this post was submitted on 12 Jul 2024
547 points (98.9% liked)

Technology

58303 readers
25 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 39 points 4 months ago (2 children)

As much of the IT sector makes up that group I'm surprised more breaches like this haven't happened.

[–] [email protected] 48 points 4 months ago* (last edited 4 months ago) (2 children)

Just because you haven’t heard of them, doesn’t mean they don’t happen more often than you think

Vigilante hacker groups don’t necessarily need public attention to get satisfaction

[–] [email protected] 22 points 4 months ago* (last edited 3 months ago) (1 children)

Oh, it's true. Even without any unlawful computer access, the amount of personal info your average IT furry can access is pretty astounding. There's furries quietly keeping things running in the background across tech, finance, industry, science, and just about everywhere.

Our Bacon numbers are tiny, too. It might be six degrees for any two random humans, but in the furry community you rarely have to go farther than friend-of-a-friend-of-a-friend-of-a-friend.

So; if you've got a problem, if nobody else can help, and if you can find them, maybe you can hire... A Furry.

[–] [email protected] 2 points 4 months ago

From what I've heard, sometimes the hacked institutions bow in the form of delaying, or even completely ditching Project 2025-style plans. Other times the institution has enough Russia and/or China ties, that a naive tankie within the group sabotages the whole effort. Yet other times they're being paid a lot of money and being given certain guarantees (ability of leaving the country in case the hacker's civil identities become illegal, etc.).

[–] [email protected] 5 points 3 months ago

There is a secret war being fought in the digital depths of cyberspace...