並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 40 件 / 51件

新着順 人気順

leakの検索結果1 - 40 件 / 51件

タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。

leakに関するエントリは51件あります。 security*あとで読むセキュリティ などが関連タグです。 人気エントリには 『Clubhouse Data Leak - 1.3M SQL Database Leaked Online | Cybernews』などがあります。
  • Clubhouse Data Leak - 1.3M SQL Database Leaked Online | Cybernews

    So far, it seems like it’s been the worst week of the year for social media platforms in terms of data leaks, with Clubhouse seemingly joining the fray. Days after scraped data from more than a billion Facebook and LinkedIn profiles, collectively speaking, was put for sale online, it looks like now it's Clubhouse’s turn. The upstart platform seems to have experienced the same fate, with an SQL dat

      Clubhouse Data Leak - 1.3M SQL Database Leaked Online | Cybernews
    • Windows 11 with new UX confirmed in a leak, ahead of Microsoft's June 24 announcement

      In advance of Microsoft's planned Windows event on June 24th, an internal build of the upcoming OS has leaked in public forums confirming the new Windows 11 branding. What you need to knowA build of Microsoft's next-gen Windows OS has leaked in public forums.Windows Central can confirm that this is Windows 11, including the new branding.The OS features a new UX that recalls the layout and design o

        Windows 11 with new UX confirmed in a leak, ahead of Microsoft's June 24 announcement
      • Nintendo suffers huge leak, source code and design files for Wii appearing online

        Nintendo suffers huge leak, source code and design files for Wii appearing online A few days ago, leaks started to surface regarding some of the older Pokemon games. We were able to get a look at tons of beta designs from the Gen 2 era, which was followed by even more earlier sprites and other assets. Apparently, this Pokemon content was just a larger portion of an overall huge Nintendo leak. Sour

          Nintendo suffers huge leak, source code and design files for Wii appearing online
        • goroutine leakを解消したい!

          この記事は、Magic Moment Advent Calendar 2023 15日目の記事です。 こんにちは! Magic Moment で Backend Engineerをしている 大塚 です。 Magic MomentではGo言語によるマイクロサービス開発をしているのですが、ある日、あるサービスのメモリ使用量が継続的に上昇する現象を観測しました。 そこで、どういった調査をしてどのように解消までいったかをまとめました。 メモリ使用量の上昇を観測 メモリ使用量が日々上昇していることが確認できます。さっそくどこで何が原因でメモリリークしているか確認してみます。 Cloud Profilerで確認 以前よりCloud Profilerを導入していたため、まずはCloud Profilerでメモリ使用量やgoroutineの数を確認しました。 Cloud Profilerについては弊社Te

            goroutine leakを解消したい!
          • Hunting down a C memory leak in a Go program

            What it feels like when your app is leaking memoryIntroductionOver the last few years at Zendesk, both Go and Kafka have been increasingly growing in importance in our architecture. It was of course inevitable that they should meet, and so various teams have been writing Kafka consumers and producers in Go of late. There are a few different library options for building Kafka apps in Go, but we’ve

              Hunting down a C memory leak in a Go program
            • GitHub Source Code Leak | Hacker News

              Hi folks, I'm the CEO of GitHub.GitHub hasn't been hacked. We accidentally shipped an un-stripped/obfuscated tarball of our GitHub Enterprise Server source code to some customers a couple of months ago. It shares code with github.com. As others have pointed out, much of GitHub is written in Ruby. Git makes it trivial to impersonate unsigned commits, so we recommend people sign their commits and lo

              • 巴波重工 | UZUMA HEAVY INDUSTRIES - Leak-Tight 3D-Printing

                正直な所、私が最初に3Dプリンタを購入した際は「せいぜい治具やエグゾーストキャノンのグリップや外装に使えればいいな」程度に考えており、圧縮空気や水などの高圧流体を扱う耐圧部品の出力は不可能であると考えていた。というのも、家庭用3Dプリンタの定番方式である熱溶解積層法(FDM式)の最大のデメリットに強度異方性(力がかかる方向によって強度にバラツキがある)があるとされており、これは積層間の完璧な密着を得るのが難しいといった特性に基づくものである。そのため実際に通常の設定でプリントした部品の内部に高圧流体を導入すると、積層の僅かな隙間から流体がリークし、耐圧部品として使い物にはならない。 しかしある日、偶然次の記事に出会い、この常識は変わることとなった。 http://fenneclabs.net/index.php/2018/12/09/3d-printing-transparent-part

