FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWIRED

Hacks Against Ukraine's Emergency Response Services Rise During Bombings

By Lily Hay Newman
Data from Cloudflare's free digital defense service, Project Galileo, illuminates new links between online and offline attacks.

AI Is Being Used to ‘Turbocharge’ Scams

By Matt Burgess
Plus: Amazon’s Ring was ordered to delete algorithms, North Korea’s failed spy satellite, and a rogue drone “attack” isn’t what it seems.

How AI Protects (and Attacks) Your Inbox

By Reece Rogers
Criminals may use artificial intelligence to scam you. Companies, like Google, are looking for ways AI and machine learning can help prevent phishing.

Kaspersky Says New Zero-Day Malware Hit iPhones—Including Its Own

By Lily Hay Newman, Andy Greenberg
On the same day, Russia’s FSB intelligence service launched wild claims of NSA and Apple hacking thousands of Russians.

Apple's iOS 16.5 Fixes 3 Security Bugs Already Used in Attacks

By Kate O'Flaherty
Plus: Microsoft patches two zero-day flaws, Google’s Android and Chrome get some much-needed updates, and more.

Millions of Gigabyte Motherboards Were Sold With a Firmware Backdoor

By Andy Greenberg
Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.

Bcrypt, a Popular Password Hashing Algorithm, Starts Its Long Goodbye

By Lily Hay Newman
The coinventor of “bcrypt” is reflecting on the ubiquitous function’s 25 years and channeling cybersecurity’s core themes into electronic dance music.

The Security Hole at the Heart of ChatGPT and Bing

By Matt Burgess
Indirect prompt-injection attacks can leave people vulnerable to scams and data theft when they use the AI chatbots.

China Hacks US Critical Networks in Guam, Raising Cyberwar Fears

By Andy Greenberg, Lily Hay Newman
Researchers say the state-sponsored espionage operation may also lay the groundwork for disruptive cyberattacks.

There’s Finally a Way to Improve Cloud Container Registry Security

By Lily Hay Newman
“Container registries” are ubiquitous software clearinghouses, but they’ve been exposed for years. Chainguard says it now has a solution.

The Real Risks in Google’s New .Zip and .Mov Domains

By Lily Hay Newman
While the company’s new top-level domains could be used in phishing attacks, security researchers are divided on how big of a problem they really pose.

A TikTok ‘Car Theft’ Challenge Is Costing Hyundai $200 Million

By Andrew Couts
Plus: The FBI gets busted abusing a spy tool, an ex-Apple engineer is charged with corporate espionage, and collection of airborne DNA raises new privacy risks.

The Underground History of Turla, Russia's Most Ingenious Hacker Group

By Andy Greenberg
From USB worms to satellite-based hacking, Russia’s FSB hackers, known as Turla, have spent 25 years distinguishing themselves as “adversary number one.”

A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks

By Lily Hay Newman
Kaspersky researchers have uncovered clues that further illuminate the hackers’ activities, which appear to have begun far earlier than originally believed.

ChatGPT Scams Are Infiltrating Apple's App Store and Google Play

By Lily Hay Newman
An explosion of interest in OpenAI’s sophisticated chatbot means a proliferation of “fleeceware” apps that trick users with sneaky in-app subscriptions.

Toyota Leaked Vehicle Data of 2 Million Customers

By Dhruv Mehrotra, Andrew Couts
The FBI disables notorious Russia-linked malware, the EU edges toward a facial recognition ban, and security firm Dragos has an intrusion of its own.

A Republican-Led Lawsuit Threatens Critical US Cyber Protections

By Eric Geller
Three states are suing to block security rules for water facilities. If they win, it may open the floodgates for challenges to other cyber rules.

A Mysterious New Hacker Group, Red Stinger, Is Lurking in Ukraine’s Cyberspace

By Lily Hay Newman
The unidentified attackers have targeted people on both sides of Russia’s war against Ukraine, carrying out espionage operations that suggest state funding.

The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services

By Andy Greenberg
For a decade, a group called Big Pipes has worked behind the scenes with the FBI to target the worst cybercriminal “booter” services plaguing the internet.

Russian ‘Ghost Ships’ Identified Near the Nord Stream Blasts

By Matt Burgess
Plus: Apple and Google plan to stop AirTag stalking, Meta violated the FTC’s privacy order, and how to tell if your car is tracking you.

