Russia Is Going All Out on Election Day Interference
As the 2024 US presidential election comes to a close, and with Donald Trump on the ballot once again, Russian actors are spreading disinformation with unprecedented and alarming intensity—and US officials say that the Kremlin’s efforts to undermine confidence in the election and foment unrest are likely to continue into January. Russian disinformation operations have […]
Read MoreMan Arrested for Snowflake Hacking Spree Faces US Extradition
For much of this summer, a mysterious group of hackers carried out a landmark spree of major data breaches, all targeting customers of the cloud data storage company Snowflake. Now one alleged hacker—whom experts believe to be the ringleader of that group—has been arrested in Canada, and he may be on his way to a […]
Read MoreFlaw in Right-Wing ‘Election Integrity’ App Exposes Voter-Suppression Plan and User Data
An app developed by the right-wing nonprofit True the Vote to crowdsource claims of voter fraud contained a security flaw that exposed the email addresses of all users who posted or commented on the platform, along with other information. The vulnerability, which has since been patched, exposed a California election officer who used the app […]
Read MoreInside the Massive Crime Industry That’s Hacking Billion-Dollar Companies
On October 20, a hacker who calls themselves Dark X said they logged in to a server and stole the personal data of 350 million Hot Topic customers. The following day, Dark X listed the data, including alleged emails, addresses, phone numbers, and partial credit card numbers, for sale on an underground forum. The day […]
Read MoreFlorida Man Accused of Hacking Disney World Menus, Changing Font to Wingdings
With just days to go until the 2024 presidential election in the United States, WIRED reported on documents that revealed US government assessments about multiple components of election security and stability. First obtained by the national security transparency nonprofit Property of the People, one report distributed by the US Department of Homeland Security in October […]
Read MoreZero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack
A popular device and application used by millions of individuals and businesses around the world to store documents is vulnerable to a zero-click flaw, a group of Dutch researchers have discovered. The vulnerability, which is called zero-click because it doesn’t require a user to click on anything to be infected, affects a photo application installed […]
Read MoreInside Sophos’ 5-Year War With the Chinese Hackers Hijacking Its Devices
For years, it’s been an inconvenient truth within the cybersecurity industry that the network security devices sold to protect customers from spies and cybercriminals are, themselves, often the machines those intruders hack to gain access to their targets. Again and again, vulnerabilities in “perimeter” devices like firewalls and VPN appliances have become footholds for sophisticated […]
Read MoreThe Untold Story of Trump’s Failed Attempt to Overthrow Venezuela’s President
On September 26, 2018, Venezuelan president Nicolás Maduro approached the lectern at the United Nations General Assembly in New York City. Hulking and mustachioed, wearing a black suit and a bright red tie, Maduro was in a bilious mood. At home, Maduro’s political position was deteriorating. The former bus driver turned autocrat had ruled Venezuela […]
Read More‘We’re a Fortress Now’: The Militarization of US Elections Is Here
Drones, snipers, razor wire, sniffer dogs, body armor, bulletproof glass, and 24-hour armed security. This is not a list of protections in place for a visit by the president of the United States nor the contents of a shipment to frontline troops fighting in Ukraine. This is a list of the security measures election officials […]
Read MoreApple Confirms Zero-Day Attacks Hitting macOS Systems
Apple has rushed out major macOS and iOS security updates to cover a pair of vulnerabilities already being exploited in the wild. The vulnerabilities, credited to Google’s TAG (Threat Analysis Group), are being actively exploited on Intel-based macOS systems, Apple confirmed in an advisory released on Tuesday. As is customary, Apple’s security response team did […]
Read More