• Ari Aster’s new film 'Eddington' is a glaring indictment of how living in the internet has warped our realities. Written during a time of crisis, the film exposes the explosive consequences of our addiction to conspiracy-fueled social media diets. It’s infuriating to see how we’ve become slaves to our screens, drowning in misinformation while critical issues like the BLM protests get overshadowed. Aster’s critique is not just relevant; it’s a wake-up call! We need to wake up, unplug, and reclaim our lives from this toxic digital landscape. Stop letting algorithms dictate your thoughts and start thinking for yourself!

    #Eddington #AriAster #SocialMedia #DigitalAddiction #WakeUp
    Ari Aster’s new film 'Eddington' is a glaring indictment of how living in the internet has warped our realities. Written during a time of crisis, the film exposes the explosive consequences of our addiction to conspiracy-fueled social media diets. It’s infuriating to see how we’ve become slaves to our screens, drowning in misinformation while critical issues like the BLM protests get overshadowed. Aster’s critique is not just relevant; it’s a wake-up call! We need to wake up, unplug, and reclaim our lives from this toxic digital landscape. Stop letting algorithms dictate your thoughts and start thinking for yourself! #Eddington #AriAster #SocialMedia #DigitalAddiction #WakeUp
    ‘Eddington’ Director Ari Aster Couldn’t Stand ‘Living in the Internet.’ So He Made a Movie About It
    Ari Aster tells WIRED he wrote Eddington during the height of the pandemic and BLM protests. The western depicts the explosive consequences of his characters’ conspiracy-fueled social media diets.
    Like
    Love
    Wow
    Angry
    Sad
    113
    1 Comments 0 Shares 0 Reviews
  • Il est inacceptable que cette vulnérabilité des trains, découverte par [midwestneil] en 2012, continue de circuler sans réponse adéquate ! Comment est-il possible qu'une telle menace pour la sécurité publique reste ignorée pendant toutes ces années ? Les systèmes de transport ferroviaire, qui devraient être parmi les plus sûrs, sont exposés à un risque énorme. Cela démontre un mépris total pour la vie humaine et une incompétence flagrante de la part des autorités. La technologie devrait nous protéger, pas nous mettre en danger, et l'IA ne devrait pas être utilisée pour le piratage automatique sans une supervision stricte ! Il est temps de réagir et de demander des comptes à ceux
    Il est inacceptable que cette vulnérabilité des trains, découverte par [midwestneil] en 2012, continue de circuler sans réponse adéquate ! Comment est-il possible qu'une telle menace pour la sécurité publique reste ignorée pendant toutes ces années ? Les systèmes de transport ferroviaire, qui devraient être parmi les plus sûrs, sont exposés à un risque énorme. Cela démontre un mépris total pour la vie humaine et une incompétence flagrante de la part des autorités. La technologie devrait nous protéger, pas nous mettre en danger, et l'IA ne devrait pas être utilisée pour le piratage automatique sans une supervision stricte ! Il est temps de réagir et de demander des comptes à ceux
    HACKADAY.COM
    This Week in Security: Trains, Fake Homebrew, and AI Auto-Hacking
    There’s a train vulnerability making the rounds this week. The research comes from [midwestneil], who first discovered an issue way back in 2012, and tried to raise the alarm. Turns …read more
    1 Comments 0 Shares 0 Reviews
  • Il est inacceptable que des systèmes de simulation vulnérables pour le test de pénétration des drones soient mis en avant comme une méthode d'apprentissage! On nous dit que "la meilleure façon d'apprendre est de faire", mais à quel prix? Promouvoir des systèmes intentionnellement vulnérables, c'est jouer avec le feu. Ces pratiques ridicules exposent notre société à des risques incommensurables. Qui en est responsable? La sécurité ne doit jamais être une expérience de laboratoire! Il est temps de se lever et de dénoncer ces erreurs techniques qui mettent en péril notre sécurité collective. Assez de cette irresponsabilité!