                  巴波重工 | UZUMA HEAVY INDUSTRIES - Leak-Tight 3D-Printing
                • Exclusive: US assessing reported leak at Chinese nuclear power facility | CNN Politics

                  - Source: CNN " data-fave-thumbnails="{"big": { "uri": "https://media.cnn.com/api/v1/images/stellar/prod/210611175112-taishan-nuclear-power-plant-file-2012.jpg?q=x_3,y_202,h_1684,w_2993,c_crop/h_540,w_960" }, "small": { "uri": "https://media.cnn.com/api/v1/images/stellar/prod/210611175112-taishan-nuclear-power-plant-file-2012.jpg?q=x_3,y_202,h_1684,w_2993,c_crop/h_540,w_960" } }" data-vr-video="fa

                    Exclusive: US assessing reported leak at Chinese nuclear power facility | CNN Politics
                  • Fixing a Memory Leak in a Production Node.js App

                    Fixing a Memory Leak in a Production Node.js AppJanuary 12th, 2023 — 15 min read A few months ago, I wrote about my migration from Postgres to SQLite. I ended that with a "to be continued" because I had a number of issues related to memory and CPU spikes that I couldn't really explain. For a while I thought it was bugs in LiteFS (which I'm using to get distributed SQLite for my distributed node ap

                      Fixing a Memory Leak in a Production Node.js App
                    • Hackers leak Zoom accounts’ usernames, passwords & email addresses

                      Forced social distancing has unusually driven the use of remote communication platforms such as Skype, Hangouts, WhatsApp and mainly Zoom, which has shown a prominent growth in terms of its number of users a couple of months ago, mention specialists of a cyber security course. Academic institutions, government offices and private companies have resorted to using Zoom to maintain their primary acti

                        Hackers leak Zoom accounts’ usernames, passwords & email addresses
                      • Personal Data Leak Checker: Your Email & Data - Breached? | CyberNews

                        Our checker has a 500 GB database of leaked hashed emails. To check if your email address has been leaked: Enter the email address into the search field (we don’t collect or store email addresses) Click Check Now View the search results on the same page

                          Personal Data Leak Checker: Your Email & Data - Breached? | CyberNews
                        • GitHub - liamg/gitjacker: 🔪 Leak git repositories from misconfigured websites

                          You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                            GitHub - liamg/gitjacker: 🔪 Leak git repositories from misconfigured websites
                          • WSJ News Exclusive | Lab Leak Most Likely Origin of Covid-19 Pandemic, Energy Department Now Says

                            News Corp is a global, diversified media and information services company focused on creating and distributing authoritative and engaging content and other products and services.

                              WSJ News Exclusive | Lab Leak Most Likely Origin of Covid-19 Pandemic, Energy Department Now Says
                            • The Lab-Leak Theory: Inside the Fight to Uncover COVID-19’s Origins

                              I. A Group Called DRASTICGilles Demaneuf is a data scientist with the Bank of New Zealand in Auckland. He was diagnosed with Asperger’s Syndrome ten years ago, and believes it gives him a professional advantage. “I’m very good at finding patterns in data, when other people see nothing,” he says. Early last spring, as cities worldwide were shutting down to halt the spread of COVID-19, Demaneuf, 52,

                                The Lab-Leak Theory: Inside the Fight to Uncover COVID-19’s Origins
                              • Revealed: leak uncovers global abuse of cyber-surveillance weapon

                                Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones. The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016. Forbidden Stories, a Paris-based nonprofit media organi

                                  Revealed: leak uncovers global abuse of cyber-surveillance weapon
                                • Intel investigating breach after 20GB of internal documents leak online

                                  Intel investigating breach after 20GB of internal documents leak online Leak confirmed to be authentic. Many files are marked "confidential" or "restricted secret." Image: Till KottmannUS chipmaker Intel is investigating a security breach after earlier today 20 GB of internal documents, with some marked "confidential" or "restricted secret," were uploaded online on file-sharing site MEGA. The data

