Tim K

@cybervulcanx
0 Followers
4 Following
5 Posts
@verge LOL, ironically when I worked there I tried to achieve this, no one listened nor cared - all that matters is the bottom dollar. MSFT is a sales organization, never mistake that - they care about the $$. If they cared about security, they would let engineers have technical conversations with clients instead of sending sales people one after the next until the pipeline is full of leads.
@GossiTheDog To be fair, I think you were the most vocal and did amazing research + investigation into abusing Recall. Big ups to you for your bravery, we all hope to be as vocal as you are against bad practices, and bad products.
Nessus, a vulnerability scanning tool, detects Recall as an informational
New configuration detected for DDosia. Hosts:
* www.mobiliteit.lu
* portal.fgc.net
* sl.se
* www.fgc.cat
* zamowienia.metro.waw.pl
* www.ktelattikis.gr
* ktel-chalkidikis.gr
* www.renfe.com
* www.lpp.si
* a1.com.pl
* rozklad-pkp.pl
* autostrady.mpay.pl
* zdm-przemysl.com
* resrobot.se
* ose.gr
* itaxi.pl
* www.aesa.pl
* e-ktel.com
* www.ktel-santorini.gr #ThreatIntel #Ddosia #NoName
* https://witha.name/data/2024-06-10_07-10-04_DDoSia-target-list-full.json
*
@GossiTheDog Is it possible to get an updated list for the current #NoName targets please?