Alexandre Dufresne

20 Followers
108 Following
332 Posts
Security Analyst by day. Awesome all the time.

New: Anime streaming service Crunchyroll has confirmed a data breach involving customer service ticket information following an incident with a third-party vendor.

https://techcrunch.com/2026/03/24/crunchyroll-confirms-data-breach-after-hacker-claims-unauthorized-access/

Crunchyroll confirms data breach after hacker claims unauthorized access | TechCrunch

Crunchyroll said it continues to investigate the data breach involving its users' personal information.

TechCrunch
⚠️ Confirmed: Metrics indicate a collapse in connectivity on AS12880, a key #Iran telecoms network that had so far remained partly online as part of the ~1% reserved state infrastructure. The incident corroborates reports of instability on the NIN domestic intranet.

February was anything but quiet at GreyNoise, from our 2026 State of the Edge Report to new edge attack research, Ivanti + BeyondTrust deep dives, and a packed March of events, check it all out in this month's Noiseletter! 🚀

https://www.greynoise.io/resources/noiseletter-february-2026

NoiseLetter February 2026

Get GreyNoise updates! Read the February 2026 NoiseLetter for product news, key resources, the latest tags and vulnerabilities, and more.

Whoops. The data broker giant LexisNexis has suffered another data breach. LN says the data taken was no big deal. The group claiming credit for the breach claims otherwise, of course.

https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/

This brings back memories of previous breach stories. One of my first big scoops that made the WaPo dead tree edition's front page involved a breach at LexisNexis in 2005 that exposed >300k consumer records. That breach was from a group of 15-18y/os in the US who also social engineered T-Mobile into giving them access to Paris Hilton's cell phone and the nudes w/in.

https://web.archive.org/web/20160513195758/http://www.washingtonpost.com/wp-dyn/content/article/2005/05/19/AR2005051901854_pf.html

In 2013, I published a scoop about a LexisNexis breach that came from group of criminal hackers who had seized control over ssndob[.]ru, then the largest ID theft service in the underground. In that months-long investigation, we found the hackers had installed backdoors on servers at LexisNexis, Dun & Bradstreet, and Kroll and were using them as part of a small and custom data broker botnet.

https://krebsonsecurity.com/2013/09/data-broker-giants-hacked-by-id-theft-service/

LexisNexis confirms data breach as hackers leak stolen files

American data analytics company LexisNexis Legal & Professional has confirmed to BleepingComputer that hackers breached its servers and accessed some customer and business information.

BleepingComputer

⚠️ Update: #Iran has now been cut off from the world for 36 hours with metrics showing connectivity at 1% of ordinary levels.

The internet blackout imposed on Saturday morning continues to limit Iranians' access to information as the war with the US and Israel widens regionally.

I usually find Louis Rossmann a bit intense, but his latest video was super enjoyable.

Humour is often the best way to bring complex issues to light while making people interested. The Norwegian Consumer Council really hit the ball, here. Watch their brilliant video on #enshittification:

Norweigan Government comes out swinging on enshittification

YouTube

It's like AWS security defaults all over again... 🤦‍♂️

Google Map API keys by default unrestricted, giving any visitor to your website with an embedded map also access to your other Google things, like the Gemini API! I can't image how confused I would've been had my bill ballooned due to visitors hammering Gemini with my, by design publicly exposed, Maps API key. 😬

https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules

#gemini #api_keys #security

Google API Keys Weren't Secrets. But then Gemini Changed the Rules. ◆ Truffle Security Co.

Google spent over a decade telling developers that Google API keys (like those used in Maps, Firebase, etc.) are not secrets. But that's no longer true.

This blogpost makes an astoundingly good case about LLMs I hadn't considered before. The collapse of public forums (like Stack Overflow) for programming answers coincides directly with the rise of programmers asking for answers from chatbots *directly*. Those debugging sessions become part of a training set that now *only private LLM corporations have access to*. This is something that "open models" seemingly can't easily fight. https://michiel.buddingh.eu/enclosure-feedback-loop
The Enclosure feedback loop

speculation about the way (paid) software development will become LLM-only

RCE in React Server Components, impacting React and Next.js. I usually don't say this, but patch right freakin' now. The React CVE listing (CVE-2025-55182) is a perfect 10.

https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
https://nextjs.org/blog/CVE-2025-66478

Critical Vulnerabilities in React and Next.js | Wiz Blog

Detect and mitigate CVE-2025-55182 and CVE-2025-66478, critical RCE vulnerabilities in React and Next.js.

wiz.io