Connect with us

Technology

Hacker claims to have 30 million customer records of Australian ticketing giant TEG

Published

on

People queuing up at Ticketek in central Sydney on 17 January 2005.

A hacker is promoting on a widely known hacker forum customer data allegedly stolen from Australian live events and ticketing company TEG.

On Thursday, the hacker put allegedly stolen TEG data up on the market, claiming to have details about 30 million users, including name, gender, date of birth, username, encrypted passwords and email addresses.

At the top of May, Ticketek, an organization owned by TEG, starts selling tickets disclosed an information breach affecting Australian customer data “which is stored on a cloud-based platform hosted by a reputable, global third-party provider”.

Advertisement

The company stated that “no Ticketek customer accounts were compromised” thanks to the encryption methods used to store their passwords. However, TEG admitted that “customer names, dates of birth and email addresses may have been affected” – data that overlapped with that advertised on the hacker forum.

The hacker included a sample of allegedly stolen data in his post. TechCrunch confirmed that at the least some of the information posted on the forum appears to be legitimate by attempting to arrange recent accounts using the e-mail addresses posted. In many cases, the Ticketek website displayed an error, suggesting that email addresses were already taken.

A TEG spokesperson reached by email didn’t comment by press time.

On its official website, Ticketek states that the corporate “sells over 23 million tickets to over 20,000 events each year.”

Advertisement

While Ticketek didn’t name its “cloud-based platform hosted by a reputable, global third-party provider,” there’s evidence to suggest it would be the snowflake behind a recent spate of data thefts affecting several of its clients, including Ticketmaster, Santander Bank and others.

Now deleted post on the Snowflake website as of January 2023, it was titled: “TEG Personalizes Live Entertainment Experiences with Snowflake.” In 2022, Altis consulting company published a case study detailing how the corporate partnered with TEG “built a modern data platform to accept streaming data into Snowflake.”

contact us

Do you have more details about this incident or other Snowflake-related breaches? From a tool that will not be working, you’ll be able to contact Lorenzo Franceschi-Bicchierai securely via Signal on +1 917 257 1382, via Telegram, Keybase and Wire @lorenzofb or email. You also can contact TechCrunch via SecureDrop.

When asked to comment on the Ticketek breach, Snowflake spokeswoman Danica Stańczak didn’t respond to our specific questions and as an alternative referred to the corporate’s public statement. Brad Jones, Snowflake’s chief information security officer, said in a press release that the corporate “has not identified evidence to suggest that this action was caused by a security vulnerability, misconfiguration or breach of the Snowflake platform.”

Advertisement

A Snowflake spokesman declined to confirm or deny whether TEG or Ticketek are Snowflake customers.

Snowflake provides corporations around the globe with services that help their customers store data within the cloud. Google-owned cybersecurity firm Mandiant reported earlier this month that cybercriminals had stolen a “significant amount of data” from several Snowflake customers. Mandiant is working with Snowflake to investigate the information breach and in a blog post revealed that the 2 corporations have notified roughly 165 Snowflake customers.

Snowflake blames the hacking campaign on its customers for not using multi-factor authentication, which allowed hackers to use passwords “previously purchased or obtained through stolen information.”

Advertisement
This article was originally published on : techcrunch.com

Technology

The next large Openai plant will not be worn: Report

Published

on

By

Sam Altman speaks onstage during The New York Times Dealbook Summit 2024.

Opeli pushed generative artificial intelligence into public consciousness. Now it might probably develop a very different variety of AI device.

According to WSJ reportThe general director of Opeli, Altman himself, told employees on Wednesday that one other large product of the corporate would not be worn. Instead, it will be compact, without the screen of the device, fully aware of the user’s environment. Small enough to sit down on the desk or slot in your pocket, Altman described it each as a “third device” next to MacBook Pro and iPhone, in addition to “Comrade AI” integrated with on a regular basis life.

