Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

EXPOSED

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users
Gaming Gear

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

by admin September 16, 2025


The Department of Homeland Security’s mandate to carry out domestic surveillance has been a concern for privacy advocates since the organization was first created in the wake of the September 11 attacks. Now a data leak affecting the DHS’s intelligence arm has shed light not just on how the department gathers and stores that sensitive information—including about its surveillance of Americans—but on how it once left that data exposed to thousands of government, private sector workers, and even foreign nationals who were never authorized to see it.

An internal DHS memo obtained by a Freedom of Information Act (FOIA) request and shared with WIRED reveals that from March to May of 2023, a DHS online platform used by the DHS Office of Intelligence and Analysis (I&A) to share sensitive but unclassified intelligence information and investigative leads among the DHS, FBI, the National Counterterrorism Center, local law enforcement, and intelligence fusion centers across the US was misconfigured, accidentally exposing restricted intelligence information to all users of the platform.

Access to the data, according to a DHS inquiry described in the memo, was meant to be limited to users of the Homeland Security Information Network’s intelligence section, known as HSIN-Intel. Instead it was set to grant access to “everyone,” exposing the information to HSIN’s tens of thousands of users. The unauthorized users who had access included US government workers focused on fields unrelated to intelligence or law enforcement such as disaster response, as well as private sector contractors and foreign government staff with access to HSIN.

“DHS advertises HSIN as secure and says the information it holds is sensitive, critical national security information,” says Spencer Reynolds, an attorney for the Brennan Center for Justice who obtained the memo via FOIA and shared it with WIRED. “But this incident raises questions about how seriously they take information security. Thousands and thousands of users gained access to information they were never supposed to have.”

HSIN-Intel’s data includes everything from law enforcement leads and tips to reports on foreign hacking and disinformation campaigns, to analysis of domestic protest movements. The memo about the HSIN-Intel breach specifically mentions, for instance, a report discussing “protests relating to a police training facility in Atlanta”—likely the Stop Cop City protests opposing the creation of the Atlanta Public Safety Training Center—noting that it focused on “media praising actions like throwing stones, fireworks and Molotov cocktails at police.”

In total, according to the memo about the DHS internal inquiry, 439 I&A “products” on the HSIN-Intel portion of the platform were improperly accessed 1,525 times. Of those unauthorized access instances, the report found that 518 were private sector users and another 46 were non-US citizens. The instances of foreign user accesses were “almost entirely” focused on cybersecurity information, the report notes, and 39 percent of all the improperly accessed intelligence products involved cybersecurity, such as foreign state-sponsored hacker groups and foreign targeting of government IT systems. The memo also noted that some of the unauthorized US users who viewed the information would have been eligible to have accessed the restricted information if they’d asked to be considered for authorization.

“When this coding error was discovered, I&A immediately fixed the problem and investigated any potential harm,” a DHS spokesperson told WIRED in a statement. “Following an extensive review, multiple oversight bodies determined there was no impactful or serious security breach. DHS takes all security and privacy measures seriously and is committed to ensuring its intelligence is shared with federal, state, local, tribal, territorial, and private sector partners to protect our homeland from the numerous adversarial threats we face.”



Source link

September 16, 2025 0 comments
0 FacebookTwitterPinterestEmail
Crypto news
NFT Gaming

Crypto Influencers’ Insane Hidden Payouts Exposed By ZachXBT

by admin September 2, 2025


Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure

Blockchain sleuth ZachXBT has published what he calls a “price sheet of 200+ crypto influencers and their wallet addresses” tied to a recent promotional push, igniting a fresh backlash over undisclosed ads on Crypto Twitter. “From 160+ accounts who accepted the deal I only saw <5 accounts actually disclose the promotional posts as an advertisement,” he wrote, adding that the spreadsheet includes addresses and transaction links used to pay creators.

How Much Crypto Influencers Secretly Make

Three screenshots of the ledger show columns listing X profiles, quoted fees per post, recipient wallet addresses, and links to Solana block explorer pages. The sheet also assigns “Tier” labels that appear to bucket accounts by perceived reach or value. Payments vary widely, from lower three-figure sums to five-figure and even one extreme five-figure outlier, with ZachXBT emphasizing that the documentation is on-chain. “60K is not a typo here’s the transaction hash to the KOLs wallet for payment… the wallets / txns on the sheet are legit,” he stated, posting the hash.

ZachXBT stressed that the dataset does not represent the entire industry, explaining it reflects a single campaign. “It’s all of the KOLs from a single project (I didn’t compile),” he said. His central critique targets non-disclosure rather than the practice of paid promotion itself. “Have stated multiple times there’s nothing wrong with influencers doing paid promotion as long as: 1) you genuinely believe in the project 2) you disclose to your followers,” he wrote. He also underscored the regulatory dimension: “Yes it’s illegal in most jurisdictions but just is rarely enforced.”

