FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WIRED

ICE Can Now Spy on Every Phone in Your Neighborhood

By: Lily Hay Newman, Matt Burgess — January 10th 2026 at 11:30
Plus: Iran shuts down its internet amid sweeping protests, an alleged scam boss gets extradited to China, and more.
☐ ☆ ✇ Security – Cisco Blog

Why your organization needs a Cisco Talos Incident Response Retainer

By: Yuri Kramarz — January 6th 2026 at 13:00
Every day, new ransomware and data breaches dominate the headlines, reminding us that it’s a matter of when, not if, your organization may be next. Having a well-prepared response plan and a team of forensic professionals ready to act at a moment’s notice can mean a world of difference between swift incident recovery or a […]
☐ ☆ ✇ WIRED

How to Protect Your iPhone or Android Device From Spyware

By: Kate O'Flaherty — January 3rd 2026 at 10:00
Being targeted by sophisticated spyware is relatively rare, but experts say that everyone needs to stay vigilant as this dangerous malware continues to proliferate worldwide.
☐ ☆ ✇ WIRED

The Worst Hacks of 2025

By: Lily Hay Newman — December 29th 2025 at 12:00
From university breaches to cyberattacks that shut down whole supply chains, these were the worst cybersecurity incidents of the year.
☐ ☆ ✇ WIRED

Chinese Crypto Scammers on Telegram Are Fueling the Biggest Darknet Markets Ever

By: Andy Greenberg — December 23rd 2025 at 11:00
Online black markets once lurked in the shadows of the dark web. Today, they’ve moved onto public platforms like Telegram—and are racking up historic illicit fortunes.
☐ ☆ ✇ WIRED

Hackers Stole Millions of PornHub Users’ Data for Extortion

By: Andy Greenberg, Lily Hay Newman, Dell Cameron — December 20th 2025 at 11:30
Plus: Cisco discloses a zero-day with no available patch, Venezuela accuses the US of a cyberattack, and more.
☐ ☆ ✇ WIRED

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

By: Dan Goodin, Ars Technica — December 17th 2025 at 10:30
The weak RC4 for administrative authentication has been a hacker holy grail for decades.
☐ ☆ ✇ WIRED

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda

By: Lily Hay Newman, Matt Burgess — December 13th 2025 at 11:30
Plus: Travelers to the US may have to hand over five years of social media history, South Korean CEOs are resigning due to cyberattacks, and more.
☐ ☆ ✇ Security – Cisco Blog

A Newbie’s Perspective: From Curiosity to Confidence, My SOC Story

By: Jessica (Bair) Oppenheimer — December 12th 2025 at 22:32
A new analyst shares their Cisco Live SOC experience, covering quick onboarding, using Cisco XDR and Endace for incident investigation, and building confidence in threat response.
☐ ☆ ✇ Security – Cisco Blog

Have You Seen My Domain Controller?

By: Duane Waddle — December 12th 2025 at 16:09
Windows clients expose Active Directory DNS queries on public Wi-Fi, risking OSINT and credential leaks. Learn from Cisco Live SOC observations how to protect clients with VPNs .
☐ ☆ ✇ Security – Cisco Blog

Splunk in Action: From SPL to PCAP

By: Brendan Kuang — December 12th 2025 at 13:57
Learn how Cisco Live SOC uses Splunk SPL and Endace PCAP to investigate exposed HTTP authentication and Kerberos activity, securing sensitive data on public Wi-Fi networks.
☐ ☆ ✇ Security – Cisco Blog

Cisco Live Melbourne 2025 SOC

By: Jessica (Bair) Oppenheimer — December 12th 2025 at 13:00
Cisco Security and Splunk protected Cisco Live Melbourne 2025 in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ ☆ ✇ Security – Cisco Blog

Cisco Live Melbourne Case Study: Cisco Live TMC Experience and DDoS

By: Hanna Jabbour — December 12th 2025 at 13:00
Explore a Cisco TME's experience in the Cisco Live SOC, detailing efficient onboarding, incident escalation, and a real-world DDoS attack investigation and response.
☐ ☆ ✇ WIRED

2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’

By: Andy Greenberg — December 10th 2025 at 17:00
The names of two partial owners of firms linked to the Salt Typhoon hacker group also appeared in records for a Cisco training program—years before the group targeted Cisco’s devices in a spy campaign.
☐ ☆ ✇ WIRED

The US Won't Sanction China for Salt Typhoon Hacking

By: Andy Greenberg — December 6th 2025 at 11:30
Plus: Officials warn of a disturbingly stealthy Chinese malware specimen, a CISA nomination stalls, and more.
☐ ☆ ✇ WIRED

Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

By: Lily Hay Newman — December 4th 2025 at 22:04
Cloudflare CEO Matthew Prince claims the internet infrastructure company’s efforts to block AI crawlers are already seeing big results.
☐ ☆ ✇ Security – Cisco Blog

GovWare 2025 Security Operations Centre

By: Jessica (Bair) Oppenheimer — December 3rd 2025 at 06:03
Cisco Security and Splunk secured the GovWare 2025 network in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ ☆ ✇ Security – Cisco Blog

From Detection to Deep Dive: Splunk Attack Analyzer and Endace for GovWare 2025 Security

By: Allison Gallo — December 2nd 2025 at 08:00
At GovWare 2025, the team leveraged Splunk Attack Analyzer's API to connect to Endace.
☐ ☆ ✇ Security – Cisco Blog

Unmasking Attacks With Cisco XDR at the GovWare SOC

By: Robin Wei — December 2nd 2025 at 08:00
During GovWare, Cisco XDR detected 39 incidents. The SOC team conducted analysis and response actions, and reported critical incidents to the GovWare NOC.
☐ ☆ ✇ Security – Cisco Blog

Splunk SOAR in Action at the GovWare: Zero-Touch Clear Text Password Response

By: Allison Gallo — December 2nd 2025 at 08:00
At GovWare 2025, the SOC team combined ES with Splunk SOAR to fully automate and track the incident response process.
☐ ☆ ✇ Security – Cisco Blog

GovWare Captive Portal: (Splash Page)

By: Ryan Maclennan — December 2nd 2025 at 08:00
Cisco provided a splash page for GovWare 2025, a click-through captive portal. Learn how the team did it.
☐ ☆ ✇ WIRED

The WIRED Guide to Digital Opsec for Teens

By: JP Aumasson, Lily Hay Newman — November 29th 2025 at 12:00
Practicing good “operations security” is essential to staying safe online. Here's a complete guide for teenagers (and anyone else) who wants to button up their digital lives.
☐ ☆ ✇ WIRED

Poems Can Trick AI Into Helping You Make a Nuclear Weapon

By: Matthew Gault — November 28th 2025 at 10:00
It turns out all the guardrails in the world won’t protect a chatbot from meter and rhyme.
☐ ☆ ✇ WIRED

The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’

By: Matt Burgess — November 26th 2025 at 16:33
Myanmar’s military has been blowing up parts of the KK Park scam compound. Experts say the actions are likely for show.
☐ ☆ ✇ WIRED

Amazon Is Using Specialized AI Agents for Deep Bug Hunting

By: Lily Hay Newman — November 24th 2025 at 14:00
Born out of an internal hackathon, Amazon’s Autonomous Threat Analysis system uses a variety of specialized AI agents to detect weaknesses and propose fixes to the company’s platforms.
☐ ☆ ✇ WIRED

US Border Patrol Is Spying on Millions of American Drivers

By: Dell Cameron, Andrew Couts — November 22nd 2025 at 11:30
Plus: The SEC lets SolarWinds off the hook, Microsoft stops a historic DDoS attack, and FBI documents reveal the agency spied on an immigration activist Signal group in New York City.
☐ ☆ ✇ WIRED

With the Rise of AI, Cisco Sounds an Urgent Alarm About the Risks of Aging Tech

By: Lily Hay Newman — November 20th 2025 at 10:00
Generative AI is making it even easier for attackers to exploit old and often forgotten network equipment. Replacing it takes investment, but Cisco is making the case that it’s worth it.
☐ ☆ ✇ Security – Cisco Blog

Seeing Inside the Vortex: Detecting Living off the Land Techniques

By: Matthew Robertson — November 11th 2025 at 13:00
Networking infrastructure is an often-overlooked threat surface being targeted by sophisticated threat actors. Learn more about this topic.
☐ ☆ ✇ WIRED

The Government Shutdown Is a Ticking Cybersecurity Time Bomb

By: Lily Hay Newman — November 7th 2025 at 22:34
Many critical systems are still being maintained, and the cloud provides some security cover. But experts say that any lapses in protections like patching and monitoring could expose government systems.
☐ ☆ ✇ WIRED

Hack Exposes Kansas City’s Secret Police Misconduct List

By: Dhruv Mehrotra, Peggy Lowe — November 3rd 2025 at 10:00
A major breach of the Kansas City, Kansas, Police Department reveals, for the first time, a list of alleged officer misconduct including dishonesty, sexual harassment, excessive force, and false arrest.
☐ ☆ ✇ WIRED

How to Hack a Poker Game

By: Lauren Goode, Michael Calore, Andy Greenberg — October 31st 2025 at 09:00
This week on Uncanny Valley, we break down how one of the most common card shufflers could be altered to cheat, and why that matters—even for those who don’t frequent the poker table.
☐ ☆ ✇ WIRED

Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm

By: Kim Zetter — October 29th 2025 at 17:13
Peter Williams, a former executive of Trenchant, L3Harris’ cyber division, has pleaded guilty to two counts of stealing trade secrets and selling them to an unnamed Russian software broker.
☐ ☆ ✇ Security – Cisco Blog

SE Labs Names Cisco Secure Firewall Best Enterprise NGFW 2025

By: Pramod Chandrashekar — October 29th 2025 at 12:00
Cisco Secure Firewall wins SE Labs’ 2025 Best NGFW award — the first ever to earn dual AAA ratings for both protection and performance. Zero breaches, Zero compromises.
☐ ☆ ✇ WIRED

Amazon Explains How Its AWS Outage Took Down the Web

By: Matt Burgess, Lily Hay Newman — October 25th 2025 at 10:30
Plus: The Jaguar Land Rover hack sets an expensive new record, OpenAI’s new Atlas browser raises security fears, Starlink cuts off scam compounds, and more.
☐ ☆ ✇ WIRED

How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA

By: Andy Greenberg — October 23rd 2025 at 23:51
WIRED recently demonstrated how to cheat at poker by hacking the Deckmate 2 card shufflers used in casinos. The mob was allegedly using the same trick to fleece victims for millions.
☐ ☆ ✇ WIRED

This ‘Privacy Browser’ Has Dangerous Hidden Features

By: Matt Burgess — October 23rd 2025 at 09:30
The Universe Browser is believed to have been downloaded millions of times. But researchers say it behaves like malware and has links to Asia’s booming cybercrime and illegal gambling networks.
☐ ☆ ✇ WIRED

Hackers Dox ICE, DHS, DOJ, and FBI Officials

By: Andy Greenberg, Matt Burgess — October 18th 2025 at 10:30
Plus: A secret FBI anti-ransomware task force gets exposed, the mystery of the CIA’s Kryptos sculpture is finally solved, North Koreans busted hiding malware in the Ethereum blockchain, and more.
☐ ☆ ✇ WIRED

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

By: Dan Goodin, Ars Technica — October 16th 2025 at 20:42
Networking software company F5 disclosed a long-term breach of its systems this week. The fallout could be severe.
☐ ☆ ✇ WIRED

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

By: Dan Goodin, Ars Technica — October 14th 2025 at 21:40
The malicious app required to make a “Pixnapping” attack work requires no permissions.
☐ ☆ ✇ WIRED

Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

By: Andy Greenberg, Matt Burgess — October 14th 2025 at 01:00
With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted.
☐ ☆ ✇ WIRED

'Happy Gilmore' Producer Buys Spyware Maker NSO Group

By: Lily Hay Newman — October 11th 2025 at 10:30
Plus: US government cybersecurity staffers get reassigned to do immigration work, a hack exposes sensitive age-verification data of Discord users, and more.
☐ ☆ ✇ WIRED

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

By: Lily Hay Newman — October 10th 2025 at 09:15
With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses that could bring the max total reward for iPhone exploits to $5 million.
☐ ☆ ✇ Krebs on Security

ShinyHunters Wage Broad Corporate Extortion Spree

By: BrianKrebs — October 7th 2025 at 22:45

A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they refuse to pay a ransom. The group also claimed responsibility for a recent breach involving Discord user data, and for stealing terabytes of sensitive files from thousands of customers of the enterprise software maker Red Hat.

The new extortion website tied to ShinyHunters (UNC6040), which threatens to publish stolen data unless Salesforce or individual victim companies agree to pay a ransom.

