FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WIRED

Change Healthcare’s New Ransomware Nightmare Goes From Bad to Worse

By: Eric Geller — April 16th 2024 at 19:09
A cybercriminal gang called RansomHub claims to be selling highly sensitive patient information stolen from Change Healthcare following a ransomware attack by another group in February.
☐ ☆ ✇ WIRED

The US Government Has a Microsoft Problem

By: Eric Geller — April 15th 2024 at 10:30
Microsoft has stumbled through a series of major cybersecurity failures over the past few years. Experts say the US government’s reliance on its systems means the company continues to get a free pass.
☐ ☆ ✇ WIRED

Roku Breach Hits 567,000 Users

By: Andy Greenberg, Andrew Couts — April 13th 2024 at 10:30
Plus: Apple warns iPhone users about spyware attacks, CISA issues an emergency directive about a Microsoft breach, and a ransomware hacker tangles with an unimpressed HR manager named Beth.
☐ ☆ ✇ WIRED

Change Healthcare Faces Another Ransomware Threat—and It Looks Credible

By: Andy Greenberg, Matt Burgess — April 12th 2024 at 18:25
Change Healthcare ransomware hackers already received a $22 million payment. Now a second group is demanding money, and it has sent WIRED samples of what they claim is the company's stolen data.
☐ ☆ ✇ WIRED

Identity Thief Lived as a Different Man for 33 Years

By: Dell Cameron, Andrew Couts — April 6th 2024 at 09:00
Plus: Microsoft scolded for a “cascade” of security failures, AI-generated lawyers send fake legal threats, a data broker quietly lobbies against US privacy legislation, and more.
☐ ☆ ✇ WIRED

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

By: Andy Greenberg — April 4th 2024 at 09:00
As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.
☐ ☆ ✇ WIRED

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

By: Andy Greenberg, Matt Burgess — April 3rd 2024 at 13:54
The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code.
☐ ☆ ✇ WIRED

The Incognito Mode Myth Has Fully Unraveled

By: Dell Cameron, Andrew Couts — April 1st 2024 at 21:22
To settle a years-long lawsuit, Google has agreed to delete “billions of data records” collected from users of “Incognito mode,” illuminating the pitfalls of relying on Chrome to protect your privacy.
☐ ☆ ✇ WIRED

A Ghost Ship’s Doomed Journey Through the Gate of Tears

By: Matt Burgess — April 1st 2024 at 06:00
Millions lost internet service after three cables in the Red Sea were damaged. Houthi rebels deny targeting the cables, but their missile attack on a cargo ship, left adrift for months, is likely to blame.
☐ ☆ ✇ McAfee Blogs

Your Social Security Number Could be for Sale: Old AT&T Data Leak Exposes 44M SSN Numbers

By: Jasdev Dhaliwal — June 11th 2025 at 17:00

If you’re an AT&T customer, now’s the time to take action. A previously reported data breach has exposed personal information from millions of accounts—and that data is reportedly up for sale on underground hacking forums.

According to cybersecurity researchers, a database containing up to 86 million AT&T customer records is being sold on Russian cybercrime forums. This leaked info includes sensitive personal details like:

  • Full names
  • Birthdates
  • Phone numbers
  • Email addresses
  • Physical addresses
  • And nearly 44 million Social Security numbers stored in plain text

Yes, you read that right—Social Security numbers stored in plain text. That’s a goldmine for identity thieves.

What Should You Do?

AT&T released the following statement to McAfee, “After analysis by our internal teams as well as external data consultants, we are confident this is repackaged data previously released on the dark web in March 2024. Affected customers were notified at that time. We have notified law enforcement of this latest development.” Additonally, AT&T offered credit monitoring and identity theft protection to those customers whose sensitive personal information was compromised as part of the notice in 2024.

However, for extra peace of mind, McAfee recommends the following:

1. Check your credit reports – Look for any unfamiliar accounts or activity. You’re entitled to a free credit report every year from each major bureau at AnnualCreditReport.com.

2. Change your AT&T account password – Especially if you haven’t updated it recently, or if you reuse that password elsewhere.

