Ted Miracco
tedmiracco.bsky.social
Ted Miracco
@tedmiracco.bsky.social
52 followers 33 following 40 posts
Innovator, Cybersecurity Expert, and NY Giants Fan. Protecting APIs by day, lamenting the Giants by night – Ted Miracco, a cybersecurity expert with a passion for resilience on and off the field.
Posts Media Videos Starter Packs
"APIs are the leading target for cybercriminals as they present the largest attack surface, and traditional tools struggle to distinguish legitimate from malicious activity at the API level.”

informationsecuritybuzz.com/transunion-c...
TransUnion Confirms Cyber Attack Exposing Data Of 4.4 Million People
This week, TransUnion confirmed a major cyber incident that exposed personal data of more than 4.4 million people.
informationsecuritybuzz.com
It means we may be out of the cellar 🎉
The first two games against NFC east opponents will answer the question. Many think another 0-2 start and calls to start Dart is in the works. My prediction stands at a 2-0 start, with a very tough victory against Washington led by the defense and a vengeful statement game vs Dallas. Let's see 🏈...
do you think Daniels vs Dart will become an epic match up over the next decade in the NFC East?
Cannot wait until Sept 7th! 1-0 would be a great start.
This team is very capable of winning 8+ games in 2025.

Regardless of who's at QB, the defense is the key to winning the close games in the 4th quarter.

They need a 2-0 start vs NFC east rivals.
I think we have a 🏈 football team in #NYC in 2025. #nygiants! This isn't a 5 win team, it's 8+ win potential, even with a brutal schedule.

What do you think? 🤔
"This is basic cybersecurity and something the company should be held accountable for," he said. "They rushed to market and promised consumers to create a safe site, and instead they exposed them."

www.cbsnews.com/news/tea-dat...
Tea dating app breach bigger than previously thought, company says
Hackers accessed direct messages and selfies belonging to users of the women-only dating intel app, Tea says.
www.cbsnews.com
Reposted by Ted Miracco
We need to make it illegal for AI models to offer advertising. And, we need to really examine referral fees as well.

The last thing we need is to have algorithms designed to maximize revenue driving LLM output and interactions.

We need to have learned our lessons from algos in social media
Just what the #nyyankees needed... A .217 hitter that's second in #mlb in strike outs???
We will know everything we need to know by week 3. They will either be 2-0 or 0-2.... I'm betting on 2-0.
Just wait until the season starts! NFC east will get a wake up call in weeks 1 and 2
@profgalloway.com gets the WIN for both highlighting UVA, and the real dangers of ICE in the same episode… where @karaswisher.bsky.social gets a fail for Old Guard 2…. Just not your best finish to another great episode of @pivotpod.bsky.social
12665 Village Lane · Playa Vista, CA
Location has changed to: 12665 Village Lane · Playa Vista, CA
Reposted by Ted Miracco
I’m excited to launch our campaign for California State Senate in #SD24!

Join us today at ellen4senate.com.
"The universe is not required to be in perfect harmony with human ambition." Carl Sagan
#lafires #carlsagan
Reposted by Ted Miracco
📣 New Podcast! "North Korea's Crypto Heists | Mobile App and API Threats" on @Spreaker #apikeys #apisecurity #approov #cryptoheist #cryptosecurity #cybersecurity #hardwarewallet #lazarusgroup #mobilesecurity #northkoreahackers #phishing #upwardlymobile
North Korea's Crypto Heists | Mobile App and API Threats
North Korean Crypto Heists: Mobile and API Threats In this episode of Upwardly Mobile, we delve into the alarming tactics employed by North Korean state-sponsored hackers to siphon billions from the cryptocurrency world. Moving beyond targeting just large exchanges, these sophisticated actors, most notably the infamous Lazarus Group, are increasingly focusing on vulnerabilities in mobile devices and Application Programming Interfaces (APIs), the digital connectors powering our apps. We discuss how your phone, the device you carry everywhere, has become a prime target. Hackers are using sophisticated social engineering and phishing campaigns delivered via messaging apps and social media to trick users into compromising their devices. They develop or infect malicious cryptocurrency apps and fake wallets to steal private keys and transaction data. Furthermore, exploiting vulnerabilities in mobile operating systems and apps, or deploying Remote Access Trojans (RATs) through various mobile vectors, allows them persistent access to steal credentials and control crypto accounts. Reports indicate attackers have even leveraged remote collaboration tools to gain control.APIs, the unseen connectors that enable apps to communicate, are also major targets. North Korean hackers actively seek to steal API keys from developers and employees within crypto firms through phishing and malware. Campaigns like "Operation 99" specifically target developers for sensitive data, including API keys. Exploiting flaws in the design or implementation of exchange and wallet APIs allows them to bypass security or manipulate data. They also utilise supply chain attacks, compromising third-party vendors with API access to gain a foothold and exploit trusted connections. Attacks like the ByBit hack reportedly involved exploiting supplier vulnerabilities and altering wallet addresses, potentially involving API manipulations.These tactics have been linked to high-profile heists against major exchanges like KuCoin and WazirX, and DeFi protocols such as the Ronin Bridge. Stolen funds are then put through complex, multi-stage laundering processes involving mixers, DEXs, and cross-chain bridges to obscure their origin. We also cover essential defence strategies for both individuals and organisations in the crypto space. For individuals, this includes being hyper-vigilant against unsolicited messages, securing your mobile device with updates and trusted app sources, using hardware wallets for significant holdings, implementing strong, unique passwords and 2FA, and diligently verifying wallet addresses. For organisations, robust API security, regular security audits, employee training, supply chain risk management, and advanced threat detection are crucial.This battle is an ongoing arms race, but understanding these evolving threats is the first step to bolstering your defences. Sponsor: This episode is brought to you by Approov, a leader in API and mobile app security. Learn more about protecting your APIs and mobile applications from sophisticated threats by visiting approov.io. Keywords: North Korea, hackers, cryptocurrency, crypto, mobile security, API security, Lazarus Group, phishing, social engineering, malware, vulnerabilities, cybercrime, cyberattack, state-sponsored hacking, API key theft, supply chain attack, cold storage, hardware wallet, 2FA, MFA, security audit, threat detection, Ronin Bridge, KuCoin, WazirX, ByBit, Operation 99, fast flux, bulletproof hosting, OWASP API Security Top Ten, Approov.
www.spreaker.com
MSG is gonna be ELECTRIC tonight! 🗽 Game 1 of the Eastern Conference Finals - Knicks vs. Pacers. Let's defend our home court and start this series on 🔥🔥🔥. Believe in New York! #NYKnicks #NBAPlayoffs