<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Mike Vizard, Author at Tubesock, Inc.</title>
	<atom:link href="https://www.tubesock.net/author/mike-vizard-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.tubesock.net/author/mike-vizard-2/</link>
	<description>Protecting Clients From Doors to Data</description>
	<lastBuildDate>Thu, 05 Feb 2026 21:13:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.tubesock.net/wp-content/uploads/2023/02/favicon.png</url>
	<title>Mike Vizard, Author at Tubesock, Inc.</title>
	<link>https://www.tubesock.net/author/mike-vizard-2/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>BreachForums disclosure surfaces falling out among ShinyHunters thieves</title>
		<link>https://www.tubesock.net/breachforums-disclosure-surfaces-falling-out-among-shinyhunters-thieves/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=breachforums-disclosure-surfaces-falling-out-among-shinyhunters-thieves</link>
		
		<dc:creator><![CDATA[Mike Vizard]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 20:23:17 +0000</pubDate>
				<guid isPermaLink="false">https://www.tubesock.net/wprss_feed_item/breachforums-disclosure-surfaces-falling-out-among-shinyhunters-thieves/</guid>

					<description><![CDATA[<p>Discover how a major BreachForums data leak exposed the identities of over 323,000 cybercriminals, sparked internal disputes among ShinyHunters hackers, and opened new opportunities for law enforcement action. Learn more about the implications for online criminal networks and cybersecurity today.</p>
<p>The post <a href="https://www.tubesock.net/breachforums-disclosure-surfaces-falling-out-among-shinyhunters-thieves/">BreachForums disclosure surfaces falling out among ShinyHunters thieves</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img decoding="async" src="https://www.barracuda.com/content/dam/barracuda-blog/images/2026/01/breachforums-disclosure.jpg" class="ff-og-image-inserted" alt="image" /></div>
<p><span class="cmp-text__rte__text-h4">Disgruntled hacker exposed identities of forum users, sparking debate and opportunities for law enforcement action</span></p>
<p><b>Takeaways</b></p>
<ul>
<li>A disgruntled ShinyHunters member exposed the identities of over 323,000 BreachForums users, revealing usernames, emails, and other metadata.</li>
<li>Internal disagreements within the cybercrime group, especially regarding attack targets, appear to have motivated the leak and highlight ethical divides among threat actors.</li>
<li>Although law enforcement may already be aware of some individuals, the newly revealed information could lead to more arrests, especially if suspects reside in countries with extradition treaties.</li>
<li>The incident underscores ongoing risks of cybercriminals shifting platforms and the challenge for authorities to apprehend them before they disappear into new online forums.</li>
</ul>
<p>Sunlight is said to be the best disinfectant, so now that the real identities of hundreds of thousands of alleged cybercriminals have been revealed, it will be interesting to see how many wind up in prison. Earlier this month a disgruntled member of the cybercrime syndicate known as ShinyHunters decided to <a href="https://www.darkreading.com/threat-intelligence/breachforums-breached-exposing-324k-cybercriminals">disclose detailed information on 323,986 users of an online BreachForums site</a> where cybercriminals acquire tools and share tactics and techniques.</p>
<p>Apparently upset about cyberattacks targeting organizations in France, a cybercriminal only identified as “James” decided the time had come to show his former compatriots that they are no longer able to anonymously launch cyberattacks.</p>
<p>The database published on a website named after ShinyHunters included usernames, email addresses, IP addresses, registration dates, and other metadata that could help law enforcement agencies identify members of the syndicate.</p>
<h2>Potential impact of the disclosure</h2>
<p>Knowing someone has committed a criminal act, however, is not one in the same as apprehending them, especially if they reside in countries that don’t have extradition treaties with the United States. It’s also probable law enforcement agencies already know who many of the individuals are. The FBI <a href="https://www.csoonline.com/article/4071014/fbi-seizes-breachforums-servers-as-threatened-salesforce-data-release-deadline-approaches.html">seized BreachForums servers</a> late last year, and French authorities arrested four members of the group. Two years ago, the U.S. District Court in Seattle also <a href="https://www.justice.gov/usao-wdwa/pr/member-notorious-international-hacking-crew-sentenced-prison">sentenced another French member of the group to three years in prison</a> after having him successfully extradited to the U.S from Morocco after he was arrested there. Many <a href="https://blog.barracuda.com/2024/10/24/the-rise-and-fall-of-the-BreachForums-cybercrime-network">BreachForums</a> users, as a result, have probably already moved on to other forums on the assumption that authorities were already monitoring activity.</p>
<p>The fact that cybercriminals might have a falling out amongst themselves isn’t all that unusual, but for one of them to go to the length of publishing a database of identities because of which organizations are being targeted suggests that some of the individuals involved have some sort of code of ethics they follow. That doesn’t necessarily mean they might be willing to testify against their cohorts, but it does appear distinctions are being made about what constitutes a legitimate target.</p>
<h2>Internal conflict and its consequences for a cybercrime syndicate</h2>
<p>It’s not clear to what degree authorities might be sowing dissent among the rank and file of the hacking community, but differences of opinion over what constitutes a legitimate target might lead additional cybercriminals to provide tips leading to the arrest of individuals that might be targeting a specific country or perhaps some type of non-profit healthcare institution serving the public good.</p>
<p>The one thing that is certain is that more arrests will likely occur once the authorities investigate the individuals listed in the database. Not everyone, of course, listed in that database may even be an actual cybercriminal. They could, in fact, be a cybersecurity researcher or someone affiliated with an intelligence service. The one thing that is certain is authorities should have more visibility into clandestine activities of members of a ShinyHunters syndicate that for the better part of this decade has been <a href="https://theconversation.com/what-are-shinyhunters-the-hackers-that-attacked-google-should-we-all-be-worried-264271">responsible for cyberattacks involving Salesforce, AT&amp;T and a small host of other organizations</a> such as Google that <a href="https://securityboulevard.com/2025/08/google-breach-salesforce-shinyhunters/">were later impacted downstream</a>. The challenge and the opportunity now is to make sure that the members of this syndicate don’t scurry off to another dark part of the web before authorities can locate and arrest them.</p>
<p>The post <a href="https://www.tubesock.net/breachforums-disclosure-surfaces-falling-out-among-shinyhunters-thieves/">BreachForums disclosure surfaces falling out among ShinyHunters thieves</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
		<media:thumbnail url="https://www.tubesock.net/www.barracuda.com/content/dam/barracuda-blog/images/2026/01/breachforums-disclosure.jpg" />
		<media:content url="https://www.tubesock.net/www.barracuda.com/content/dam/barracuda-blog/images/2026/01/breachforums-disclosure.jpg" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
		<item>
		<title>AI browsers are rapidly becoming major risk to cybersecurity</title>
		<link>https://www.tubesock.net/ai-browsers-are-rapidly-becoming-major-risk-to-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-browsers-are-rapidly-becoming-major-risk-to-cybersecurity</link>
		
		<dc:creator><![CDATA[Mike Vizard]]></dc:creator>
		<pubDate>Mon, 10 Nov 2025 22:00:18 +0000</pubDate>
				<guid isPermaLink="false">https://www.tubesock.net/ai-browsers-are-rapidly-becoming-major-risk-to-cybersecurity/</guid>

					<description><![CDATA[<p>This post explores emerging threats and security considerations in the era of advanced browser technologies.</p>
<p>The post <a href="https://www.tubesock.net/ai-browsers-are-rapidly-becoming-major-risk-to-cybersecurity/">AI browsers are rapidly becoming major risk to cybersecurity</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img decoding="async" src="https://www.barracuda.com/content/dam/barracuda-blog/images/2025/11/ai-browsers.jpg" class="ff-og-image-inserted" alt="image" /></div>
<h4>Emerging threats and security considerations in the era of advanced browser technologies</h4>
<p><b>Takeaways</b></p>
<ul>
<li>AI browsers introduce unique cybersecurity risks, including susceptibility to prompt injection attacks that can extend beyond the browser itself.</li>
<li>Malicious prompts could lead to data exfiltration and credential theft, potentially compromising entire workflows.</li>
<li>Many end users remain unaware of the potential dangers and download AI browsers without considering security implications.</li>