The preview took place after the OpenAI announced that he was purchased by IO, a startup founded last 12 months by the previous Apple Joni Ive designer, in a capital agreement value $ 6.5 billion. I will take a key creative and design role at Openai.

Advertisement

Altman reportedly told employees that the acquisition can ultimately add 1 trillion USD to the corporate conveyorsWearing devices or glasses that got other outfits.

Altman reportedly also emphasized to the staff that the key would be crucial to stop the copying of competitors before starting. As it seems, the recording of his comments leaked to the journal, asking questions on how much he can trust his team and the way rather more he will be able to reveal.

(Tagstotransate) devices

This article was originally published on : techcrunch.com
Advertisement
Continue Reading

Technology

The latest model AI Google Gemma can work on phones

Published

on

By

It grows “open” AI Google, Gemma, grows.

While Google I/O 2025 On Tuesday, Google removed Gemma 3N compresses, a model designed for “liquid” on phones, laptops and tablets. According to Google, available in a preview starting on Tuesday, Gemma 3N can support sound, text, paintings and flicks.

Models efficient enough to operate in offline mode and without the necessity to calculate within the cloud have gained popularity within the AI ​​community lately. They will not be only cheaper to make use of than large models, but they keep privacy, eliminating the necessity to send data to a distant data center.

Advertisement

During the speech to I/O product manager, Gemma Gus Martins said that GEMMA 3N can work on devices with lower than 2 GB of RAM. “Gemma 3N shares the same architecture as Gemini Nano, and is also designed for incredible performance,” he added.

In addition to Gemma 3N, Google releases Medgemma through the AI ​​developer foundation program. According to Medgemma, it’s essentially the most talented model to research text and health -related images.

“Medgemma (IS) OUR (…) A collection of open models to understand the text and multimodal image (health),” said Martins. “Medgemma works great in various imaging and text applications, thanks to which developers (…) could adapt the models to their own health applications.”

Also on the horizon there may be SignGEMMA, an open model for signaling sign language right into a spoken language. Google claims that Signgemma will allow programmers to create recent applications and integration for users of deaf and hard.

Advertisement

“SIGNGEMMA is a new family of models trained to translate sign language into a spoken text, but preferably in the American sign and English,” said Martins. “This is the most talented model of understanding sign language in history and we are looking forward to you-programmers, deaf and hard communities-to take this base and build with it.”

It is value noting that Gemma has been criticized for non -standard, non -standard license conditions, which in accordance with some developers adopted models with a dangerous proposal. However, this didn’t discourage programmers from downloading Gemma models tens of tens of millions of times.

.

(Tagstransate) gemma

Advertisement
This article was originally published on : techcrunch.com
Continue Reading

Technology

Trump to sign a criminalizing account of porn revenge and clear deep cabinets

Published

on

By

President Donald Trump is predicted to sign the act on Take It Down, a bilateral law that introduces more severe punishments for distributing clear images, including deep wardrobes and pornography of revenge.

The Act criminalizes the publication of such photos, regardless of whether or not they are authentic or generated AI. Whoever publishes photos or videos can face penalty, including a advantageous, deprivation of liberty and restitution.

According to the brand new law, media firms and web platforms must remove such materials inside 48 hours of termination of the victim. Platforms must also take steps to remove the duplicate content.

Advertisement

Many states have already banned clear sexual desems and pornography of revenge, but for the primary time federal regulatory authorities will enter to impose restrictions on web firms.

The first lady Melania Trump lobbyed for the law, which was sponsored by the senators Ted Cruz (R-TEXAS) and Amy Klobuchar (d-minn.). Cruz said he inspired him to act after hearing that Snapchat for nearly a 12 months refused to remove a deep displacement of a 14-year-old girl.

Proponents of freedom of speech and a group of digital rights aroused concerns, saying that the law is Too wide And it will probably lead to censorship of legal photos, similar to legal pornography, in addition to government critics.

(Tagstransate) AI

Advertisement
This article was originally published on : techcrunch.com
Continue Reading
Advertisement

OUR NEWSLETTER

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending