• Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Comentários 0 Compartilhamentos
  • Major data broker hack impacts 364,000 individuals’ data

    Published
    June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles!
    Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at workLexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptopWhy the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers. You might switch to a more private search enginethat doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups. Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #major #data #broker #hack #impacts
    Major data broker hack impacts 364,000 individuals’ data
    Published June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles! Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at workLexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptopWhy the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers. You might switch to a more private search enginethat doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups. Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #major #data #broker #hack #impacts
    WWW.FOXNEWS.COM
    Major data broker hack impacts 364,000 individuals’ data
    Published June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles! Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at work (Kurt "CyberGuy" Knutsson)LexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptop (Kurt "CyberGuy" Knutsson)Why the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work (Kurt "CyberGuy" Knutsson)7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers (such as uBlock Origin or Privacy Badger). You might switch to a more private search engine (like DuckDuckGo or Brave) that doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups (so marketing emails don’t go to your main inbox). Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Angry
    Sad
    369
    0 Comentários 0 Compartilhamentos
  • Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.
    "Several widely used extensionsunintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext."
    The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middleattacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences.

    The list of identified extensions are below -

    SEMRush Rankand PI Rank, which call the URL "rank.trelliancom" over plain HTTP
    Browsec VPN, which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonawscom" when a user attempts to uninstall the extension
    MSN New Taband MSN Homepage, Bing Search & News, which transmit a unique machine identifier and other details over HTTP to "g.ceipmsncom"
    DualSafe Password Manager & Digital Vault, which constructs an HTTP-based URL request to "stats.itopupdatecom" along with information about the extension version, user's browser language, and usage "type"

    "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said.
    Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions -

    Online Security & Privacy extension, AVG Online Security, Speed Dial- New Tab Page, 3D, Sync, and SellerSprite - Amazon Research Tool, which expose a hard-coded Google Analytics 4API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics
    Equatio – Math Made Digital, which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits
    Awesome Screen Recorder & Screenshotand Scrolling Screenshot Tool & Screen Capture, which expose the developer's Amazon Web Servicesaccess key used to upload screenshots to the developer's S3 bucket
    Microsoft Editor – Spelling & Grammar Checker, which exposes a telemetry key named "StatsApiKey" to log user data for analytics
    Antidote Connector, which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys.
    Watch2Gether, which exposes a Tenor GIF search API key
    Trust Wallet, which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app
    TravelArrow – Your Virtual Travel Agent, which exposes a geolocation API key when making queries to "ip-apicom"

    Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned.
    Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec.

    "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side."
    Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk.
    The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk.
    "Users of these extensions should consider removing them until the developers address the insecurecalls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks."
    "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    #popular #chrome #extensions #leak #api
    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensionsunintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext." The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middleattacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences. The list of identified extensions are below - SEMRush Rankand PI Rank, which call the URL "rank.trelliancom" over plain HTTP Browsec VPN, which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonawscom" when a user attempts to uninstall the extension MSN New Taband MSN Homepage, Bing Search & News, which transmit a unique machine identifier and other details over HTTP to "g.ceipmsncom" DualSafe Password Manager & Digital Vault, which constructs an HTTP-based URL request to "stats.itopupdatecom" along with information about the extension version, user's browser language, and usage "type" "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said. Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions - Online Security & Privacy extension, AVG Online Security, Speed Dial- New Tab Page, 3D, Sync, and SellerSprite - Amazon Research Tool, which expose a hard-coded Google Analytics 4API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics Equatio – Math Made Digital, which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits Awesome Screen Recorder & Screenshotand Scrolling Screenshot Tool & Screen Capture, which expose the developer's Amazon Web Servicesaccess key used to upload screenshots to the developer's S3 bucket Microsoft Editor – Spelling & Grammar Checker, which exposes a telemetry key named "StatsApiKey" to log user data for analytics Antidote Connector, which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys. Watch2Gether, which exposes a Tenor GIF search API key Trust Wallet, which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app TravelArrow – Your Virtual Travel Agent, which exposes a geolocation API key when making queries to "ip-apicom" Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned. Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec. "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side." Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk. The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk. "Users of these extensions should consider removing them until the developers address the insecurecalls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks." "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. #popular #chrome #extensions #leak #api
    THEHACKERNEWS.COM
    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensions [...] unintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext." The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middle (AitM) attacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences. The list of identified extensions are below - SEMRush Rank (extension ID: idbhoeaiokcojcgappfigpifhpkjgmab) and PI Rank (ID: ccgdboldgdlngcgfdolahmiilojmfndl), which call the URL "rank.trellian[.]com" over plain HTTP Browsec VPN (ID: omghfjlpggmjjaagoclmmobgdodcjboh), which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonaws[.]com" when a user attempts to uninstall the extension MSN New Tab (ID: lklfbkdigihjaaeamncibechhgalldgl) and MSN Homepage, Bing Search & News (ID: midiombanaceofjhodpdibeppmnamfcj), which transmit a unique machine identifier and other details over HTTP to "g.ceipmsn[.]com" DualSafe Password Manager & Digital Vault (ID: lgbjhdkjmpgjgcbcdlhkokkckpjmedgc), which constructs an HTTP-based URL request to "stats.itopupdate[.]com" along with information about the extension version, user's browser language, and usage "type" "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said. Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions - Online Security & Privacy extension (ID: gomekmidlodglbbmalcneegieacbdmki), AVG Online Security (ID: nbmoafcmbajniiapeidgficgifbfmjfo), Speed Dial [FVD] - New Tab Page, 3D, Sync (ID: llaficoajjainaijghjlofdfmbjpebpa), and SellerSprite - Amazon Research Tool (ID: lnbmbgocenenhhhdojdielgnmeflbnfb), which expose a hard-coded Google Analytics 4 (GA4) API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics Equatio – Math Made Digital (ID: hjngolefdpdnooamgdldlkjgmdcmcjnc), which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits Awesome Screen Recorder & Screenshot (ID: nlipoenfbbikpbjkfpfillcgkoblgpmj) and Scrolling Screenshot Tool & Screen Capture (ID: mfpiaehgjbbfednooihadalhehabhcjo), which expose the developer's Amazon Web Services (AWS) access key used to upload screenshots to the developer's S3 bucket Microsoft Editor – Spelling & Grammar Checker (ID: gpaiobkfhnonedkhhfjpmhdalgeoebfa), which exposes a telemetry key named "StatsApiKey" to log user data for analytics Antidote Connector (ID: lmbopdiikkamfphhgcckcjhojnokgfeo), which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys. Watch2Gether (ID: cimpffimgeipdhnhjohpbehjkcdpjolg), which exposes a Tenor GIF search API key Trust Wallet (ID: egjidjbpglichdcondbcbdnbeeppgdph), which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app TravelArrow – Your Virtual Travel Agent (ID: coplmfnphahpcknbchcehdikbdieognn), which exposes a geolocation API key when making queries to "ip-api[.]com" Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned. Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec. "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side." Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk. The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk. "Users of these extensions should consider removing them until the developers address the insecure [HTTP] calls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks." "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    Like
    Love
    Wow
    Sad
    Angry
    334
    0 Comentários 0 Compartilhamentos
  • Stone PC Case, Cooler Master GPU, DIY Case from Scratch, and Metal Fans