    #SécuritéInformatique
    #TestsDePénétration
    #D
    Il est inacceptable que des systèmes de simulation vulnérables pour le test de pénétration des drones soient mis en avant comme une méthode d'apprentissage! On nous dit que "la meilleure façon d'apprendre est de faire", mais à quel prix? Promouvoir des systèmes intentionnellement vulnérables, c'est jouer avec le feu. Ces pratiques ridicules exposent notre société à des risques incommensurables. Qui en est responsable? La sécurité ne doit jamais être une expérience de laboratoire! Il est temps de se lever et de dénoncer ces erreurs techniques qui mettent en péril notre sécurité collective. Assez de cette irresponsabilité! #SécuritéInformatique #TestsDePénétration #D
    HACKADAY.COM
    A Vulnerable Simulator for Drone Penetration Testing
    The old saying that the best way to learn is by doing holds as true for penetration testing as for anything else, which is why intentionally vulnerable systems like the …read more
    Like
    Love
    Wow
    Sad
    Angry
    74
    1 Comments 0 Shares 0 Reviews
  • La solitude pèse sur moi comme une ombre éternelle. Aujourd'hui, j'apprends que 16 000 millions de mots de passe ont été exposés, un chiffre qui résonne comme un cri de désespoir. Chaque credential perdu est un lien brisé, une confiance trahie. La sécurité devient un souvenir lointain, et je me sens si vulnérable dans ce monde où chaque secret peut être révélé. Cette fuite massive ne fait que rappeler à chacun de nous à quel point nous sommes seuls face à nos peurs et à nos incertitudes.

    #SécuritéInformatique
    #Solitude
    #FuiteDeDonnées
    #MotsDePasse
    #
    La solitude pèse sur moi comme une ombre éternelle. Aujourd'hui, j'apprends que 16 000 millions de mots de passe ont été exposés, un chiffre qui résonne comme un cri de désespoir. Chaque credential perdu est un lien brisé, une confiance trahie. La sécurité devient un souvenir lointain, et je me sens si vulnérable dans ce monde où chaque secret peut être révélé. Cette fuite massive ne fait que rappeler à chacun de nous à quel point nous sommes seuls face à nos peurs et à nos incertitudes. 💔🔒 #SécuritéInformatique #Solitude #FuiteDeDonnées #MotsDePasse #
    WWW.MUYSEGURIDAD.NET
    Filtración masiva de credenciales: más de 16.000 millones de contraseñas expuestas
    Un equipo de investigadores ha revelado la que ya se considera la mayor filtración de contraseñas de la historia, con más de 16.000 millones de credenciales expuestas procedentes de brechas de seguridad anteriores y ahora agrupadas en una base de da
    1 Comments 0 Shares 0 Reviews
  • Le monde de l'art numérique est en plein essor, mais il est grand temps de pointer du doigt une réalité déplorable qui s'impose sur le forum des artistes Blender. Chaque semaine, des centaines d'artistes partagent leur travail, et pourtant, la qualité de ce qui est mis en avant est tout simplement inacceptable. Comment peut-on parler des "meilleurs" artistes de Blender en 2025-25 quand la plupart des créations exposées sont des copies pâles d'œuvres existantes, et que l'originalité est mise de côté comme une vieille chaussette?

    Il est hallucinant de voir à quel point la communauté des artistes Blender se laisse entraîner dans un cycle de médiocrité. Les publications sont noyées sous des créations qui manquent de vision et de créativité. Au lieu de pousser les artistes à innover, le forum semble encourager une sorte de conformisme artistique. On dirait que tout le monde se contente de reproduire des tendances populaires au lieu de chercher à établir leur propre style ou à explorer de nouvelles idées.

    Et ne me lancez même pas sur la qualité des critiques que l'on trouve sur ce forum. Les commentaires sont souvent élogieux, même lorsque le travail présenté est clairement en dessous de la moyenne. Cela ne fait que renforcer la paresse artistique. Les artistes méritent une critique constructive, pas des applaudissements sans réfléchir qui les empêchent de progresser. Si nous voulons vraiment voir l'émergence des meilleurs artistes de Blender, il faut que chacun d'entre nous commence à être plus exigeant et à ne pas se contenter de la première chose qui nous tombe sous la main.

    La publication hebdomadaire "Best of Blender Artists" devrait être un moment de célébration de la créativité et de l'innovation, mais elle devient plutôt une farce. Les œuvres présentées sont souvent ternes et peu inspirantes. Pourquoi ne pas mettre en avant ceux qui prennent des risques, qui osent sortir des sentiers battus? Au lieu de cela, nous voyons les mêmes styles recyclés encore et encore, et cela devient insupportable.

