
SSL handshake failed Error code 525
What happened?
Cloudflare is unable to establish an SSL connection to the origin server.
What can I do?
If you're a visitor of this website:
Please try again in a few minutes.
If you're the owner of this website:
It appears that the SSL configuration used is not compatible with Cloudflare. This could happen for a several reasons, including no shared cipher suites.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Ya Libnan
7 hours ago
- Ya Libnan
16 billion passwords exposed in record-breaking data breach
Several collections of login credentials reveal one of the largest data breaches in history, totaling a humongous 16 billion exposed login credentials. The data most likely originates from various infostealers. This story, based on unique Cybernews findings and originally published on the website on June 18, is constantly being updated with clarifications and additional information in response to public discourse. The most recent version of the article features comments from Cybernews researcher Aras Nazarovas and Bob Diachenko who unveiled this recent data leak. We've also added a few screenshots as proof of the leak. Key takeaways: Unnecessarily compiling sensitive information can be as damaging as actively trying to steal it. For example, the Cybernews research team discovered a plethora of supermassive datasets, housing billions upon billions of login credentials. From social media and corporate platforms to VPNs and developer portals, no stone was left unturned. Our team has been closely monitoring the web since the beginning of the year. So far, they've discovered 30 exposed datasets containing from tens of millions to over 3.5 billion records each. In total, the researchers uncovered an unimaginable 16 billion records. None of the exposed datasets were reported previously, bar one: in late May, Wired magazine reported a security researcher discovering a 'mysterious database' with 184 million records. It barely scratches the top 20 of what the team discovered. Most worryingly, researchers claim new massive datasets emerge every few weeks, signaling how prevalent infostealer malware truly is. 'This is not just a leak – it's a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What's especially concerning is the structure and recency of these datasets – these aren't just old breaches being recycled. This is fresh, weaponizable intelligence at scale,' researchers said. The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data. Most of the datasets were temporarily accessible through unsecured Elasticsearch or object storage instances. Researchers claim that most of the data in the leaked datasets is a mix of details from stealer malware, credential stuffing sets, and repackaged leaks. There was no way to effectively compare the data between different datasets, but it's safe to say overlapping records are definitely present. In other words, it's impossible to tell how many people or accounts were actually exposed. However, the information that the team managed to gather revealed that most of the information followed a clear structure: URL, followed by login details and a password. Most modern infostealers – malicious software stealing sensitive information – collect data in exactly this way. Information in the leaked datasets opens the doors to pretty much any online service imaginable, from Apple, Facebook, and Google, to GitHub, Telegram, and various government services. It's hard to miss something when 16 billion records are on the table. According to the researchers, credential leaks at this scale are fuel for phishing campaigns, account takeovers, ransomware intrusions, and business email compromise (BEC) attacks. 'The inclusion of both old and recent infostealer logs – often with tokens, cookies, and metadata – makes this data particularly dangerous for organizations lacking multi-factor authentication or credential hygiene practices,' the team said. The datasets that the team uncovered differ widely. For example, the smallest, named after malicious software, had over 16 million records. Meanwhile, the largest one, most likely related to the Portuguese-speaking population, had over 3.5 billion records. On average, one dataset with exposed credentials had 550 million records. Some of the datasets were named generically, such as 'logins,' 'credentials,' and similar terms, preventing the team from getting a better understanding of what's inside. Others, however, hinted at the services they're related to. For example, one dataset with over 455 million records was named to indicate its origins in the Russian Federation. Another dataset, with over 60 million records, was named after Telegram, a cloud-based instant messaging platform. 'The inclusion of both old and recent infostealer logs – often with tokens, cookies, and metadata – makes this data particularly dangerous for organizations lacking multi-factor authentication or credential hygiene practices,' the team said. While naming is not the best way to deduce where the data comes from, it seems some of the information relates to cloud services, business-oriented data, and even locked files. Some dataset names likely point to a form of malware that was used to collect the data. It is unclear who owns the leaked data. While it could be security researchers that compile data to check and monitor data leaks, it's virtually guaranteed that some of the leaked datasets were owned by cybercriminals. Cybercriminals love massive datasets as aggregated collections allow them to scale up various types of attacks, such as identity theft, phishing schemes, and unauthorized access. A success rate of less than a percent can open doors to millions of individuals, who can be tricked into revealing more sensitive details, such as financial accounts. Worryingly, since it's unclear who owns the exposed datasets, there's little impact users can do to protect themselves. However, basic cyber hygiene is essential. Using a password manager to generate strong, unique passwords, and updating them regularly, can be the difference between a safe account and stolen details. Users should also review their systems for infostealers, to avoid losing their data to attackers. With a dataset containing 16 billion passwords, that's equivalent to two leaked accounts for every person on the planet. We don't really know how many duplicate records there are, as the leak comes from multiple datasets. However, some reporting by other media outlets can be quite misleading. Some claim that Facebook, Google, and Apple credentials were leaked. While we can't completely dismiss such claims, we feel this is somewhat inaccurate. Bob Diachenko, a Cybernews contributor, cybersecurity researcher, and owner of is behind this recent major discovery. CYBERNEWS


Nahar Net
13 hours ago
- Nahar Net
How billionaire Mark Walter made his fortune
by Naharnet Newsdesk 20 June 2025, 15:10 The billionaire slated to take over the controlling interest in the Los Angeles Lakers has built a career leading businesses investing in everything from sports franchises to artificial intelligence. Mark Walter is CEO of the global investment and advisory company Guggenheim Partners, which is estimated to have more than $325 billion in assets. He's also co-founder and CEO of holding company TWG Global. Forbes estimates Walter's net worth is $6.1 billion. The publication ranked him at No. 216 on its Forbes 400 list last year. Walter received an undergraduate degree in business administration from Creighton University and a law degree from Northwestern University, but ultimately chose business over a career in law. In the mid-1990s, he co-founded Liberty Hampshire, an investment management firm in Chicago. That business became part of Guggenheim Partners, which Walter co-founded in the late 1990s. In addition to Guggenheim, Walter co-founded TWG Global with film producer Thomas Tull. The company holds a portfolio of finance and insurance sector companies, including Guggenheim Investments, Guggenheim Securities, Group 1001 Insurance and Delaware Life. It also includes aerospace and defense technology company Shield AI. Last month, TWG Global announced a partnership with Palantir Technologies and Elon Musk's AI company, xAI, maker of Grok, aimed at developing artificial intelligence for use in the financial services industry. TWG Global also includes investments in sports, media and entertainment franchises, such as the controlling interest in the Los Angeles Dodgers, Premier League club Chelsea, the Professional Women's Hockey League and — through TWG Motorsports — ownership of several auto racing teams including Cadillac Formula 1. Beyond business, Walter and his wife, Kimbra, have founded or contributed to various philanthropic organizations, including the Los Angeles Dodgers Foundation, the Academy Group, Chicago Beyond and OneGoal.


LBCI
2 days ago
- LBCI
Iran in 'near-total internet blackout': UK-based watchdog
Iran was on Wednesday in a "near-total national internet blackout" as tensions deepened between Tehran and Israel, a London-based online watchdog said. "Live network data show Iran is now in the midst of a near-total national internet blackout; the incident follows a series of earlier partial disruptions and comes amid escalating military tensions with Israel after days of back-and-forth missile strikes," NetBlocks wrote on X. AFP