    Stone PC Case, Cooler Master GPU, DIY Case from Scratch, and Metal FansJune 4, 2025Last Updated: 2025-06-04Cooler Master is doing some really interesting stuff with its new casesThe HighlightsCooler Master’s upcoming MF600, MF500, and MF400 reconfigurable frame cases are assembled from columns and cornersThe company also showed off interesting stone facade case front panelsCooler Master is working on a “GPU” with AsusTable of ContentsAutoTOC Grab a GN Tear-Down Toolkit to support our AD-FREE reviews and IN-DEPTH testing while also getting a high-quality, highly portable 10-piece toolkit that was custom designed for use with video cards for repasting and water block installation. Includes a portable roll bag, hook hangers for pegboards, a storage compartment, and instructional GPU disassembly cards.IntroWe visited Cooler Master’s booth at Computex 2025 where the company showed off several new cases. Arguably the most interesting one is a modular case. It comes with, we believe, 8 corners and 12 columns.Editor's note: This was originally published on May 20, 2025 as a video. This content has been adapted to written format for this article and is unchanged from the original publication.CreditsHostSteve BurkeCamera, Video EditingMike GaglioneVitalii MakhnovetsWriting, Web EditingJimmy ThangCooler Master MF CasesThe case comes with a front panel that has a dust filter in it. With it all assembled, it looks like the cases in the image above. The cases are the MF series, with the largest one being the MF600, which we assume translates to “Motherf***ing 600.” There’s also the MF500 and the smaller MF400. Initially, Cooler Master is basically going to be selling pre-configured models. Eventually, the company wants to allow people to customize the case on their site and have it assembled and shipped from around the City of Industry. It’s pretty cool as it’s a fully modular approach.The side panels are secured to the case via magnets, which is actually a nice touch. Internally, the MF600 we saw came with 3x140mm fans on the front and 1x120mm fan on the back. The motherboard tray is pretty standard for the most part. Exceptions include a rail system that provides numerous holes for screws to go in, which allows Cooler Master to reconfigure things. Inside the case towards the back, there’s also a rail system, which forms bits and pieces of the motherboard tray that allow for more customizability. Cooler Master has been kind of on-and-off in the DIY space over the years where they’ve had some really big wins and some really big losses. They were also kind of absent for a while, but these MF cases represent a better showing from what we’ve seen in a while from the company. According to Cooler Master, a pre-configured MF600 is supposed to cost We expect to test and review the case. The MF500 is supposed to go for and includes 2x200mm fans in the front and 1x120mm fan in the back. The smallest MF case, the MF600, which is a very large micro ATX box, is going for In terms of fans, it has 2x120mm ones at the bottom coupled with a 1x120mm fan in the rear.  Cooler Master also showed off different panel types they’re experimenting with. One of them included a facade-style stone. One of the pre-built MF cases we looked at had stuff flipped around in an inverted layout. One of the benefits of its rail system allows the case to have a bar that screws in which can support the GPU. Looking into this system, you can see that the PSU is at the bottom next to a bottom intake fan. Updated Cosmos Visit our Patreon page to contribute a few dollars toward this website's operationAdditionally, when you purchase through links to retailers on our site, we may earn a small affiliate commission.Cooler Master’s updated Cosmos has the NVIDIA-like DGX style front. We also saw a variant of the Cosmos with thermal baffles in it. We have some criticisms of its execution, but overall, it’s an interesting idea.  The way the baffles are designed, Cooler Master is trying to bring air straight in through its channels. There’s a channel for the CPU that exposes the fin stack and Cooler Master's V8 CPU cooler. It conveys an idea similar to an engine cover. The GPU has a separate baffle beneath the CPU one. The company is trying to isolate air flow. In theory, this should work well and we would love this idea applied to more affordable cases, like the MF series, especially since they’re already kind of configurable. Looking at the back, fans can be mounted on the rear, which can help pull air out. We also saw another variant of the Cosmos case running liquid cooling with a distro block. It was coupled with 4x180mm fans and a “720” radiator, which pulled air into the case. Unfortunately, the air is blowing straight into the wall of a motherboard tray, but Cooler Master says the plan is to pull the air up and out of the case with additional 180mm fans on the top and to move the PSU towards the bottom of the case. Looking closer at the front of the special edition of the Cosmos cases, we can see the NVIDIA DGX shroud, which Cooler Master manufactures. It’s essentially like a sponge-like mesh. The special edition of the Cosmos doesn’t have a price yet, but the non-special edition variant is supposed to be around which is before any potential tariffs. Cooler Master CoolersCooler Master showed off some CPU air coolers that had some 3D heat pipes, which had more heat pipes protruding from the center. The company also showed off its V8 cooler and a full-metal fan. The fan’s blades and frame are both aluminum.  Cooler Master Elite Series CasesCooler Master does some really cool sh*t but has a branding problem. For instance, the company’s “Elite” series cases, shown in the image above, are actually budget cases. From left to right, we believe they are called the Elite 482, Elite 600, Elite 490 Wood, Elite 691 Wood, Elite 693, Elite 692, Elite 302, and Elite 502. Our advice to Cooler Master here is for them to unf*ck these names.Most of the Elite series cases don’t come with fans with the exception of the Elite 302 and Elite 502, which come with 3 ARGB fans. MF360Next up are Cooler Master’s MF360 cases, which conveys that you can see inside the case from all sides. While it’s going to have some thermal challenges, to give the company credit, it’s actually really good looking. The MF360 is a showcase fish-tank style PC that you can see through from both sides. Inside the case, we saw a distro block and tubes routed through on both sides.Cooling XThe case in the image above, which goes by "Cooling X,” and uses the company’s new MF frame system. If you look at the corner, you can see the individual columns. At Computex, we saw it as a pre-built system.The top of the case has a magnetically attached panel, which just pulls right off. The panel itself provides really good porosity and the material is pretty nice. Removing the top panel exposes 2 offset fans. The back fan tries to pull in air with the front fan trying to exhaust air out of the top, which is why they’re offset. That’s kind of cool to see.  Cooler Master FansCooler Master showed off all-aluminum fans, which include the blades and frame. The MF120 XT is a 120mm model, is supposed to be and the company says it goes up to 4,000 RPM. The fan’s RPM can also be button-controlled via an external remote and it uses a dual-ball-bearing solution. Cooler Master’s mixed fans, which use plastic blades coupled with an aluminum frame, come with fluid dynamic bearings. The clearance between the fan blade tip and the frame is important as the smaller that clearance is, the better performance you get. The major downside is that as the fan ages, it can start to clip the interior of the frame. Having it too close can also negatively impact yields. The solution to this is LCP, which is incredibly expensive, or metal, because it doesn’t deform, but that’s also expensive. Right now, Cooler Master says it’s about a .8mm distance, which is pretty good. The company is targeting 0.6mm by the time the fan launches. Cooler Master Video Card Shroud Grab a GN15 Large Anti-Static Modmat to celebrate our 15th Anniversary and for a high-quality PC building work surface. The Modmat features useful PC building diagrams and is anti-static conductive. Purchases directly fund our work!Cooler Master also showed off some video cards, which is not something the company is typically involved with. Cooler Master created a GPU shroud with adjustable slats that can accommodate 15-30mm fans. This solution is geared towards pre-built PCs and isn’t planned to be sold separately.Examining one of the fans, we saw a standard 25mm-thick fan, which Cooler Master’s GPU shroud solution can adjust to via different notch options.Cooler Master is also using a vapor chamber, which is supported by 8x8mm heat pipes running through the shroud and a gigantic fin stack. In total, it weighs almost 7 pounds.Cooler Master claims that, in terms of cooling, it performs similar to the 4-fan Astral solution at lower noise levels, but we don’t have those numbers. With 4,000 RPM fans running on a 600-watt heat load, Cooler Master claims a 5090 will run at about 49 degrees C or so for the GPU.
    #stone #case #cooler #master #gpu
    Stone PC Case, Cooler Master GPU, DIY Case from Scratch, and Metal Fans
    Stone PC Case, Cooler Master GPU, DIY Case from Scratch, and Metal FansJune 4, 2025Last Updated: 2025-06-04Cooler Master is doing some really interesting stuff with its new casesThe HighlightsCooler Master’s upcoming MF600, MF500, and MF400 reconfigurable frame cases are assembled from columns and cornersThe company also showed off interesting stone facade case front panelsCooler Master is working on a “GPU” with AsusTable of ContentsAutoTOC Grab a GN Tear-Down Toolkit to support our AD-FREE reviews and IN-DEPTH testing while also getting a high-quality, highly portable 10-piece toolkit that was custom designed for use with video cards for repasting and water block installation. Includes a portable roll bag, hook hangers for pegboards, a storage compartment, and instructional GPU disassembly cards.IntroWe visited Cooler Master’s booth at Computex 2025 where the company showed off several new cases. Arguably the most interesting one is a modular case. It comes with, we believe, 8 corners and 12 columns.Editor's note: This was originally published on May 20, 2025 as a video. This content has been adapted to written format for this article and is unchanged from the original publication.CreditsHostSteve BurkeCamera, Video EditingMike GaglioneVitalii MakhnovetsWriting, Web EditingJimmy ThangCooler Master MF CasesThe case comes with a front panel that has a dust filter in it. With it all assembled, it looks like the cases in the image above. The cases are the MF series, with the largest one being the MF600, which we assume translates to “Motherf***ing 600.” There’s also the MF500 and the smaller MF400. Initially, Cooler Master is basically going to be selling pre-configured models. Eventually, the company wants to allow people to customize the case on their site and have it assembled and shipped from around the City of Industry. It’s pretty cool as it’s a fully modular approach.The side panels are secured to the case via magnets, which is actually a nice touch. Internally, the MF600 we saw came with 3x140mm fans on the front and 1x120mm fan on the back. The motherboard tray is pretty standard for the most part. Exceptions include a rail system that provides numerous holes for screws to go in, which allows Cooler Master to reconfigure things. Inside the case towards the back, there’s also a rail system, which forms bits and pieces of the motherboard tray that allow for more customizability. Cooler Master has been kind of on-and-off in the DIY space over the years where they’ve had some really big wins and some really big losses. They were also kind of absent for a while, but these MF cases represent a better showing from what we’ve seen in a while from the company. According to Cooler Master, a pre-configured MF600 is supposed to cost We expect to test and review the case. The MF500 is supposed to go for and includes 2x200mm fans in the front and 1x120mm fan in the back. The smallest MF case, the MF600, which is a very large micro ATX box, is going for In terms of fans, it has 2x120mm ones at the bottom coupled with a 1x120mm fan in the rear.  Cooler Master also showed off different panel types they’re experimenting with. One of them included a facade-style stone. One of the pre-built MF cases we looked at had stuff flipped around in an inverted layout. One of the benefits of its rail system allows the case to have a bar that screws in which can support the GPU. Looking into this system, you can see that the PSU is at the bottom next to a bottom intake fan. Updated Cosmos Visit our Patreon page to contribute a few dollars toward this website's operationAdditionally, when you purchase through links to retailers on our site, we may earn a small affiliate commission.Cooler Master’s updated Cosmos has the NVIDIA-like DGX style front. We also saw a variant of the Cosmos with thermal baffles in it. We have some criticisms of its execution, but overall, it’s an interesting idea.  The way the baffles are designed, Cooler Master is trying to bring air straight in through its channels. There’s a channel for the CPU that exposes the fin stack and Cooler Master's V8 CPU cooler. It conveys an idea similar to an engine cover. The GPU has a separate baffle beneath the CPU one. The company is trying to isolate air flow. In theory, this should work well and we would love this idea applied to more affordable cases, like the MF series, especially since they’re already kind of configurable. Looking at the back, fans can be mounted on the rear, which can help pull air out. We also saw another variant of the Cosmos case running liquid cooling with a distro block. It was coupled with 4x180mm fans and a “720” radiator, which pulled air into the case. Unfortunately, the air is blowing straight into the wall of a motherboard tray, but Cooler Master says the plan is to pull the air up and out of the case with additional 180mm fans on the top and to move the PSU towards the bottom of the case. Looking closer at the front of the special edition of the Cosmos cases, we can see the NVIDIA DGX shroud, which Cooler Master manufactures. It’s essentially like a sponge-like mesh. The special edition of the Cosmos doesn’t have a price yet, but the non-special edition variant is supposed to be around which is before any potential tariffs. Cooler Master CoolersCooler Master showed off some CPU air coolers that had some 3D heat pipes, which had more heat pipes protruding from the center. The company also showed off its V8 cooler and a full-metal fan. The fan’s blades and frame are both aluminum.  Cooler Master Elite Series CasesCooler Master does some really cool sh*t but has a branding problem. For instance, the company’s “Elite” series cases, shown in the image above, are actually budget cases. From left to right, we believe they are called the Elite 482, Elite 600, Elite 490 Wood, Elite 691 Wood, Elite 693, Elite 692, Elite 302, and Elite 502. Our advice to Cooler Master here is for them to unf*ck these names.Most of the Elite series cases don’t come with fans with the exception of the Elite 302 and Elite 502, which come with 3 ARGB fans. MF360Next up are Cooler Master’s MF360 cases, which conveys that you can see inside the case from all sides. While it’s going to have some thermal challenges, to give the company credit, it’s actually really good looking. The MF360 is a showcase fish-tank style PC that you can see through from both sides. Inside the case, we saw a distro block and tubes routed through on both sides.Cooling XThe case in the image above, which goes by "Cooling X,” and uses the company’s new MF frame system. If you look at the corner, you can see the individual columns. At Computex, we saw it as a pre-built system.The top of the case has a magnetically attached panel, which just pulls right off. The panel itself provides really good porosity and the material is pretty nice. Removing the top panel exposes 2 offset fans. The back fan tries to pull in air with the front fan trying to exhaust air out of the top, which is why they’re offset. That’s kind of cool to see.  Cooler Master FansCooler Master showed off all-aluminum fans, which include the blades and frame. The MF120 XT is a 120mm model, is supposed to be and the company says it goes up to 4,000 RPM. The fan’s RPM can also be button-controlled via an external remote and it uses a dual-ball-bearing solution. Cooler Master’s mixed fans, which use plastic blades coupled with an aluminum frame, come with fluid dynamic bearings. The clearance between the fan blade tip and the frame is important as the smaller that clearance is, the better performance you get. The major downside is that as the fan ages, it can start to clip the interior of the frame. Having it too close can also negatively impact yields. The solution to this is LCP, which is incredibly expensive, or metal, because it doesn’t deform, but that’s also expensive. Right now, Cooler Master says it’s about a .8mm distance, which is pretty good. The company is targeting 0.6mm by the time the fan launches. Cooler Master Video Card Shroud Grab a GN15 Large Anti-Static Modmat to celebrate our 15th Anniversary and for a high-quality PC building work surface. The Modmat features useful PC building diagrams and is anti-static conductive. Purchases directly fund our work!Cooler Master also showed off some video cards, which is not something the company is typically involved with. Cooler Master created a GPU shroud with adjustable slats that can accommodate 15-30mm fans. This solution is geared towards pre-built PCs and isn’t planned to be sold separately.Examining one of the fans, we saw a standard 25mm-thick fan, which Cooler Master’s GPU shroud solution can adjust to via different notch options.Cooler Master is also using a vapor chamber, which is supported by 8x8mm heat pipes running through the shroud and a gigantic fin stack. In total, it weighs almost 7 pounds.Cooler Master claims that, in terms of cooling, it performs similar to the 4-fan Astral solution at lower noise levels, but we don’t have those numbers. With 4,000 RPM fans running on a 600-watt heat load, Cooler Master claims a 5090 will run at about 49 degrees C or so for the GPU. #stone #case #cooler #master #gpu
    GAMERSNEXUS.NET
    Stone PC Case, Cooler Master GPU, DIY Case from Scratch, and Metal Fans
    Stone PC Case, Cooler Master GPU, DIY Case from Scratch, and Metal FansJune 4, 2025Last Updated: 2025-06-04Cooler Master is doing some really interesting stuff with its new casesThe HighlightsCooler Master’s upcoming MF600, MF500, and MF400 reconfigurable frame cases are assembled from columns and cornersThe company also showed off interesting stone facade case front panelsCooler Master is working on a “GPU” with AsusTable of ContentsAutoTOC Grab a GN Tear-Down Toolkit to support our AD-FREE reviews and IN-DEPTH testing while also getting a high-quality, highly portable 10-piece toolkit that was custom designed for use with video cards for repasting and water block installation. Includes a portable roll bag, hook hangers for pegboards, a storage compartment, and instructional GPU disassembly cards.IntroWe visited Cooler Master’s booth at Computex 2025 where the company showed off several new cases. Arguably the most interesting one is a modular case. It comes with, we believe, 8 corners and 12 columns.Editor's note: This was originally published on May 20, 2025 as a video. This content has been adapted to written format for this article and is unchanged from the original publication.CreditsHostSteve BurkeCamera, Video EditingMike GaglioneVitalii MakhnovetsWriting, Web EditingJimmy ThangCooler Master MF CasesThe case comes with a front panel that has a dust filter in it. With it all assembled, it looks like the cases in the image above. The cases are the MF series, with the largest one being the MF600, which we assume translates to “Motherf***ing 600.” There’s also the MF500 and the smaller MF400. Initially, Cooler Master is basically going to be selling pre-configured models. Eventually, the company wants to allow people to customize the case on their site and have it assembled and shipped from around the City of Industry. It’s pretty cool as it’s a fully modular approach.The side panels are secured to the case via magnets, which is actually a nice touch. Internally, the MF600 we saw came with 3x140mm fans on the front and 1x120mm fan on the back. The motherboard tray is pretty standard for the most part. Exceptions include a rail system that provides numerous holes for screws to go in, which allows Cooler Master to reconfigure things. Inside the case towards the back, there’s also a rail system, which forms bits and pieces of the motherboard tray that allow for more customizability. Cooler Master has been kind of on-and-off in the DIY space over the years where they’ve had some really big wins and some really big losses. They were also kind of absent for a while, but these MF cases represent a better showing from what we’ve seen in a while from the company. According to Cooler Master, a pre-configured MF600 is supposed to cost $200. We expect to test and review the case. The MF500 is supposed to go for $165 and includes 2x200mm fans in the front and 1x120mm fan in the back. The smallest MF case, the MF600, which is a very large micro ATX box, is going for $150. In terms of fans, it has 2x120mm ones at the bottom coupled with a 1x120mm fan in the rear.  Cooler Master also showed off different panel types they’re experimenting with. One of them included a facade-style stone. One of the pre-built MF cases we looked at had stuff flipped around in an inverted layout. One of the benefits of its rail system allows the case to have a bar that screws in which can support the GPU. Looking into this system, you can see that the PSU is at the bottom next to a bottom intake fan. Updated Cosmos Visit our Patreon page to contribute a few dollars toward this website's operation (or consider a direct donation or buying something from our GN Store!) Additionally, when you purchase through links to retailers on our site, we may earn a small affiliate commission.Cooler Master’s updated Cosmos has the NVIDIA-like DGX style front. We also saw a variant of the Cosmos with thermal baffles in it. We have some criticisms of its execution, but overall, it’s an interesting idea.  The way the baffles are designed, Cooler Master is trying to bring air straight in through its channels. There’s a channel for the CPU that exposes the fin stack and Cooler Master's V8 CPU cooler. It conveys an idea similar to an engine cover. The GPU has a separate baffle beneath the CPU one. The company is trying to isolate air flow. In theory, this should work well and we would love this idea applied to more affordable cases, like the MF series, especially since they’re already kind of configurable. Looking at the back, fans can be mounted on the rear, which can help pull air out. We also saw another variant of the Cosmos case running liquid cooling with a distro block. It was coupled with 4x180mm fans and a “720” radiator, which pulled air into the case. Unfortunately, the air is blowing straight into the wall of a motherboard tray, but Cooler Master says the plan is to pull the air up and out of the case with additional 180mm fans on the top and to move the PSU towards the bottom of the case. Looking closer at the front of the special edition of the Cosmos cases, we can see the NVIDIA DGX shroud, which Cooler Master manufactures. It’s essentially like a sponge-like mesh. The special edition of the Cosmos doesn’t have a price yet, but the non-special edition variant is supposed to be around $400, which is before any potential tariffs. Cooler Master CoolersCooler Master showed off some CPU air coolers that had some 3D heat pipes, which had more heat pipes protruding from the center. The company also showed off its V8 cooler and a full-metal fan. The fan’s blades and frame are both aluminum.  Cooler Master Elite Series CasesCooler Master does some really cool sh*t but has a branding problem. For instance, the company’s “Elite” series cases, shown in the image above, are actually budget cases. From left to right, we believe they are called the Elite 482 ($50), Elite 600 ($65), Elite 490 Wood ($50), Elite 691 Wood ($60), Elite 693 ($60), Elite 692 ($70), Elite 302 ($40), and Elite 502 ($60). Our advice to Cooler Master here is for them to unf*ck these names.Most of the Elite series cases don’t come with fans with the exception of the Elite 302 and Elite 502, which come with 3 ARGB fans. MF360Next up are Cooler Master’s MF360 cases, which conveys that you can see inside the case from all sides. While it’s going to have some thermal challenges, to give the company credit, it’s actually really good looking. The MF360 is a showcase fish-tank style PC that you can see through from both sides. Inside the case, we saw a distro block and tubes routed through on both sides.Cooling XThe case in the image above, which goes by "Cooling X,” and uses the company’s new MF frame system. If you look at the corner, you can see the individual columns. At Computex, we saw it as a pre-built system.The top of the case has a magnetically attached panel, which just pulls right off. The panel itself provides really good porosity and the material is pretty nice. Removing the top panel exposes 2 offset fans. The back fan tries to pull in air with the front fan trying to exhaust air out of the top, which is why they’re offset. That’s kind of cool to see.  Cooler Master FansCooler Master showed off all-aluminum fans, which include the blades and frame. The MF120 XT is a 120mm model, is supposed to be $35, and the company says it goes up to 4,000 RPM. The fan’s RPM can also be button-controlled via an external remote and it uses a dual-ball-bearing solution. Cooler Master’s mixed fans, which use plastic blades coupled with an aluminum frame, come with fluid dynamic bearings (FDBs). The clearance between the fan blade tip and the frame is important as the smaller that clearance is, the better performance you get. The major downside is that as the fan ages, it can start to clip the interior of the frame. Having it too close can also negatively impact yields. The solution to this is LCP, which is incredibly expensive, or metal, because it doesn’t deform, but that’s also expensive. Right now, Cooler Master says it’s about a .8mm distance, which is pretty good. The company is targeting 0.6mm by the time the fan launches. Cooler Master Video Card Shroud Grab a GN15 Large Anti-Static Modmat to celebrate our 15th Anniversary and for a high-quality PC building work surface. The Modmat features useful PC building diagrams and is anti-static conductive. Purchases directly fund our work! (or consider a direct donation or a Patreon contribution!)Cooler Master also showed off some video cards, which is not something the company is typically involved with. Cooler Master created a GPU shroud with adjustable slats that can accommodate 15-30mm fans. This solution is geared towards pre-built PCs and isn’t planned to be sold separately.Examining one of the fans, we saw a standard 25mm-thick fan, which Cooler Master’s GPU shroud solution can adjust to via different notch options.Cooler Master is also using a vapor chamber, which is supported by 8x8mm heat pipes running through the shroud and a gigantic fin stack. In total, it weighs almost 7 pounds (3.2 kilograms).Cooler Master claims that, in terms of cooling, it performs similar to the 4-fan Astral solution at lower noise levels, but we don’t have those numbers. With 4,000 RPM fans running on a 600-watt heat load, Cooler Master claims a 5090 will run at about 49 degrees C or so for the GPU.
    Like
    Love
    Wow
    Sad
    Angry
    197
    0 Comentários 0 Compartilhamentos
  • Adidas data breach reveals customer info in vendor attack

    Published
    June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles!
    Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #adidas #data #breach #reveals #customer
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #adidas #data #breach #reveals #customer
    WWW.FOXNEWS.COM
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at work (Kurt "CyberGuy" Knutsson)Adidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas sign (Kurt "CyberGuy" Knutsson)What Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harm (such as identity theft or fraud) being caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at https://www.adidas.com/us/helpWe apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe (Kurt "CyberGuy" Knutsson)6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Angry
    Sad
    216
    0 Comentários 0 Compartilhamentos
  • Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

    Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach

    Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishingcampaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion.
    The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with threat groups with ties to an online cybercrime collective known as The Com.
    "Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements," the company said in a report shared with The Hacker News.

    This approach, Google's Threat Intelligence Groupadded, has had the benefit of tricking English-speaking employees into performing actions that give the threat actors access or lead to the sharing of valuable information such as credentials, which are then used to facilitate data theft.
    A noteworthy aspect of UNC6040's activities involves the use of a modified version of Salesforce's Data Loader that victims are deceived into authorizing so as to connect to the organization's Salesforce portal during the vishing attack. Data Loader is an application used to import, export, and update data in bulk within the Salesforce platform.
    Specifically, the attackers guide the target to visit Salesforce's connected app setup page and approve the modified version of the Data Loader app that carries a different name or brandingfrom its legitimate counterpart. This action grants them unauthorized access to the Salesforce customer environments and exfiltrate data.
    Beyond data loss, the attacks serve as a stepping stone for UNC6040 to move laterally through the victim's network, and then access and harvest information from other platforms such as Okta, Workplace, and Microsoft 365.

    Select incidents have also involved extortion activities, but only "several months" after the initial intrusions were observed, indicating an attempt to monetize and profit off the stolen data presumably in partnership with a second threat actor.
    "During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims," Google said.
    UNC6040's overlaps with groups linked to The Com stem from the targeting of Okta credentials and the use of social engineering via IT support, a tactic that has been embraced by Scattered Spider, another financially motivated threat actor that's part of the loose-knit organized collective.
    The vishing campaign hasn't gone unnoticed by Salesforce, which, in March 2025, warned of threat actors using social engineering tactics to impersonate IT support personnel over the phone and trick its customers' employees into giving away their credentials or approving the modified Data Loader app.