3. Set up fraud alerts or credit freezes – It’s a smart move to stop scammers from opening new accounts in your name.

4. Monitor for identity theft – Consider using an identity monitoring service that can alert you to suspicious activity across your credit, bank, and public records.

5. Protect your digital life – Consider signing up for a McAfee+ protection plan. You’ll get automatic scam alerts, security for unlimited devices, and 24/7 identity monitoring—plus up to $2 million in identity theft coverage and recovery support from U.S.-based experts. McAfee handles the heavy lifting with dark web monitoring and scam prevention, so you can get back to living your life with confidence.

Taking steps now can help keep your identity safe in the long run.

 

 

The post Your Social Security Number Could be for Sale: Old AT&T Data Leak Exposes 44M SSN Numbers appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

Yogurt Heist Reveals a Rampant Form of Online Fraud

By: Andy Greenberg, Andrew Couts — March 30th 2024 at 13:00
Plus: “MFA bombing” attacks target Apple users, Israel deploys face recognition tech on Gazans, AI gets trained to spot tent encampments, and OSINT investigators find fugitive Amond Bundy.
☐ ☆ ✇ WIRED

Jeffrey Epstein’s Island Visitors Exposed by Data Broker

By: Dhruv Mehrotra, Dell Cameron — March 28th 2024 at 11:00
A WIRED investigation uncovered coordinates collected by a controversial data broker that reveal sensitive information about visitors to an island once owned by Epstein, the notorious sex offender.
☐ ☆ ✇ WIRED

‘Malicious Activity’ Hits the University of Cambridge’s Medical School

By: Matt Burgess — March 27th 2024 at 16:36
Multiple university departments linked to the Clinical School Computing Service have been inaccessible for a month. The university has not revealed the nature of the “malicious activity.”
☐ ☆ ✇ WIRED

Judges Block US Extradition of WikiLeaks Founder Julian Assange—for Now

By: Dell Cameron, Matt Burgess — March 26th 2024 at 10:53
A high court in London says the WikiLeaks founder won’t be extradited “immediately” and the US must provide more “assurances” about any extradition.
☐ ☆ ✇ WIRED

Chinese Hackers Charged in Decade-Long Global Spying Rampage

By: Matt Burgess — March 25th 2024 at 18:22
US and UK officials hit Chinese hacking group APT31 with sanctions and criminal charges after they targeted thousands of businesses, politicians, and critics of China.
☐ ☆ ✇ WIRED

Apple Chip Flaw Leaks Secret Encryption Keys

By: Andrew Couts — March 23rd 2024 at 10:00
Plus: The Biden administration warns of nationwide attacks on US water systems, a new Russian wiper malware emerges, and China-linked hackers wage a global attack spree.
☐ ☆ ✇ WIRED

The DOJ Puts Apple's iMessage Encryption in the Antitrust Crosshairs

By: Andy Greenberg, Andrew Couts — March 21st 2024 at 21:59
Privacy and security are an Apple selling point. But the DOJ’s new antitrust lawsuit argues that Apple selectively embraces privacy and security features in ways that hurt competition—and users.
☐ ☆ ✇ WIRED

Automakers Are Telling Your Insurance Company How You Really Drive

By: Dell Cameron, Andrew Couts — March 16th 2024 at 13:00
Plus: The operator of a dark-web cryptocurrency “mixing” service is found guilty, and a US senator reveals that popular safes contain secret backdoors.
☐ ☆ ✇ WIRED

There Are Dark Corners of the Internet. Then There's 764

By: Ali Winston — March 13th 2024 at 12:00
A global network of violent predators is hiding in plain sight, targeting children on major platforms, grooming them, and extorting them to commit horrific acts of abuse.
☐ ☆ ✇ WIRED

Binance’s Top Crypto Crime Investigator Is Being Detained in Nigeria

By: Andy Greenberg — March 12th 2024 at 04:03
Tigran Gambaryan, a former crypto-focused US federal agent, and a second Binance executive, Nadeem Anjarwalla, have been held in Abuja without passports for two weeks.
☐ ☆ ✇ WIRED

Google Is Getting Thousands of Deepfake Porn Complaints

By: Matt Burgess — March 11th 2024 at 07:00
Content creators are using copyright laws to get nonconsensual deepfakes removed from the web. With the complaints covering nearly 30,000 URLs, experts say Google should do more to help.
☐ ☆ ✇ WIRED

