Ecoer Logo
VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS51.68%
Net Worth
24.274USD
STEEM
11.267STEEM
SBD
42.930SBD
Own SP
46.057SP

Detailed Balance

STEEM
balance
3.842STEEM
market_balance
0.000STEEM
savings_balance
0.000STEEM
reward_steem_balance
7.425STEEM
STEEM POWER
Own SP
46.057SP
Delegated Out
0.000SP
Delegation In
0.000SP
Effective Power
46.057SP
Reward SP (pending)
8.847SP
SBD
sbd_balance
42.581SBD
sbd_conversions
0.000SBD
sbd_market_balance
0.000SBD
savings_sbd_balance
0.000SBD
reward_sbd_balance
0.349SBD
{
  "balance": "3.842 STEEM",
  "savings_balance": "0.000 STEEM",
  "reward_steem_balance": "7.425 STEEM",
  "vesting_shares": "74999.542831 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "sbd_balance": "42.581 SBD",
  "savings_sbd_balance": "0.000 SBD",
  "reward_sbd_balance": "0.349 SBD",
  "conversions": []
}

Account Info

nametwr
id820660
rank43,095
reputation1474105728380
created2018-03-12T11:43:21
recovery_accountsteem
proxyNone
post_count1,941
comment_count0
lifetime_vote_count0
witnesses_voted_for0
last_post2020-03-20T12:05:03
last_root_post2020-03-20T12:05:03
last_vote_time2020-03-20T12:11:00
proxied_vsf_votes0, 0, 0, 0
can_vote1
voting_power9,799
delayed_votes0
balance3.842 STEEM
savings_balance0.000 STEEM
sbd_balance42.581 SBD
savings_sbd_balance0.000 SBD
vesting_shares74999.542831 VESTS
delegated_vesting_shares0.000000 VESTS
received_vesting_shares0.000000 VESTS
reward_vesting_balance17458.144836 VESTS
vesting_balance0.000 STEEM
vesting_withdraw_rate0.000000 VESTS
next_vesting_withdrawal1969-12-31T23:59:59
withdrawn0
to_withdraw0
withdraw_routes0
savings_withdraw_requests0
last_account_recovery1970-01-01T00:00:00
reset_accountnull
last_owner_update1970-01-01T00:00:00
last_account_update1970-01-01T00:00:00
minedNo
sbd_seconds0
sbd_last_interest_payment2019-06-23T23:24:42
savings_sbd_last_interest_payment1970-01-01T00:00:00
{
  "id": 820660,
  "name": "twr",
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM5mZdVikYSMj8K5qXaEpyKBXUPALYBr8ByPe84QQgLJB2qFiEZm",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM75rXwAFKCDTaTdfaW5GvxPAvEQJYjtiWj4apLvkvpy3gWqE8ee",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7qWEgKwU8FTtmH6pWmw3iHJgxSixpjRSTfhA2xJ7ztL8icWTMd",
        1
      ]
    ]
  },
  "memo_key": "STM5wznJC9Yn8HJg53a233pNK9rWeGvc5HQbGUdNf9ppkpDSmpw7d",
  "json_metadata": "{}",
  "posting_json_metadata": "",
  "proxy": "",
  "last_owner_update": "1970-01-01T00:00:00",
  "last_account_update": "1970-01-01T00:00:00",
  "created": "2018-03-12T11:43:21",
  "mined": false,
  "recovery_account": "steem",
  "last_account_recovery": "1970-01-01T00:00:00",
  "reset_account": "null",
  "comment_count": 0,
  "lifetime_vote_count": 0,
  "post_count": 1941,
  "can_vote": true,
  "voting_manabar": {
    "current_mana": "73499551974",
    "last_update_time": 1584706260
  },
  "downvote_manabar": {
    "current_mana": "18749885707",
    "last_update_time": 1584706260
  },
  "voting_power": 9799,
  "balance": "3.842 STEEM",
  "savings_balance": "0.000 STEEM",
  "sbd_balance": "42.581 SBD",
  "sbd_seconds": "0",
  "sbd_seconds_last_update": "2019-06-23T23:24:42",
  "sbd_last_interest_payment": "2019-06-23T23:24:42",
  "savings_sbd_balance": "0.000 SBD",
  "savings_sbd_seconds": "0",
  "savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
  "savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_withdraw_requests": 0,
  "reward_sbd_balance": "0.349 SBD",
  "reward_steem_balance": "7.425 STEEM",
  "reward_vesting_balance": "17458.144836 VESTS",
  "reward_vesting_steem": "8.847 STEEM",
  "vesting_shares": "74999.542831 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "vesting_withdraw_rate": "0.000000 VESTS",
  "next_vesting_withdrawal": "1969-12-31T23:59:59",
  "withdrawn": 0,
  "to_withdraw": 0,
  "withdraw_routes": 0,
  "curation_rewards": 80,
  "posting_rewards": 89273,
  "proxied_vsf_votes": [
    0,
    0,
    0,
    0
  ],
  "witnesses_voted_for": 0,
  "last_post": "2020-03-20T12:05:03",
  "last_root_post": "2020-03-20T12:05:03",
  "last_vote_time": "2020-03-20T12:11:00",
  "post_bandwidth": 0,
  "pending_claimed_accounts": 0,
  "vesting_balance": "0.000 STEEM",
  "reputation": "1474105728380",
  "transfer_history": [],
  "market_history": [],
  "post_history": [],
  "vote_history": [],
  "other_history": [],
  "witness_votes": [],
  "tags_usage": [],
  "guest_bloggers": [],
  "rank": 43095
}

Withdraw Routes

IncomingOutgoing
Empty
Empty
{
  "incoming": [],
  "outgoing": []
}
From Date
To Date
samantha77replied to @twr / sx60dg
2025/06/01 06:51:18
parent authortwr
parent permlinkhowtoavoidlosingmoneywhenchoosingproxies-xf6bwynwqi
authorsamantha77
permlinksx60dg
title
bodySelecting a trustworthy proxy can be challenging due to numerous options and varying quality. I rely on the unlimited rotating proxy https://onlineproxy.io/mobile-proxies/rotating-proxy/unlimited-bandwidth from OnlineProxy because it offers seamless, secure, and anonymous browsing. Its rotating IPs prevent detection and bans, making it perfect for scraping, testing, or privacy needs. For me, it’s the ideal solution to stay connected without restrictions or compromises on performance.
json metadata{"links":["https://onlineproxy.io/mobile-proxies/rotating-proxy/unlimited-bandwidth"],"app":"steemit/0.2"}
Transaction InfoBlock #96070938/Trx 1fce25f08c3f4924ec2a66e5517af8362c2299a3
View Raw JSON Data
{
  "trx_id": "1fce25f08c3f4924ec2a66e5517af8362c2299a3",
  "block": 96070938,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2025-06-01T06:51:18",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "howtoavoidlosingmoneywhenchoosingproxies-xf6bwynwqi",
      "author": "samantha77",
      "permlink": "sx60dg",
      "title": "",
      "body": "Selecting a trustworthy proxy can be challenging due to numerous options and varying quality. I rely on the unlimited rotating proxy https://onlineproxy.io/mobile-proxies/rotating-proxy/unlimited-bandwidth from OnlineProxy because it offers seamless, secure, and anonymous browsing. Its rotating IPs prevent detection and bans, making it perfect for scraping, testing, or privacy needs. For me, it’s the ideal solution to stay connected without restrictions or compromises on performance.",
      "json_metadata": "{\"links\":[\"https://onlineproxy.io/mobile-proxies/rotating-proxy/unlimited-bandwidth\"],\"app\":\"steemit/0.2\"}"
    }
  ]
}
steemeggsent 0.001 STEEM to @twr- "@se-witness needs your witness vote! To help drum up some support, @steemegg is giving away free daily votes to all supporters Starting 12/19. visit my latest post for more info."
2022/12/18 17:01:36
fromsteemegg
totwr
amount0.001 STEEM
memo@se-witness needs your witness vote! To help drum up some support, @steemegg is giving away free daily votes to all supporters Starting 12/19. visit my latest post for more info.
Transaction InfoBlock #70407595/Trx 50c5b2a7534080e6f87e415e7a542f1e3c2ba236
View Raw JSON Data
{
  "trx_id": "50c5b2a7534080e6f87e415e7a542f1e3c2ba236",
  "block": 70407595,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2022-12-18T17:01:36",
  "op": [
    "transfer",
    {
      "from": "steemegg",
      "to": "twr",
      "amount": "0.001 STEEM",
      "memo": "@se-witness needs your witness vote! To help drum up some support,\n        @steemegg is giving away free daily votes to all supporters Starting 12/19.\n        visit my latest post for more info."
    }
  ]
}
2022/11/07 21:27:51
votercyberstarr
authortwr
permlinkdataleakhitsgermanpoliticians-3iqcm8wuai
weight10000 (100.00%)
Transaction InfoBlock #69239613/Trx 3fa006ed3a83573eac819d9fd960efa9e5ba17bb
View Raw JSON Data
{
  "trx_id": "3fa006ed3a83573eac819d9fd960efa9e5ba17bb",
  "block": 69239613,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2022-11-07T21:27:51",
  "op": [
    "vote",
    {
      "voter": "cyberstarr",
      "author": "twr",
      "permlink": "dataleakhitsgermanpoliticians-3iqcm8wuai",
      "weight": 10000
    }
  ]
}
ph-supportsent 0.001 STEEM to @twr
2022/08/17 16:13:18
fromph-support
totwr
amount0.001 STEEM
memo
Transaction InfoBlock #66886186/Trx af9a1066b794de5832d5a8e1fa3a12306720a8e1
View Raw JSON Data
{
  "trx_id": "af9a1066b794de5832d5a8e1fa3a12306720a8e1",
  "block": 66886186,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2022-08-17T16:13:18",
  "op": [
    "transfer",
    {
      "from": "ph-support",
      "to": "twr",
      "amount": "0.001 STEEM",
      "memo": ""
    }
  ]
}
2021/08/10 11:52:42
parent authortwr
parent permlinkextensionapiscanstealbrowserdatathroughmaliciouswebsites-01qq54j3gg
authorcrypto-exchanges
permlinkqxmgzt
title
body<h2>Crypto Exchange In UK?</h2>This is a good article on the [best crypto exchanges in UK](https://steemit.com/cryptocurrency/@crypto-exchanges/best-uk).
json metadata{"links":["https://steemit.com/cryptocurrency/@crypto-exchanges/best-uk"],"app":"steemit/0.2"}
Transaction InfoBlock #56242751/Trx 19095dbd9cc7ba295e906abc56da207fee9f4ebd
View Raw JSON Data
{
  "trx_id": "19095dbd9cc7ba295e906abc56da207fee9f4ebd",
  "block": 56242751,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2021-08-10T11:52:42",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "extensionapiscanstealbrowserdatathroughmaliciouswebsites-01qq54j3gg",
      "author": "crypto-exchanges",
      "permlink": "qxmgzt",
      "title": "",
      "body": "<h2>Crypto Exchange In UK?</h2>This is a good article on the [best crypto exchanges in UK](https://steemit.com/cryptocurrency/@crypto-exchanges/best-uk).",
      "json_metadata": "{\"links\":[\"https://steemit.com/cryptocurrency/@crypto-exchanges/best-uk\"],\"app\":\"steemit/0.2\"}"
    }
  ]
}
2021/03/29 21:33:09
votermohzak1
authortwr
permlinknmap-bootstrap-xslhackcreatesvisuallyappealingnmapscanreportsinterviewwithitscreatorandreashontzia-wxdhfhu3e9
weight10000 (100.00%)
Transaction InfoBlock #52434114/Trx 11d4081ae71399d3c957c58c5d11be86a34c2554
View Raw JSON Data
{
  "trx_id": "11d4081ae71399d3c957c58c5d11be86a34c2554",
  "block": 52434114,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2021-03-29T21:33:09",
  "op": [
    "vote",
    {
      "voter": "mohzak1",
      "author": "twr",
      "permlink": "nmap-bootstrap-xslhackcreatesvisuallyappealingnmapscanreportsinterviewwithitscreatorandreashontzia-wxdhfhu3e9",
      "weight": 10000
    }
  ]
}
blurtofficialsent 0.001 STEEM to @twr- "CONGRATS! You have a 1:1 BLURT AIRDROP of 258.611 BLURT and 38.424000 BLURT POWER waiting for you. Check out https://blurtwallet.com/@twr and https://blurt.blog/ TODAY!"
2020/12/18 15:31:24
fromblurtofficial
totwr
amount0.001 STEEM
memoCONGRATS! You have a 1:1 BLURT AIRDROP of 258.611 BLURT and 38.424000 BLURT POWER waiting for you. Check out https://blurtwallet.com/@twr and https://blurt.blog/ TODAY!
Transaction InfoBlock #49558503/Trx 9d1bb81665e38c20fb699e6b3c216e1b15f44a89
View Raw JSON Data
{
  "trx_id": "9d1bb81665e38c20fb699e6b3c216e1b15f44a89",
  "block": 49558503,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-12-18T15:31:24",
  "op": [
    "transfer",
    {
      "from": "blurtofficial",
      "to": "twr",
      "amount": "0.001 STEEM",
      "memo": "CONGRATS! You have a 1:1 BLURT AIRDROP of 258.611 BLURT and 38.424000 BLURT POWER waiting for you. Check out https://blurtwallet.com/@twr and https://blurt.blog/ TODAY!"
    }
  ]
}
2020/11/21 15:37:27
voterdarkweblegitfind
authortwr
permlinkmixcloudsuffereddatabreachaffecting21millionusers-yu9lrp9s9n
weight10000 (100.00%)
Transaction InfoBlock #48794499/Trx a0f43524640b3bc126c9613c48357369ae0592cf
View Raw JSON Data
{
  "trx_id": "a0f43524640b3bc126c9613c48357369ae0592cf",
  "block": 48794499,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-11-21T15:37:27",
  "op": [
    "vote",
    {
      "voter": "darkweblegitfind",
      "author": "twr",
      "permlink": "mixcloudsuffereddatabreachaffecting21millionusers-yu9lrp9s9n",
      "weight": 10000
    }
  ]
}
2020/11/06 01:43:27
voteracdcjewels
authortwr
permlinkanandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z
weight10000 (100.00%)
Transaction InfoBlock #48354446/Trx 26bae4b004d0728f122ccc0ee8fae9ee942dbe42
View Raw JSON Data
{
  "trx_id": "26bae4b004d0728f122ccc0ee8fae9ee942dbe42",
  "block": 48354446,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-11-06T01:43:27",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "anandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z",
      "weight": 10000
    }
  ]
}
2020/11/06 01:43:09
voteracdcjewels
authortwr
permlinkmultipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or
weight10000 (100.00%)
Transaction InfoBlock #48354440/Trx b4d10e49cb20d3a5a1fad3e5677c8a89d5ff9189
View Raw JSON Data
{
  "trx_id": "b4d10e49cb20d3a5a1fad3e5677c8a89d5ff9189",
  "block": 48354440,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-11-06T01:43:09",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "multipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or",
      "weight": 10000
    }
  ]
}
2020/11/06 01:43:03
voteracdcjewels
authortwr
permlinkanandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z
weight10000 (100.00%)
Transaction InfoBlock #48354438/Trx 80a312d525452999849847d64009945ee5967eec
View Raw JSON Data
{
  "trx_id": "80a312d525452999849847d64009945ee5967eec",
  "block": 48354438,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-11-06T01:43:03",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "anandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z",
      "weight": 10000
    }
  ]
}
johndonovanreplied to @twr / qhgtbr
2020/09/30 09:35:51
parent authortwr
parent permlinkmaliciousandroidbattery-saverappinstallsadwareandstealsdata-bjq0687od3
authorjohndonovan
permlinkqhgtbr
title
bodyCan any free [malware remover](https://thinkmobiles.com/blog/best-free-antimalware/) help to fix this problem?
json metadata{"links":["https://thinkmobiles.com/blog/best-free-antimalware/"],"app":"steemit/0.2"}
Transaction InfoBlock #47314446/Trx 65437499abd6afbc4106a589fb978dd87a131a94
View Raw JSON Data
{
  "trx_id": "65437499abd6afbc4106a589fb978dd87a131a94",
  "block": 47314446,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-09-30T09:35:51",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "maliciousandroidbattery-saverappinstallsadwareandstealsdata-bjq0687od3",
      "author": "johndonovan",
      "permlink": "qhgtbr",
      "title": "",
      "body": "Can any free [malware remover](https://thinkmobiles.com/blog/best-free-antimalware/) help to fix this problem?",
      "json_metadata": "{\"links\":[\"https://thinkmobiles.com/blog/best-free-antimalware/\"],\"app\":\"steemit/0.2\"}"
    }
  ]
}
johndonovanreplied to @twr / qh7dt1
2020/09/25 07:22:12
parent authortwr
parent permlinkmoreadware-deliveringandroidgamesandcameraappsremovedfromgoogleplaystore-k45zzmn7j7
authorjohndonovan
permlinkqh7dt1
title
bodyIt will be good is all adware will be removed from reliable sources such as Play Market. Sometimes the [adware remover](https://thinkmobiles.com/blog/best-free-antimalware/) does not help and you can face the same problems.
json metadata{"links":["https://thinkmobiles.com/blog/best-free-antimalware/"],"app":"steemit/0.2"}
Transaction InfoBlock #47169562/Trx 8f442990f46aa84a6e5b628d48c8af83a52a8253
View Raw JSON Data
{
  "trx_id": "8f442990f46aa84a6e5b628d48c8af83a52a8253",
  "block": 47169562,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-09-25T07:22:12",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "moreadware-deliveringandroidgamesandcameraappsremovedfromgoogleplaystore-k45zzmn7j7",
      "author": "johndonovan",
      "permlink": "qh7dt1",
      "title": "",
      "body": "It will be good is all adware will be removed from reliable sources such as Play Market.  Sometimes the [adware remover](https://thinkmobiles.com/blog/best-free-antimalware/) does not help and you can face the same problems.",
      "json_metadata": "{\"links\":[\"https://thinkmobiles.com/blog/best-free-antimalware/\"],\"app\":\"steemit/0.2\"}"
    }
  ]
}
fisermanreplied to @twr / q6btli
2020/05/25 20:34:27
parent authortwr
parent permlinkuserstopayforwindows7extendedsecurityupdates-0cgz359tsy
authorfiserman
permlinkq6btli
title
body...
json metadata{"app":"steemit/0.2"}
Transaction InfoBlock #43685278/Trx bdb9185036dd8d932a170c71daaabff99789c1a6
View Raw JSON Data
{
  "trx_id": "bdb9185036dd8d932a170c71daaabff99789c1a6",
  "block": 43685278,
  "trx_in_block": 13,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-25T20:34:27",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "userstopayforwindows7extendedsecurityupdates-0cgz359tsy",
      "author": "fiserman",
      "permlink": "q6btli",
      "title": "",
      "body": "...",
      "json_metadata": "{\"app\":\"steemit/0.2\"}"
    }
  ]
}
crypto.piotrsent 0.002 STEEM to @twr- "Dear @twr, I hope you don't mind this little memo. I would like to introduce you to new "LEARN AND EARN" initiative which I came up together with @hardaeborla. Check out my latest post and hopefully y..."
2020/05/14 17:49:57
fromcrypto.piotr
totwr
amount0.002 STEEM
memoDear @twr, I hope you don't mind this little memo. I would like to introduce you to new "LEARN AND EARN" initiative which I came up together with @hardaeborla. Check out my latest post and hopefully you will enjoy our new idea. Obviously I would appreciate every resteem and your feedback. I read all comments. Yours, Piotr // LINK: https://steemit.com/hive-175254/@crypto.piotr/learn-and-earn-our-project-hope-new-awesome-initiative
Transaction InfoBlock #43371954/Trx ef19f4efdd3ab64dce9c883369f8b86d8c14de99
View Raw JSON Data
{
  "trx_id": "ef19f4efdd3ab64dce9c883369f8b86d8c14de99",
  "block": 43371954,
  "trx_in_block": 30,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-14T17:49:57",
  "op": [
    "transfer",
    {
      "from": "crypto.piotr",
      "to": "twr",
      "amount": "0.002 STEEM",
      "memo": "Dear @twr, I hope you don't mind this little memo. I would like to introduce you to new \"LEARN AND EARN\" initiative which I came up together with @hardaeborla. Check out my latest post and hopefully you will enjoy our new idea. Obviously I would appreciate every resteem and your feedback. I read all comments. Yours, Piotr // LINK: https://steemit.com/hive-175254/@crypto.piotr/learn-and-earn-our-project-hope-new-awesome-initiative"
    }
  ]
}
twrreceived 0.057 STEEM, 0.071 SP author reward for @twr / typesofvulnerabilityassessmentandmethodologies-0xin105tif
2020/03/27 12:05:03
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
sbd payout0.000 SBD
steem payout0.057 STEEM
vesting payout115.511171 VESTS
Transaction InfoBlock #42015079/Virtual Operation #6
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 42015079,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 6,
  "timestamp": "2020-03-27T12:05:03",
  "op": [
    "author_reward",
    {
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "sbd_payout": "0.000 SBD",
      "steem_payout": "0.057 STEEM",
      "vesting_payout": "115.511171 VESTS"
    }
  ]
}
steempressreceived 0.012 SP benefactor reward from @twr
2020/03/27 12:05:03
benefactorsteempress
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
sbd payout0.000 SBD
steem payout0.010 STEEM
vesting payout19.578164 VESTS
Transaction InfoBlock #42015079/Virtual Operation #5
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 42015079,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 5,
  "timestamp": "2020-03-27T12:05:03",
  "op": [
    "comment_benefactor_reward",
    {
      "benefactor": "steempress",
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "sbd_payout": "0.000 SBD",
      "steem_payout": "0.010 STEEM",
      "vesting_payout": "19.578164 VESTS"
    }
  ]
}
2020/03/24 05:25:45
voteracdcjewels
authortwr
permlinkmultipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or
weight10000 (100.00%)
Transaction InfoBlock #41921885/Trx cf39dc25a6948512689ebc7e74cd15d9619662a3
View Raw JSON Data
{
  "trx_id": "cf39dc25a6948512689ebc7e74cd15d9619662a3",
  "block": 41921885,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-24T05:25:45",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "multipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or",
      "weight": 10000
    }
  ]
}
2020/03/24 05:25:39
voteracdcjewels
authortwr
permlinkmultipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or
weight10000 (100.00%)
Transaction InfoBlock #41921883/Trx 29b77963668ad6c74f0f293628646e7a3a7a4cbf
View Raw JSON Data
{
  "trx_id": "29b77963668ad6c74f0f293628646e7a3a7a4cbf",
  "block": 41921883,
  "trx_in_block": 30,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-24T05:25:39",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "multipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or",
      "weight": 10000
    }
  ]
}
2020/03/24 05:25:36
voteracdcjewels
authortwr
permlinkanandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z
weight10000 (100.00%)
Transaction InfoBlock #41921882/Trx 5f3f6db56cf6f18b3e312ed1334b03959ea5e12e
View Raw JSON Data
{
  "trx_id": "5f3f6db56cf6f18b3e312ed1334b03959ea5e12e",
  "block": 41921882,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-24T05:25:36",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "anandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z",
      "weight": 10000
    }
  ]
}
2020/03/24 05:25:30
voteracdcjewels
authortwr
permlinkanandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z
weight10000 (100.00%)
Transaction InfoBlock #41921880/Trx 1837010992a9b70c9f5c8a15753b21ff83ce2fb5
View Raw JSON Data
{
  "trx_id": "1837010992a9b70c9f5c8a15753b21ff83ce2fb5",
  "block": 41921880,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-24T05:25:30",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "anandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z",
      "weight": 10000
    }
  ]
}
2020/03/24 05:23:42
voteracdcjewels
authortwr
permlinkmultipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or
weight10000 (100.00%)
Transaction InfoBlock #41921845/Trx a5ae20e5ea8a9dff3dec50bc6d020dffa09ceee3
View Raw JSON Data
{
  "trx_id": "a5ae20e5ea8a9dff3dec50bc6d020dffa09ceee3",
  "block": 41921845,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-24T05:23:42",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "multipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or",
      "weight": 10000
    }
  ]
}
2020/03/24 05:23:27
voteracdcjewels
authortwr
permlinkanandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z
weight10000 (100.00%)
Transaction InfoBlock #41921840/Trx 17d8cd0e2e46dafe02b7134cc78c7b02995a15b0
View Raw JSON Data
{
  "trx_id": "17d8cd0e2e46dafe02b7134cc78c7b02995a15b0",
  "block": 41921840,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-24T05:23:27",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "anandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z",
      "weight": 10000
    }
  ]
}
2020/03/24 05:23:06
voteracdcjewels
authortwr
permlinkmultipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or
weight10000 (100.00%)
Transaction InfoBlock #41921834/Trx ab90bc98d88cd3ddaad5f9f635c35e1ecd89e606
View Raw JSON Data
{
  "trx_id": "ab90bc98d88cd3ddaad5f9f635c35e1ecd89e606",
  "block": 41921834,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-24T05:23:06",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "multipletiktokvulnerabilitiescouldexploitordeleteuserspersonaldata-catrgej9or",
      "weight": 10000
    }
  ]
}
2020/03/24 05:23:03
voteracdcjewels
authortwr
permlinkanandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z
weight10000 (100.00%)
Transaction InfoBlock #41921833/Trx d6e102f3a39a47e72677c6646376a77ba550babe
View Raw JSON Data
{
  "trx_id": "d6e102f3a39a47e72677c6646376a77ba550babe",
  "block": 41921833,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-24T05:23:03",
  "op": [
    "vote",
    {
      "voter": "acdcjewels",
      "author": "twr",
      "permlink": "anandroidbluetoothvulnerabilityallowedexploitwithoutuserinteraction-msxyqdcm3z",
      "weight": 10000
    }
  ]
}
2020/03/24 03:35:03
authortwr
permlinkpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
sbd payout0.000 SBD
steem payout0.063 STEEM
vesting payout127.279262 VESTS
Transaction InfoBlock #41919700/Virtual Operation #5
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 41919700,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 5,
  "timestamp": "2020-03-24T03:35:03",
  "op": [
    "author_reward",
    {
      "author": "twr",
      "permlink": "popupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "sbd_payout": "0.000 SBD",
      "steem_payout": "0.063 STEEM",
      "vesting_payout": "127.279262 VESTS"
    }
  ]
}
steempressreceived 0.013 SP benefactor reward from @twr
2020/03/24 03:35:03
benefactorsteempress
authortwr
permlinkpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
sbd payout0.000 SBD
steem payout0.011 STEEM
vesting payout21.539567 VESTS
Transaction InfoBlock #41919700/Virtual Operation #4
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 41919700,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 4,
  "timestamp": "2020-03-24T03:35:03",
  "op": [
    "comment_benefactor_reward",
    {
      "benefactor": "steempress",
      "author": "twr",
      "permlink": "popupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "sbd_payout": "0.000 SBD",
      "steem_payout": "0.011 STEEM",
      "vesting_payout": "21.539567 VESTS"
    }
  ]
}
2020/03/20 12:34:12
voterpayroll
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
weight100 (1.00%)
Transaction InfoBlock #41817040/Trx 2450b6ed5b8e8b645d6c17656c0fc4d8aed5c968
View Raw JSON Data
{
  "trx_id": "2450b6ed5b8e8b645d6c17656c0fc4d8aed5c968",
  "block": 41817040,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:34:12",
  "op": [
    "vote",
    {
      "voter": "payroll",
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "weight": 100
    }
  ]
}
2020/03/20 12:11:00
votertwr
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
weight10000 (100.00%)
Transaction InfoBlock #41816576/Trx 4570c6567cf399e0db2cb795352d34f13570c930
View Raw JSON Data
{
  "trx_id": "4570c6567cf399e0db2cb795352d34f13570c930",
  "block": 41816576,
  "trx_in_block": 22,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:11:00",
  "op": [
    "vote",
    {
      "voter": "twr",
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "weight": 10000
    }
  ]
}
2020/03/20 12:09:09
voterbtcfreeforall001
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
weight100 (1.00%)
Transaction InfoBlock #41816539/Trx 3398ff69b00bc035aca0ae958852b49920ce554f
View Raw JSON Data
{
  "trx_id": "3398ff69b00bc035aca0ae958852b49920ce554f",
  "block": 41816539,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:09:09",
  "op": [
    "vote",
    {
      "voter": "btcfreeforall001",
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "weight": 100
    }
  ]
}
2020/03/20 12:05:27
parent authortwr
parent permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
authorcheetah
permlinkcheetah-re-twrtypesofvulnerabilityassessmentandmethodologies-0xin105tif
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://latesthackingnews.com/2020/03/20/types-of-vulnerability-assessment-and-methodologies/
json metadata
Transaction InfoBlock #41816465/Trx 8adcefb726b8f2e3a0b721119bf71ebdaac4c386
View Raw JSON Data
{
  "trx_id": "8adcefb726b8f2e3a0b721119bf71ebdaac4c386",
  "block": 41816465,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:05:27",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "author": "cheetah",
      "permlink": "cheetah-re-twrtypesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://latesthackingnews.com/2020/03/20/types-of-vulnerability-assessment-and-methodologies/",
      "json_metadata": ""
    }
  ]
}
2020/03/20 12:05:21
votercheetah
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
weight8 (0.08%)
Transaction InfoBlock #41816463/Trx 9d59d51f1c909b3c74a49f858476fb21e9a5aff0
View Raw JSON Data
{
  "trx_id": "9d59d51f1c909b3c74a49f858476fb21e9a5aff0",
  "block": 41816463,
  "trx_in_block": 25,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:05:21",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "weight": 8
    }
  ]
}
2020/03/20 12:05:12
parent authortwr
parent permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
authorinnerhive
permlinkinnerhive-re-twrtypesofvulnerabilityassessmentandmethodologies-0xin105tif
title
bodyhttps://i.imgur.com/CBqCEo5.png<br><br>Join the community in our migration to Hive, a community built blockchain for the community. All Steem account holders will receive equivalent stake on the new Hive blockchain.<br><br>Please [follow @innerhive on twitter](https://twitter.com/innerhive) for more information.
json metadata
Transaction InfoBlock #41816460/Trx 9c73dfdbe21bc545e9383b50eefeba6fff31c996
View Raw JSON Data
{
  "trx_id": "9c73dfdbe21bc545e9383b50eefeba6fff31c996",
  "block": 41816460,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:05:12",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "author": "innerhive",
      "permlink": "innerhive-re-twrtypesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "title": "",
      "body": "https://i.imgur.com/CBqCEo5.png<br><br>Join the community in our migration to Hive, a community built blockchain for the community.  All Steem account holders will receive equivalent stake on the new Hive blockchain.<br><br>Please [follow @innerhive on twitter](https://twitter.com/innerhive) for more information.",
      "json_metadata": ""
    }
  ]
}
2020/03/20 12:05:09
voterinnerhive
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
weight1 (0.01%)
Transaction InfoBlock #41816459/Trx 992ad556ac630a377cb287c5210d2c1b35fb06d5
View Raw JSON Data
{
  "trx_id": "992ad556ac630a377cb287c5210d2c1b35fb06d5",
  "block": 41816459,
  "trx_in_block": 49,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:05:09",
  "op": [
    "vote",
    {
      "voter": "innerhive",
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "weight": 1
    }
  ]
}
2020/03/20 12:05:06
votertonimontana
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
weight323 (3.23%)
Transaction InfoBlock #41816458/Trx 5a97302281755332245eac2bd4fd68ecfb057e8f
View Raw JSON Data
{
  "trx_id": "5a97302281755332245eac2bd4fd68ecfb057e8f",
  "block": 41816458,
  "trx_in_block": 39,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:05:06",
  "op": [
    "vote",
    {
      "voter": "tonimontana",
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "weight": 323
    }
  ]
}
2020/03/20 12:05:03
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #41816457/Trx 12ffc9eba4d9047eadced9ebc2031b6f8e9f3558
View Raw JSON Data
{
  "trx_id": "12ffc9eba4d9047eadced9ebc2031b6f8e9f3558",
  "block": 41816457,
  "trx_in_block": 55,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:05:03",
  "op": [
    "comment_options",
    {
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2020/03/20 12:05:03
parent author
parent permlinktechnology
authortwr
permlinktypesofvulnerabilityassessmentandmethodologies-0xin105tif
titleTypes Of Vulnerability Assessment And Methodologies
body<center>https://latesthackingnews.com/wp-content/uploads/2020/03/audit-4189560_640-scaled.jpg</center> <br/>Vulnerability assessments are often carried out to help assure organizations are protected from well known vulnerabilities (low hanging fruit). As the term implies a vulnerability assessment is the methodology used for identifying security loopholes within IT applications and infrastructure and their subsequent remediation. It involves robust scanning of components either by individual security experts or network security admins in an organization. <h2>Vulnerability Assessment Categories</h2> Depending on the areas of the infrastructure under review a vulnerability assessment can be classified into three broad types. <h3>External Scans</h3> Scanning those components of the IT ecosystem that directly face the internet and are accessible to external users. For instance, ports, networks, websites, apps, and other systems used by external users or customers. <h3>Internal Scans</h3> Finding loopholes in the internal network of an organization (not exposed to external scans) that may damage the enterprise network. <h3>Environmental Scans</h3> Environmental vulnerability scans focus on specified operational technology of an organization, such as cloud services, IoT, and mobile devices. <h2>Vulnerability Assessment Methodology</h2> The methodology for vulnerability assessments include the following steps, regardless of whether it is done by different vulnerability assessment tools or manually. <ul> <li><strong>Initial Planning</strong> – Identifying the specific area of the organization’s IT infrastructure to assess for bugs.</li> <li><strong>Scanning</strong> – Manual or automated scanning of the target areas for possible or potential security vulnerabilities, flaws, exploitable bugs, and false positives.</li> <li><strong>Analysis</strong> – Analyzing the detected vulnerabilities for their potential impact, suggesting remedies, and quantifying the bugs to mark their severity and urgency of remediation.</li> <li><strong>Remediation</strong> – Applying various security measures to fix glitches by introducing product updates or system upgrades.</li> </ul> <h2>Common Vulnerability Scanning Methods</h2> <h3>Web Application Scanning</h3> Scanning web applications for identifying known vulnerabilities in the app architecture either manually, using app security scanners, or by hiring professional <a href="https://www.indusface.com/products/application-security/web-application-scanning/?utm_source=latesthackingnews&amp;utm_medium=PPC&amp;utm_campaign=latesthackingnews-types-of-vulnerability-assessment">web app scanning services</a> who provide both automated and indepth manual assessments along with virtual patching services as well as False positive POC for all automated scanner findings. <h3>Network Scanning</h3> Scanning wired or wireless networks to identify and remedy potential security flaws. <h3>Build Assessment</h3> Analyzing software builds for any security or performance bugs that may cause trouble in the later stages. <h3>Database Assessments</h3> Identifying security weaknesses in databases to help prevent data breaches. <h3>Host-based Scanning</h3> Running scans on workstations, servers, and network hosts including a thorough examination of ports and services. <h2>Conclusion</h2> Vulnerability assessments should be a requisite for big and small enterprises to ensure the inclusive security of their IT infrastructure. These robust assessments not only protect firms from malicious cyber attacks but also helps them build a credible stance among customers and the protection of their data. The extent of time and efforts required for such vigorous analysis may be difficult for some firms to manage. In such situations, businesses may partner with professional cybersecurity firms, such as <a href="https://www.indusface.com/?utm_source=latesthackingnews&amp;utm_medium=PPC&amp;utm_campaign=latesthackingnews-types-of-vulnerability-assessment" target="_blank" rel="noopener noreferrer">Indusface</a>, to handle these tasks. Doing so saves them from investing their resources in this arena whilst providing a stress-free alternative to help in managing their business security. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/20/types-of-vulnerability-assessment-and-methodologies/ </em><hr/></center>
json metadata{"community":"steempress","app":"steempress","image":[""],"tags":["technology","hacking"],"canonical_url":"https://latesthackingnews.com/2020/03/20/types-of-vulnerability-assessment-and-methodologies/"}
Transaction InfoBlock #41816457/Trx 12ffc9eba4d9047eadced9ebc2031b6f8e9f3558
View Raw JSON Data
{
  "trx_id": "12ffc9eba4d9047eadced9ebc2031b6f8e9f3558",
  "block": 41816457,
  "trx_in_block": 55,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-20T12:05:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "twr",
      "permlink": "typesofvulnerabilityassessmentandmethodologies-0xin105tif",
      "title": "Types Of Vulnerability Assessment And Methodologies",
      "body": "<center>https://latesthackingnews.com/wp-content/uploads/2020/03/audit-4189560_640-scaled.jpg</center> <br/>Vulnerability assessments are often carried out to help assure organizations are protected from well known vulnerabilities (low hanging fruit).\r\n\r\nAs the term implies a vulnerability assessment is the methodology used for identifying security loopholes within IT applications and infrastructure and their subsequent remediation. It involves robust scanning of components either by individual security experts or network security admins in an organization.\r\n<h2>Vulnerability Assessment Categories</h2>\r\nDepending on the areas of the infrastructure under review a vulnerability assessment can be classified into three broad types.\r\n<h3>External Scans</h3>\r\nScanning those components of the IT ecosystem that directly face the internet and are accessible to external users. For instance, ports, networks, websites, apps, and other systems used by external users or customers.\r\n<h3>Internal Scans</h3>\r\nFinding loopholes in the internal network of an organization (not exposed to external scans) that may damage the enterprise network.\r\n<h3>Environmental Scans</h3>\r\nEnvironmental vulnerability scans focus on specified operational technology of an organization, such as cloud services, IoT, and mobile devices.\r\n<h2>Vulnerability Assessment Methodology</h2>\r\nThe methodology for vulnerability assessments include the following steps, regardless of whether it is done by different vulnerability assessment tools or manually.\r\n<ul>\r\n <li><strong>Initial Planning</strong> – Identifying the specific area of the organization’s IT infrastructure to assess for bugs.</li>\r\n <li><strong>Scanning</strong> – Manual or automated scanning of the target areas for possible or potential security vulnerabilities, flaws, exploitable bugs, and false positives.</li>\r\n <li><strong>Analysis</strong> – Analyzing the detected vulnerabilities for their potential impact, suggesting remedies, and quantifying the bugs to mark their severity and urgency of remediation.</li>\r\n <li><strong>Remediation</strong> – Applying various security measures to fix glitches by introducing product updates or system upgrades.</li>\r\n</ul>\r\n<h2>Common Vulnerability Scanning Methods</h2>\r\n<h3>Web Application Scanning</h3>\r\nScanning web applications for identifying known vulnerabilities in the app architecture either manually, using app security scanners, or by hiring professional <a href=\"https://www.indusface.com/products/application-security/web-application-scanning/?utm_source=latesthackingnews&amp;utm_medium=PPC&amp;utm_campaign=latesthackingnews-types-of-vulnerability-assessment\">web app scanning services</a> who provide both automated and indepth manual assessments along with virtual patching services as well as False positive POC for all automated scanner findings.\r\n<h3>Network Scanning</h3>\r\nScanning wired or wireless networks to identify and remedy potential security flaws.\r\n<h3>Build Assessment</h3>\r\nAnalyzing software builds for any security or performance bugs that may cause trouble in the later stages.\r\n<h3>Database Assessments</h3>\r\nIdentifying security weaknesses in databases to help prevent data breaches.\r\n<h3>Host-based Scanning</h3>\r\nRunning scans on workstations, servers, and network hosts including a thorough examination of ports and services.\r\n<h2>Conclusion</h2>\r\nVulnerability assessments should be a requisite for big and small enterprises to ensure the inclusive security of their IT infrastructure. These robust assessments not only protect firms from malicious cyber attacks but also helps them build a credible stance among customers and the protection of their data.\r\n\r\nThe extent of time and efforts required for such vigorous analysis may be difficult for some firms to manage. In such situations, businesses may partner with professional cybersecurity firms, such as <a href=\"https://www.indusface.com/?utm_source=latesthackingnews&amp;utm_medium=PPC&amp;utm_campaign=latesthackingnews-types-of-vulnerability-assessment\" target=\"_blank\" rel=\"noopener noreferrer\">Indusface</a>, to handle these tasks. Doing so saves them from investing their resources in this arena whilst providing a stress-free alternative to help in managing their business security. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/20/types-of-vulnerability-assessment-and-methodologies/ </em><hr/></center>",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress\",\"image\":[\"\"],\"tags\":[\"technology\",\"hacking\"],\"canonical_url\":\"https://latesthackingnews.com/2020/03/20/types-of-vulnerability-assessment-and-methodologies/\"}"
    }
  ]
}
2020/03/18 12:16:00
votertwr
authortwr
permlinkbliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o
weight10000 (100.00%)
Transaction InfoBlock #41759163/Trx de066ae4b09ec2a7c420a93034a7ac1adc81e583
View Raw JSON Data
{
  "trx_id": "de066ae4b09ec2a7c420a93034a7ac1adc81e583",
  "block": 41759163,
  "trx_in_block": 26,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-18T12:16:00",
  "op": [
    "vote",
    {
      "voter": "twr",
      "author": "twr",
      "permlink": "bliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o",
      "weight": 10000
    }
  ]
}
2020/03/18 12:14:24
voterbtcfreeforall001
authortwr
permlinkbliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o
weight100 (1.00%)
Transaction InfoBlock #41759131/Trx e302cc49a440b79a5c087f852f2898dace81915b
View Raw JSON Data
{
  "trx_id": "e302cc49a440b79a5c087f852f2898dace81915b",
  "block": 41759131,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-18T12:14:24",
  "op": [
    "vote",
    {
      "voter": "btcfreeforall001",
      "author": "twr",
      "permlink": "bliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o",
      "weight": 100
    }
  ]
}
2020/03/18 12:10:18
parent authortwr
parent permlinkbliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o
authorcheetah
permlinkcheetah-re-twrbliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://latesthackingnews.com/2020/03/18/blisk-browser-vendors-leaked-data-via-unsecured-database-server/
json metadata
Transaction InfoBlock #41759049/Trx b95581680335a24054e20f6b26f9c733c068f4e1
View Raw JSON Data
{
  "trx_id": "b95581680335a24054e20f6b26f9c733c068f4e1",
  "block": 41759049,
  "trx_in_block": 23,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-18T12:10:18",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "bliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o",
      "author": "cheetah",
      "permlink": "cheetah-re-twrbliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://latesthackingnews.com/2020/03/18/blisk-browser-vendors-leaked-data-via-unsecured-database-server/",
      "json_metadata": ""
    }
  ]
}
2020/03/18 12:10:15
votercheetah
authortwr
permlinkbliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o
weight8 (0.08%)
Transaction InfoBlock #41759048/Trx af8658b6023a7897591c23c78cc8e783d2887086
View Raw JSON Data
{
  "trx_id": "af8658b6023a7897591c23c78cc8e783d2887086",
  "block": 41759048,
  "trx_in_block": 19,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-18T12:10:15",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "twr",
      "permlink": "bliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o",
      "weight": 8
    }
  ]
}
2020/03/18 12:10:03
authortwr
permlinkbliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #41759044/Trx 7fbb421943e2ce294820ea4144fd5c5f044f0e2f
View Raw JSON Data
{
  "trx_id": "7fbb421943e2ce294820ea4144fd5c5f044f0e2f",
  "block": 41759044,
  "trx_in_block": 33,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-18T12:10:03",
  "op": [
    "comment_options",
    {
      "author": "twr",
      "permlink": "bliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2020/03/18 12:10:03
parent author
parent permlinkdataexposed
authortwr
permlinkbliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o
titleBlisk Browser Vendors Leaked Data Via Unsecured Database Server
body<center>https://latesthackingnews.com/wp-content/uploads/2020/03/Blisk-browser.png</center> <br/>Vendors behind the Blisk browser – a dedicated browser for web developers – inadvertently left a database unsecured that leaked data containing millions of records. Blisk is a web browser tailored for web developers keeping in view their needs. Launched in 2014, the browser’s userbase includes some prominent names as well, such as Apple, Microsoft, NASA, eBay, UNICEF and others. <h2>Blisk Vendor Data Leaked</h2> Security researchers from vpnMentor, Noam Rotem and Ran Locar, discovered another unsecured server exposing users’ data. This time, the open server belonged to the Blisk browser vendors, which leaked data related to web developers. Detailing their findings in a <a href="https://www.vpnmentor.com/blog/report-blisk-leak/" target="_blank" rel="noopener noreferrer">post</a>, the researchers revealed that they found an unprotected <a href="https://latesthackingnews.com/tag/elasticsearch-server/" target="_blank" rel="noopener noreferrer">Elasticsearch</a> database leaking data. It precisely contained 3.4GB of data that included more than 2.9 million records. Blisk obtained this data from users without the need to bypass any security measures. The exposed information included sensitive details about users, including their email addresses, user agent details, and IP addresses. While leaving databases open is already negligent, the additional issue with Blisk was the way they collected the data. According to the researchers, <blockquote>Since the browser “sees” what the user sees, it can potentially bypass encryption, 2-factor authentication, and any other measure they have in place. If the user is using software that is not heavily secured, this can lead to very serious security breaches. It appears that no matter what security measures you put in place while using Blisk, your data would still potentially be leaked. </blockquote> <h2>Database Now Closed</h2> Upon finding the unprotected server, the researchers traced back the vendors and informed them of the matter. Following their report, the vendors addressed the matter in a few days pulling the database offline. Though the researchers fear that the kind of information left online could lead to serious security threats, Blisk confirmed to ZDNet that the incident did not affect any sensitive data. Nonetheless, any Blisk user eager to know about the potential impact on oneself of the incident may contact the vendors for details. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/18/blisk-browser-vendors-leaked-data-via-unsecured-database-server/ </em><hr/></center>
json metadata{"community":"steempress","app":"steempress","image":[""],"tags":["dataexposed","dataleak","dataleaked","database","databasesecurity"],"canonical_url":"https://latesthackingnews.com/2020/03/18/blisk-browser-vendors-leaked-data-via-unsecured-database-server/"}
Transaction InfoBlock #41759044/Trx 7fbb421943e2ce294820ea4144fd5c5f044f0e2f
View Raw JSON Data
{
  "trx_id": "7fbb421943e2ce294820ea4144fd5c5f044f0e2f",
  "block": 41759044,
  "trx_in_block": 33,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-18T12:10:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "dataexposed",
      "author": "twr",
      "permlink": "bliskbrowservendorsleakeddataviaunsecureddatabaseserver-5ruubvsl1o",
      "title": "Blisk Browser Vendors Leaked Data Via Unsecured Database Server",
      "body": "<center>https://latesthackingnews.com/wp-content/uploads/2020/03/Blisk-browser.png</center> <br/>Vendors behind the Blisk browser – a dedicated browser for web developers – inadvertently left a database unsecured that leaked data containing millions of records.\r\n\r\nBlisk is a web browser tailored for web developers keeping in view their needs. Launched in 2014, the browser’s userbase includes some prominent names as well, such as Apple, Microsoft, NASA, eBay, UNICEF and others.\r\n<h2>Blisk Vendor Data Leaked</h2>\r\nSecurity researchers from vpnMentor, Noam Rotem and Ran Locar, discovered another unsecured server exposing users’ data. This time, the open server belonged to the Blisk browser vendors, which leaked data related to web developers.\r\n\r\nDetailing their findings in a <a href=\"https://www.vpnmentor.com/blog/report-blisk-leak/\" target=\"_blank\" rel=\"noopener noreferrer\">post</a>, the researchers revealed that they found an unprotected <a href=\"https://latesthackingnews.com/tag/elasticsearch-server/\" target=\"_blank\" rel=\"noopener noreferrer\">Elasticsearch</a> database leaking data. It precisely contained 3.4GB of data that included more than 2.9 million records. Blisk obtained this data from users without the need to bypass any security measures.\r\n\r\nThe exposed information included sensitive details about users, including their email addresses, user agent details, and IP addresses.\r\n\r\nWhile leaving databases open is already negligent, the additional issue with Blisk was the way they collected the data. According to the researchers,\r\n<blockquote>Since the browser “sees” what the user sees, it can potentially bypass encryption, 2-factor authentication, and any other measure they have in place. If the user is using software that is not heavily secured, this can lead to very serious security breaches.\r\nIt appears that no matter what security measures you put in place while using Blisk, your data would still potentially be leaked.\n</blockquote>\r\n<h2>Database Now Closed</h2>\r\nUpon finding the unprotected server, the researchers traced back the vendors and informed them of the matter. Following their report, the vendors addressed the matter in a few days pulling the database offline.\r\n\r\nThough the researchers fear that the kind of information left online could lead to serious security threats, Blisk confirmed to ZDNet that the incident did not affect any sensitive data.\r\n\r\nNonetheless, any Blisk user eager to know about the potential impact on oneself of the incident may contact the vendors for details. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/18/blisk-browser-vendors-leaked-data-via-unsecured-database-server/ </em><hr/></center>",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress\",\"image\":[\"\"],\"tags\":[\"dataexposed\",\"dataleak\",\"dataleaked\",\"database\",\"databasesecurity\"],\"canonical_url\":\"https://latesthackingnews.com/2020/03/18/blisk-browser-vendors-leaked-data-via-unsecured-database-server/\"}"
    }
  ]
}
2020/03/17 20:51:00
votertwr
authortwr
permlinko2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i
weight10000 (100.00%)
Transaction InfoBlock #41740691/Trx 37c57b7a01ee905bc504127faf11fcf89604d39c
View Raw JSON Data
{
  "trx_id": "37c57b7a01ee905bc504127faf11fcf89604d39c",
  "block": 41740691,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T20:51:00",
  "op": [
    "vote",
    {
      "voter": "twr",
      "author": "twr",
      "permlink": "o2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i",
      "weight": 10000
    }
  ]
}
2020/03/17 20:49:09
voterbtcfreeforall001
authortwr
permlinko2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i
weight100 (1.00%)
Transaction InfoBlock #41740654/Trx 22036af77db6e091dd4adc3f8f00c76c9abfb4dd
View Raw JSON Data
{
  "trx_id": "22036af77db6e091dd4adc3f8f00c76c9abfb4dd",
  "block": 41740654,
  "trx_in_block": 13,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T20:49:09",
  "op": [
    "vote",
    {
      "voter": "btcfreeforall001",
      "author": "twr",
      "permlink": "o2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i",
      "weight": 100
    }
  ]
}
2020/03/17 20:45:24
parent authortwr
parent permlinko2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i
authorcheetah
permlinkcheetah-re-twro2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://latesthackingnews.com/2020/03/17/o2s-uk-partner-aerial-direct-suffered-data-breach-exposing-six-years-of-data/
json metadata
Transaction InfoBlock #41740579/Trx e734359fa5d2ce02187e77ab2fd6200f4bcbb1e3
View Raw JSON Data
{
  "trx_id": "e734359fa5d2ce02187e77ab2fd6200f4bcbb1e3",
  "block": 41740579,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T20:45:24",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "o2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i",
      "author": "cheetah",
      "permlink": "cheetah-re-twro2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://latesthackingnews.com/2020/03/17/o2s-uk-partner-aerial-direct-suffered-data-breach-exposing-six-years-of-data/",
      "json_metadata": ""
    }
  ]
}
2020/03/17 20:45:21
votercheetah
authortwr
permlinko2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i
weight8 (0.08%)
Transaction InfoBlock #41740578/Trx 2b2b3e2976fa3e03267f2d8b29f09c6d1ddb0621
View Raw JSON Data
{
  "trx_id": "2b2b3e2976fa3e03267f2d8b29f09c6d1ddb0621",
  "block": 41740578,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T20:45:21",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "twr",
      "permlink": "o2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i",
      "weight": 8
    }
  ]
}
2020/03/17 20:45:03
authortwr
permlinko2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #41740572/Trx 5f3c5880ec1599b2b29046f11e46f9208d250d33
View Raw JSON Data
{
  "trx_id": "5f3c5880ec1599b2b29046f11e46f9208d250d33",
  "block": 41740572,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T20:45:03",
  "op": [
    "comment_options",
    {
      "author": "twr",
      "permlink": "o2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2020/03/17 20:45:03
parent author
parent permlinkaerialdirectdatabreach
authortwr
permlinko2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i
titleO2's UK Partner "Aerial Direct" Suffered Data Breach Exposing Six-Years of Data
body<center>https://latesthackingnews.com/wp-content/uploads/2020/03/data-breach-scaled.jpg</center> <br/>Once again, a telecom giant made it to the news owing to a security incident. Though, this time, the victim O2 UK suffered indirectly since the data breach happened to a partner firm Aerial Direct. <h2>O2 UK Partner Data Breach</h2> Reportedly, the UK-based telecommunication firm O2 has indirectly suffered a cyber attack. Specifically, data was breached from the O2 UK partner firm Aerial Direct potentially affecting thousands of customers. As revealed via their <a href="https://www.aerial-direct.co.uk/di-update" target="_blank" rel="noopener noreferrer">website</a>, the firm recently noticed unauthorized access to their database. Investigating the matter revealed that the incident resulted in a security breach. <blockquote>The data was contained in an external back-up database, a part of which was accessed by an unauthorised third-party attacker, who downloaded some of the information contained on that database, which was confined to non-financial information. </blockquote> According to TheRegister, Aerial Direct disclosed the incident in an email notification to their customers, they stated they noticed the breach on February 26, 2020. Regarding the breached details, the company revealed that the database contained personal information of customers. As stated on their website, <blockquote>The information was used to manage information about our customers. This included contact details (such as name, home and email address, date of birth and phone numbers), technical and product information. Please note that whilst this is all of the types of information contained in the database, not all of this information may have related to every customer. </blockquote> Nonetheless, the incident did not affect financial data or passwords since the database did not contain such information. <h2>Security Measures Underway</h2> Upon noticing the breach, the firm swiftly worked out to contain the attack. <blockquote>As soon as we became aware of this unauthorised access we shut down all permissions to the database to contain the incident. </blockquote> They also began informing customers about the breach. For other details, they are still investigating the matter. For now, the extent of the breach remains unclear. Nonetheless, considering the extensive customerbase of the Aerial Direct, one may expect it to be huge. Aerial Direct boasts having O2 UK as the largest business partner with 130,000 customers, among other clients. They have confirmed on their website that they keep the data of expired customers for 6 years. Recently, another telecom giant <a href="https://latesthackingnews.com/2020/03/06/t-mobile-suffer-another-data-breach-affecting-personal-and-financial-data-of-customers/" target="_blank" rel="noopener noreferrer">T-Mobile has also disclosed a data breach</a> involving personal and financial information. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/17/o2s-uk-partner-aerial-direct-suffered-data-breach-exposing-six-years-of-data/ </em><hr/></center>
json metadata{"community":"steempress","app":"steempress","image":[""],"tags":["aerialdirectdatabreach","customerdataleaked","customers","databreach","databasesecurity"],"canonical_url":"https://latesthackingnews.com/2020/03/17/o2s-uk-partner-aerial-direct-suffered-data-breach-exposing-six-years-of-data/"}
Transaction InfoBlock #41740572/Trx 5f3c5880ec1599b2b29046f11e46f9208d250d33
View Raw JSON Data
{
  "trx_id": "5f3c5880ec1599b2b29046f11e46f9208d250d33",
  "block": 41740572,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T20:45:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "aerialdirectdatabreach",
      "author": "twr",
      "permlink": "o2sukpartneraerialdirectsuffereddatabreachexposingsix-yearsofdata-7w96no9s7i",
      "title": "O2's UK Partner \"Aerial Direct\" Suffered Data Breach Exposing Six-Years of Data",
      "body": "<center>https://latesthackingnews.com/wp-content/uploads/2020/03/data-breach-scaled.jpg</center> <br/>Once again, a telecom giant made it to the news owing to a security incident. Though, this time, the victim O2 UK suffered indirectly since the data breach happened to a partner firm Aerial Direct.\r\n<h2>O2 UK Partner Data Breach</h2>\r\nReportedly, the UK-based telecommunication firm O2 has indirectly suffered a cyber attack. Specifically, data was breached from the O2 UK partner firm Aerial Direct potentially affecting thousands of customers.\r\n\r\nAs revealed via their <a href=\"https://www.aerial-direct.co.uk/di-update\" target=\"_blank\" rel=\"noopener noreferrer\">website</a>, the firm recently noticed unauthorized access to their database. Investigating the matter revealed that the incident resulted in a security breach.\r\n<blockquote>The data was contained in an external back-up database, a part of which was accessed by an unauthorised third-party attacker, who downloaded some of the information contained on that database, which was confined to non-financial information.\n</blockquote>\r\nAccording to TheRegister, Aerial Direct disclosed the incident in an email notification to their customers, they stated they noticed the breach on February 26, 2020. Regarding the breached details, the company revealed that the database contained personal information of customers. As stated on their website,\r\n<blockquote>The information was used to manage information about our customers. This included contact details (such as name, home and email address, date of birth and phone numbers), technical and product information. Please note that whilst this is all of the types of information contained in the database, not all of this information may have related to every customer.\n</blockquote>\r\nNonetheless, the incident did not affect financial data or passwords since the database did not contain such information.\r\n<h2>Security Measures Underway</h2>\r\nUpon noticing the breach, the firm swiftly worked out to contain the attack.\r\n<blockquote>As soon as we became aware of this unauthorised access we shut down all permissions to the database to contain the incident.\n</blockquote>\r\nThey also began informing customers about the breach. For other details, they are still investigating the matter.\r\n\r\nFor now, the extent of the breach remains unclear. Nonetheless, considering the extensive customerbase of the Aerial Direct, one may expect it to be huge. Aerial Direct boasts having O2 UK as the largest business partner with 130,000 customers, among other clients. They have confirmed on their website that they keep the data of expired customers for 6 years.\r\n\r\nRecently, another telecom giant <a href=\"https://latesthackingnews.com/2020/03/06/t-mobile-suffer-another-data-breach-affecting-personal-and-financial-data-of-customers/\" target=\"_blank\" rel=\"noopener noreferrer\">T-Mobile has also disclosed a data breach</a> involving personal and financial information. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/17/o2s-uk-partner-aerial-direct-suffered-data-breach-exposing-six-years-of-data/ </em><hr/></center>",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress\",\"image\":[\"\"],\"tags\":[\"aerialdirectdatabreach\",\"customerdataleaked\",\"customers\",\"databreach\",\"databasesecurity\"],\"canonical_url\":\"https://latesthackingnews.com/2020/03/17/o2s-uk-partner-aerial-direct-suffered-data-breach-exposing-six-years-of-data/\"}"
    }
  ]
}
2020/03/17 13:41:00
votertwr
authortwr
permlinkslackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix
weight10000 (100.00%)
Transaction InfoBlock #41732103/Trx 769457243384912fb4db367d0974e8426b36f23e
View Raw JSON Data
{
  "trx_id": "769457243384912fb4db367d0974e8426b36f23e",
  "block": 41732103,
  "trx_in_block": 27,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T13:41:00",
  "op": [
    "vote",
    {
      "voter": "twr",
      "author": "twr",
      "permlink": "slackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix",
      "weight": 10000
    }
  ]
}
2020/03/17 13:39:12
voterbtcfreeforall001
authortwr
permlinkslackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix
weight100 (1.00%)
Transaction InfoBlock #41732067/Trx c24c5de7c5e7b73d6a45dc50a7157d90bcdd87e7
View Raw JSON Data
{
  "trx_id": "c24c5de7c5e7b73d6a45dc50a7157d90bcdd87e7",
  "block": 41732067,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T13:39:12",
  "op": [
    "vote",
    {
      "voter": "btcfreeforall001",
      "author": "twr",
      "permlink": "slackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix",
      "weight": 100
    }
  ]
}
2020/03/17 13:35:24
parent authortwr
parent permlinkslackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix
authorcheetah
permlinkcheetah-re-twrslackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://latesthackingnews.com/2020/03/17/slack-patch-critical-vulnerability-allowing-automated-account-takeovers/
json metadata
Transaction InfoBlock #41731991/Trx 1311ea497bde56cef84b345766c8b4662289c801
View Raw JSON Data
{
  "trx_id": "1311ea497bde56cef84b345766c8b4662289c801",
  "block": 41731991,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T13:35:24",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "slackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix",
      "author": "cheetah",
      "permlink": "cheetah-re-twrslackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://latesthackingnews.com/2020/03/17/slack-patch-critical-vulnerability-allowing-automated-account-takeovers/",
      "json_metadata": ""
    }
  ]
}
2020/03/17 13:35:18
votercheetah
authortwr
permlinkslackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix
weight8 (0.08%)
Transaction InfoBlock #41731989/Trx 410fbf41b6212d0ac9c85354ad909b1e360f0120
View Raw JSON Data
{
  "trx_id": "410fbf41b6212d0ac9c85354ad909b1e360f0120",
  "block": 41731989,
  "trx_in_block": 25,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T13:35:18",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "twr",
      "permlink": "slackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix",
      "weight": 8
    }
  ]
}
2020/03/17 13:35:03
authortwr
permlinkslackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #41731984/Trx 7a91e1a70d679606b402884fe7b0affbf2ab3000
View Raw JSON Data
{
  "trx_id": "7a91e1a70d679606b402884fe7b0affbf2ab3000",
  "block": 41731984,
  "trx_in_block": 23,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T13:35:03",
  "op": [
    "comment_options",
    {
      "author": "twr",
      "permlink": "slackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2020/03/17 13:35:03
parent author
parent permlinkaccounttakeover
authortwr
permlinkslackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix
titleSlack Patch Critical Vulnerability Allowing Automated Account Takeovers
body<center>https://latesthackingnews.com/wp-content/uploads/2020/03/Slack.jpg</center> <br/>A critical security vulnerability existed in Slack that could have lead to a massive data breach affecting its customers. Slack also fixed another vulnerability together with this one. <h2>Slack Vulnerability Allowing Account Takeovers</h2> Reportedly, bug hunter Evan Custodio discovered a critical vulnerability affecting Slack. As per his findings, the vulnerability could allow automated account takeovers, ultimately leading to a data breach. While disclosing the flaw to Slack via its <a href="https://latesthackingnews.com/tag/hackerone/" target="_blank" rel="noopener noreferrer">HackerOne</a> bug bounty program, the researcher shared a <a href="https://hackerone.com/reports/737140" target="_blank" rel="noopener noreferrer">detailed report</a> about the exploit. As revealed, he found an HTTP Request Smuggling bug that could allow automated hacking of arbitrary customer accounts. <blockquote>This researcher exploited an HTTP Request Smuggling bug on a Slack asset to perform a CL.TE-based hijack onto neighboring customer requests. This hijack forced the victim into an open-redirect that forwarded the victim onto the researcher's collaborator client with slack domain cookies. The posted cookies in the customer request on the collaborator client contained the customer's secret session cookie. </blockquote> Thus, an adversary could exploit the flaw to continue taking over random accounts, something that can lead to a huge breach. A potential attacker could also create bots to execute the attacks, thus involving automation for swift breaches. Following his report, Slack confirmed by reproducing the exploit and worked out a fix for the bug. Both the researcher and the vendors agreed to disclose the bug publicly after ensuring a patch was implemented. They have now disclosed the bug after fixing it, whilst acknowledging the researcher’s efforts with a $6500 bounty. <h2>Other Slack Vulnerabilities Also Fixed</h2> Alongside the above, Slack also disclosed another critical vulnerability which awarded the researcher an additional $3500 bounty. As revealed through the <a href="https://hackerone.com/reports/333419" target="_blank" rel="noopener noreferrer">report</a>, the TURN server allowed proxying UDP packets and TCP connections to interact with the internal Slack network. The researcher Sandro Gauci, who reported this flaw, also won another bounty of $2000 for reporting a high-severity vulnerability. As revealed through the <a href="https://hackerone.com/reports/531032" target="_blank" rel="noopener noreferrer">bug report</a>, this flaw allowed a man-in-the-middle hijack and handle SRTP stream in place of Slack. While the researcher discovered and reported this vulnerability around a year ago, Slack disclosed the bug only recently after ensuring a thorough fix. Let us know your thoughts in the comments. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/17/slack-patch-critical-vulnerability-allowing-automated-account-takeovers/ </em><hr/></center>
json metadata{"community":"steempress","app":"steempress","image":[""],"tags":["accounttakeover","accountshijacking","bug","bugbounty","bugbountyhunting"],"canonical_url":"https://latesthackingnews.com/2020/03/17/slack-patch-critical-vulnerability-allowing-automated-account-takeovers/"}
Transaction InfoBlock #41731984/Trx 7a91e1a70d679606b402884fe7b0affbf2ab3000
View Raw JSON Data
{
  "trx_id": "7a91e1a70d679606b402884fe7b0affbf2ab3000",
  "block": 41731984,
  "trx_in_block": 23,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T13:35:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "accounttakeover",
      "author": "twr",
      "permlink": "slackpatchcriticalvulnerabilityallowingautomatedaccounttakeovers-r01gt781ix",
      "title": "Slack Patch Critical Vulnerability Allowing Automated Account Takeovers",
      "body": "<center>https://latesthackingnews.com/wp-content/uploads/2020/03/Slack.jpg</center> <br/>A critical security vulnerability existed in Slack that could have lead to a massive data breach affecting its customers. Slack also fixed another vulnerability together with this one.\r\n<h2>Slack Vulnerability Allowing Account Takeovers</h2>\r\nReportedly, bug hunter Evan Custodio discovered a critical vulnerability affecting Slack. As per his findings, the vulnerability could allow automated account takeovers, ultimately leading to a data breach.\r\n\r\nWhile disclosing the flaw to Slack via its <a href=\"https://latesthackingnews.com/tag/hackerone/\" target=\"_blank\" rel=\"noopener noreferrer\">HackerOne</a> bug bounty program, the researcher shared a <a href=\"https://hackerone.com/reports/737140\" target=\"_blank\" rel=\"noopener noreferrer\">detailed report</a> about the exploit. As revealed, he found an HTTP Request Smuggling bug that could allow automated hacking of arbitrary customer accounts.\r\n<blockquote>This researcher exploited an HTTP Request Smuggling bug on a Slack asset to perform a CL.TE-based hijack onto neighboring customer requests. This hijack forced the victim into an open-redirect that forwarded the victim onto the researcher's collaborator client with slack domain cookies. The posted cookies in the customer request on the collaborator client contained the customer's secret session cookie.\n</blockquote>\r\nThus, an adversary could exploit the flaw to continue taking over random accounts, something that can lead to a huge breach. A potential attacker could also create bots to execute the attacks, thus involving automation for swift breaches.\r\n\r\nFollowing his report, Slack confirmed by reproducing the exploit and worked out a fix for the bug. Both the researcher and the vendors agreed to disclose the bug publicly after ensuring a patch was implemented. They have now disclosed the bug after fixing it, whilst acknowledging the researcher’s efforts with a $6500 bounty.\r\n<h2>Other Slack Vulnerabilities Also Fixed</h2>\r\nAlongside the above, Slack also disclosed another critical vulnerability which awarded the researcher an additional $3500 bounty. As revealed through the <a href=\"https://hackerone.com/reports/333419\" target=\"_blank\" rel=\"noopener noreferrer\">report</a>, the TURN server allowed proxying UDP packets and TCP connections to interact with the internal Slack network.\r\n\r\nThe researcher Sandro Gauci, who reported this flaw, also won another bounty of $2000 for reporting a high-severity vulnerability. As revealed through the <a href=\"https://hackerone.com/reports/531032\" target=\"_blank\" rel=\"noopener noreferrer\">bug report</a>, this flaw allowed a man-in-the-middle hijack and handle SRTP stream in place of Slack. While the researcher discovered and reported this vulnerability around a year ago, Slack disclosed the bug only recently after ensuring a thorough fix.\r\n\r\nLet us know your thoughts in the comments. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/17/slack-patch-critical-vulnerability-allowing-automated-account-takeovers/ </em><hr/></center>",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress\",\"image\":[\"\"],\"tags\":[\"accounttakeover\",\"accountshijacking\",\"bug\",\"bugbounty\",\"bugbountyhunting\"],\"canonical_url\":\"https://latesthackingnews.com/2020/03/17/slack-patch-critical-vulnerability-allowing-automated-account-takeovers/\"}"
    }
  ]
}
2020/03/17 09:41:00
votertwr
authortwr
permlinkopenexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko
weight10000 (100.00%)
Transaction InfoBlock #41727310/Trx c2aad7c233c10be93930e5344701255bbb3a529f
View Raw JSON Data
{
  "trx_id": "c2aad7c233c10be93930e5344701255bbb3a529f",
  "block": 41727310,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T09:41:00",
  "op": [
    "vote",
    {
      "voter": "twr",
      "author": "twr",
      "permlink": "openexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko",
      "weight": 10000
    }
  ]
}
2020/03/17 09:39:09
voterbtcfreeforall001
authortwr
permlinkopenexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko
weight100 (1.00%)
Transaction InfoBlock #41727274/Trx e52d5e27da733c2dd82bb75bdc43bb7f802c868f
View Raw JSON Data
{
  "trx_id": "e52d5e27da733c2dd82bb75bdc43bb7f802c868f",
  "block": 41727274,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T09:39:09",
  "op": [
    "vote",
    {
      "voter": "btcfreeforall001",
      "author": "twr",
      "permlink": "openexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko",
      "weight": 100
    }
  ]
}
2020/03/17 09:35:18
parent authortwr
parent permlinkopenexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko
authorcheetah
permlinkcheetah-re-twropenexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://latesthackingnews.com/2020/03/17/open-exchange-rates-discloses-data-breach-exposing-customers-data/
json metadata
Transaction InfoBlock #41727197/Trx f88c43c505603d2f21f79c80a3e5a798a60f9fa7
View Raw JSON Data
{
  "trx_id": "f88c43c505603d2f21f79c80a3e5a798a60f9fa7",
  "block": 41727197,
  "trx_in_block": 18,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T09:35:18",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "openexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko",
      "author": "cheetah",
      "permlink": "cheetah-re-twropenexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://latesthackingnews.com/2020/03/17/open-exchange-rates-discloses-data-breach-exposing-customers-data/",
      "json_metadata": ""
    }
  ]
}
2020/03/17 09:35:15
votercheetah
authortwr
permlinkopenexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko
weight8 (0.08%)
Transaction InfoBlock #41727196/Trx 41e48ff8c1c4966af1d0ed8b4c6659dbd0bd4e11
View Raw JSON Data
{
  "trx_id": "41e48ff8c1c4966af1d0ed8b4c6659dbd0bd4e11",
  "block": 41727196,
  "trx_in_block": 10,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T09:35:15",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "twr",
      "permlink": "openexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko",
      "weight": 8
    }
  ]
}
2020/03/17 09:35:03
authortwr
permlinkopenexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #41727192/Trx c6fefec64cfd8d8acd958d5a68c5577768f23da5
View Raw JSON Data
{
  "trx_id": "c6fefec64cfd8d8acd958d5a68c5577768f23da5",
  "block": 41727192,
  "trx_in_block": 36,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T09:35:03",
  "op": [
    "comment_options",
    {
      "author": "twr",
      "permlink": "openexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2020/03/17 09:35:03
parent author
parent permlinkcustomerdataleaked
authortwr
permlinkopenexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko
titleOpen Exchange Rates Discloses Data Breach Exposing Customers’ Data
body<center>https://latesthackingnews.com/wp-content/uploads/2019/04/Aerogrow-data-breach.jpg</center> <br/>Extending the list of security breach victims, another incident surfaces online exposing customers’ data. This time, the affected firm is Open Exchange Rates, a commercial API provider facilitating numerous businesses. <h2>Open Exchange Rates Data Breach</h2> Reportedly, the firm Open Exchange Rates has disclosed a data breach that affected the personal information of the customers. The news about the incident became public after a breach notification sent by the firm surfaced online. https://twitter.com/SylvieLorxu/status/1238149687200358401 As elaborated in their <a href="https://pastebin.com/AzDPAN9N" target="_blank" rel="noopener noreferrer">letter</a>, the company took notice of the breach after it received numerous complaints regarding their API. <blockquote>On Monday 2 March 2020, we received reports that requests to our API were taking longer than usual to receive a response, resulting in timeouts for a number of users. Upon investigation, we determined that this was the result of a network misconfiguration. </blockquote> Further investigations of the matter made the firm realize a security breach. <blockquote>While correcting the underlying network issue, we identified that changes had been made to our AWS environment by an unauthorised user account. </blockquote> Specifically, they noticed that the unauthorized user had gained access to a compromised secure access key via their AWS infrastructure, thereby gaining access to their database. Scratching the surface revealed that the attacker first accessed their systems on February 9, 2020. The attack continued for about one month undetected. While the attack didn’t seem aimed at specifically stealing users’ data, the hacked database did contain some customer information. This includes users’ names and email addresses, hashed passwords, IP addresses, business names and addresses, country, website address, and account app IDs. <h2>Security Measures Underway</h2> Upon detecting the <a href="https://latesthackingnews.com/tag/data-breach-2/" target="_blank" rel="noopener noreferrer">breach</a>, Open Exchange Rates quickly acted to contain the attack and begin investigations. For now, they assure no misuse of the breached data, nor did they store any passwords in plain text. Nonetheless, as a precaution, they have reset the passwords of all users. They also advise generating new API keys. <blockquote>As the App IDs (API keys) connected to your account are also potentially affected, you may also wish to generate new ones to access the service via your account dashboard. We do not have any evidence of these being used to gain access to the API, however they could be used to query exchange rate information from our service using your account. </blockquote> Let us know your thoughts in the comments. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/17/open-exchange-rates-discloses-data-breach-exposing-customers-data/ </em><hr/></center>
json metadata{"community":"steempress","app":"steempress","image":[""],"tags":["customerdataleaked","databreach","dataexpose","dataexposed","dataleak"],"canonical_url":"https://latesthackingnews.com/2020/03/17/open-exchange-rates-discloses-data-breach-exposing-customers-data/"}
Transaction InfoBlock #41727192/Trx c6fefec64cfd8d8acd958d5a68c5577768f23da5
View Raw JSON Data
{
  "trx_id": "c6fefec64cfd8d8acd958d5a68c5577768f23da5",
  "block": 41727192,
  "trx_in_block": 36,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T09:35:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "customerdataleaked",
      "author": "twr",
      "permlink": "openexchangeratesdisclosesdatabreachexposingcustomersdata-3bhea79iko",
      "title": "Open Exchange Rates Discloses Data Breach Exposing Customers’ Data",
      "body": "<center>https://latesthackingnews.com/wp-content/uploads/2019/04/Aerogrow-data-breach.jpg</center> <br/>Extending the list of security breach victims, another incident surfaces online exposing customers’ data. This time, the affected firm is Open Exchange Rates, a commercial API provider facilitating numerous businesses.\r\n<h2>Open Exchange Rates Data Breach</h2>\r\nReportedly, the firm Open Exchange Rates has disclosed a data breach that affected the personal information of the customers.\r\n\r\nThe news about the incident became public after a breach notification sent by the firm surfaced online.\r\n\r\nhttps://twitter.com/SylvieLorxu/status/1238149687200358401\r\n\r\nAs elaborated in their <a href=\"https://pastebin.com/AzDPAN9N\" target=\"_blank\" rel=\"noopener noreferrer\">letter</a>, the company took notice of the breach after it received numerous complaints regarding their API.\r\n<blockquote>On Monday 2 March 2020, we received reports that requests to our API were taking longer than usual to receive a response, resulting in timeouts for a number of users.\r\nUpon investigation, we determined that this was the result of a network misconfiguration.\n</blockquote>\r\nFurther investigations of the matter made the firm realize a security breach.\r\n<blockquote>While correcting the underlying network issue, we identified that changes had been made to our AWS environment by an unauthorised user account.\n</blockquote>\r\nSpecifically, they noticed that the unauthorized user had gained access to a compromised secure access key via their AWS infrastructure, thereby gaining access to their database.\r\n\r\nScratching the surface revealed that the attacker first accessed their systems on February 9, 2020. The attack continued for about one month undetected.\r\n\r\nWhile the attack didn’t seem aimed at specifically stealing users’ data, the hacked database did contain some customer information. This includes users’ names and email addresses, hashed passwords, IP addresses, business names and addresses, country, website address, and account app IDs.\r\n<h2>Security Measures Underway</h2>\r\nUpon detecting the <a href=\"https://latesthackingnews.com/tag/data-breach-2/\" target=\"_blank\" rel=\"noopener noreferrer\">breach</a>, Open Exchange Rates quickly acted to contain the attack and begin investigations. For now, they assure no misuse of the breached data, nor did they store any passwords in plain text.\r\n\r\nNonetheless, as a precaution, they have reset the passwords of all users. They also advise generating new API keys.\r\n<blockquote>As the App IDs (API keys) connected to your account are also potentially affected, you may also wish to generate new ones to access the service via your account dashboard. We do not have any evidence of these being used to gain access to the API, however they could be used to query exchange rate information from our service using your account.\n</blockquote>\r\nLet us know your thoughts in the comments. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/17/open-exchange-rates-discloses-data-breach-exposing-customers-data/ </em><hr/></center>",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress\",\"image\":[\"\"],\"tags\":[\"customerdataleaked\",\"databreach\",\"dataexpose\",\"dataexposed\",\"dataleak\"],\"canonical_url\":\"https://latesthackingnews.com/2020/03/17/open-exchange-rates-discloses-data-breach-exposing-customers-data/\"}"
    }
  ]
}
2020/03/17 07:03:21
voterelizibar
authortwr
permlinkvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
weight10000 (100.00%)
Transaction InfoBlock #41724161/Trx e51a881a4bd128f47b5a9caa4ff38d88f9f200e9
View Raw JSON Data
{
  "trx_id": "e51a881a4bd128f47b5a9caa4ff38d88f9f200e9",
  "block": 41724161,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T07:03:21",
  "op": [
    "vote",
    {
      "voter": "elizibar",
      "author": "twr",
      "permlink": "vmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "weight": 10000
    }
  ]
}
2020/03/17 06:41:00
votertwr
authortwr
permlinkvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
weight10000 (100.00%)
Transaction InfoBlock #41723716/Trx 2b0b2cd4cef47fc4a902991df884bc29da538c69
View Raw JSON Data
{
  "trx_id": "2b0b2cd4cef47fc4a902991df884bc29da538c69",
  "block": 41723716,
  "trx_in_block": 23,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T06:41:00",
  "op": [
    "vote",
    {
      "voter": "twr",
      "author": "twr",
      "permlink": "vmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "weight": 10000
    }
  ]
}
2020/03/17 06:40:48
voterphasewalker
authortwr
permlinkvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
weight100 (1.00%)
Transaction InfoBlock #41723712/Trx de642a839afeb205068135a0719e121993a0dcbd
View Raw JSON Data
{
  "trx_id": "de642a839afeb205068135a0719e121993a0dcbd",
  "block": 41723712,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T06:40:48",
  "op": [
    "vote",
    {
      "voter": "phasewalker",
      "author": "twr",
      "permlink": "vmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "weight": 100
    }
  ]
}
2020/03/17 06:39:09
voterbtcfreeforall001
authortwr
permlinkvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
weight100 (1.00%)
Transaction InfoBlock #41723679/Trx 71b1aff3fe2161526594bdfda1abbbebd5cf0301
View Raw JSON Data
{
  "trx_id": "71b1aff3fe2161526594bdfda1abbbebd5cf0301",
  "block": 41723679,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T06:39:09",
  "op": [
    "vote",
    {
      "voter": "btcfreeforall001",
      "author": "twr",
      "permlink": "vmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "weight": 100
    }
  ]
}
2020/03/17 06:35:24
parent authortwr
parent permlinkvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
authorcheetah
permlinkcheetah-re-twrvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://latesthackingnews.com/2020/03/17/vmware-patched-critical-guest-to-host-vulnerability-affecting-vmware-workstation-pro/
json metadata
Transaction InfoBlock #41723604/Trx 8c546cbdcfdfca38c053c58608d11bb781a9c47f
View Raw JSON Data
{
  "trx_id": "8c546cbdcfdfca38c053c58608d11bb781a9c47f",
  "block": 41723604,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T06:35:24",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "vmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "author": "cheetah",
      "permlink": "cheetah-re-twrvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://latesthackingnews.com/2020/03/17/vmware-patched-critical-guest-to-host-vulnerability-affecting-vmware-workstation-pro/",
