DJing

AlphaTheta enters wireless DJ speaker world with WAVE-EIGHT speaker, SonicLink ultra-low-latency tech – DJ TechTools

AlphaTheta – Pioneer DJ’s owners and now a brand onto themselves – are taking on low-latency wireless audio. Today they’re introducing the WAVE-EIGHT, a portable wireless DJ speaker that aims to make setting up a party without running cables that much easier. [embedded content] The easiest way to explain the WAVE-EIGHT to DJs who already […]

DJing

OMNIS-DUO is a portable battery-powered all-in-one DJ setup from AlphaTheta – DJ TechTools

Meet the brand new OMNIS-DUO from AlphaTheta. The battery-powered all-in-one standalone market – previously occupied only by the Denon DJ’s Prime Go and Numark’s Mixstream Pro – gains a new member today. The well-leaked device will be the first DJ product to bear the AlphaTheta logo and word mark on it. Yesterday, diligent internet sleuths […]

Cybersecurity

CISA adds Atlassian Confluence Data Center bug to its Known Exploited Vulnerabilities catalog – Security Affairs

CISA adds Atlassian Confluence Data Center bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 25, 2024 U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Atlassian Confluence Data Center and Server Template Injection bug to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Atlassian Confluence Data Center and Server Template […]

Cybersecurity

Global Retailer BuyGoods.com Leaks 198GB of Internal and User PII, KYC data

The staggering 198.3 gigabytes of misconfigured database contained more than 260,000 records including customer selfies with unredacted credit cards. Cybersecurity researcher Jeremiah Fowler recently uncovered a misconfigured cloud database that had left a wealth of sensitive data exposed. The affected database contained records attributed to customers of BuyGoods.com, alternatively recognized in the industry as Softwareproject. […]

Cybersecurity

How the Sys:All Loophole Allowed Us To Penetrate GKE Clusters in Production

Following our discovery of a critical loophole in Google Kubernetes Engine (GKE) dubbed Sys:All, we decided to conduct research into the real-world impacts of this issue. Our initial probe already revealed over a thousand vulnerable GKE clusters due to admins configuring RBAC bindings making the system:authenticated group overprivileged, which could potentially allow any Google account […]