                                    Intel investigating breach after 20GB of internal documents leak online
                                  • Zelensky, in private, plots bold attacks inside Russia, leak shows

                                    Ukrainian President Volodymyr Zelensky has won the trust of Western governments by refusing to use the weapons they provide for attacks inside Russia and prioritizing the targeting of Russian forces inside Ukraine’s borders. But behind closed doors, Ukraine’s leader has proposed going in a more audacious direction — occupying Russian villages to gain leverage over Moscow, bombing a pipeline that t

                                      Zelensky, in private, plots bold attacks inside Russia, leak shows
                                    • ‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics

                                      The software engineers behind these systems are employees of NTC Vulkan. On the surface, it looks like a run-of-the-mill cybersecurity consultancy. However, a leak of secret files from the company has exposed its work bolstering Vladimir Putin’s cyberwarfare capabilities. Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies

                                        ‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
                                      • Data leak reveals how China 'brainwashes' Uighurs in prison camps

                                        Data leak reveals how China 'brainwashes' Uighurs in prison camps "An electric baton to the back of the head" - a former inmate described conditions at a secret camp to the BBC Leaked documents detail for the first time China's systematic brainwashing of hundreds of thousands of Muslims in a network of high-security prison camps.

                                          Data leak reveals how China 'brainwashes' Uighurs in prison camps
                                        • Adafruit discloses data leak from ex-employee's GitHub repo

                                          Adafruit has disclosed a data leak that occurred due to a publicly-viewable GitHub repository. The company suspects this could have allowed "unauthorized access" to information about certain users on or before 2019. Based in New York City, Adafruit is a producer of open-source hardware components since 2005. The company designs, manufactures, and sells electronics products, tools, and accessories.

                                            Adafruit discloses data leak from ex-employee's GitHub repo
                                          • Roe v Wade: US Supreme Court may overturn abortion rights, leak suggests

                                            Millions could lose the legal right to abortion this summer, a leaked Supreme Court document shows.

                                              Roe v Wade: US Supreme Court may overturn abortion rights, leak suggests
                                            • Apple, you've AirDrop'd the ball: Academics detail ways to leak contact info of nearby iThings for spear-phishing

                                              Apple, you've AirDrop'd the ball: Academics detail ways to leak contact info of nearby iThings for spear-phishing Apple's AirDrop has a couple of potentially annoying privacy weaknesses that Cupertino is so far refusing to address even though a solution has been offered. A bug-hunting team at Technische Universität Darmstadt in Germany reverse engineered AirDrop – iOS and macOS's ad-hoc over-the-a

                                                Apple, you've AirDrop'd the ball: Academics detail ways to leak contact info of nearby iThings for spear-phishing
                                              • Toxic gas leak at Indian chemical plant kills at least 11 and hospitalizes hundreds | CNN

                                                " data-check-event-based-preview="" data-is-vertical-video-embed="false" data-network-id="" data-publish-date="2020-05-07T19:39:58Z" data-video-section="world" data-canonical-url="https://www.cnn.com/videos/world/2020/05/07/india-gas-leak-multiple-dead-hundreds-hospitalized-lon-orig-na.cnn" data-branding-key="" data-video-slug="india gas leak multiple dead hundreds hospitalized lon orig na" data-f

                                                  Toxic gas leak at Indian chemical plant kills at least 11 and hospitalizes hundreds | CNN
                                                • FinCEN Files: All you need to know about the documents leak

                                                  Leaked documents involving about $2tn of transactions have revealed how some of the world's biggest banks have allowed criminals to move dirty money around the world. They also show how Russian oligarchs have used banks to avoid sanctions that were supposed to stop them getting their money into the West. It's the latest in a string of leaks over the past five years that have exposed secret deals,

                                                    FinCEN Files: All you need to know about the documents leak
                                                  • From Discord to 4chan: The Improbable Journey of a US Intelligence Leak - bellingcat

                                                      From Discord to 4chan: The Improbable Journey of a US Intelligence Leak - bellingcat
                                                    • advisories/2021_github_actions_checkspelling_token_leak_via_advice_symlink.md at master · justinsteven/advisories