Russian Hackers Stole Microsoft Source Code—and the Attack Isn’t Over

By: Dhruv Mehrotra, Andrew Couts — March 9th 2024 at 14:00
Plus: An ex-Google engineer gets arrested for allegedly stealing trade secrets, hackers breach the top US cybersecurity agency, and X’s new feature exposes sensitive user data.
☐ ☆ ✇ WIRED

Meta Abandons Hacking Victims, Draining Law Enforcement Resources, Officials Say

By: Dell Cameron — March 6th 2024 at 15:38
A coalition of 41 state attorneys general says Meta is failing to assist Facebook and Instagram users whose accounts have been hacked—and they want the company to take “immediate action.”
☐ ☆ ✇ WIRED

Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment

By: Andy Greenberg — March 4th 2024 at 17:41
The transaction, visible on Bitcoin's blockchain, suggests the victim of one of the worst ransomware attacks in years may have paid a very large ransom.
☐ ☆ ✇ WIRED

The Privacy Danger Lurking in Push Notifications

By: Andy Greenberg, Andrew Couts, Matt Burgess — March 2nd 2024 at 14:00
Plus: Apple warns about sideloading apps, a court orders NSO group to turn over the code of its Pegasus spyware, and an investigation finds widely available security cams are wildly insecure.
☐ ☆ ✇ McAfee Blogs

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

By: Vishnu Varadaraj — March 1st 2024 at 13:20

Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the office. 

The hybrid working model is met with mixed reviews from employees and business security teams alike. For some employees, a clearer separation between work and home is a welcome change. CTV News reports 66% of Canadian respondents to an International Workplace Group poll say they are looking forward to splitting their working hours between the office and home. 

For business security teams who are just catching their breath after the monumental shift to a remote workforce, they are now gearing up for the new online safety challenges posed by the hybrid work model. According to a VMware Canada Threat Report, 86% of security professionals agree that cyberattacks aimed at their organizations have become more sophisticated since the onset of the pandemic. Additionally, 91% of global respondents cite employees working from home as the cause of cyberattacks. Challenges of the hybrid workforce include the constant back-and-forth of company-issued devices, the lack of control over home office setups, and mixing personal and company devices with company and personal business respectively. For example, if you pay your bills or shop online using your work device, it opens several new avenues for a hacker to walk right onto the corporate network. When your guard is down even a little bit when you are off the clock, you could fall victim to e-skimmers, fake login pages, or phishing scams. 

Best Practices for Mitigating Attacks in the Hybrid Workplace 

No matter how advanced your company’s threat detection system, hackers know where vulnerabilities lie and are on the hunt to exploit them. Check out these tips to ensure you are not the weak link in your organization. 

1. Use a VPN

virtual private network (VPN) is a service that scrambles online browsing data, making it impossible for nefarious characters to decipher your activity. This is an excellent way to deter hackers from tracking your movements and picking up sensitive pieces of information. 

VPNs are essential if you are working in a public area, sharing a wireless network with strangers, or using a Wi-Fi connection that is not password protected. Public Wi-Fi networks are notoriously easy pickings for hackers seeking entry into unsuspecting users’ devices. On the days where you are not in the office, make sure your wireless connection is secure. 

2. Lockaway your passwords 

While a VPN is an excellent tool, security measures and your accounts are vulnerable without a strong and private password or passphrase to protect them. The gigantic Colonial Pipeline hack is being blamed on a hacker gaining entry through an unused VPN that was not secured with multifactor authentication. Multifactor authentication is an online safety measure where more than one method of identity verification is needed to access the valuable information that lies within password-protected accounts. 

Consider using a password manager to organize all your passwords and logins. Password managers remember each pairing so you don’t have to, plus most managers are secured with multifactor authentication. A password manager makes it easier to add variety to your passwords and prevents you from ever having to write them down.

3. Secure work-issued devices 

Professionals who travel between their home and an office are likely transporting their devices back and forth, increasing the number of opportunities for devices to be forgotten at either location or in transit. As convenient as it may be, never use your personal device for official business. Even if you pride yourself on sound online safety habits, your company device likely has more defenses ingrained in its hardware than your personal devices. 