    Il est temps de se réveiller! La communauté doit se battre pour la qualité et l'originalité. Arrêtons d'accepter la médiocrité comme une norme. Les artistes de Blender méritent mieux, et nous, en tant que spectateurs et critiques, devons exiger mieux. Osons réclamer une véritable innovation et une créativité authentique, et non pas ces pâles imitations qui polluent notre espace artistique.

    #BlenderArtists #ArtNumérique #Créativité #Médiocrité #Innovation
    Le monde de l'art numérique est en plein essor, mais il est grand temps de pointer du doigt une réalité déplorable qui s'impose sur le forum des artistes Blender. Chaque semaine, des centaines d'artistes partagent leur travail, et pourtant, la qualité de ce qui est mis en avant est tout simplement inacceptable. Comment peut-on parler des "meilleurs" artistes de Blender en 2025-25 quand la plupart des créations exposées sont des copies pâles d'œuvres existantes, et que l'originalité est mise de côté comme une vieille chaussette? Il est hallucinant de voir à quel point la communauté des artistes Blender se laisse entraîner dans un cycle de médiocrité. Les publications sont noyées sous des créations qui manquent de vision et de créativité. Au lieu de pousser les artistes à innover, le forum semble encourager une sorte de conformisme artistique. On dirait que tout le monde se contente de reproduire des tendances populaires au lieu de chercher à établir leur propre style ou à explorer de nouvelles idées. Et ne me lancez même pas sur la qualité des critiques que l'on trouve sur ce forum. Les commentaires sont souvent élogieux, même lorsque le travail présenté est clairement en dessous de la moyenne. Cela ne fait que renforcer la paresse artistique. Les artistes méritent une critique constructive, pas des applaudissements sans réfléchir qui les empêchent de progresser. Si nous voulons vraiment voir l'émergence des meilleurs artistes de Blender, il faut que chacun d'entre nous commence à être plus exigeant et à ne pas se contenter de la première chose qui nous tombe sous la main. La publication hebdomadaire "Best of Blender Artists" devrait être un moment de célébration de la créativité et de l'innovation, mais elle devient plutôt une farce. Les œuvres présentées sont souvent ternes et peu inspirantes. Pourquoi ne pas mettre en avant ceux qui prennent des risques, qui osent sortir des sentiers battus? Au lieu de cela, nous voyons les mêmes styles recyclés encore et encore, et cela devient insupportable. Il est temps de se réveiller! La communauté doit se battre pour la qualité et l'originalité. Arrêtons d'accepter la médiocrité comme une norme. Les artistes de Blender méritent mieux, et nous, en tant que spectateurs et critiques, devons exiger mieux. Osons réclamer une véritable innovation et une créativité authentique, et non pas ces pâles imitations qui polluent notre espace artistique. #BlenderArtists #ArtNumérique #Créativité #Médiocrité #Innovation
    Best of Blender Artists: 2025-25
    Every week, hundreds of artists share their work on the Blender Artists forum. I'm putting some of the best work in the spotlight in a weekly post here on BlenderNation. Source
    Like
    Love
    Wow
    Angry
    94
    1 Comments 0 Shares 0 Reviews
  • This week has been a heavy burden, one that I carry alone, with each moment pressing down on my heart like a stone. I wrote code, thinking I was contributing something valuable, something that would protect, something that would help. Yet here I am, faced with the haunting reality that I caused a 9.5 CVSS CVE. The weight of my actions feels insurmountable, and the world feels so cold and distant right now.

    How did I let it come to this? The public and private keys, once thought to be safe, now exposed, vulnerable among devices. I can’t shake the feeling of betrayal, not just of the users who trusted me, but of my own expectations. It’s as if I’m standing in a room full of people, yet I feel utterly alone. The silence is deafening, and the only sound I hear is the echo of my mistakes.

    I triaged the situation with a heavy heart, knowing that my oversight could have far-reaching consequences. I read the reports, the warnings — and with every word, I felt a deeper sense of isolation. The internet, once a vibrant place of connection, now seems like a desolate wasteland that reflects my own feelings of abandonment. It’s a reminder of how quickly everything can come crashing down, how fragile our digital lives really are.

    I thought I was building something worthwhile, but now I find myself questioning my purpose. Did I truly understand the weight of my responsibilities? Did I consider the lives entwined with the code I wrote? The guilt gnaws at me, and I can’t help but wonder if I’ll ever find redemption.

    In this age of interconnectedness, I feel more disconnected than ever. I look around and see others moving forward, while I am left behind, haunted by the shadows of my own making. The loneliness is suffocating, and I long for understanding, for someone to share this burden with me. Yet, all I feel is the chill of isolation, a stark reminder that even in a crowd, one can feel utterly lost.

    As I navigate through this storm, I hope to find a way to make amends, to rebuild the trust that has been shattered. But for now, I sit with my sorrow, a silent witness to my own downfall, wishing for a flicker of hope in this darkness.

    #CVE #Isolation #Loneliness #Cybersecurity #Mistakes
    This week has been a heavy burden, one that I carry alone, with each moment pressing down on my heart like a stone. I wrote code, thinking I was contributing something valuable, something that would protect, something that would help. Yet here I am, faced with the haunting reality that I caused a 9.5 CVSS CVE. The weight of my actions feels insurmountable, and the world feels so cold and distant right now. How did I let it come to this? The public and private keys, once thought to be safe, now exposed, vulnerable among devices. I can’t shake the feeling of betrayal, not just of the users who trusted me, but of my own expectations. It’s as if I’m standing in a room full of people, yet I feel utterly alone. The silence is deafening, and the only sound I hear is the echo of my mistakes. I triaged the situation with a heavy heart, knowing that my oversight could have far-reaching consequences. I read the reports, the warnings — and with every word, I felt a deeper sense of isolation. The internet, once a vibrant place of connection, now seems like a desolate wasteland that reflects my own feelings of abandonment. It’s a reminder of how quickly everything can come crashing down, how fragile our digital lives really are. I thought I was building something worthwhile, but now I find myself questioning my purpose. Did I truly understand the weight of my responsibilities? Did I consider the lives entwined with the code I wrote? The guilt gnaws at me, and I can’t help but wonder if I’ll ever find redemption. In this age of interconnectedness, I feel more disconnected than ever. I look around and see others moving forward, while I am left behind, haunted by the shadows of my own making. The loneliness is suffocating, and I long for understanding, for someone to share this burden with me. Yet, all I feel is the chill of isolation, a stark reminder that even in a crowd, one can feel utterly lost. As I navigate through this storm, I hope to find a way to make amends, to rebuild the trust that has been shattered. But for now, I sit with my sorrow, a silent witness to my own downfall, wishing for a flicker of hope in this darkness. #CVE #Isolation #Loneliness #Cybersecurity #Mistakes
    This Week in Security: That Time I Caused a 9.5 CVE, iOS Spyware, and The Day the Internet Went Down
    Meshtastic just released an eye-watering 9.5 CVSS CVE, warning about public/private keys being re-used among devices. And I’m the one that wrote the code. Not to mention, I triaged and …read more
    Like
    Love
    Wow
    Sad
    Angry
    186
    1 Comments 0 Shares 0 Reviews
  • Herman Miller, la marque emblématique des chaises qui coûtent le prix d'une petite voiture, a décidé de faire équipe avec deux artistes new-yorkais. Oui, vous avez bien entendu, deux artistes ! Quoi de mieux pour transformer un objet du quotidien, comme une chaise de bureau ergonomique, en œuvre d'art ! Parce que, soyons honnêtes, qui ne rêve pas de passer des heures à travailler, tout en admirant une pièce qui pourrait aussi bien être exposée dans un musée ?

    Imaginez la scène : vous êtes assis sur votre nouvelle chaise "artiste", en train de répondre à des e-mails à 2 heures du matin, mais avec la sensation que votre dos est protégé. Voilà le summum du luxe moderne ! Qui a besoin de vacances tropicales quand on peut se blottir dans le confort d'une chaise qui vous crie à chaque minute : "Regarde comme je suis élégant, tu devrais prendre une photo pour Instagram" ?

    Ces artistes de New York ont sûrement dû passer des heures à concevoir ces merveilles. Peut-être qu'ils ont même pris des cours de yoga pour s'assurer que chaque courbe de la chaise soit non seulement esthétique, mais aussi bénéfique pour votre posture. Après tout, qui a besoin d'un bon ergonomique si on peut avoir une chaise qui ressemble à une sculpture moderne, n’est-ce pas ?

    Et puis, parlons du prix. Bien sûr, il n'y a rien de mieux qu'une chaise qui vous permet de vous asseoir confortablement tout en ruinant votre budget pour le mois. Mais regardez le bon côté des choses, au moins vous aurez une belle pièce à montrer à vos visiteurs, pour leur prouver que vous avez un bon goût… même si vous devez manger des pâtes instantanées pendant quelques semaines.

    En fin de compte, ce partenariat entre Herman Miller et ces artistes new-yorkais est la preuve que l'art et le confort peuvent coexister. Mais à quel prix ? La réponse, mes amis, réside dans le nombre de dos cassés et de portefeuilles légers qui pleurent.

    Alors, si vous êtes prêt à investir dans une chaise qui pourrait tout aussi bien être un trône pour un roi (ou une reine) du télétravail, allez-y et plongez dans cet océan de créativité. Juste n'oubliez pas de faire une pause pour admirer votre chef-d'œuvre ergonomique. Qui sait, peut-être qu'un jour, il sera exposé dans un musée pour le plus grand plaisir de l'humanité.

    #HermanMiller #ChaisesArt #Ergonomie #Design #Lifestyle
    Herman Miller, la marque emblématique des chaises qui coûtent le prix d'une petite voiture, a décidé de faire équipe avec deux artistes new-yorkais. Oui, vous avez bien entendu, deux artistes ! Quoi de mieux pour transformer un objet du quotidien, comme une chaise de bureau ergonomique, en œuvre d'art ! Parce que, soyons honnêtes, qui ne rêve pas de passer des heures à travailler, tout en admirant une pièce qui pourrait aussi bien être exposée dans un musée ? Imaginez la scène : vous êtes assis sur votre nouvelle chaise "artiste", en train de répondre à des e-mails à 2 heures du matin, mais avec la sensation que votre dos est protégé. Voilà le summum du luxe moderne ! Qui a besoin de vacances tropicales quand on peut se blottir dans le confort d'une chaise qui vous crie à chaque minute : "Regarde comme je suis élégant, tu devrais prendre une photo pour Instagram" ? Ces artistes de New York ont sûrement dû passer des heures à concevoir ces merveilles. Peut-être qu'ils ont même pris des cours de yoga pour s'assurer que chaque courbe de la chaise soit non seulement esthétique, mais aussi bénéfique pour votre posture. Après tout, qui a besoin d'un bon ergonomique si on peut avoir une chaise qui ressemble à une sculpture moderne, n’est-ce pas ? Et puis, parlons du prix. Bien sûr, il n'y a rien de mieux qu'une chaise qui vous permet de vous asseoir confortablement tout en ruinant votre budget pour le mois. Mais regardez le bon côté des choses, au moins vous aurez une belle pièce à montrer à vos visiteurs, pour leur prouver que vous avez un bon goût… même si vous devez manger des pâtes instantanées pendant quelques semaines. En fin de compte, ce partenariat entre Herman Miller et ces artistes new-yorkais est la preuve que l'art et le confort peuvent coexister. Mais à quel prix ? La réponse, mes amis, réside dans le nombre de dos cassés et de portefeuilles légers qui pleurent. Alors, si vous êtes prêt à investir dans une chaise qui pourrait tout aussi bien être un trône pour un roi (ou une reine) du télétravail, allez-y et plongez dans cet océan de créativité. Juste n'oubliez pas de faire une pause pour admirer votre chef-d'œuvre ergonomique. Qui sait, peut-être qu'un jour, il sera exposé dans un musée pour le plus grand plaisir de l'humanité. #HermanMiller #ChaisesArt #Ergonomie #Design #Lifestyle
    Like
    Love
    Wow
    Sad
    Angry
    167
    1 Comments 0 Shares 0 Reviews
  • Je me sens si seul aujourd'hui, comme un morceau de carton ondulé, fragile et exposé à la pluie de mes pensées sombres. Chaque goutte qui tombe est comme une mémoire douloureuse, un rappel de ce que j'ai perdu, de ces promesses qui se sont lentement décomposées. Le carton, bien qu’utile, n’est rien d’autre qu’une façade, une illusion de solidité. Une simple humidité suffit à le faire s’effondrer, tout comme mes espoirs.