Meta Moves to Counter New Malware and Repeat Account Takeovers

By Lily Hay Newman
The company is adding new tools as bad actors use ChatGPT-themed lures and mask their infrastructure in an attempt to trick victims and elude defenders.

Doctors Behind Mifepristone Ban Called ‘Christians’ a Top Threat

By Dell Cameron, Dhruv Mehrotra
Leaked documents reveal that the American College of Pediatricians viewed “mainstream medicine” and “nominal Christians” as its opposition.

American College of Pediatricians Leak Exposes 10,000 Confidential Files

By Dell Cameron, Dhruv Mehrotra
A Google Drive left public on the American College of Pediatricians’ website exposed detailed financial records, sensitive member details, and more.

Cops Just Revealed a Record-Breaking Dark Web Dragnet

By Andy Greenberg
Operation SpecTor likely drew on leads from multiple dark web market busts, including the secret takedown of Monopoly Market in 2021.

SolarWinds: The Untold Story of the Boldest Supply-Chain Hack

By Kim Zetter
The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.

Apple, Google, and Microsoft Just Fixed Zero-Day Security Flaws

By Kate O'Flaherty
Firefox gets a needed tune-up, SolarWinds squashes two high-severity bugs, Oracle patches 433 vulnerabilities, and more updates you should make now.

DOJ Detected SolarWinds Breach Months Before Public Disclosure

By Kim Zetter
In May 2020, the US Department of Justice noticed Russian hackers in its network but did not realize the significance of what it had found for six months.

NSA Cybersecurity Director Says ‘Buckle Up’ for Generative AI

By Lily Hay Newman
The security issues raised by ChatGPT and similar tech are just beginning to emerge, but Rob Joyce says it’s time to prepare for what comes next.

A Security Team Is Turning This Malware Gang’s Tricks Against It

By Lily Hay Newman
The cybercriminals behind the Gootloader malware have found clever ways to avoid detection. But researchers are using those same mechanisms to stop them.

Google’s Authenticator App Now Lets You Sync 2FA Codes Across Devices

By Matt Burgess
You can now sync sign-in codes across devices—but they aren’t end-to-end encrypted.

Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs

By Lily Hay Newman
To protect its Confidential Computing cloud infrastructure and gain critical insights, Google leans on its relationships with chipmakers.

Hacker Group Names Are Now Absurdly Out of Control

By Andy Greenberg
Pumpkin Sandstorm. Spandex Tempest. Charming Kitten. Is this really how we want to name the hackers wreaking havoc worldwide?

Criminals Are Using Tiny Devices to Hack and Steal Cars

By Matt Burgess
Apple thwarts NSO’s spyware, the rise of a GPT-4 black market, Russia targets Starlink internet connections, and more.

The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks

By Andy Greenberg
The mass compromise of the VoIP firm's customers is the first confirmed incident where one software-supply-chain attack enabled another, researchers say.

The Hacker Who Hijacked Matt Walsh’s Twitter Was Just ‘Bored’

By Dell Cameron
The breach of the right-wing provocateur was simply a way of “stirring up some drama,” the attacker tells WIRED. But the damage could have been much worse.

Used Routers Often Come Loaded With Corporate Secrets

By Lily Hay Newman
More than half of the enterprise routers researchers bought secondhand hadn’t been wiped, exposing sensitive info like login credentials and customer data.

Apple’s Macs Have Long Escaped Ransomware. That May Be Changing

By Lily Hay Newman
The discovery of malicious encryptors for Apple computers could herald new risks for macOS users if the malware continues to evolve.

Security Roundup: Leak of Top-Secret US Intel Risks a New Wave of Mass Surveillance

By Dhruv Mehrotra, Andrew Couts
Plus: Hackers claim to have stolen 10 TB from Western Digital, a new spyware has emerged, and WhatsApp gets a fresh security feature.

The Hacking of ChatGPT Is Just Getting Started

By Matt Burgess
Security researchers are jailbreaking large language models to get around safety rules. Things could get much worse.

LinkedIn Verification Now Lets You Verify Your Job and Account

By Lily Hay Newman
To beat back fake accounts, the professional social network is rolling out new tools to prove you work where you say you do and are who you say you are.

