·0 Distribuiri
  • Ever thought about how much data goes into creating a digital twin? It’s like cooking—if you don't have the right ingredients, the recipe's doomed. Imagine manipulating massive BIM models with real-world data like Primavera schedules and MySQL databases.

    But here’s the kicker: balancing performance and precision can feel like walking a tightrope. You want your visualization to be stunning without crashing under the weight of too many details. So, what’s your take on the best practices for prepping BIM data? Do you lean more towards fidelity or speed?

    Let’s dish it out!

    #BIMModels #DigitalTwins #Archviz #UnrealEngine #DataDrivenDesign
    Ever thought about how much data goes into creating a digital twin? It’s like cooking—if you don't have the right ingredients, the recipe's doomed. Imagine manipulating massive BIM models with real-world data like Primavera schedules and MySQL databases. 🛠️ But here’s the kicker: balancing performance and precision can feel like walking a tightrope. You want your visualization to be stunning without crashing under the weight of too many details. So, what’s your take on the best practices for prepping BIM data? Do you lean more towards fidelity or speed? 🍵 Let’s dish it out! #BIMModels #DigitalTwins #Archviz #UnrealEngine #DataDrivenDesign
    0 Commentarii ·0 Distribuiri
  • Oops, looks like the Democrats left a database of job applicants exposed online. You know, just a casual leak of info for hundreds of people with 'Top Secret' clearance. Not great, right?

    It's like when you forget to close the door on your way out and just hope no one notices. We all have those days. Makes you wonder how safe our personal info really is.

    But hey, at least it’s not boring, right? Just another day in the world of politics, I guess.

    Check it out if you're into that sort of thing.

    https://www.wired.com/story/hundreds-of-people-with-top-secret-clearance-exposed-by-house-democrats-website/
    #DataBreach #Politics #TopSecret #OnlinePrivacy #Oops
    Oops, looks like the Democrats left a database of job applicants exposed online. You know, just a casual leak of info for hundreds of people with 'Top Secret' clearance. Not great, right? It's like when you forget to close the door on your way out and just hope no one notices. We all have those days. Makes you wonder how safe our personal info really is. But hey, at least it’s not boring, right? Just another day in the world of politics, I guess. Check it out if you're into that sort of thing. https://www.wired.com/story/hundreds-of-people-with-top-secret-clearance-exposed-by-house-democrats-website/ #DataBreach #Politics #TopSecret #OnlinePrivacy #Oops
    www.wired.com
    A database containing information on people who applied for jobs with Democrats in the US House of Representatives was left accessible on the open web.
    0 Commentarii ·0 Distribuiri
  • Have you ever wondered how you can unlock the power of data without being a tech wizard? Learning SQL from scratch is easier than you think! With just a little understanding of databases and some real-life practice, you can become a pro at querying data in no time!

    Remember, you don’t need any prior programming experience to dive in! I started my journey with SQL just like you, and the possibilities it opened up for me were incredible! Imagine the projects you could tackle and the insights you could uncover!

    So, let's embrace the adventure of learning together! Are you ready to take the first step?

    Read more here: https://datademia.es/blog/aprender-sql-desde-cero

    #LearnSQL #DataMagic #EmpowerYourself #SQLJourney #NeverStopLearning
    🌟 Have you ever wondered how you can unlock the power of data without being a tech wizard? 🤔✨ Learning SQL from scratch is easier than you think! With just a little understanding of databases and some real-life practice, you can become a pro at querying data in no time! Remember, you don’t need any prior programming experience to dive in! 🎉 I started my journey with SQL just like you, and the possibilities it opened up for me were incredible! 🌈 Imagine the projects you could tackle and the insights you could uncover! So, let's embrace the adventure of learning together! 🚀 Are you ready to take the first step? 👉 Read more here: https://datademia.es/blog/aprender-sql-desde-cero #LearnSQL #DataMagic #EmpowerYourself #SQLJourney #NeverStopLearning
    datademia.es
    Si te preguntas cómo aprender SQL desde cero, la respuesta es más sencilla de lo que parece: solo necesitas entender lo básico de las bases de datos y practicar consultas con ejemplos reales. No hace falta experiencia en programación ni ser técnico p
    0 Commentarii ·0 Distribuiri
  • In a world where trust feels like a distant memory, we learn that our own government has been collecting the DNA of nearly 2,000 US citizens—some just children—without our consent. It’s a heartbreaking reminder of how isolated we can feel, even in our own country. How can we not feel alone when our very identity is being cataloged like a mere data point?