      "json_metadata": ""
    }
  ]
}
2020/03/17 06:35:21
votercheetah
authortwr
permlinkvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
weight8 (0.08%)
Transaction InfoBlock #41723603/Trx b46266f8300484394129dc2263b6213ab309df19
View Raw JSON Data
{
  "trx_id": "b46266f8300484394129dc2263b6213ab309df19",
  "block": 41723603,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T06:35:21",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "twr",
      "permlink": "vmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "weight": 8
    }
  ]
}
2020/03/17 06:35:03
authortwr
permlinkvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #41723597/Trx d9b622c36e82309357ccc48afad621b286166d05
View Raw JSON Data
{
  "trx_id": "d9b622c36e82309357ccc48afad621b286166d05",
  "block": 41723597,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T06:35:03",
  "op": [
    "comment_options",
    {
      "author": "twr",
      "permlink": "vmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2020/03/17 06:35:03
parent author
parent permlinkarbitrarycodeexecution
authortwr
permlinkvmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo
titleVMware Patched Critical Guest-to-Host Vulnerability Affecting VMware Workstation Pro
body<center>https://latesthackingnews.com/wp-content/uploads/2018/11/VMware-Patched-Critical-Vulnerability-In-Workstation-and-Fusion.jpeg</center> <br/>VMware has recently patched numerous bugs across multiple products. The most notable of all is a critical guest-to-host vulnerability affecting the VMware Workstation Pro. <h2>WMware Patched Critical Vulnerability</h2> Reportedly, a critical security vulnerability existed in the VMware Workstation Pro that targeted guest-to-host interaction. Specifically, the flaw allowed guest apps to execute commands on the host. Sharing the details in an <a href="https://www.vmware.com/security/advisories/VMSA-2020-0004.html" target="_blank" rel="noopener noreferrer">advisory</a>, VMware elaborated that a critical use-after-free vulnerability (CVE-2020-3947) existed in Workstation and Fusion products. <blockquote>VMware Workstation and Fusion contain a use-after vulnerability in vmnetdhcp… Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine. </blockquote> The vendors labeled it a critical severity bug with a CVSS score of 9.3. The bug first caught the attention of a Trend Micro ZDI researcher who then reported the matter to VMware. They have since fixed the flaw with the release of VMware Workstation v.15.5.2 and VMware Fusion v.11.5.2. <h2>Other VMware Fixes</h2> Alongside the above, the vendors also <a href="https://latesthackingnews.com/tag/vmware-patch/" target="_blank" rel="noopener noreferrer">fixed</a> two other vulnerabilities in their products. The first of these is an important severity local Privilege escalation vulnerability in Cortado Thinprint (CVE-2020-3948). Affecting the VMware Workstation and Fusion, the vulnerability allowed local attackers to elevate privileges on a Linux guest VM by exploiting the flaw. The vendors have fixed this bug since it had a CVSS score of 7.8 with the release of Workstation v.15.5.2 and Fusion v.11.5.2. The other is also an important severity privilege escalation flaw (CVE-2019-5543) with a CVSS score of 7.3. The bug existed in VMware Horizon Client for Windows, VMRC for Windows and Workstation for Windows allowing exploitation by local attackers. The vendors fixed the flaw with the release of Horizon Client for Windows v.5.3.0, VMRC for Windows v.11.0.0, and Workstation for Windows v.15.5.2. Users must ensure they upgrade to the latest patched versions to stay safe from potential exploitation. Let us know your thoughts in the comments. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/17/vmware-patched-critical-guest-to-host-vulnerability-affecting-vmware-workstation-pro/ </em><hr/></center>
json metadata{"community":"steempress","app":"steempress","image":[""],"tags":["arbitrarycodeexecution","bug","codeexecution","flaw","fusion"],"canonical_url":"https://latesthackingnews.com/2020/03/17/vmware-patched-critical-guest-to-host-vulnerability-affecting-vmware-workstation-pro/"}
Transaction InfoBlock #41723597/Trx d9b622c36e82309357ccc48afad621b286166d05
View Raw JSON Data
{
  "trx_id": "d9b622c36e82309357ccc48afad621b286166d05",
  "block": 41723597,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T06:35:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "arbitrarycodeexecution",
      "author": "twr",
      "permlink": "vmwarepatchedcriticalguest-to-hostvulnerabilityaffectingvmwareworkstationpro-nqeh6jraqo",
      "title": "VMware Patched Critical Guest-to-Host Vulnerability Affecting VMware Workstation Pro",
      "body": "<center>https://latesthackingnews.com/wp-content/uploads/2018/11/VMware-Patched-Critical-Vulnerability-In-Workstation-and-Fusion.jpeg</center> <br/>VMware has recently patched numerous bugs across multiple products. The most notable of all is a critical guest-to-host vulnerability affecting the VMware Workstation Pro.\r\n<h2>WMware Patched Critical Vulnerability</h2>\r\nReportedly, a critical security vulnerability existed in the VMware Workstation Pro that targeted guest-to-host interaction. Specifically, the flaw allowed guest apps to execute commands on the host.\r\n\r\nSharing the details in an <a href=\"https://www.vmware.com/security/advisories/VMSA-2020-0004.html\" target=\"_blank\" rel=\"noopener noreferrer\">advisory</a>, VMware elaborated that a critical use-after-free vulnerability (CVE-2020-3947) existed in Workstation and Fusion products.\r\n<blockquote>VMware Workstation and Fusion contain a use-after vulnerability in vmnetdhcp…\r\nSuccessful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine.\n</blockquote>\r\nThe vendors labeled it a critical severity bug with a CVSS score of 9.3.\r\n\r\nThe bug first caught the attention of a Trend Micro ZDI researcher who then reported the matter to VMware. They have since fixed the flaw with the release of VMware Workstation v.15.5.2 and VMware Fusion v.11.5.2.\r\n<h2>Other VMware Fixes</h2>\r\nAlongside the above, the vendors also <a href=\"https://latesthackingnews.com/tag/vmware-patch/\" target=\"_blank\" rel=\"noopener noreferrer\">fixed</a> two other vulnerabilities in their products.\r\n\r\nThe first of these is an important severity local Privilege escalation vulnerability in Cortado Thinprint (CVE-2020-3948). Affecting the VMware Workstation and Fusion, the vulnerability allowed local attackers to elevate privileges on a Linux guest VM by exploiting the flaw.\r\n\r\nThe vendors have fixed this bug since it had a CVSS score of 7.8 with the release of Workstation v.15.5.2 and Fusion v.11.5.2.\r\n\r\nThe other is also an important severity privilege escalation flaw (CVE-2019-5543) with a CVSS score of 7.3. The bug existed in VMware Horizon Client for Windows, VMRC for Windows and Workstation for Windows allowing exploitation by local attackers. The vendors fixed the flaw with the release of Horizon Client for Windows v.5.3.0, VMRC for Windows v.11.0.0, and Workstation for Windows v.15.5.2.\r\n\r\nUsers must ensure they upgrade to the latest patched versions to stay safe from potential exploitation.\r\n\r\nLet us know your thoughts in the comments. <br /><center><hr/><em>Posted from my blog with <a href='https://wordpress.org/plugins/steempress/'>SteemPress</a> : https://latesthackingnews.com/2020/03/17/vmware-patched-critical-guest-to-host-vulnerability-affecting-vmware-workstation-pro/ </em><hr/></center>",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress\",\"image\":[\"\"],\"tags\":[\"arbitrarycodeexecution\",\"bug\",\"codeexecution\",\"flaw\",\"fusion\"],\"canonical_url\":\"https://latesthackingnews.com/2020/03/17/vmware-patched-critical-guest-to-host-vulnerability-affecting-vmware-workstation-pro/\"}"
    }
  ]
}
2020/03/17 03:55:12
voterpayroll
authortwr
permlinkpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
weight100 (1.00%)
Transaction InfoBlock #41720403/Trx 3316bebbd2b1e9df105b9bf41240c0dfd76f501b
View Raw JSON Data
{
  "trx_id": "3316bebbd2b1e9df105b9bf41240c0dfd76f501b",
  "block": 41720403,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T03:55:12",
  "op": [
    "vote",
    {
      "voter": "payroll",
      "author": "twr",
      "permlink": "popupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "weight": 100
    }
  ]
}
2020/03/17 03:41:00
votertwr
authortwr
permlinkpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
weight10000 (100.00%)
Transaction InfoBlock #41720120/Trx a9db2463f6cb075c957b10f5e1abb64b84028dcc
View Raw JSON Data
{
  "trx_id": "a9db2463f6cb075c957b10f5e1abb64b84028dcc",
  "block": 41720120,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T03:41:00",
  "op": [
    "vote",
    {
      "voter": "twr",
      "author": "twr",
      "permlink": "popupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "weight": 10000
    }
  ]
}
2020/03/17 03:39:12
voterbtcfreeforall001
authortwr
permlinkpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
weight100 (1.00%)
Transaction InfoBlock #41720084/Trx ca3f21ccaa9970aa8bd4567b6f1290a75c130cf1
View Raw JSON Data
{
  "trx_id": "ca3f21ccaa9970aa8bd4567b6f1290a75c130cf1",
  "block": 41720084,
  "trx_in_block": 26,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T03:39:12",
  "op": [
    "vote",
    {
      "voter": "btcfreeforall001",
      "author": "twr",
      "permlink": "popupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "weight": 100
    }
  ]
}
2020/03/17 03:35:18
parent authortwr
parent permlinkpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
authorcheetah
permlinkcheetah-re-twrpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://latesthackingnews.com/2020/03/16/popup-builder-wordpress-plugin-vulnerability-risked-over-100k-websites/
json metadata
Transaction InfoBlock #41720006/Trx 249976a7408c25d726712b04d9c8efa17ba8c2bf
View Raw JSON Data
{
  "trx_id": "249976a7408c25d726712b04d9c8efa17ba8c2bf",
  "block": 41720006,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T03:35:18",
  "op": [
    "comment",
    {
      "parent_author": "twr",
      "parent_permlink": "popupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "author": "cheetah",
      "permlink": "cheetah-re-twrpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://latesthackingnews.com/2020/03/16/popup-builder-wordpress-plugin-vulnerability-risked-over-100k-websites/",
      "json_metadata": ""
    }
  ]
}
2020/03/17 03:35:15
votercheetah
authortwr
permlinkpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
weight8 (0.08%)
Transaction InfoBlock #41720005/Trx 2f2d2e323b6258f0eec2b2616dfd8a49d78bb855
View Raw JSON Data
{
  "trx_id": "2f2d2e323b6258f0eec2b2616dfd8a49d78bb855",
  "block": 41720005,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T03:35:15",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "twr",
      "permlink": "popupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "weight": 8
    }
  ]
}
2020/03/17 03:35:03
authortwr
permlinkpopupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #41720001/Trx 8437e441938f355ffdaea54f544f465d770ef8fa
View Raw JSON Data
{
  "trx_id": "8437e441938f355ffdaea54f544f465d770ef8fa",
  "block": 41720001,
  "trx_in_block": 18,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-17T03:35:03",
  "op": [
    "comment_options",
    {
      "author": "twr",
      "permlink": "popupbuilderwordpresspluginvulnerabilityriskedover100kwebsites-w9dpqo7wfu",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}

Account Metadata

POSTING JSON METADATA
None
JSON METADATA
None
{
  "posting_json_metadata": {},
  "json_metadata": {}
}

Auth Keys

Owner
Single Signature
Public Keys
STM5mZdVikYSMj8K5qXaEpyKBXUPALYBr8ByPe84QQgLJB2qFiEZm1/1
Active
Single Signature
Public Keys
STM75rXwAFKCDTaTdfaW5GvxPAvEQJYjtiWj4apLvkvpy3gWqE8ee1/1
Posting
Single Signature
Public Keys
STM7qWEgKwU8FTtmH6pWmw3iHJgxSixpjRSTfhA2xJ7ztL8icWTMd1/1
Memo
STM5wznJC9Yn8HJg53a233pNK9rWeGvc5HQbGUdNf9ppkpDSmpw7d
{
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM5mZdVikYSMj8K5qXaEpyKBXUPALYBr8ByPe84QQgLJB2qFiEZm",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM75rXwAFKCDTaTdfaW5GvxPAvEQJYjtiWj4apLvkvpy3gWqE8ee",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7qWEgKwU8FTtmH6pWmw3iHJgxSixpjRSTfhA2xJ7ztL8icWTMd",
        1
      ]
    ]
  },
  "memo": "STM5wznJC9Yn8HJg53a233pNK9rWeGvc5HQbGUdNf9ppkpDSmpw7d"
}

Witness Votes

0 / 30
No active witness votes.
[]