DuoLingo is a massive language learning service that provides lessons to more than 74 million users around the world. The service offers short language lessons via a set of apps and is designed to help users learn new languages. Duolingo doesn't store a huge amount of information about its users, but it does have enough data on its users for it to be problematic if the information is lost.
Data breaches are quickly becoming one of the most damaging crimes committed today and one of the most common. Hackers are stealing valuable information from organizations at a rapidly growing rate, which means your data isn't safe for anyone. Major companies like Tesla, M&T Bank, and Duolingo were all hit by breaches this week, as well as Missouri Medicaid, the University of Missouri, and UMass Chan Medical School.
Cross-Site Scripting (XSS) is a web security vulnerability that happens when cybercriminals inject client-side scripts into web pages accessible by other users. These scripts compromise the web page and allow cybercriminals to inject malicious scripts into a user’s browser, leading to the exposure of data, session hijacking or manipulation of the web page’s content and functionality.
The concept of ratings has been the accepted standard for making investment decisions. The first commercial credit reporting agency, the Mercantile Agency, was founded in 1841. While this relied on largely subjective methods of evaluation, it wasn’t until the 1960s, when credit reporting became computerized, that the industry consolidated and took off. Since then, credit and financial ratings models have progressed to become objective and trustworthy data points that inform lending decisions.
It’s been reported that 2.6 million user records sourced from the Duolingo app are for sale. The attacker apparently obtained them from an open API provided by the company. There’s a more technical explanation available here. While we talk a lot about the vulnerabilities in the OWASP API Top-10 and the exploits associated with those vulnerabilities, this incident provides a good reminder that not all vulnerabilities are flaws in code. In fact, this API was working as designed.