                                                      The check-spelling GitHub Actions community workflow is a spell checker for GitHub commits. When the workflow is enabled on a given repository, it is activated whenever a Pull Request is made to that repo. The workflow checks the spelling according to a configuration defined by the repo, and submits a Pull Request comment showing the details of any spelling errors. For a repo configured to use the

                                                        advisories/2021_github_actions_checkspelling_token_leak_via_advice_symlink.md at master · justinsteven/advisories
                                                      • バンダイナムコスタジオの社内人員削減について – Leak Press

                                                        2024年4月 これまでフルリモートだったのが強制出社開始で、育児や介護等でリモート勤務しかできない社員をふるいにかけていく。 急な強制出社で座席が足りず座席数を詰めて、酸欠状態になるフロアが続出。 5月~6月にかけて退職者が続出するも、目標とする削減数に満たないので派遣社員や嘱託社員の契約を終了していくも、まだまだ削減数に満たないので正社員を、通称「辞めさせ部署」に送り、何も仕事を与えず評価だけ下げるということで自主退職を促していく。 テイルズオブザレイス、ブループロトコルが終了を発表。 その他もサービス終了タイトルが控えており、社内で未発表のタイトルも5プロジェクトほどペンディング。 100人近くの社員が待機部署に送られる。 現在、「辞めさせ部署」にて仕事を与えず何かと理由を付けて、退職を促すという行為を実施している。 完全新規IPの開発進捗も悪く、版権物の秘匿案件も開発費率を引き下げ

                                                        • OWASP Data Leak Notification | OWASP Foundation

                                                          This website uses cookies to analyze our traffic and only share that information with our analytics partners. Accept Andrew van der Stock Friday, March 29, 2024 In late February 2024, after receiving a few support requests, the OWASP Foundation became aware of a misconfiguration of OWASP’s old Wiki web server, leading to a data leak involving decade+-old member resumes. Who is affected? If you wer

                                                          • Google exposes intelligence and defense employee names in VirusTotal leak

                                                            Google exposes intelligence and defense employee names in VirusTotal leak Hundreds of individuals working for defense and intelligence agencies globally have had their names and email addresses accidentally exposed by an employee at Google’s malware scanning platform VirusTotal. The online service lets organizations upload suspected malware to be checked against a range of anti-virus tools. VirusT

                                                              Google exposes intelligence and defense employee names in VirusTotal leak
                                                            • Google won’t comment on a potentially massive leak of its search algorithm documentation

                                                              Google’s search algorithm is perhaps the most consequential system on the internet, dictating what sites live and die and what content on the web looks like. But how exactly Google ranks websites has long been a mystery, pieced together by journalists, researchers, and people working in search engine optimization. Now, an explosive leak that purports to show thousands of pages of internal document

                                                                Google won’t comment on a potentially massive leak of its search algorithm documentation
                                                              • Outlook Vulnerability Discovery and New Ways to Leak NTLM Hashes

                                                                Varonis is your all-in-one SaaS platform to automatically find critical data, remediate exposure, and stop threats in the cloud and on-premises.

                                                                  Outlook Vulnerability Discovery and New Ways to Leak NTLM Hashes
                                                                • XSinator - XS-Leak Browser Test Suite

                                                                  XSinator.com is an XS-Leak browser test suite that was created for the paper XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers. With a single click, XSinator can automatically scan for XS-Leaks vulnerabilities in your browser (mobile or desktop). The table below shows the evaluation results categorized by its detectable differences. Successful attack

                                                                  • Wuhan lab leak theory: How Fort Detrick became a centre for Chinese conspiracies

                                                                    Wuhan lab leak theory: How Fort Detrick became a centre for Chinese conspiracies A disinformation campaign claiming that the Covid-19 virus originated from an American military base in Maryland has gained popularity in China ahead of the release of a US intelligence report on the virus origins. In May, US president Joe Biden ordered a 90-day probe into whether the Covid-19 virus came from a lab ac

                                                                      Wuhan lab leak theory: How Fort Detrick became a centre for Chinese conspiracies
                                                                    • Leak detection: Android Studio vs LeakCanary ⚔️

                                                                      I recently came across this comment in a post: The thing really annoying about LeakCanary or Android Studio, most of the time leaks identified by LeakCanary do not appear in Profiler/Memory/memory leaks, I wonder if LeakCanary is showing false positives or Android Studio is missing positives. That's a good question, let's dig into code and figure this out! False positive leaks in Android Studio Be