With your personal devices, you should carefully vet everything you download. With your work-issued devices, this vetting process is even more important as company information is at stake. The Information and Privacy Commissioner of Ontario states that employees should never download applications to their work devices without permission from the IT team. Apps and programs often have security vulnerabilities that could open a gateway for hackers. 

4. Practice a personal Zero Trust model 

Zero Trust is a security philosophy that is exactly what it sounds like: trust no one. Businesses are employing Zero Trust models to greatly limit who has access to sensitive data sources. Adopt your own personal Zero Trust philosophy concerning your passwords, logins, and device access. This means never sharing passwords or log in details, especially over email, instant messenger, or over a video conference. Hackers commonly eavesdrop on all three mediums. Also, even your most trusted coworker could mishandle your passwords and login details, such as writing them down and leaving them in a public place.  

A key aspect of the Zero Trust model is only granting employees access to platforms that are vital to their job. Sharing your logins with coworkers who may not be authorized for using that platform undermines all the hard work the IT team does to keep tabs on data access. 

Work Intelligently, Diligently, and Securely 

Every time you turn on the nightly news, another ransomware attack has hit another organization, each one bigger than the last. This heightened prevalence is a reflection on the wiliness of hackers, but also the number of security holes every company must plug.  

There are several vulnerable points of entry in every company, and some of those vulnerabilities are heightened by the hybrid work model. Always heed the advice of your company’s IT team, and make sure to do your part to keep your devices and work information secure. 

The post Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

Here Come the AI Worms

By: Matt Burgess — March 1st 2024 at 09:00
Security researchers created an AI worm in a test environment that can automatically spread between generative AI agents—potentially stealing data and sending spam emails along the way.
☐ ☆ ✇ WIRED

The Mysterious Case of the Missing Trump Trial Ransomware Leak

By: Andy Greenberg — February 29th 2024 at 18:24
The notorious LockBit gang promised a Georgia court leak "that could affect the upcoming US election.” It didn't materialize—but the story may not be over yet.
☐ ☆ ✇ WIRED

Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’

By: Vittoria Elliott — February 29th 2024 at 13:00
Several of the strikes occurred far from the front lines of the conflict, indicating possible war crimes. Researchers say the attacks likely had devastating impacts on civilians.
☐ ☆ ✇ WIRED

A Pornhub Chatbot Stopped Millions From Searching for Child Abuse Videos

By: Matt Burgess — February 29th 2024 at 08:00
Every time someone in the UK searched for child abuse material on Pornhub, a chatbot appeared and told them how to get help.
☐ ☆ ✇ WIRED

Biden Executive Order Bans Sale of US Data to China, Russia. Good Luck

By: Dell Cameron — February 28th 2024 at 19:23
The White House issued an executive order on Wednesday that aims to prevent the sale of Americans' data to “countries of concern,” including China and Russia. Its effectiveness may vary.
☐ ☆ ✇ WIRED

Dictators Used Sandvine Tech to Censor the Internet. The US Finally Did Something About It

By: Peter Guest — February 28th 2024 at 15:45
Canada-based Sandvine has long sold its web-monitoring tech to authoritarian regimes. This week, the US sanctioned the company, severely limiting its ability to do business with American firms.
☐ ☆ ✇ WIRED

Change Healthcare Ransomware Attack: BlackCat Hackers Quickly Returned After FBI Bust

By: Andy Greenberg — February 27th 2024 at 22:35
Two months ago, the FBI “disrupted” the BlackCat ransomware group. They're already back—and their latest attack is causing delays at pharmacies across the US.
☐ ☆ ✇ WIRED

How a Right-Wing Controversy Could Sabotage US Election Security

By: Eric Geller — February 26th 2024 at 13:00
Republicans who run elections are split over whether to keep working with the Cybersecurity and Infrastructure Security Agency to fight hackers, online falsehoods, and polling-place threats.
☐ ☆ ✇ WIRED

A Mysterious Leak Exposed Chinese Hacking Secrets

By: Matt Burgess — February 24th 2024 at 14:00
Plus: Scammers try to dupe Apple with 5,000 fake iPhones, Avast gets fined for selling browsing data, and researchers figure out how to clone fingerprints from your phone screen.
☐ ☆ ✇ WIRED