Pinduoduo, a Top Chinese Shopping App, Is Laced With Malware

By Lily Hay Newman
Plus: 119 arrested during a sting on the Genesis dark-web market, the IRS aims to buy an online mass surveillance tool, and more.

The Dangerous Weak Link in the US Food Chain

By Eric Geller
Without an information sharing and analysis center, the country’s food and agriculture sector is uniquely vulnerable to hackers.

Massive 3CX Supply-Chain Hack Targeted Cryptocurrency Firms

By Andy Greenberg
North Korean hackers appear to have used the corrupted VoIP software to go after just a handful of crypto firms with “surgical precision.”

‘Vulkan’ Leak Offers a Peek at Russia’s Cyberwar Playbook

By Andrew Couts, Andy Greenberg
Plus: A major new supply chain attack, Biden’s spyware executive order, and a hacking campaign against Exxon’s critics.

Apple's iOS 16.4: Security Updates Are Better Than New Emoji

By Kate O'Flaherty
Plus: Microsoft Outlook and Android patch serious flaws, Chrome and Firefox get fixes, and much more.

The US Is Sending Money to Countries Devastated by Cyberattacks

By Lily Hay Newman
The White House is providing $25 million to Costa Rica, after giving Albania similar aid following aggression by hackers linked to Iran.

Microsoft's ‘Security Copilot’ Sics ChatGPT on Security Breaches

By Lily Hay Newman
The new tool aims to deliver the network insights and coordination that “AI” security systems have long promised.

North Korea Is Now Mining Crypto to Launder Its Stolen Loot

By Andy Greenberg
A spy group working for the Kim regime has been feeding stolen coins into crypto mining services in an effort to throw tracers off their trail.

India Shut Down Mobile Internet in Punjab Amid Manhunt for Amritpal Singh

By Lily Hay Newman
Plus: The “Clop” gang's ransomware spree, the DC Health Link breach comes into focus, and more.

The Scorched-Earth Tactics of Iran’s Cyber Army

By Arian Khameneh
Amid ongoing protests, the Iranian regime has lost control of its image, pushing it to employ increasingly drastic tactics where everyone loses.

This Is the New Leader of Russia's Infamous Sandworm Hacking Unit

By Andy Greenberg
Evgenii Serebriakov now runs the most aggressive hacking team of Russia’s GRU military spy agency. To Western intelligence, he’s a familiar face.

AI-Generated Voice Deepfakes Aren’t Scary Good—Yet

By Lily Hay Newman
The threat of scammers using voice deepfakes in their cons is real, but researchers say old-school voice-impersonation attacks are still the more pressing concern.

The World’s Real ‘Cybercrime’ Problem

By Andrew Couts, Dhruv Mehrotra
From US state laws to the international stage, definitions of “cybercrime” remain vague, broad, and increasingly entrenched in our legal systems.

A Spy Wants to Connect With You on LinkedIn

By Jennifer Conrad, Matt Burgess
Russia, North Korea, Iran, and China have been caught using fake profiles to gather information. But the platform’s tools to weed them out only go so far.

Ransomware Attacks Have Entered a ‘Heinous’ New Phase

By Lily Hay Newman
With victims refusing to pay, cybercriminal gangs are now releasing stolen photos of cancer patients and sensitive student records.

How a Catholic Group Doxed Gay Priests

By Lily Hay Newman, Dhruv Mehrotra
Plus: A data breach exposes Washington, Ring camera footage has a new problem, and the George Santos scandal slips into the world of cybercrime.

‘Pig Butchering’ Scams Are Now a $3 Billion Threat

By Lily Hay Newman
The FBI’s latest Internet Crime Report highlights the stunning rise of investment-themed crimes over the past 18 months.

The LastPass Hack Somehow Gets Worse

By Lily Hay Newman
Plus: The US Marshals disclose a “major” cybersecurity incident, T-Mobile has gotten pwned so much, and more.

The High-Stakes Blame Game in the White House Cybersecurity Plan

By Lily Hay Newman
The Biden administration’s new strategy would shift the liability for security failures to a controversial target: the companies that caused them.

This Hacker Tool Can Pinpoint a DJI Drone Operator's Exact Location

By Andy Greenberg
Every DJI quadcopter broadcasts its operator's position via radio—unencrypted. Now, a group of researchers has learned to decode those coordinates.
❌