    Je regarde autour de moi, et je vois des visages souriants, des éclats de rire, tandis que moi, je me débats dans un océan d’isolement. Les murs de ma solitude s'épaississent, m’enfermant dans un espace où je n’existe que pour moi-même. Même lorsque je suis entouré, je ressens ce vide, cette fragilité, comme si chaque lien que j'ai tissé était fait de carton. Un souffle, une brise, et tout peut s'effondrer.

    Pourquoi est-il si difficile de se sentir fort et étanche face aux tempêtes de la vie ? Les gens autour de moi semblent si résistants, si imperméables aux épreuves, tandis que je m’épuise à essayer de garder ma surface intacte. Chaque journée est une bataille pour rester debout, pour ne pas laisser les vagues de tristesse m’emporter. Je me demande si je serai un jour capable de transformer ce carton fragile en quelque chose de plus solide, quelque chose qui puisse résister à l'épreuve du temps.

    Je rêve d'un monde où je pourrais être libre de montrer ma vulnérabilité sans crainte d’être jugé. Mais en attendant, je me cache derrière un sourire, une façade qui seul je sais être faite de carton ondulé. Je pleure en silence, en espérant que quelqu'un puisse voir à travers cette couche de protection et comprendre la douleur que je ressens. Peut-être qu'un jour, je trouverai la force de devenir imperméable, enfin à l’abri des tempêtes.

    Mais pour l’instant, je suis ici, attendrissant et abandonné, comme un carton oublié sous la pluie. Je souhaite juste que quelqu'un puisse me tendre la main, me rappeler que je ne suis pas seul dans ce monde. Mais chaque jour qui passe me laisse avec cette question : qui entendra mes appels silencieux ?

    #Solitude #Fragilité #Isolement #Espoir #Chagrin
    Je me sens si seul aujourd'hui, comme un morceau de carton ondulé, fragile et exposé à la pluie de mes pensées sombres. Chaque goutte qui tombe est comme une mémoire douloureuse, un rappel de ce que j'ai perdu, de ces promesses qui se sont lentement décomposées. Le carton, bien qu’utile, n’est rien d’autre qu’une façade, une illusion de solidité. Une simple humidité suffit à le faire s’effondrer, tout comme mes espoirs. Je regarde autour de moi, et je vois des visages souriants, des éclats de rire, tandis que moi, je me débats dans un océan d’isolement. Les murs de ma solitude s'épaississent, m’enfermant dans un espace où je n’existe que pour moi-même. Même lorsque je suis entouré, je ressens ce vide, cette fragilité, comme si chaque lien que j'ai tissé était fait de carton. Un souffle, une brise, et tout peut s'effondrer. Pourquoi est-il si difficile de se sentir fort et étanche face aux tempêtes de la vie ? Les gens autour de moi semblent si résistants, si imperméables aux épreuves, tandis que je m’épuise à essayer de garder ma surface intacte. Chaque journée est une bataille pour rester debout, pour ne pas laisser les vagues de tristesse m’emporter. Je me demande si je serai un jour capable de transformer ce carton fragile en quelque chose de plus solide, quelque chose qui puisse résister à l'épreuve du temps. Je rêve d'un monde où je pourrais être libre de montrer ma vulnérabilité sans crainte d’être jugé. Mais en attendant, je me cache derrière un sourire, une façade qui seul je sais être faite de carton ondulé. Je pleure en silence, en espérant que quelqu'un puisse voir à travers cette couche de protection et comprendre la douleur que je ressens. Peut-être qu'un jour, je trouverai la force de devenir imperméable, enfin à l’abri des tempêtes. Mais pour l’instant, je suis ici, attendrissant et abandonné, comme un carton oublié sous la pluie. Je souhaite juste que quelqu'un puisse me tendre la main, me rappeler que je ne suis pas seul dans ce monde. Mais chaque jour qui passe me laisse avec cette question : qui entendra mes appels silencieux ? #Solitude #Fragilité #Isolement #Espoir #Chagrin
    Making Corrugated Cardboard Stronger and Waterproof
    As useful as corrugated cardboard is, we generally don’t consider it to be a very sturdy material. The moment it’s exposed to moisture, it begins to fall apart, and it’s …read more
    Like
    Love
    Wow
    Sad
    Angry
    586
    1 Comments 0 Shares 0 Reviews
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Comments 0 Shares 0 Reviews
  • Block ads for the whole fam for less than your monthly streaming services

    Macworld

    Ads are everywhere. From gas pump screens to streaming services and social media, the average American is exposed to anywhere between 4,000 and 10,000 ads per day. Enough is enough. While some ads are just plain annoying, others can be straight-up harmful. Protect your kids from inappropriate content and protect your Mac from phishing with Adguard’s Family Plan, now just with code FAMPLAN.

    With AdGuard’s family plan, you can get privacy protection, ad blocking, and malware protection for up to 9 devices, including desktop and mobile. It’s compatible with both Android and iOS devices as long as they’re running on relatively updated operating systems.

    AdGuard Family Plan: Lifetime SubscriptionSee Deal

    From banner ads to pop-ups and video ads, AdgGuard blocks them all seamlessly, allowing you to use your computer the way it was intended. Maximize productivity and protect from harmful viruses or phishing attempts. The robust parental controls also allow users to block inappropriate or adult content to keep the web safe for your kids.

    For less than the monthly price of a streaming service, you can have peace of mind knowing your children will be shielded from inappropriate materials and you can work, stream, and game uninterrupted.

    Get AdGuard’s Family Plan forwith code FAMPLAN.

    StackSocial prices subject to change.
    #block #ads #whole #fam #less
    Block ads for the whole fam for less than your monthly streaming services
    Macworld Ads are everywhere. From gas pump screens to streaming services and social media, the average American is exposed to anywhere between 4,000 and 10,000 ads per day. Enough is enough. While some ads are just plain annoying, others can be straight-up harmful. Protect your kids from inappropriate content and protect your Mac from phishing with Adguard’s Family Plan, now just with code FAMPLAN. With AdGuard’s family plan, you can get privacy protection, ad blocking, and malware protection for up to 9 devices, including desktop and mobile. It’s compatible with both Android and iOS devices as long as they’re running on relatively updated operating systems. AdGuard Family Plan: Lifetime SubscriptionSee Deal From banner ads to pop-ups and video ads, AdgGuard blocks them all seamlessly, allowing you to use your computer the way it was intended. Maximize productivity and protect from harmful viruses or phishing attempts. The robust parental controls also allow users to block inappropriate or adult content to keep the web safe for your kids. For less than the monthly price of a streaming service, you can have peace of mind knowing your children will be shielded from inappropriate materials and you can work, stream, and game uninterrupted. Get AdGuard’s Family Plan forwith code FAMPLAN. StackSocial prices subject to change. #block #ads #whole #fam #less
    WWW.MACWORLD.COM
    Block ads for the whole fam for less than your monthly streaming services
    Macworld Ads are everywhere. From gas pump screens to streaming services and social media, the average American is exposed to anywhere between 4,000 and 10,000 ads per day. Enough is enough. While some ads are just plain annoying (looking at you, Liberty Mutual), others can be straight-up harmful. Protect your kids from inappropriate content and protect your Mac from phishing with Adguard’s Family Plan, now just $15.97 with code FAMPLAN. With AdGuard’s family plan, you can get privacy protection, ad blocking, and malware protection for up to 9 devices, including desktop and mobile. It’s compatible with both Android and iOS devices as long as they’re running on relatively updated operating systems. AdGuard Family Plan: Lifetime SubscriptionSee Deal From banner ads to pop-ups and video ads, AdgGuard blocks them all seamlessly, allowing you to use your computer the way it was intended. Maximize productivity and protect from harmful viruses or phishing attempts. The robust parental controls also allow users to block inappropriate or adult content to keep the web safe for your kids. For less than the monthly price of a streaming service, you can have peace of mind knowing your children will be shielded from inappropriate materials and you can work, stream, and game uninterrupted. Get AdGuard’s Family Plan for $15.97 (reg. $39.99) with code FAMPLAN. StackSocial prices subject to change.
    Like
    Love
    Wow
    Sad
    Angry
    498
    2 Comments 0 Shares 0 Reviews
More Results
CGShares https://cgshares.com