Here Are the Secret Locations of ShotSpotter Gunfire Sensors

By: Dhruv Mehrotra, Joey Scott — February 23rd 2024 at 01:18
The locations of microphones used to detect gunshots have been kept hidden from police and the public. A WIRED analysis of leaked coordinates confirms arguments critics have made against the technology.
☐ ☆ ✇ WIRED

Leak Reveals the Unusual Path of ‘Urgent’ Russian Threat Warning

By: Dell Cameron — February 22nd 2024 at 19:57
The US Congress was preparing to vote on a key foreign surveillance program last week. Then a wild Russian threat appeared.
☐ ☆ ✇ WIRED

Apple iOS 17.4: iMessage Gets Post-Quantum Encryption in New Update

By: Matt Burgess — February 21st 2024 at 14:00
Useful quantum computers aren’t a reality—yet. But in one of the biggest deployments of post-quantum encryption so far, Apple is bringing the technology to iMessage.
☐ ☆ ✇ WIRED

Anne Neuberger, a Top White House Cyber Official, Sees the 'Promise and Peril' in AI

By: Garrett M. Graff — February 21st 2024 at 12:00
Anne Neuberger, the Biden administration’s deputy national security adviser for cyber, tells WIRED about emerging cybersecurity threats—and what the US plans to do about them.
☐ ☆ ✇ WIRED

The Danger Lurking Just Below Ukraine's Surface

By: Justin Ling — February 19th 2024 at 07:00
The widespread use of mines has left Ukrainians scrambling to find ways to clear the explosives. New efforts to develop mine-clearing technology may help them push back Russia's invading forces.
☐ ☆ ✇ WIRED

How to Not Get Scammed Out of $50,000

By: Andrew Couts — February 17th 2024 at 14:00
Plus: State-backed hackers test out generative AI, the US takes down a major Russian military botnet, and 100 hospitals in Romania go offline amid a major ransomware attack.
☐ ☆ ✇ WIRED

Leak of Russian ‘Threat’ Part of a Bid to Kill US Surveillance Reform, Sources Say

By: Dell Cameron — February 16th 2024 at 20:30
A surprise disclosure of a national security threat by the House Intelligence chair was part of an effort to block legislation that aimed to limit cops and spies from buying Americans' private data.
☐ ☆ ✇ WIRED

Section 702 Surveillance Fight Pits the White House Opposite Reproductive Rights

By: Dell Cameron, Andrew Couts — February 14th 2024 at 16:05
Prominent advocates for the rights of pregnant people are urging members of Congress to support legislation that would ban warrantless access to sensitive data as the White House fights against it.
☐ ☆ ✇ WIRED

‘AI Girlfriends’ Are a Privacy Nightmare

By: Matt Burgess — February 14th 2024 at 09:00
Romantic chatbots collect huge amounts of data, provide vague information about how they use it, use weak password protections, and aren’t transparent, new research from Mozilla says.
☐ ☆ ✇ WIRED

A Backroom Deal Looms Over Section 702 Surveillance Fight

By: Dell Cameron — February 12th 2024 at 19:15
Top congressional lawmakers are meeting in private to discuss the future of a widely unpopular surveillance program, worrying members devoted to reforming Section 702.
☐ ☆ ✇ WIRED

Satellite Images Point to Indiscriminate Israeli Attacks on Gaza’s Health Care Facilities

By: Vittoria Elliott — February 12th 2024 at 13:34
New research finds that Israel’s attacks on Gaza damaged hospitals and other medical facilities at the same rate as other buildings, potentially in violation of international law.
☐ ☆ ✇ WIRED

How 3 Million ‘Hacked’ Toothbrushes Became a Cyber Urban Legend

By: Andy Greenberg, Dhruv Mehrotra — February 10th 2024 at 14:00
Plus: China’s Volt Typhoon hackers lurked in US systems for years, the Biden administration’s crackdown on spyware vendors ramps up, and a new pro-Beijing disinformation campaign gets exposed.
☐ ☆ ✇ WIRED

London Underground Is Testing Real-Time AI Surveillance Tools to Spot Crime

By: Matt Burgess — February 8th 2024 at 17:55
In a test at one station, Transport for London used a computer vision system to try and detect crime and weapons, people falling on the tracks, and fare dodgers, documents obtained by WIRED show.
☐ ☆ ✇ WIRED

Ransomware Payments Hit a Record $1.1 Billion in 2023

By: Andy Greenberg — February 7th 2024 at 14:00
After a slowdown in payments to ransomware gangs in 2022, last year saw total ransom payouts jump to their highest level yet, according to a new report from crypto-tracing firm Chainalysis.
☐ ☆ ✇ WIRED

WhatsApp Chats Will Soon Work With Other Encrypted Messaging Apps

By: Matt Burgess — February 6th 2024 at 16:53
New EU rules mean WhatsApp and Messenger must be interoperable with other chat apps. Here’s how that will work.
☐ ☆ ✇ WIRED

China’s Hackers Keep Targeting US Water and Electricity Supplies

By: Matt Burgess, Dhruv Mehrotra — February 3rd 2024 at 14:00
Plus: Russia was likely behind widespread GPS outages, Vault 7 leaker was sentenced, police claim to trace Monero cryptocurrency, and more.
☐ ☆ ✇ WIRED

The Mystery of the $400 Million FTX Heist May Have Been Solved

By: Andy Greenberg — February 1st 2024 at 21:48
An indictment against three Americans suggests that at least some of the culprits behind the theft of an FTX crypto fortune may be in custody.
☐ ☆ ✇ WIRED

A Startup Allegedly ‘Hacked the World.’ Then Came the Censorship—and Now the Backlash

By: Andy Greenberg — February 1st 2024 at 17:30
A loose coalition of anti-censorship voices is working to highlight reports of one Indian company’s hacker-for-hire past—and the legal threats aimed at making them disappear.
☐ ☆ ✇ WIRED

YouTube, Discord, and ‘Lord of the Rings’ Led Police to a Teen Accused of a US Swatting Spree

By: Dhruv Mehrotra, Andrew Couts — February 1st 2024 at 01:28
For nearly two years, police have been tracking down the culprit behind a wave of hoax threats. A digital trail took them to the door of a 17-year-old in California.
☐ ☆ ✇ WIRED

Robots Are Fighting Robots in Russia's War in Ukraine

By: Matt Burgess — January 30th 2024 at 12:00
Aerial drones have changed the war in Ukraine. Now, both Russia’s and Ukraine’s militaries are deploying more unmanned ground robots—and the two are colliding.
☐ ☆ ✇ WIRED

US Lawmakers Tell DOJ to Quit Blindly Funding ‘Predictive’ Police Tools

By: Dell Cameron — January 29th 2024 at 16:19
Members of Congress say the DOJ is funding the use of AI tools that further discriminatory policing practices. They're demanding higher standards for federal grants.
☐ ☆ ✇ WIRED

23andMe Failed to Detect Account Intrusions for Months

By: Lily Hay Newman — January 27th 2024 at 14:00
Plus: North Korean hackers get into generative AI, a phone surveillance tool that can monitor billions of devices gets exposed, and ambient light sensors pose a new privacy risk.
☐ ☆ ✇ WIRED

Police Arrest Teen Said to Be Linked to Hundreds of Swatting Attacks

By: Dhruv Mehrotra — January 26th 2024 at 21:07
A California teenager who allegedly used the handle Torswats to carry out a nationwide swatting campaign is being extradited to Florida to face felony charges, WIRED has learned.
☐ ☆ ✇ WIRED

The Pentagon Tried to Hide That It Bought Americans’ Data Without a Warrant

By: Dell Cameron — January 26th 2024 at 19:13
US spy agencies purchased Americans’ phone location data and internet metadata without a warrant but only admitted it after a US senator blocked the appointment of a new NSA director.
☐ ☆ ✇ WIRED

Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight

By: Lily Hay Newman — January 25th 2024 at 21:30
Newly disclosed breaches of Microsoft and Hewlett-Packard Enterprise highlight the persistent threat posed by Midnight Blizzard, a notorious Russian cyber-espionage group.
❌