    "They have been reported luring our customers' employees and third-party support workers to phishing pages designed to steal credentials and MFA tokens or prompting users to navigate to the login.salesforcecom/setup/connect page in order to add a malicious connected app," the company said.
    "In some cases, we have observed that the malicious connected app is a modified version of the Data Loader app published under a different name and/or branding. Once the threat actor gains access to a customer's Salesforce account or adds a connected app, they use the connected app to exfiltrate data."
    The development not only highlights the continued sophistication of social engineering campaigns, but also shows how IT support staff are being increasingly targeted as a way to gain initial access.
    "The success of campaigns like UNC6040's, leveraging these refined vishing tactics, demonstrates that this approach remains an effective threat vector for financially motivated groups seeking to breach organizational defenses," Google said.
    "Given the extended time frame between initial compromise and extortion, it is possible that multiple victim organizations and potentially downstream victims could face extortion demands in the coming weeks or months."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #google #exposes #vishing #group #unc6040
    Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
    Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishingcampaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion. The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with threat groups with ties to an online cybercrime collective known as The Com. "Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements," the company said in a report shared with The Hacker News. This approach, Google's Threat Intelligence Groupadded, has had the benefit of tricking English-speaking employees into performing actions that give the threat actors access or lead to the sharing of valuable information such as credentials, which are then used to facilitate data theft. A noteworthy aspect of UNC6040's activities involves the use of a modified version of Salesforce's Data Loader that victims are deceived into authorizing so as to connect to the organization's Salesforce portal during the vishing attack. Data Loader is an application used to import, export, and update data in bulk within the Salesforce platform. Specifically, the attackers guide the target to visit Salesforce's connected app setup page and approve the modified version of the Data Loader app that carries a different name or brandingfrom its legitimate counterpart. This action grants them unauthorized access to the Salesforce customer environments and exfiltrate data. Beyond data loss, the attacks serve as a stepping stone for UNC6040 to move laterally through the victim's network, and then access and harvest information from other platforms such as Okta, Workplace, and Microsoft 365. Select incidents have also involved extortion activities, but only "several months" after the initial intrusions were observed, indicating an attempt to monetize and profit off the stolen data presumably in partnership with a second threat actor. "During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims," Google said. UNC6040's overlaps with groups linked to The Com stem from the targeting of Okta credentials and the use of social engineering via IT support, a tactic that has been embraced by Scattered Spider, another financially motivated threat actor that's part of the loose-knit organized collective. The vishing campaign hasn't gone unnoticed by Salesforce, which, in March 2025, warned of threat actors using social engineering tactics to impersonate IT support personnel over the phone and trick its customers' employees into giving away their credentials or approving the modified Data Loader app. "They have been reported luring our customers' employees and third-party support workers to phishing pages designed to steal credentials and MFA tokens or prompting users to navigate to the login.salesforcecom/setup/connect page in order to add a malicious connected app," the company said. "In some cases, we have observed that the malicious connected app is a modified version of the Data Loader app published under a different name and/or branding. Once the threat actor gains access to a customer's Salesforce account or adds a connected app, they use the connected app to exfiltrate data." The development not only highlights the continued sophistication of social engineering campaigns, but also shows how IT support staff are being increasingly targeted as a way to gain initial access. "The success of campaigns like UNC6040's, leveraging these refined vishing tactics, demonstrates that this approach remains an effective threat vector for financially motivated groups seeking to breach organizational defenses," Google said. "Given the extended time frame between initial compromise and extortion, it is possible that multiple victim organizations and potentially downstream victims could face extortion demands in the coming weeks or months." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #google #exposes #vishing #group #unc6040
    THEHACKERNEWS.COM
    Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
    Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishing (aka vishing) campaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion. The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with threat groups with ties to an online cybercrime collective known as The Com. "Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements," the company said in a report shared with The Hacker News. This approach, Google's Threat Intelligence Group (GTIG) added, has had the benefit of tricking English-speaking employees into performing actions that give the threat actors access or lead to the sharing of valuable information such as credentials, which are then used to facilitate data theft. A noteworthy aspect of UNC6040's activities involves the use of a modified version of Salesforce's Data Loader that victims are deceived into authorizing so as to connect to the organization's Salesforce portal during the vishing attack. Data Loader is an application used to import, export, and update data in bulk within the Salesforce platform. Specifically, the attackers guide the target to visit Salesforce's connected app setup page and approve the modified version of the Data Loader app that carries a different name or branding (e.g., "My Ticket Portal") from its legitimate counterpart. This action grants them unauthorized access to the Salesforce customer environments and exfiltrate data. Beyond data loss, the attacks serve as a stepping stone for UNC6040 to move laterally through the victim's network, and then access and harvest information from other platforms such as Okta, Workplace, and Microsoft 365. Select incidents have also involved extortion activities, but only "several months" after the initial intrusions were observed, indicating an attempt to monetize and profit off the stolen data presumably in partnership with a second threat actor. "During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims," Google said. UNC6040's overlaps with groups linked to The Com stem from the targeting of Okta credentials and the use of social engineering via IT support, a tactic that has been embraced by Scattered Spider, another financially motivated threat actor that's part of the loose-knit organized collective. The vishing campaign hasn't gone unnoticed by Salesforce, which, in March 2025, warned of threat actors using social engineering tactics to impersonate IT support personnel over the phone and trick its customers' employees into giving away their credentials or approving the modified Data Loader app. "They have been reported luring our customers' employees and third-party support workers to phishing pages designed to steal credentials and MFA tokens or prompting users to navigate to the login.salesforce[.]com/setup/connect page in order to add a malicious connected app," the company said. "In some cases, we have observed that the malicious connected app is a modified version of the Data Loader app published under a different name and/or branding. Once the threat actor gains access to a customer's Salesforce account or adds a connected app, they use the connected app to exfiltrate data." The development not only highlights the continued sophistication of social engineering campaigns, but also shows how IT support staff are being increasingly targeted as a way to gain initial access. "The success of campaigns like UNC6040's, leveraging these refined vishing tactics, demonstrates that this approach remains an effective threat vector for financially motivated groups seeking to breach organizational defenses," Google said. "Given the extended time frame between initial compromise and extortion, it is possible that multiple victim organizations and potentially downstream victims could face extortion demands in the coming weeks or months." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Angry
    Sad
    314
    0 Comentários 0 Compartilhamentos
  • Transparent Design: How See-Through Materials Are Revolutionizing Architecture & Product Design

    Transparent design is the intentional use of see-through or translucent materials and visual strategies to evoke openness, honesty, and fluidity in both spatial and product design. It enhances light flow, visibility, and interaction, blurring boundaries between spaces or revealing inner layers of products.
    In interiors, this manifests through glass walls, acrylic dividers, and open layouts that invite natural light and visual connection. Transparency in product design often exposes internal mechanisms in products, fostering trust and curiosity by making functions visible. It focuses on simplicity, clarity, and minimalist form, creating seamless connections between objects and their environments. Let’s now explore how transparency shapes the function, experience, and emotional impact of spatial and product design.
    Transparent Spatial Design
    Transparency in spatial design serves as a powerful architectural language that transcends mere material choice, creating profound connections between spaces and their inhabitants. By employing translucent or clear elements, designers can dissolve traditional boundaries, allowing light to penetrate deeply into interiors while establishing visual relationships between previously separated areas. This permeability creates a dynamic spatial experience where environments flow into one another, expanding perceived dimensions and fostering a sense of openness. The strategic use of transparent elements – whether through glass partitions, open floor plans, or permeable screens – transforms rigid spatial hierarchies into fluid, interconnected zones that respond to contemporary needs for flexibility and connection with both surrounding spaces and natural environments.
    Beyond its physical manifestations, transparency embodies deeper philosophical principles in design, representing honesty, clarity, and accessibility. It democratizes space by removing visual barriers that traditionally signaled exclusion or privacy, instead promoting inclusivity and shared experience. In public buildings, transparent features invite engagement and participation, while in residential contexts, they nurture connection to nature and enhance wellbeing through abundant natural light. This approach challenges designers to thoughtfully balance openness with necessary privacy, creating nuanced spatial sequences that can reveal or conceal as needed. When skillfully implemented, transparency becomes more than an aesthetic choice, it becomes a fundamental design strategy that shapes how we experience, navigate, and emotionally respond to our built environment.
    1. Expands Perception of Space
    Transparency in spatial design enhances how people perceive space by blurring the boundaries between rooms and creating a seamless connection between the indoors and the outdoors. Materials like glass and acrylic create visual continuity, making interiors feel larger, more open, and seamlessly integrated.
    This approach encourages a fluid transition between spaces, eliminates confinement, and promotes spatial freedom. As a result, transparent design contributes to an inviting atmosphere while maximising natural views and light penetration throughout the environment.

    Nestled in St. Donat near Montreal, the Apple Tree House by ACDF Architecture is a striking example of transparent design rooted in emotional memory. Wrapped around a central courtyard with a symbolic apple tree, the low-slung home features expansive glass walls that create continuous visual access to nature. The transparent layout not only blurs the boundaries between indoors and outdoors but also transforms the apple tree into a living focal point and is visible from multiple angles and spaces within the house.

    This thoughtful transparency allows natural light to flood the interiors while connecting the home’s occupants with the changing seasons outside. The home’s square-shaped plan includes three black-clad volumes that house bedrooms, a lounge, and service areas. Despite the openness, privacy is preserved through deliberate wall placements. Wooden ceilings and concrete floors add warmth and texture, but it’s the full-height glazing that defines the home that frames nature as a permanent, ever-evolving artwork at its heart.
    2. Enhances the Feeling of Openness
    One of the core benefits of transparent design is its ability to harness natural light, transforming enclosed areas into luminous, uplifting environments. By using translucent or clear materials, designers reduce the need for artificial lighting and minimize visual barriers.
    This not only improves energy efficiency but also fosters emotional well-being by connecting occupants to daylight and exterior views. Ultimately, transparency promotes a feeling of openness and calm, aligning with minimalist and modern architectural principles.

    The Living O’Pod by UN10 Design Studio is a transparent, two-story pod designed as a minimalist retreat that fully immerses its occupants in nature. Built with a steel frame and glass panels all around, this glass bubble offers uninterrupted panoramic views of the Finnish wilderness. Its remote location provides the privacy needed to embrace transparency, allowing residents to enjoy stunning sunrises, sunsets, and starry nights from within. The open design blurs the line between indoors and outdoors, creating a unique connection with the environment.

    Located in Repovesi, Finland, the pod’s interiors feature warm plywood floors and walls that complement the natural setting. A standout feature is its 360° rotation, which allows the entire structure to turn and capture optimal light and views throughout the day. Equipped with thermal insulation and heating, the Living O’Pod ensures comfort year-round and builds a harmonious relationship between people and nature.
    3. Encourages Interaction
    Transparent design reimagines interiors as active participants in the user experience, rather than passive backgrounds. Open sightlines and clear partitions encourage movement, visibility, and spontaneous interaction among occupants. This layout strategy fosters social connectivity, enhances spatial navigation, and aligns with contemporary needs for collaboration and flexibility.
    Whether in residential, commercial, or public spaces, transparency supports an intuitive spatial flow that strengthens the emotional and functional relationship between people and their environment.

    The Beach Cabin on the Baltic Sea, designed by Peter Kuczia, is a striking architectural piece located near Gdansk in northern Poland. This small gastronomy facility combines simplicity with bold design, harmoniously fitting into the beach environment while standing out through its innovative form. The structure is composed of two distinct parts: an enclosed space and an expansive open living and dining area that maximizes natural light and offers shelter. This dual arrangement creates a balanced yet dynamic architectural composition that respects the surrounding landscape.

    A defining feature of the cabin is its open dining area, which is divided into two sections—one traditional cabin-style and the other constructed entirely of glass. The transparent glass facade provides uninterrupted panoramic views of the Baltic Sea, the shoreline, and the sky, enhancing the connection between interior and nature. Elevated on stilts, the building appears to float above the sand, minimizing environmental impact and contributing to its ethereal, dreamlike quality.
    Transparent Product Design
    In product design, transparency serves as both a functional strategy and a powerful communicative tool that transforms the relationship between users and objects. By revealing internal components and operational mechanisms through clear or translucent materials, designers create an immediate visual understanding of how products function, demystifying technology and inviting engagement. This design approach establishes an honest dialogue with consumers, building trust through visibility rather than concealment. Beyond mere aesthetics, transparent design celebrates the beauty of engineering, turning circuit boards, gears, and mechanical elements into intentional visual features that tell the product’s story. From the nostalgic appeal of see-through gaming consoles to modern tech accessories, this approach satisfies our innate curiosity about how things work while creating a more informed user experience.
    The psychological impact of transparency in products extends beyond functional clarity to create deeper emotional connections. When users can observe a product’s inner workings, they develop increased confidence in its quality and craftsmanship, fostering a sense of reliability that opaque designs often struggle to convey. This visibility also democratizes understanding, making complex technologies more accessible and less intimidating to diverse users. Transparent design elements can evoke powerful nostalgic associations while simultaneously appearing futuristic and innovative, creating a timeless appeal that transcends trends. By embracing transparency, designers reject the notion that complexity should be hidden, instead celebrating the intricate engineering that powers our everyday objects. This philosophy aligns perfectly with contemporary values of authenticity and mindful consumption, where users increasingly seek products that communicate honesty in both form and function.
    1. Reveals Functionality
    Transparent product design exposes internal components like wiring, gears, or circuits, turning functional parts into visual features. This approach demystifies the object, inviting users to understand how it works rather than hiding its complexity. It fosters appreciation for craftsmanship and engineering while encouraging educational curiosity. By showcasing what lies beneath the surface, designers build an honest relationship with consumers that is based on clarity, trust, and visible function.

    Packing a backpack often means tossing everything in and hoping for the best—until you need something fast. This transparent modular backpack concept reimagines that daily hassle with a clear, compartmentalized design that lets you see all your gear at a glance. No more digging through a dark abyss—every item has its visible place. The bag features four detachable, differently sized boxes that snap together with straps, letting you customize what you carry. Grab just the tech module or gym gear block and go—simple, efficient, and streamlined. Unlike traditional organizers that hide contents in pouches, the transparent material keeps everything in plain sight, saving time and frustration.

    While it raises valid concerns around privacy and security, the clarity and convenience it offers make it ideal for fast-paced, on-the-go lifestyles. With form meeting function, this concept shows how transparent design can transform not just how a bag looks, but how it works.
    2. Enhances User Engagement
    When users can see how a product operates, they feel more confident using it. Transparent casings invite interaction by reducing uncertainty about internal processes. This visible clarity reassures users about the product’s integrity and quality, creating a psychological sense of openness and reliability.
    Especially in tech and appliances, this strategy deepens user trust and adds emotional value by allowing a more intimate connection with the design’s purpose and construction.

    The transparent Sony Glass Blue WF-C710N earbuds represent something more meaningful than a mere aesthetic choice, embodying a refreshing philosophy of technological honesty. While most devices conceal their inner workings behind opaque shells, Sony’s decision to reveal the intricate circuitry and precision components celebrates the engineering artistry that makes these tiny audio marvels possible.

    As you catch glimpses of copper coils and circuit boards through the crystal-clear housing, there’s a renewed appreciation for the invisible complexity that delivers your favorite music, serving as a visual reminder that sometimes the most beautiful designs are those that have nothing to hide.
    3. Celebrates Aesthetic Engineering
    Transparency turns utilitarian details into design features, allowing users to visually experience the beauty of inner mechanisms. This trend, seen in everything from vintage electronics to modern gadgets and watches, values technical artistry as much as outer form.
    Transparent design redefines aesthetics by focusing on the raw, mechanical truth of a product. It appeals to minimalism and industrial design lovers, offering visual depth and storytelling through exposed structure rather than decorative surface embellishment.

    DAB Motors’ 1α Transparent Edition brings retro tech flair into modern mobility with its striking transparent bodywork. Inspired by the see-through gadgets of the ”90s—like the Game Boy Color and clear Nintendo controllers—this electric motorcycle reveals its inner mechanics with style. The semi-translucent panels offer a rare peek at the bike’s intricate engineering, blending nostalgia with innovation. Carbon fiber elements, sourced from repurposed Airbus materials, complement the lightweight transparency, creating a visual experience that’s both futuristic and rooted in classic design aesthetics.

    The see-through design isn’t just for looks—it enhances the connection between rider and machine. Exposed components like the integrated LCD dashboard, lenticular headlight, and visible frame structure emphasize function and precision. This openness aligns with a broader transparent design philosophy, where clarity and honesty in construction are celebrated. The DAB 1α turns heads not by hiding complexity, but by proudly displaying it, making every ride a statement in motion.
    Beyond just materials, transparent design also reflects a deeper design philosophy that values clarity in purpose, function, and sustainability. It supports minimalist thinking by focusing on what’s essential, reducing visual clutter, and making spaces or products easier to understand and engage with. Whether in interiors or objects, transparency helps create a more honest, functional, and connected user experienceThe post Transparent Design: How See-Through Materials Are Revolutionizing Architecture & Product Design first appeared on Yanko Design.
    #transparent #design #how #seethrough #materials
    Transparent Design: How See-Through Materials Are Revolutionizing Architecture & Product Design
    Transparent design is the intentional use of see-through or translucent materials and visual strategies to evoke openness, honesty, and fluidity in both spatial and product design. It enhances light flow, visibility, and interaction, blurring boundaries between spaces or revealing inner layers of products. In interiors, this manifests through glass walls, acrylic dividers, and open layouts that invite natural light and visual connection. Transparency in product design often exposes internal mechanisms in products, fostering trust and curiosity by making functions visible. It focuses on simplicity, clarity, and minimalist form, creating seamless connections between objects and their environments. Let’s now explore how transparency shapes the function, experience, and emotional impact of spatial and product design. Transparent Spatial Design Transparency in spatial design serves as a powerful architectural language that transcends mere material choice, creating profound connections between spaces and their inhabitants. By employing translucent or clear elements, designers can dissolve traditional boundaries, allowing light to penetrate deeply into interiors while establishing visual relationships between previously separated areas. This permeability creates a dynamic spatial experience where environments flow into one another, expanding perceived dimensions and fostering a sense of openness. The strategic use of transparent elements – whether through glass partitions, open floor plans, or permeable screens – transforms rigid spatial hierarchies into fluid, interconnected zones that respond to contemporary needs for flexibility and connection with both surrounding spaces and natural environments. Beyond its physical manifestations, transparency embodies deeper philosophical principles in design, representing honesty, clarity, and accessibility. It democratizes space by removing visual barriers that traditionally signaled exclusion or privacy, instead promoting inclusivity and shared experience. In public buildings, transparent features invite engagement and participation, while in residential contexts, they nurture connection to nature and enhance wellbeing through abundant natural light. This approach challenges designers to thoughtfully balance openness with necessary privacy, creating nuanced spatial sequences that can reveal or conceal as needed. When skillfully implemented, transparency becomes more than an aesthetic choice, it becomes a fundamental design strategy that shapes how we experience, navigate, and emotionally respond to our built environment. 1. Expands Perception of Space Transparency in spatial design enhances how people perceive space by blurring the boundaries between rooms and creating a seamless connection between the indoors and the outdoors. Materials like glass and acrylic create visual continuity, making interiors feel larger, more open, and seamlessly integrated. This approach encourages a fluid transition between spaces, eliminates confinement, and promotes spatial freedom. As a result, transparent design contributes to an inviting atmosphere while maximising natural views and light penetration throughout the environment. Nestled in St. Donat near Montreal, the Apple Tree House by ACDF Architecture is a striking example of transparent design rooted in emotional memory. Wrapped around a central courtyard with a symbolic apple tree, the low-slung home features expansive glass walls that create continuous visual access to nature. The transparent layout not only blurs the boundaries between indoors and outdoors but also transforms the apple tree into a living focal point and is visible from multiple angles and spaces within the house. This thoughtful transparency allows natural light to flood the interiors while connecting the home’s occupants with the changing seasons outside. The home’s square-shaped plan includes three black-clad volumes that house bedrooms, a lounge, and service areas. Despite the openness, privacy is preserved through deliberate wall placements. Wooden ceilings and concrete floors add warmth and texture, but it’s the full-height glazing that defines the home that frames nature as a permanent, ever-evolving artwork at its heart. 2. Enhances the Feeling of Openness One of the core benefits of transparent design is its ability to harness natural light, transforming enclosed areas into luminous, uplifting environments. By using translucent or clear materials, designers reduce the need for artificial lighting and minimize visual barriers. This not only improves energy efficiency but also fosters emotional well-being by connecting occupants to daylight and exterior views. Ultimately, transparency promotes a feeling of openness and calm, aligning with minimalist and modern architectural principles. The Living O’Pod by UN10 Design Studio is a transparent, two-story pod designed as a minimalist retreat that fully immerses its occupants in nature. Built with a steel frame and glass panels all around, this glass bubble offers uninterrupted panoramic views of the Finnish wilderness. Its remote location provides the privacy needed to embrace transparency, allowing residents to enjoy stunning sunrises, sunsets, and starry nights from within. The open design blurs the line between indoors and outdoors, creating a unique connection with the environment. Located in Repovesi, Finland, the pod’s interiors feature warm plywood floors and walls that complement the natural setting. A standout feature is its 360° rotation, which allows the entire structure to turn and capture optimal light and views throughout the day. Equipped with thermal insulation and heating, the Living O’Pod ensures comfort year-round and builds a harmonious relationship between people and nature. 3. Encourages Interaction Transparent design reimagines interiors as active participants in the user experience, rather than passive backgrounds. Open sightlines and clear partitions encourage movement, visibility, and spontaneous interaction among occupants. This layout strategy fosters social connectivity, enhances spatial navigation, and aligns with contemporary needs for collaboration and flexibility. Whether in residential, commercial, or public spaces, transparency supports an intuitive spatial flow that strengthens the emotional and functional relationship between people and their environment. The Beach Cabin on the Baltic Sea, designed by Peter Kuczia, is a striking architectural piece located near Gdansk in northern Poland. This small gastronomy facility combines simplicity with bold design, harmoniously fitting into the beach environment while standing out through its innovative form. The structure is composed of two distinct parts: an enclosed space and an expansive open living and dining area that maximizes natural light and offers shelter. This dual arrangement creates a balanced yet dynamic architectural composition that respects the surrounding landscape. A defining feature of the cabin is its open dining area, which is divided into two sections—one traditional cabin-style and the other constructed entirely of glass. The transparent glass facade provides uninterrupted panoramic views of the Baltic Sea, the shoreline, and the sky, enhancing the connection between interior and nature. Elevated on stilts, the building appears to float above the sand, minimizing environmental impact and contributing to its ethereal, dreamlike quality. Transparent Product Design In product design, transparency serves as both a functional strategy and a powerful communicative tool that transforms the relationship between users and objects. By revealing internal components and operational mechanisms through clear or translucent materials, designers create an immediate visual understanding of how products function, demystifying technology and inviting engagement. This design approach establishes an honest dialogue with consumers, building trust through visibility rather than concealment. Beyond mere aesthetics, transparent design celebrates the beauty of engineering, turning circuit boards, gears, and mechanical elements into intentional visual features that tell the product’s story. From the nostalgic appeal of see-through gaming consoles to modern tech accessories, this approach satisfies our innate curiosity about how things work while creating a more informed user experience. The psychological impact of transparency in products extends beyond functional clarity to create deeper emotional connections. When users can observe a product’s inner workings, they develop increased confidence in its quality and craftsmanship, fostering a sense of reliability that opaque designs often struggle to convey. This visibility also democratizes understanding, making complex technologies more accessible and less intimidating to diverse users. Transparent design elements can evoke powerful nostalgic associations while simultaneously appearing futuristic and innovative, creating a timeless appeal that transcends trends. By embracing transparency, designers reject the notion that complexity should be hidden, instead celebrating the intricate engineering that powers our everyday objects. This philosophy aligns perfectly with contemporary values of authenticity and mindful consumption, where users increasingly seek products that communicate honesty in both form and function. 1. Reveals Functionality Transparent product design exposes internal components like wiring, gears, or circuits, turning functional parts into visual features. This approach demystifies the object, inviting users to understand how it works rather than hiding its complexity. It fosters appreciation for craftsmanship and engineering while encouraging educational curiosity. By showcasing what lies beneath the surface, designers build an honest relationship with consumers that is based on clarity, trust, and visible function. Packing a backpack often means tossing everything in and hoping for the best—until you need something fast. This transparent modular backpack concept reimagines that daily hassle with a clear, compartmentalized design that lets you see all your gear at a glance. No more digging through a dark abyss—every item has its visible place. The bag features four detachable, differently sized boxes that snap together with straps, letting you customize what you carry. Grab just the tech module or gym gear block and go—simple, efficient, and streamlined. Unlike traditional organizers that hide contents in pouches, the transparent material keeps everything in plain sight, saving time and frustration. While it raises valid concerns around privacy and security, the clarity and convenience it offers make it ideal for fast-paced, on-the-go lifestyles. With form meeting function, this concept shows how transparent design can transform not just how a bag looks, but how it works. 2. Enhances User Engagement When users can see how a product operates, they feel more confident using it. Transparent casings invite interaction by reducing uncertainty about internal processes. This visible clarity reassures users about the product’s integrity and quality, creating a psychological sense of openness and reliability. Especially in tech and appliances, this strategy deepens user trust and adds emotional value by allowing a more intimate connection with the design’s purpose and construction. The transparent Sony Glass Blue WF-C710N earbuds represent something more meaningful than a mere aesthetic choice, embodying a refreshing philosophy of technological honesty. While most devices conceal their inner workings behind opaque shells, Sony’s decision to reveal the intricate circuitry and precision components celebrates the engineering artistry that makes these tiny audio marvels possible. As you catch glimpses of copper coils and circuit boards through the crystal-clear housing, there’s a renewed appreciation for the invisible complexity that delivers your favorite music, serving as a visual reminder that sometimes the most beautiful designs are those that have nothing to hide. 3. Celebrates Aesthetic Engineering Transparency turns utilitarian details into design features, allowing users to visually experience the beauty of inner mechanisms. This trend, seen in everything from vintage electronics to modern gadgets and watches, values technical artistry as much as outer form. Transparent design redefines aesthetics by focusing on the raw, mechanical truth of a product. It appeals to minimalism and industrial design lovers, offering visual depth and storytelling through exposed structure rather than decorative surface embellishment. DAB Motors’ 1α Transparent Edition brings retro tech flair into modern mobility with its striking transparent bodywork. Inspired by the see-through gadgets of the ”90s—like the Game Boy Color and clear Nintendo controllers—this electric motorcycle reveals its inner mechanics with style. The semi-translucent panels offer a rare peek at the bike’s intricate engineering, blending nostalgia with innovation. Carbon fiber elements, sourced from repurposed Airbus materials, complement the lightweight transparency, creating a visual experience that’s both futuristic and rooted in classic design aesthetics. The see-through design isn’t just for looks—it enhances the connection between rider and machine. Exposed components like the integrated LCD dashboard, lenticular headlight, and visible frame structure emphasize function and precision. This openness aligns with a broader transparent design philosophy, where clarity and honesty in construction are celebrated. The DAB 1α turns heads not by hiding complexity, but by proudly displaying it, making every ride a statement in motion. Beyond just materials, transparent design also reflects a deeper design philosophy that values clarity in purpose, function, and sustainability. It supports minimalist thinking by focusing on what’s essential, reducing visual clutter, and making spaces or products easier to understand and engage with. Whether in interiors or objects, transparency helps create a more honest, functional, and connected user experienceThe post Transparent Design: How See-Through Materials Are Revolutionizing Architecture & Product Design first appeared on Yanko Design. #transparent #design #how #seethrough #materials