The leak quickly set off a wave of incredulity and finger-pointing. Commenters zeroed in on a listed $60,000 payment for a single post to the account @Atitty_. When asked “why are they getting 60k for a single post,” ZachXBT replied, “Seems they do small giveaway posts to farm engagement from people in developing countries.” Others focused on the broader disclosure problem. “It’s wild people in crypto don’t see the need to alert their following with a #ad at the end of the post,” wrote Erick (@EB7). ZachXBT agreed, reiterating that transparency is the crux: “Agreed there’s nothing wrong with paid promotions when you disclose and it’s a project you genuinely believe in.”

The ten highest-priced placements visible in Tier-1 include @atitty_ at $60,000 per post (one post listed); @sibeleth at $10,000 per post (one); @MediaGiraffes at $5,000 per post on a $10,000/two-post package (two); @ApeMP5 at roughly $4,250 per video on an $8,500/2-video package (two); @DaoKwonDo at approximately $2,166 per post on a $6,500 package; @herrocrypto at $2,500 per post on a $5,000/two-post package (two); @fuelkek at $2,500 per post on a $5,000/two-post package (two); @TedPillows at $2,250 per post on a $9,000/four-post package (four); @EddyXBT at $2,000 per post on a $12,000/six-post package (six); and @Regrets10x at $2,000 per post on an $8,000/four-post package (four).

Crypto influencer payments | Source: @zachxbt

The thread also captured collateral allegations swirling around individual personalities and account quality. Community member Loshmi revived earlier accusations that @xiacalls rebranded and “changed his complete female appearance,” claiming “people still pay him NEARLY $2000 bucks for 2 paid promos.” ZachXBT’s response was curt—“Many such cases”—and he later suggested many of the accounts in the spreadsheet are either newcomers or artificially boosted, saying, “Most of them are from the most recent class of CT or are just botted accounts.”

Beyond the headline numbers, the screenshots illuminate how industrialized the pay-for-post market has become. Rows enumerate per-post price cards, bundle offers, and “package” deals, with dedicated fields for payment addresses and “PAID – SOL SCAN” links that appear designed for quick auditability. That level of bookkeeping, juxtaposed with claims of widespread non-disclosure, is what makes the leak so combustible: it offers a rare, structured glimpse into how some campaigns are organized, priced, and settled on-chain while the public output often reads like organic enthusiasm.

ZachXBT’s position, repeated throughout the exchange, is not to vilify paid placements but to force a reckoning with transparency norms that other online advertising markets have largely internalized. “It’s about 155/160 accounts not disclosing,” he wrote, calling the situation “still a big problem in the industry after so many years.”

At press time, the total crypto market cap stood at $3.77 trillion.

Total crypto market cap consolidates between the 1.272 and 1.414 Fib, 1-week chart | Source: TOTAL on TradingView.com

Featured image created with DALL.E, chart from TradingView.com

Editorial Process for bitcoinist is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.



Source link

September 2, 2025 0 comments
0 FacebookTwitterPinterestEmail
How Will the Israel-Iran Conflict End? Here's What AI Models Predict
NFT Gaming

Perplexity Comet Flaw Exposed User Data to Attackers, Brave Reports

by admin August 25, 2025



In brief

  • In a demo, Comet’s AI assistant followed embedded prompts and posted private emails and codes.
  • Brave says the vulnerability remained exploitable weeks after Perplexity claimed to have fixed it.
  • Experts warn that prompt injection attacks expose deep security gaps in AI agent systems.

Brave Software has uncovered a security flaw in Perplexity AI’s Comet browser that showed how attackers could trick its AI assistant into leaking private user data.

In a proof-of-concept demo published August 20, Brave researchers identified hidden instructions inside a Reddit comment. When Comet’s AI assistant was asked to summarize the page, it didn’t just summarize—it followed the hidden commands.

Perplexity disputed the severity of the finding. A spokesperson told Decrypt the issue “was patched before anyone noticed” and said no user data was compromised. “We have a pretty robust bounty program,” the spokesperson added. “We worked directly with Brave to identify and repair it.”



Brave, which is developing its own agentic browser, maintained that the flaw remained exploitable weeks after the patch and argued Comet’s design leaves it open to further attacks.

Brave said the vulnerability comes down to how agentic browsers like Comet process web content. “When users ask it to summarize a page, Comet feeds part of that page directly to its language model without distinguishing between the user’s instructions and untrusted content,” the report explained. “This allows attackers to embed hidden commands that the AI will execute as if they were from the user.”

Prompt injection: old idea, new target

This type of exploit is known as a prompt injection attack. Instead of tricking a person, it tricks an AI system by hiding instructions in plain text.

“It’s similar to traditional injection attacks—SQL injection, LDAP injection, command injection,” Matthew Mullins, lead hacker at Reveal Security, told Decrypt. “The concept isn’t new, but the method is different. You’re exploiting natural language instead of structured code.”