<li>Organizations need to educate users and consider implementing stricter controls to prevent unauthorized software downloads.</li>
<li>Cybersecurity professionals should proactively collaborate with AI advocates to establish best practices for responsible AI adoption.</li>
<li>Balancing innovation with security is crucial, and early engagement may help set positive examples for safe AI usage.</li>
</ul>
<p>As a new type of browser infused with artificial intelligence (AI) capabilities start to become more widely available, significant security concerns are starting to emerge.</p>
<p>Like most AI tools, this new type of browser is susceptible to prompt injection attacks. However, the issue is these AI browsers are being connected to a wide range of applications that make it possible to extend the reach of a prompt injection attack well beyond the browser.</p>
<p>For example, a malicious prompt injected to content accessed by an AI browser might direct it to exfiltrate data from an application and then forward it on to an external site using a messaging service. The root cause of the issue is that unlike a human who might, hopefully, recognize suspicious URLs, spelling errors and unusual layouts that are indicative of a malicious web site, <a href="https://securityboulevard.com/2025/06/browser-ai-agents-the-new-weakest-link-that-can-feed-your-credentials-and-data-to-attackers/">AI browsers don’t make those distinctions</a>. More troubling still, the credentials of an end user could be stolen, enabling malicious actors to use their AI browser to commandeer an entire workflow.</p>
<p>Unfortunately, while many end users are enthusiastically downloading these AI browsers, they are for the most part blissfully ignorant or, in some cases willfully oblivious, of the cybersecurity implications.</p>
<h2>Proactive steps for safeguarding AI adoption</h2>
<p>Of course, a large number of organizations have policies and controls in place that prevent end users from downloading software that has not been approved, but the majority do not. Cybersecurity and IT professionals that work for those organizations should make a concerted effort to, at the very least, make sure every end user clearly understands the potential risks. At the very most, there might be no time like the present to implement some more stringent controls.</p>
<p>In fact, cybersecurity professionals would be well advised to remind users that proponents of an AI philosophy that advocates for going fast and breaking things are not going to be around to help clean up the mess they helped make. Their sole goal is to spur as much adoption of their tools and platforms as quickly as possible regardless of the level of risk to an organization that might create. The challenge is that cybersecurity professionals are once again in the uncomfortable position of urging caution in the face of a massive wave of exuberance.</p>
<p>Sadly, if history is any guide there will need to be a very large number of cybersecurity incidents before end users start to fully appreciate the peril. Cybercriminals are themselves still coming up to speed on prompt injection tactics and techniques, but as most cybersecurity professionals already well know: If it can be imagined, someone is already trying it.</p>
<h2>Balancing innovation with security</h2>
<p>In the meantime, rather than simply waiting for the inevitable issues to arise, cybersecurity teams should be proactively engaging AI advocates within their organization. The more responsible they are, the better the chances are that the rest of the organization might even one day adopt a set of best practices for safely using AI. Those leading-edge users of AI, in fact, might set the example for all that follow.</p>
<p>Of course, there are always going to be rogue end users who adopt AI tools and applications without much of a second thought, alongside any number of shadow IT technologies they also regularly employ. The only difference in the age of AI is the level of risk to the organization is now several orders of magnitude greater.</p>
<p>The post <a href="https://www.tubesock.net/ai-browsers-are-rapidly-becoming-major-risk-to-cybersecurity/">AI browsers are rapidly becoming major risk to cybersecurity</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
		<media:thumbnail url="https://www.tubesock.net/www.barracuda.com/content/dam/barracuda-blog/images/2025/11/ai-browsers.jpg" />
		<media:content url="https://www.tubesock.net/www.barracuda.com/content/dam/barracuda-blog/images/2025/11/ai-browsers.jpg" medium="image">
			<media:title type="html">image</media:title>
		</media:content>
	</item>
	</channel>
</rss>