    WWW.YANKODESIGN.COM
    Transparent Design: How See-Through Materials Are Revolutionizing Architecture & Product Design
    Transparent design is the intentional use of see-through or translucent materials and visual strategies to evoke openness, honesty, and fluidity in both spatial and product design. It enhances light flow, visibility, and interaction, blurring boundaries between spaces or revealing inner layers of products. In interiors, this manifests through glass walls, acrylic dividers, and open layouts that invite natural light and visual connection. Transparency in product design often exposes internal mechanisms in products, fostering trust and curiosity by making functions visible. It focuses on simplicity, clarity, and minimalist form, creating seamless connections between objects and their environments. Let’s now explore how transparency shapes the function, experience, and emotional impact of spatial and product design. Transparent Spatial Design Transparency in spatial design serves as a powerful architectural language that transcends mere material choice, creating profound connections between spaces and their inhabitants. By employing translucent or clear elements, designers can dissolve traditional boundaries, allowing light to penetrate deeply into interiors while establishing visual relationships between previously separated areas. This permeability creates a dynamic spatial experience where environments flow into one another, expanding perceived dimensions and fostering a sense of openness. The strategic use of transparent elements – whether through glass partitions, open floor plans, or permeable screens – transforms rigid spatial hierarchies into fluid, interconnected zones that respond to contemporary needs for flexibility and connection with both surrounding spaces and natural environments. Beyond its physical manifestations, transparency embodies deeper philosophical principles in design, representing honesty, clarity, and accessibility. It democratizes space by removing visual barriers that traditionally signaled exclusion or privacy, instead promoting inclusivity and shared experience. In public buildings, transparent features invite engagement and participation, while in residential contexts, they nurture connection to nature and enhance wellbeing through abundant natural light. This approach challenges designers to thoughtfully balance openness with necessary privacy, creating nuanced spatial sequences that can reveal or conceal as needed. When skillfully implemented, transparency becomes more than an aesthetic choice, it becomes a fundamental design strategy that shapes how we experience, navigate, and emotionally respond to our built environment. 1. Expands Perception of Space Transparency in spatial design enhances how people perceive space by blurring the boundaries between rooms and creating a seamless connection between the indoors and the outdoors. Materials like glass and acrylic create visual continuity, making interiors feel larger, more open, and seamlessly integrated. This approach encourages a fluid transition between spaces, eliminates confinement, and promotes spatial freedom. As a result, transparent design contributes to an inviting atmosphere while maximising natural views and light penetration throughout the environment. Nestled in St. Donat near Montreal, the Apple Tree House by ACDF Architecture is a striking example of transparent design rooted in emotional memory. Wrapped around a central courtyard with a symbolic apple tree, the low-slung home features expansive glass walls that create continuous visual access to nature. The transparent layout not only blurs the boundaries between indoors and outdoors but also transforms the apple tree into a living focal point and is visible from multiple angles and spaces within the house. This thoughtful transparency allows natural light to flood the interiors while connecting the home’s occupants with the changing seasons outside. The home’s square-shaped plan includes three black-clad volumes that house bedrooms, a lounge, and service areas. Despite the openness, privacy is preserved through deliberate wall placements. Wooden ceilings and concrete floors add warmth and texture, but it’s the full-height glazing that defines the home that frames nature as a permanent, ever-evolving artwork at its heart. 2. Enhances the Feeling of Openness One of the core benefits of transparent design is its ability to harness natural light, transforming enclosed areas into luminous, uplifting environments. By using translucent or clear materials, designers reduce the need for artificial lighting and minimize visual barriers. This not only improves energy efficiency but also fosters emotional well-being by connecting occupants to daylight and exterior views. Ultimately, transparency promotes a feeling of openness and calm, aligning with minimalist and modern architectural principles. The Living O’Pod by UN10 Design Studio is a transparent, two-story pod designed as a minimalist retreat that fully immerses its occupants in nature. Built with a steel frame and glass panels all around, this glass bubble offers uninterrupted panoramic views of the Finnish wilderness. Its remote location provides the privacy needed to embrace transparency, allowing residents to enjoy stunning sunrises, sunsets, and starry nights from within. The open design blurs the line between indoors and outdoors, creating a unique connection with the environment. Located in Repovesi, Finland, the pod’s interiors feature warm plywood floors and walls that complement the natural setting. A standout feature is its 360° rotation, which allows the entire structure to turn and capture optimal light and views throughout the day. Equipped with thermal insulation and heating, the Living O’Pod ensures comfort year-round and builds a harmonious relationship between people and nature. 3. Encourages Interaction Transparent design reimagines interiors as active participants in the user experience, rather than passive backgrounds. Open sightlines and clear partitions encourage movement, visibility, and spontaneous interaction among occupants. This layout strategy fosters social connectivity, enhances spatial navigation, and aligns with contemporary needs for collaboration and flexibility. Whether in residential, commercial, or public spaces, transparency supports an intuitive spatial flow that strengthens the emotional and functional relationship between people and their environment. The Beach Cabin on the Baltic Sea, designed by Peter Kuczia, is a striking architectural piece located near Gdansk in northern Poland. This small gastronomy facility combines simplicity with bold design, harmoniously fitting into the beach environment while standing out through its innovative form. The structure is composed of two distinct parts: an enclosed space and an expansive open living and dining area that maximizes natural light and offers shelter. This dual arrangement creates a balanced yet dynamic architectural composition that respects the surrounding landscape. A defining feature of the cabin is its open dining area, which is divided into two sections—one traditional cabin-style and the other constructed entirely of glass. The transparent glass facade provides uninterrupted panoramic views of the Baltic Sea, the shoreline, and the sky, enhancing the connection between interior and nature. Elevated on stilts, the building appears to float above the sand, minimizing environmental impact and contributing to its ethereal, dreamlike quality. Transparent Product Design In product design, transparency serves as both a functional strategy and a powerful communicative tool that transforms the relationship between users and objects. By revealing internal components and operational mechanisms through clear or translucent materials, designers create an immediate visual understanding of how products function, demystifying technology and inviting engagement. This design approach establishes an honest dialogue with consumers, building trust through visibility rather than concealment. Beyond mere aesthetics, transparent design celebrates the beauty of engineering, turning circuit boards, gears, and mechanical elements into intentional visual features that tell the product’s story. From the nostalgic appeal of see-through gaming consoles to modern tech accessories, this approach satisfies our innate curiosity about how things work while creating a more informed user experience. The psychological impact of transparency in products extends beyond functional clarity to create deeper emotional connections. When users can observe a product’s inner workings, they develop increased confidence in its quality and craftsmanship, fostering a sense of reliability that opaque designs often struggle to convey. This visibility also democratizes understanding, making complex technologies more accessible and less intimidating to diverse users. Transparent design elements can evoke powerful nostalgic associations while simultaneously appearing futuristic and innovative, creating a timeless appeal that transcends trends. By embracing transparency, designers reject the notion that complexity should be hidden, instead celebrating the intricate engineering that powers our everyday objects. This philosophy aligns perfectly with contemporary values of authenticity and mindful consumption, where users increasingly seek products that communicate honesty in both form and function. 1. Reveals Functionality Transparent product design exposes internal components like wiring, gears, or circuits, turning functional parts into visual features. This approach demystifies the object, inviting users to understand how it works rather than hiding its complexity. It fosters appreciation for craftsmanship and engineering while encouraging educational curiosity. By showcasing what lies beneath the surface, designers build an honest relationship with consumers that is based on clarity, trust, and visible function. Packing a backpack often means tossing everything in and hoping for the best—until you need something fast. This transparent modular backpack concept reimagines that daily hassle with a clear, compartmentalized design that lets you see all your gear at a glance. No more digging through a dark abyss—every item has its visible place. The bag features four detachable, differently sized boxes that snap together with straps, letting you customize what you carry. Grab just the tech module or gym gear block and go—simple, efficient, and streamlined. Unlike traditional organizers that hide contents in pouches, the transparent material keeps everything in plain sight, saving time and frustration. While it raises valid concerns around privacy and security, the clarity and convenience it offers make it ideal for fast-paced, on-the-go lifestyles. With form meeting function, this concept shows how transparent design can transform not just how a bag looks, but how it works. 2. Enhances User Engagement When users can see how a product operates, they feel more confident using it. Transparent casings invite interaction by reducing uncertainty about internal processes. This visible clarity reassures users about the product’s integrity and quality, creating a psychological sense of openness and reliability. Especially in tech and appliances, this strategy deepens user trust and adds emotional value by allowing a more intimate connection with the design’s purpose and construction. The transparent Sony Glass Blue WF-C710N earbuds represent something more meaningful than a mere aesthetic choice, embodying a refreshing philosophy of technological honesty. While most devices conceal their inner workings behind opaque shells, Sony’s decision to reveal the intricate circuitry and precision components celebrates the engineering artistry that makes these tiny audio marvels possible. As you catch glimpses of copper coils and circuit boards through the crystal-clear housing, there’s a renewed appreciation for the invisible complexity that delivers your favorite music, serving as a visual reminder that sometimes the most beautiful designs are those that have nothing to hide. 3. Celebrates Aesthetic Engineering Transparency turns utilitarian details into design features, allowing users to visually experience the beauty of inner mechanisms. This trend, seen in everything from vintage electronics to modern gadgets and watches, values technical artistry as much as outer form. Transparent design redefines aesthetics by focusing on the raw, mechanical truth of a product. It appeals to minimalism and industrial design lovers, offering visual depth and storytelling through exposed structure rather than decorative surface embellishment. DAB Motors’ 1α Transparent Edition brings retro tech flair into modern mobility with its striking transparent bodywork. Inspired by the see-through gadgets of the ”90s—like the Game Boy Color and clear Nintendo controllers—this electric motorcycle reveals its inner mechanics with style. The semi-translucent panels offer a rare peek at the bike’s intricate engineering, blending nostalgia with innovation. Carbon fiber elements, sourced from repurposed Airbus materials, complement the lightweight transparency, creating a visual experience that’s both futuristic and rooted in classic design aesthetics. The see-through design isn’t just for looks—it enhances the connection between rider and machine. Exposed components like the integrated LCD dashboard, lenticular headlight, and visible frame structure emphasize function and precision. This openness aligns with a broader transparent design philosophy, where clarity and honesty in construction are celebrated. The DAB 1α turns heads not by hiding complexity, but by proudly displaying it, making every ride a statement in motion. Beyond just materials, transparent design also reflects a deeper design philosophy that values clarity in purpose, function, and sustainability. It supports minimalist thinking by focusing on what’s essential, reducing visual clutter, and making spaces or products easier to understand and engage with. Whether in interiors or objects, transparency helps create a more honest, functional, and connected user experienceThe post Transparent Design: How See-Through Materials Are Revolutionizing Architecture & Product Design first appeared on Yanko Design.
    0 Comentários 0 Compartilhamentos
  • Microsoft takes down malware found on 394,000 Windows PCs

    Published
    June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data, but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work  What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop  More about the Lumma infostealerLumma is a Malware-as-a-Servicethat has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop  6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authenticationwhenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. ​Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #microsoft #takes #down #malware #found
    Microsoft takes down malware found on 394,000 Windows PCs
    Published June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data, but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work  What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop  More about the Lumma infostealerLumma is a Malware-as-a-Servicethat has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop  6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authenticationwhenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. ​Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #microsoft #takes #down #malware #found
    WWW.FOXNEWS.COM
    Microsoft takes down malware found on 394,000 Windows PCs
    Published June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data (more on this later), but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop   (Kurt "CyberGuy" Knutsson)More about the Lumma infostealerLumma is a Malware-as-a-Service (MaaS) that has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop   (Kurt "CyberGuy" Knutsson)6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authentication (2FA) whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. ​Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos
  • Massive data breach exposes 184 million passwords and logins