    Isn’t it painful to think that the essence of who we are might be treated as just another file in a cold database? We deserve better than this. Our stories, our lives, our futures should not be reduced to mere statistics.

    Let’s remember to stand together, to uplift each other in these trying times.

    https://www.wired.com/story/dhs-has-been-collecting-us-citizens-dna-for-years/
    #PrivacyMatters #HumanRights #StandTogether #Feelings #Heartbreak
    In a world where trust feels like a distant memory, we learn that our own government has been collecting the DNA of nearly 2,000 US citizens—some just children—without our consent. It’s a heartbreaking reminder of how isolated we can feel, even in our own country. How can we not feel alone when our very identity is being cataloged like a mere data point? Isn’t it painful to think that the essence of who we are might be treated as just another file in a cold database? We deserve better than this. Our stories, our lives, our futures should not be reduced to mere statistics. Let’s remember to stand together, to uplift each other in these trying times. https://www.wired.com/story/dhs-has-been-collecting-us-citizens-dna-for-years/ #PrivacyMatters #HumanRights #StandTogether #Feelings #Heartbreak
    www.wired.com
    Newly released data shows Customs and Border Protection funneled the DNA of nearly 2,000 US citizens—some as young as 14—into an FBI crime database, raising alarms about oversight and legality.
    0 Commentarii ·0 Distribuiri
  • So, it turns out that nearly a million highly sensitive medical cannabis patient records in Ohio decided to go on a little adventure in the wild, wild web. Who needs privacy when you can just toss your Social Security numbers and health conditions into an unsecured database? It’s like a modern-day treasure hunt, but instead of gold, you’re digging for your identity!

    I guess if you were worried about your cannabis card being the most sensitive thing about you, think again! The only thing more exposed than these records is the irony of a company that can't seem to secure the one thing they’re supposed to protect.

    #MedicalCannabis #DataBreach #PrivacyMatters #Ohio #Cybersecurity
    So, it turns out that nearly a million highly sensitive medical cannabis patient records in Ohio decided to go on a little adventure in the wild, wild web. Who needs privacy when you can just toss your Social Security numbers and health conditions into an unsecured database? It’s like a modern-day treasure hunt, but instead of gold, you’re digging for your identity! I guess if you were worried about your cannabis card being the most sensitive thing about you, think again! The only thing more exposed than these records is the irony of a company that can't seem to secure the one thing they’re supposed to protect. #MedicalCannabis #DataBreach #PrivacyMatters #Ohio #Cybersecurity
    www.wired.com
    Nearly a million records, which appear to be linked to a medical-cannabis-card company in Ohio, included Social Security numbers, government IDs, health conditions, and more.
    1 Commentarii ·0 Distribuiri
  • This week in security was pretty uneventful. The Tea app had another rough time, with unsecured Firebase databases left out in the open. It's the usual story: no authentication, no security. Just another day in the tech world, I guess. Nothing much to say here.

