If (huge if!) those screen shots are legit, then Anydesk was storing passwords in cleartext or equivalent; many of them are far too random to be bruteforced so quickly.
The last one, where both the domain name and password start with QR, makes me think the screenshots might actually be legit.
The ramifications of this breach are profound. Cybercriminals who gained
access to the AnyDesk portal could glean valuable information about
customers, including license keys, active connections, session
durations, contact information, email addresses, and the number of
managed remote access hosts, all with their online/offline status and
IDs. Such details open up a plethora of malicious possibilities.
In light of this breach, AnyDesk customers must take proactive steps
to protect their accounts and data. Password changes alone are
insufficient. AnyDesk offers a whitelist feature, enabling users to specify who can connect to their devices, adding an extra layer of security.
Multi-factor
authentication (MFA) is strongly recommended to enhance account
protection. Organizations should also monitor for any unexpected
password and MFA changes, suspicious sessions, and emails referencing
AnyDesk accounts from unknown sources.
This sounds a lot like HRM already on the market for sports and fitness activities. Garmin's actually works by calculating breaths rather than measuring them.
can't do much , didn't make English language news.
Google translate seems to have problems with some news sites.
Here's what Radio-Canada (french CBC) has to say
The Ministère de la Cybersécurité et du Numérique du Québec confirmed on Thursday that an incident of computer security due to an action by an employee was quickly corrected.
This employee has been transferred to une boîte de courriel personale des documents contenant des renseignements personnels de 529 employés de la fonction publique. Elle aurait agi de bonne foi et a collaboré avec le ministère, a indicé ce dernier en réponse aux questions de Radio-Canada.
The incident occurred on May 23 last year, when the employee was transferred to another public organization. She explained that she had transferred documents to be able to answer the questions of her replacement in order to facilitate the transition.
The ministry specified that the employee had access to this information in the framework of his duties.
Even if the intention of the employee was not to use the information for an illegal purpose, this practice contravenes the rules of safety in place intended for the personnel of MCN, the ministry emphasized in its email to Radio-Canada.
Par ailleurs, the ministère indicated that a complaint had been filed with the police so that an inquiry could be opened.
The employee was also sanctioned for not respecting the rules of the ministry, which ensured the destruction of the information transferred to the personal email box.
The Information Access Commission was also informed of the incident.