    Published
    May 31, 2025 10:00am EDT close iPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' Data breaches are no longer rare events but a persistent problem. We’ve been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren’t entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Illustration of a hacker at work.How the database was uncovered and what it containedCybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELFFowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world’s largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions.The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. Illustration of a hacker at work.Where did the data come fromFowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks.After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent.To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds.1.7 BILLION PASSWORDS LEAKED ON DARK WEB AND WHY YOURS IS AT RISK Login on a tablet.6 ways to protect yourself after a data breach1. Change your password on every platform: If your login credentials have been exposed, it’s not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here.2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won’t be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data.3. Watch for unusual account activity: After a breach, it’s common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn’t initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions.4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you’re protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Kurt’s key takeawaySecurity is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online.CLICK HERE TO GET THE FOX NEWS APPDo you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #massive #data #breach #exposes #million
    Massive data breach exposes 184 million passwords and logins
    Published May 31, 2025 10:00am EDT close iPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' Data breaches are no longer rare events but a persistent problem. We’ve been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren’t entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Illustration of a hacker at work.How the database was uncovered and what it containedCybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELFFowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world’s largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions.The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. Illustration of a hacker at work.Where did the data come fromFowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks.After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent.To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds.1.7 BILLION PASSWORDS LEAKED ON DARK WEB AND WHY YOURS IS AT RISK Login on a tablet.6 ways to protect yourself after a data breach1. Change your password on every platform: If your login credentials have been exposed, it’s not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here.2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won’t be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data.3. Watch for unusual account activity: After a breach, it’s common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn’t initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions.4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you’re protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Kurt’s key takeawaySecurity is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online.CLICK HERE TO GET THE FOX NEWS APPDo you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #massive #data #breach #exposes #million
    WWW.FOXNEWS.COM
    Massive data breach exposes 184 million passwords and logins
    Published May 31, 2025 10:00am EDT close iPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' Data breaches are no longer rare events but a persistent problem. We’ve been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren’t entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Illustration of a hacker at work. (Kurt "CyberGuy" Knutsson)How the database was uncovered and what it containedCybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELFFowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world’s largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions.The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. Illustration of a hacker at work. (Kurt "CyberGuy" Knutsson)Where did the data come fromFowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks.After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent.To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds.1.7 BILLION PASSWORDS LEAKED ON DARK WEB AND WHY YOURS IS AT RISK Login on a tablet. (Kurt "CyberGuy" Knutsson)6 ways to protect yourself after a data breach1. Change your password on every platform: If your login credentials have been exposed, it’s not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here.2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won’t be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data.3. Watch for unusual account activity: After a breach, it’s common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn’t initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions.4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you’re protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Kurt’s key takeawaySecurity is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online.CLICK HERE TO GET THE FOX NEWS APPDo you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos
  • Gironda Residence by Giovanni Mecozzi: The Renovation of Casa Guaccimanni in Ravenna

    Gironda Residence | © Simone Bossi
    Located just steps from Piazza del Popolo in Ravenna, the Renaissance-era Casa Guaccimanni holds centuries of architectural and historical weight. Constructed in the fifteenth century for the Venetian podestà Nicolò Giustinian, the building evolved through noble ownership and later became home to Vittorio and Alessandro Guaccimanni, sons of Risorgimento figure Luigi Guaccimanni. Architecturally, the structure is characterized by a tripartite plan with a central corridor flanked by large rooms, an interior courtyard with a double loggia, and decorative elements spanning Renaissance to Neoclassical periods. Once concealed beneath plaster, its frescoed veranda and exposed wooden ceilings speak to a layered history of intervention, concealment, and rediscovery.

    Gironda Residence in Casa Guaccimanni Technical Information

    Architects1-13: Giovanni Mecozzi Architetti
    Location: Casa Guaccimanni, Via Armando Diaz, Ravenna, Italy
    Client: Emanuela Docimo
    Project Years: 2022 – 2024
    Original Structure: 15th Century
    Photographs: © Andrea Sestito, © Simone Bossi, © Omar Sartor

    The new and the old never touch, but gently brush against each other, maintaining a distance capable of generating tension.
    – Giovanni Mecozzi

    Gironda Residence in Casa Guaccimanni Photographs

    © Omar Sartor

    © Andrea Sestito

    © Andrea Sestito

    © Andrea Sestito

    © Omar Sartor

    © Simone Bossi

    © Simone Bossi

    © Simone Bossi

    © Omar Sartor

    © Omar Sartor

    © Omar Sartor

    © Andrea Sestito

    © Omar Sartor
    Design Intent: Reversibility and Temporal Tension
    The recent architectural project by Giovanni Mecozzi Architetti centers on the noble floor of the palazzo, reinterpreted as a contemporary residence named Gironda. Rather than imposing a new visual regime onto the historic shell, the intervention operates with restraint, foregrounding the building’s original character while establishing new spatial and material conditions.
    At the core of the project lies a design philosophy rooted in reversibility. Mecozzi’s intervention resists permanence. The furnishings and spatial devices introduced into the historic rooms are self-supporting and detached from the structure. No new element makes physical contact with the floors, ceilings, or walls, preserving the integrity of the original surfaces. This strategy avoids irreversible alterations and allows the architecture to remain temporally flexible.
    Architect Giovanni Mecozzi articulates this approach succinctly: “The new and the old never touch, but gently brush against each other, maintaining a distance capable of generating tension.” This spatial tension is not decorative but conceptual, prompting occupants to consider the relationship between historical continuity and contemporary transformation. The design does not attempt to erase time but rather exposes its layers through careful juxtaposition.
    The project draws conceptual and chromatic inspiration from Ravenna’s early Christian and Byzantine mosaics. Rather than replicate ornamental motifs, Mecozzi extracts abstract qualities such as color, luminosity, and surface texture, integrating them as subtle spatial references throughout the residence.
    Gironda Residence Material Strategy
    Access to the residence is organized through a longitudinal hallway that bisects the plan, connecting a balcony on the north façade with a loggia overlooking the garden to the south. This corridor becomes a spine for circulation and orientation, punctuated by entries into five main rooms: the kitchen, veranda, and three independent suites.
    Each suite functions as a self-contained spatial environment. The original large rooms have been reimagined with integrated volumes housing diverse domestic functions: bathrooms, saunas, walk-in closets, reading nooks, and home cinemas. These new programmatic layers are embedded within freestanding furniture structures, which operate more as inhabitable objects than architectural partitions.
    Color becomes an operative tool for spatial differentiation. The three principal suites, the Gold Room, the Blue Room, and the Green Room, are introduced chromatically through thresholds that face the main corridor. This prelude of color sets the tone for each room’s unique interior experience. Within, glossy glass tiles, gilded surfaces, and a reduced palette of materials establish a scenographic yet restrained environment.
    The flooring, a Venetian terrazzo installed during earlier restoration work in the 2000s, has been retained. Its beveled borders and rounded corners respond to the proportions of each room, reinforcing a visual continuity that binds the new interventions with the inherited context. In contrast to the historical envelope, the furniture and spatial devices employ a language of monochromatic forms and minimal detailing, occasionally verging on neoplastic abstraction. This tension between old ornament and new abstraction is one of the project’s defining features.
    Furnishings curated by Atelier Biagetti, known for their theatrical and ironic sensibility, further enrich the atmosphere. These pieces do not mimic the historical setting but create moments of visual friction and playful ambiguity, enhancing the multi-temporal character of the interiors.
    Architectural Significance and Cultural Dialogue
    The Gironda residence exemplifies a growing discourse in contemporary architecture around adaptive reuse that neither mimics nor erases the past. Rather than treating heritage as a constraint or an aesthetic to be curated, Mecozzi engages it as an active agent in spatial transformation. The project is a case study in reversible architecture, where temporality is embedded in the design, not just its historical references.
    This intervention prompts broader questions about the role of preservation in contemporary practice. Can architectural interventions occupy historic contexts without becoming parasitic or nostalgic? Mecozzi’s project suggests that they can adopt a posture of critical distance and conceptual clarity.
    Gironda does not attempt to restore Casa Guaccimanni to a previous state or impose a singular vision of modernity. Instead, it crafts a dialogue between past and present, structured through spatial strategies, material choices, and chromatic cues. In doing so, it opens a new chapter in the building’s ongoing life, one that is fully contemporary yet deeply rooted in architectural memory.
    Gironda Residence in Casa Guaccimanni Plans

    Floor Plan | © Giovanni Mecozzi Architetti

    Golden Room Layout | © Giovanni Mecozzi Architetti

    Door Detail | © Giovanni Mecozzi Architetti
    Gironda Residence in Casa Guaccimanni Image Gallery

    About Giovanni Mecozzi
    Giovanni Mecozzi is an Italian architect based in Ravenna, Italy, and the founder of Giovanni Mecozzi Architetti, a multidisciplinary studio specializing in architecture, interior design, and landscape projects. After graduating from the University of Ferrara with an architecture degree, Mecozzi gained international experience working in Spain, including collaborating with Mendaro Arquitectos in Madrid. Upon returning to Italy, he co-founded GMA, focusing on projects emphasizing the relationship between architecture, the client, and the context, with a particular interest in renovating and transforming historical buildings. 
    Credits and Additional Notes