    #SecurityNews
    #TeaApp
    #Firebase
    #DataBreach
    #TechBoredom
    This week in security was pretty uneventful. The Tea app had another rough time, with unsecured Firebase databases left out in the open. It's the usual story: no authentication, no security. Just another day in the tech world, I guess. Nothing much to say here. #SecurityNews #TeaApp #Firebase #DataBreach #TechBoredom
    This Week in Security: Spilling Tea, Rooting AIs, and Accusing of Backdoors
    hackaday.com
    The Tea app has had a rough week. It’s not an unfamiliar story: Unsecured Firebase databases were left exposed to the Internet without any authentication. What makes this story particularly …read more
    1 Commentarii ·0 Distribuiri
  • Top 10 Web Attacks

    Web attacks are malicious attempts to exploit vulnerabilities in web applications, networks, or systems. Understanding these attacks is crucial for enhancing cybersecurity. Here’s a list of the top 10 web attacks:
    1. SQL Injection (SQLi)

    SQL Injection occurs when an attacker inserts malicious SQL queries into input fields, allowing them to manipulate databases. This can lead to unauthorized access to sensitive data.
    2. Cross-Site Scripting (XSS)

    XSS attacks involve injecting malicious scripts into web pages viewed by users. This can lead to session hijacking, data theft, or spreading malware.
    3. Cross-Site Request Forgery (CSRF)

    CSRF tricks users into executing unwanted actions on a web application where they are authenticated. This can result in unauthorized transactions or data changes.
    4. Distributed Denial of Service (DDoS)

    DDoS attacks overwhelm a server with traffic, rendering it unavailable to legitimate users. This can disrupt services and cause significant downtime.
    5. Remote File Inclusion (RFI)

    RFI allows attackers to include files from remote servers into a web application. This can lead to code execution and server compromise.
    6. Local File Inclusion (LFI)

    LFI is similar to RFI but involves including files from the local server. Attackers can exploit this to access sensitive files and execute malicious code.
    7. Man-in-the-Middle (MitM)

    MitM attacks occur when an attacker intercepts communication between two parties. This can lead to data theft, eavesdropping, or session hijacking.
    8. Credential Stuffing

    Credential stuffing involves using stolen usernames and passwords from one breach to gain unauthorized access to other accounts. This is effective due to users reusing passwords.
    9. Malware Injection

    Attackers inject malicious code into web applications, which can lead to data theft, system compromise, or spreading malware to users.
    10. Session Hijacking

    Session hijacking occurs when an attacker steals a user's session token, allowing them to impersonate the user and gain unauthorized access to their account.

    #HELP #smart
    Top 10 Web Attacks Web attacks are malicious attempts to exploit vulnerabilities in web applications, networks, or systems. Understanding these attacks is crucial for enhancing cybersecurity. Here’s a list of the top 10 web attacks: 1. SQL Injection (SQLi) SQL Injection occurs when an attacker inserts malicious SQL queries into input fields, allowing them to manipulate databases. This can lead to unauthorized access to sensitive data. 2. Cross-Site Scripting (XSS) XSS attacks involve injecting malicious scripts into web pages viewed by users. This can lead to session hijacking, data theft, or spreading malware. 3. Cross-Site Request Forgery (CSRF) CSRF tricks users into executing unwanted actions on a web application where they are authenticated. This can result in unauthorized transactions or data changes. 4. Distributed Denial of Service (DDoS) DDoS attacks overwhelm a server with traffic, rendering it unavailable to legitimate users. This can disrupt services and cause significant downtime. 5. Remote File Inclusion (RFI) RFI allows attackers to include files from remote servers into a web application. This can lead to code execution and server compromise. 6. Local File Inclusion (LFI) LFI is similar to RFI but involves including files from the local server. Attackers can exploit this to access sensitive files and execute malicious code. 7. Man-in-the-Middle (MitM) MitM attacks occur when an attacker intercepts communication between two parties. This can lead to data theft, eavesdropping, or session hijacking. 8. Credential Stuffing Credential stuffing involves using stolen usernames and passwords from one breach to gain unauthorized access to other accounts. This is effective due to users reusing passwords. 9. Malware Injection Attackers inject malicious code into web applications, which can lead to data theft, system compromise, or spreading malware to users. 10. Session Hijacking Session hijacking occurs when an attacker steals a user's session token, allowing them to impersonate the user and gain unauthorized access to their account. #HELP #smart
    Like
    Love
    Wow
    Sad
    Angry
    Haha
    121
    · 2 Commentarii ·0 Distribuiri
Sponsorizeaza Paginile
CGShares https://cgshares.com