Security researchers have been warning for months that prompt injection could become a major headache as AI systems gain more autonomy. In May, Princeton researchers showed how crypto AI agents could be manipulated with “memory injection” attacks, where malicious information gets stored in an AI’s memory and later acted on as if it were real.

Even Simon Willison, the developer credited with coining the term prompt injection, said the problem goes far beyond Comet. “The Brave security team reported serious prompt injection vulnerabilities in it, but Brave themselves are developing a similar feature that looks doomed to have similar problems,” he posted on X.

Shivan Sahib, Brave’s vice president of privacy and security, said its upcoming browser would include “a set of mitigations that help reduce the risk of indirect prompt injections.”

“We’re planning on isolating agentic browsing into its own storage area and browsing session, so that a user doesn’t accidentally end up granting access to their banking and other sensitive data to the agent,” he told Decrypt. “We’ll be sharing more details soon.”

The bigger risk

The Comet demo highlights a broader problem: AI agents are being deployed with powerful permissions but weak security controls. Because large language models can misinterpret instructions—or follow them too literally—they’re especially vulnerable to hidden prompts.

“These models can hallucinate,” Mullins warned. “They can go completely off the rails, like asking, ‘What’s your favorite flavor of Twizzler?’ and getting instructions for making a homemade firearm.”

With AI agents being given direct access to email, files, and live user sessions, the stakes are high. “Everyone wants to slap AI into everything,” Mullins said. “But no one’s testing what permissions the model has, or what happens when it leaks.”

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.



Source link

August 25, 2025 0 comments
0 FacebookTwitterPinterestEmail
Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database
Gaming Gear

Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database

by admin August 20, 2025


As legal cannabis has expanded around the United States for both recreational and medical use, companies have amassed troves of data about customers and their transactions. People who have applied for medical marijuana cards have had to share particularly personal health data to qualify. For some patients in Ohio who use medical weed, a recent data exposure could impact their sensitive information.

Security researcher Jeremiah Fowler found a publicly accessible database in mid-July that appeared to contain medical records, mental health evaluations, physician reports, and images of IDs like driver’s licenses for people seeking medical cannabis cards. The 323-GB trove stored close to a million records, including Social Security numbers, email addresses, physical addresses, dates of birth, and medical data—all organized by name.

Based on information that seemed to describe specific employees and business partners, Fowler suspected that the data belonged to the Ohio-based company Ohio Medical Alliance LLC, which goes by the name Ohio Marijuana Card. Fowler contacted the company on July 14; when he checked the database the next day, it had been secured and was no longer publicly accessible online. Fowler did not receive a response about his submission.

Ohio Medical Alliance did not answer WIRED’s questions about Fowler’s findings. At one point, though, the company’s president, Cassandra Brooks, wrote in an email: “I need time to investigate this alleged incident. We take data security very seriously and are looking into this matter.”

“There were physicians’ reports that would say what the underlying problem was—whether it was anxiety, cancer, HIV, or something else. In some cases, the applicants would submit their own medical records as proof” of their qualifying condition, Fowler tells WIRED. “I saw identification documents from lots of states, from everywhere. And I even saw offender release cards, which are basically IDs for people who just got out of prison that they submitted as proof of identity to get a medical marijuana card.”

Fowler says that most of the files in the database were image formats like PDFs, JPGs, and PNGs. One CSV plaintext document called “staff comments” appeared to be an export of internal communications, appointment histories, notes about clients, and application status. That file also contained more then 200,000 email addresses of Ohio Medical Alliance employees, business associates, and customers.

Databases that are misconfigured and have inadvertently been left publicly exposed on the open internet are a common problem online in spite of efforts to raise awareness about the mistake and its privacy implications.



Source link

August 20, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (1,098)
  • Esports (800)
  • Game Reviews (763)
  • Game Updates (906)
  • GameFi Guides (1,058)
  • Gaming Gear (960)
  • NFT Gaming (1,079)
  • Product Reviews (960)

Recent Posts

  • Absolum Review – The Sweet Spot
  • New PlayStation 6 tech all but confirmed by Sony and AMD – and it looks like it’ll make its way into other hardware too
  • Arc Raiders Wants To Make Progression Wipes Less Unfair
  • Battlefield 6 Review – Good Company
  • BF6 Review: The first Battlefield game I can recommend without reservations

Recent Posts

  • Absolum Review – The Sweet Spot

    October 9, 2025
  • New PlayStation 6 tech all but confirmed by Sony and AMD – and it looks like it’ll make its way into other hardware too

    October 9, 2025
  • Arc Raiders Wants To Make Progression Wipes Less Unfair

    October 9, 2025
  • Battlefield 6 Review – Good Company

    October 9, 2025
  • BF6 Review: The first Battlefield game I can recommend without reservations

    October 9, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Absolum Review – The Sweet Spot

    October 9, 2025
  • New PlayStation 6 tech all but confirmed by Sony and AMD – and it looks like it’ll make its way into other hardware too

    October 9, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close