    Design Team: Giovanni Mecozzi, Cecilia Verdini, Filippo Minghetti
    Construction: EdilcostruzioniElectrical Systems: Elektra ServiceMechanical and Hydraulic Systems: Nuova OLP
    Structural Alterations: Not applicableCustom Furniture: Idea LegnoCurtains and Fabrics: Selezione Arredamenti, Ravenna
    Lighting: ViabizzunoResin Coatings and Flooring: Kerakoll
    Rugs and Carpeting: Centro Moquette, Rimini
    Bathroom Furnishings: Salaroli, Ravenna
    Furniture, Artwork, and Design Objects Selected by: Atelier BiagettiFurniture Designers: Alberto Biagetti and Laura Baldassarri
    #gironda #residence #giovanni #mecozzi #renovation
    Gironda Residence by Giovanni Mecozzi: The Renovation of Casa Guaccimanni in Ravenna
    Gironda Residence | © Simone Bossi Located just steps from Piazza del Popolo in Ravenna, the Renaissance-era Casa Guaccimanni holds centuries of architectural and historical weight. Constructed in the fifteenth century for the Venetian podestà Nicolò Giustinian, the building evolved through noble ownership and later became home to Vittorio and Alessandro Guaccimanni, sons of Risorgimento figure Luigi Guaccimanni. Architecturally, the structure is characterized by a tripartite plan with a central corridor flanked by large rooms, an interior courtyard with a double loggia, and decorative elements spanning Renaissance to Neoclassical periods. Once concealed beneath plaster, its frescoed veranda and exposed wooden ceilings speak to a layered history of intervention, concealment, and rediscovery. Gironda Residence in Casa Guaccimanni Technical Information Architects1-13: Giovanni Mecozzi Architetti Location: Casa Guaccimanni, Via Armando Diaz, Ravenna, Italy Client: Emanuela Docimo Project Years: 2022 – 2024 Original Structure: 15th Century Photographs: © Andrea Sestito, © Simone Bossi, © Omar Sartor The new and the old never touch, but gently brush against each other, maintaining a distance capable of generating tension. – Giovanni Mecozzi Gironda Residence in Casa Guaccimanni Photographs © Omar Sartor © Andrea Sestito © Andrea Sestito © Andrea Sestito © Omar Sartor © Simone Bossi © Simone Bossi © Simone Bossi © Omar Sartor © Omar Sartor © Omar Sartor © Andrea Sestito © Omar Sartor Design Intent: Reversibility and Temporal Tension The recent architectural project by Giovanni Mecozzi Architetti centers on the noble floor of the palazzo, reinterpreted as a contemporary residence named Gironda. Rather than imposing a new visual regime onto the historic shell, the intervention operates with restraint, foregrounding the building’s original character while establishing new spatial and material conditions. At the core of the project lies a design philosophy rooted in reversibility. Mecozzi’s intervention resists permanence. The furnishings and spatial devices introduced into the historic rooms are self-supporting and detached from the structure. No new element makes physical contact with the floors, ceilings, or walls, preserving the integrity of the original surfaces. This strategy avoids irreversible alterations and allows the architecture to remain temporally flexible. Architect Giovanni Mecozzi articulates this approach succinctly: “The new and the old never touch, but gently brush against each other, maintaining a distance capable of generating tension.” This spatial tension is not decorative but conceptual, prompting occupants to consider the relationship between historical continuity and contemporary transformation. The design does not attempt to erase time but rather exposes its layers through careful juxtaposition. The project draws conceptual and chromatic inspiration from Ravenna’s early Christian and Byzantine mosaics. Rather than replicate ornamental motifs, Mecozzi extracts abstract qualities such as color, luminosity, and surface texture, integrating them as subtle spatial references throughout the residence. Gironda Residence Material Strategy Access to the residence is organized through a longitudinal hallway that bisects the plan, connecting a balcony on the north façade with a loggia overlooking the garden to the south. This corridor becomes a spine for circulation and orientation, punctuated by entries into five main rooms: the kitchen, veranda, and three independent suites. Each suite functions as a self-contained spatial environment. The original large rooms have been reimagined with integrated volumes housing diverse domestic functions: bathrooms, saunas, walk-in closets, reading nooks, and home cinemas. These new programmatic layers are embedded within freestanding furniture structures, which operate more as inhabitable objects than architectural partitions. Color becomes an operative tool for spatial differentiation. The three principal suites, the Gold Room, the Blue Room, and the Green Room, are introduced chromatically through thresholds that face the main corridor. This prelude of color sets the tone for each room’s unique interior experience. Within, glossy glass tiles, gilded surfaces, and a reduced palette of materials establish a scenographic yet restrained environment. The flooring, a Venetian terrazzo installed during earlier restoration work in the 2000s, has been retained. Its beveled borders and rounded corners respond to the proportions of each room, reinforcing a visual continuity that binds the new interventions with the inherited context. In contrast to the historical envelope, the furniture and spatial devices employ a language of monochromatic forms and minimal detailing, occasionally verging on neoplastic abstraction. This tension between old ornament and new abstraction is one of the project’s defining features. Furnishings curated by Atelier Biagetti, known for their theatrical and ironic sensibility, further enrich the atmosphere. These pieces do not mimic the historical setting but create moments of visual friction and playful ambiguity, enhancing the multi-temporal character of the interiors. Architectural Significance and Cultural Dialogue The Gironda residence exemplifies a growing discourse in contemporary architecture around adaptive reuse that neither mimics nor erases the past. Rather than treating heritage as a constraint or an aesthetic to be curated, Mecozzi engages it as an active agent in spatial transformation. The project is a case study in reversible architecture, where temporality is embedded in the design, not just its historical references. This intervention prompts broader questions about the role of preservation in contemporary practice. Can architectural interventions occupy historic contexts without becoming parasitic or nostalgic? Mecozzi’s project suggests that they can adopt a posture of critical distance and conceptual clarity. Gironda does not attempt to restore Casa Guaccimanni to a previous state or impose a singular vision of modernity. Instead, it crafts a dialogue between past and present, structured through spatial strategies, material choices, and chromatic cues. In doing so, it opens a new chapter in the building’s ongoing life, one that is fully contemporary yet deeply rooted in architectural memory. Gironda Residence in Casa Guaccimanni Plans Floor Plan | © Giovanni Mecozzi Architetti Golden Room Layout | © Giovanni Mecozzi Architetti Door Detail | © Giovanni Mecozzi Architetti Gironda Residence in Casa Guaccimanni Image Gallery About Giovanni Mecozzi Giovanni Mecozzi is an Italian architect based in Ravenna, Italy, and the founder of Giovanni Mecozzi Architetti, a multidisciplinary studio specializing in architecture, interior design, and landscape projects. After graduating from the University of Ferrara with an architecture degree, Mecozzi gained international experience working in Spain, including collaborating with Mendaro Arquitectos in Madrid. Upon returning to Italy, he co-founded GMA, focusing on projects emphasizing the relationship between architecture, the client, and the context, with a particular interest in renovating and transforming historical buildings.  Credits and Additional Notes Design Team: Giovanni Mecozzi, Cecilia Verdini, Filippo Minghetti Construction: EdilcostruzioniElectrical Systems: Elektra ServiceMechanical and Hydraulic Systems: Nuova OLP Structural Alterations: Not applicableCustom Furniture: Idea LegnoCurtains and Fabrics: Selezione Arredamenti, Ravenna Lighting: ViabizzunoResin Coatings and Flooring: Kerakoll Rugs and Carpeting: Centro Moquette, Rimini Bathroom Furnishings: Salaroli, Ravenna Furniture, Artwork, and Design Objects Selected by: Atelier BiagettiFurniture Designers: Alberto Biagetti and Laura Baldassarri #gironda #residence #giovanni #mecozzi #renovation
    ARCHEYES.COM
    Gironda Residence by Giovanni Mecozzi: The Renovation of Casa Guaccimanni in Ravenna
    Gironda Residence | © Simone Bossi Located just steps from Piazza del Popolo in Ravenna, the Renaissance-era Casa Guaccimanni holds centuries of architectural and historical weight. Constructed in the fifteenth century for the Venetian podestà Nicolò Giustinian, the building evolved through noble ownership and later became home to Vittorio and Alessandro Guaccimanni, sons of Risorgimento figure Luigi Guaccimanni. Architecturally, the structure is characterized by a tripartite plan with a central corridor flanked by large rooms, an interior courtyard with a double loggia, and decorative elements spanning Renaissance to Neoclassical periods. Once concealed beneath plaster, its frescoed veranda and exposed wooden ceilings speak to a layered history of intervention, concealment, and rediscovery. Gironda Residence in Casa Guaccimanni Technical Information Architects1-13: Giovanni Mecozzi Architetti Location: Casa Guaccimanni, Via Armando Diaz, Ravenna, Italy Client: Emanuela Docimo Project Years: 2022 – 2024 Original Structure: 15th Century Photographs: © Andrea Sestito, © Simone Bossi, © Omar Sartor The new and the old never touch, but gently brush against each other, maintaining a distance capable of generating tension. – Giovanni Mecozzi Gironda Residence in Casa Guaccimanni Photographs © Omar Sartor © Andrea Sestito © Andrea Sestito © Andrea Sestito © Omar Sartor © Simone Bossi © Simone Bossi © Simone Bossi © Omar Sartor © Omar Sartor © Omar Sartor © Andrea Sestito © Omar Sartor Design Intent: Reversibility and Temporal Tension The recent architectural project by Giovanni Mecozzi Architetti centers on the noble floor of the palazzo, reinterpreted as a contemporary residence named Gironda. Rather than imposing a new visual regime onto the historic shell, the intervention operates with restraint, foregrounding the building’s original character while establishing new spatial and material conditions. At the core of the project lies a design philosophy rooted in reversibility. Mecozzi’s intervention resists permanence. The furnishings and spatial devices introduced into the historic rooms are self-supporting and detached from the structure. No new element makes physical contact with the floors, ceilings, or walls, preserving the integrity of the original surfaces. This strategy avoids irreversible alterations and allows the architecture to remain temporally flexible. Architect Giovanni Mecozzi articulates this approach succinctly: “The new and the old never touch, but gently brush against each other, maintaining a distance capable of generating tension.” This spatial tension is not decorative but conceptual, prompting occupants to consider the relationship between historical continuity and contemporary transformation. The design does not attempt to erase time but rather exposes its layers through careful juxtaposition. The project draws conceptual and chromatic inspiration from Ravenna’s early Christian and Byzantine mosaics. Rather than replicate ornamental motifs, Mecozzi extracts abstract qualities such as color, luminosity, and surface texture, integrating them as subtle spatial references throughout the residence. Gironda Residence Material Strategy Access to the residence is organized through a longitudinal hallway that bisects the plan, connecting a balcony on the north façade with a loggia overlooking the garden to the south. This corridor becomes a spine for circulation and orientation, punctuated by entries into five main rooms: the kitchen, veranda, and three independent suites. Each suite functions as a self-contained spatial environment. The original large rooms have been reimagined with integrated volumes housing diverse domestic functions: bathrooms, saunas, walk-in closets, reading nooks, and home cinemas. These new programmatic layers are embedded within freestanding furniture structures, which operate more as inhabitable objects than architectural partitions. Color becomes an operative tool for spatial differentiation. The three principal suites, the Gold Room, the Blue Room, and the Green Room, are introduced chromatically through thresholds that face the main corridor. This prelude of color sets the tone for each room’s unique interior experience. Within, glossy glass tiles, gilded surfaces, and a reduced palette of materials establish a scenographic yet restrained environment. The flooring, a Venetian terrazzo installed during earlier restoration work in the 2000s, has been retained. Its beveled borders and rounded corners respond to the proportions of each room, reinforcing a visual continuity that binds the new interventions with the inherited context. In contrast to the historical envelope, the furniture and spatial devices employ a language of monochromatic forms and minimal detailing, occasionally verging on neoplastic abstraction. This tension between old ornament and new abstraction is one of the project’s defining features. Furnishings curated by Atelier Biagetti, known for their theatrical and ironic sensibility, further enrich the atmosphere. These pieces do not mimic the historical setting but create moments of visual friction and playful ambiguity, enhancing the multi-temporal character of the interiors. Architectural Significance and Cultural Dialogue The Gironda residence exemplifies a growing discourse in contemporary architecture around adaptive reuse that neither mimics nor erases the past. Rather than treating heritage as a constraint or an aesthetic to be curated, Mecozzi engages it as an active agent in spatial transformation. The project is a case study in reversible architecture, where temporality is embedded in the design, not just its historical references. This intervention prompts broader questions about the role of preservation in contemporary practice. Can architectural interventions occupy historic contexts without becoming parasitic or nostalgic? Mecozzi’s project suggests that they can adopt a posture of critical distance and conceptual clarity. Gironda does not attempt to restore Casa Guaccimanni to a previous state or impose a singular vision of modernity. Instead, it crafts a dialogue between past and present, structured through spatial strategies, material choices, and chromatic cues. In doing so, it opens a new chapter in the building’s ongoing life, one that is fully contemporary yet deeply rooted in architectural memory. Gironda Residence in Casa Guaccimanni Plans Floor Plan | © Giovanni Mecozzi Architetti Golden Room Layout | © Giovanni Mecozzi Architetti Door Detail | © Giovanni Mecozzi Architetti Gironda Residence in Casa Guaccimanni Image Gallery About Giovanni Mecozzi Giovanni Mecozzi is an Italian architect based in Ravenna, Italy, and the founder of Giovanni Mecozzi Architetti (GMA), a multidisciplinary studio specializing in architecture, interior design, and landscape projects. After graduating from the University of Ferrara with an architecture degree, Mecozzi gained international experience working in Spain, including collaborating with Mendaro Arquitectos in Madrid. Upon returning to Italy, he co-founded GMA, focusing on projects emphasizing the relationship between architecture, the client, and the context, with a particular interest in renovating and transforming historical buildings.  Credits and Additional Notes Design Team: Giovanni Mecozzi, Cecilia Verdini, Filippo Minghetti Construction: Edilcostruzioni (Leoni Andrea) Electrical Systems: Elektra Service (Andrea Baiardi) Mechanical and Hydraulic Systems: Nuova OLP Structural Alterations: Not applicable (intervention is fully reversible) Custom Furniture: Idea Legno (Paolo Berdondini) Curtains and Fabrics: Selezione Arredamenti, Ravenna Lighting: Viabizzuno (via Tutto Luce, Cesena) Resin Coatings and Flooring: Kerakoll Rugs and Carpeting: Centro Moquette, Rimini Bathroom Furnishings: Salaroli, Ravenna Furniture, Artwork, and Design Objects Selected by: Atelier Biagetti (Milan) Furniture Designers: Alberto Biagetti and Laura Baldassarri
    0 Comentários 0 Compartilhamentos
Páginas impulsionada