                                                                        Leak detection: Android Studio vs LeakCanary ⚔️
                                                                      • iOSアプリのメモリリーク (Memory Leak) の検出とデバッグの方法を、ネコに関するプログラムで学びましょう。(Reference Cycle 参照サイクル) - Qiita

                                                                        iOSアプリのメモリリーク (Memory Leak) の検出とデバッグの方法を、ネコに関するプログラムで学びましょう。(Reference Cycle 参照サイクル)XcodeSwiftmemoryLeak iOSアプリのメモリリークの検出とデバッグの方法を、ネコに関するプログラムで学びましょう! 今日は、サンプルプログラムを使って、iOSアプリにおけるメモリリークとは何なのかを学んでいきます。「僕のイタズラ猫)」というプログラムで、メモリリークの直し方を学びます。 はじめに、Xcodeに実装されているデバッグツールを使ってメモリーの問題を探し出す方法を学びます。次に、実際にデバッグを行います。 サンプルプログラム 私はたくさんのネコを飼っています。たまにいずれかのネコがソファーを引っ掻いてしまいます。どのネコが一番「行儀が悪い」かを確認するためにこのリストを作りました。 (冗談だよ。

                                                                          iOSアプリのメモリリーク (Memory Leak) の検出とデバッグの方法を、ネコに関するプログラムで学びましょう。(Reference Cycle 参照サイクル) - Qiita
                                                                        • Swimming in poo: Fears of sewage leak in Olympic venue

                                                                          Swimming in poo: Fears of sewage leak in Olympic venueSource: Getty Images Forget the heat, it’s Stinky Bay causing the most concern for our Olympic open water swimmers and triathletes, with concerns raised about the water quality in Tokyo Bay. A foul odour has been reported at the swimming venue for triathletes and open water swimmers, raising concerns about elevated levels of the dangerous E-col

                                                                            Swimming in poo: Fears of sewage leak in Olympic venue
                                                                          • Details about new SMB wormable bug leak in Microsoft Patch Tuesday snafu

                                                                            Details about a new "wormable" vulnerability in the Microsoft Server Message Block (SMB) protocol have accidentally leaked online today during the preamble to Microsoft's regular Patch Tuesday update cycle. No technical details have been published, but short summaries describing the bug have been posted on the websites of two cyber-security firms, Cisco Talos and Fortinet. The security flaw, track

                                                                              Details about new SMB wormable bug leak in Microsoft Patch Tuesday snafu
                                                                            • Major leak ‘exposes’ members and ‘lifts the lid’ on the Chinese Communist Party

                                                                              Major leak ‘exposes’ members and ‘lifts the lid’ on the Chinese Communist Party A major leak containing a register with the details of nearly two million CCP members has occurred – exposing members who are now working all over the world, while also lifting the lid on how the party operates under Xi Jinping, says Sharri Markson. Ms Markson said the leak is a register with the details of Communist P

                                                                                Major leak ‘exposes’ members and ‘lifts the lid’ on the Chinese Communist Party
                                                                              • COP26: Document leak reveals nations lobbying to change key climate report

                                                                                COP26: Document leak reveals nations lobbying to change key climate report A huge leak of documents seen by BBC News shows how countries are trying to change a crucial scientific report on how to tackle climate change. The leak reveals Saudi Arabia, Japan and Australia are among countries asking the UN to play down the need to move rapidly away from fossil fuels.

                                                                                  COP26: Document leak reveals nations lobbying to change key climate report
                                                                                • So We've Got a Memory Leak… | Steven Harman — Maker & Breaker of Things

                                                                                  Memory leaks happen. And if you’re here, reading this, I’d bet you’re dealing with one. First things first - are you sure it’s a leak, and not bloat? Okay, so it’s a leak. Much has been written about various tools for profiling a leak, understanding heap dumps, common causes of leaks, work being done to improve Ruby’s memory layout, and so much more. Ben Sheldon’s recent “The answer is in your hea

                                                                                    So We've Got a Memory Leak… | Steven Harman — Maker & Breaker of Things

                                                                                  新着記事