In May 2025, a prolific and amorphous English-speaking cybercrime group known as ShinyHunters launched a social engineering campaign that used voice phishing to trick targets into connecting a malicious app to their organization’s Salesforce portal.

The first real details about the incident came in early June, when the Google Threat Intelligence Group (GTIG) warned that ShinyHunters — tracked by Google as UNC6040 — was extorting victims over their stolen Salesforce data, and that the group was poised to launch a data leak site to publicly shame victim companies into paying a ransom to keep their records private. A month later, Google acknowledged that one of its own corporate Salesforce instances was impacted in the voice phishing campaign.

Last week, a new victim shaming blog dubbed “Scattered LAPSUS$ Hunters” began publishing the names of companies that had customer Salesforce data stolen as a result of the May voice phishing campaign.

“Contact us to negotiate this ransom or all your customers data will be leaked,” the website stated in a message to Salesforce. “If we come to a resolution all individual extortions against your customers will be withdrawn from. Nobody else will have to pay us, if you pay, Salesforce, Inc.”

Below that message were more than three dozen entries for companies that allegedly had Salesforce data stolen, including Toyota, FedEx, Disney/Hulu, and UPS. The entries for each company specified the volume of stolen data available, as well as the date that the information was retrieved (the stated breach dates range between May and September 2025).

Image: Mandiant.

On October 5, the Scattered LAPSUS$ Hunters victim shaming and extortion blog announced that the group was responsible for a breach in September involving a GitLab server used by Red Hat that contained more than 28,000 Git code repositories, including more than 5,000 Customer Engagement Reports (CERs).

“Alot of folders have their client’s secrets such as artifactory access tokens, git tokens, azure, docker (redhat docker, azure containers, dockerhub), their client’s infrastructure details in the CERs like the audits that were done for them, and a whole LOT more, etc.,” the hackers claimed.

Their claims came several days after a previously unknown hacker group calling itself the Crimson Collective took credit for the Red Hat intrusion on Telegram.

Red Hat disclosed on October 2 that attackers had compromised a company GitLab server, and said it was in the process of notifying affected customers.

“The compromised GitLab instance housed consulting engagement data, which may include, for example, Red Hat’s project specifications, example code snippets, internal communications about consulting services, and limited forms of business contact information,” Red Hat wrote.

Separately, Discord has started emailing users affected by another breach claimed by ShinyHunters. Discord said an incident on September 20 at a “third-party customer service provider” impacted a “limited number of users” who communicated with Discord customer support or Trust & Safety teams. The information included Discord usernames, emails, IP address, the last four digits of any stored payment cards, and government ID images submitted during age verification appeals.

The Scattered Lapsus$ Hunters claim they will publish data stolen from Salesforce and its customers if ransom demands aren’t paid by October 10. The group also claims it will soon begin extorting hundreds more organizations that lost data in August after a cybercrime group stole vast amounts of authentication tokens from Salesloft, whose AI chatbot is used by many corporate websites to convert customer interaction into Salesforce leads.

In a communication sent to customers today, Salesforce emphasized that the theft of any third-party Salesloft data allegedly stolen by ShinyHunters did not originate from a vulnerability within the core Salesforce platform. The company also stressed that it has no plans to meet any extortion demands.

“Salesforce will not engage, negotiate with, or pay any extortion demand,” the message to customers read. “Our focus is, and remains, on defending our environment, conducting thorough forensic analysis, supporting our customers, and working with law enforcement and regulatory authorities.”

The GTIG tracked the group behind the Salesloft data thefts as UNC6395, and says the group has been observed harvesting the data for authentication tokens tied to a range of cloud services like Snowflake and Amazon’s AWS.

Google catalogs Scattered Lapsus$ Hunters by so many UNC names (throw in UNC6240 for good measure) because it is thought to be an amalgamation of three hacking groups — Scattered Spider, Lapsus$ and ShinyHunters. The members of these groups hail from many of the same chat channels on the Com, a mostly English-language cybercriminal community that operates across an ocean of Telegram and Discord servers.

The Scattered Lapsus$ Hunters darknet blog is currently offline. The outage appears to have coincided with the disappearance of the group’s new clearnet blog — breachforums[.]hn — which vanished after shifting its Domain Name Service (DNS) servers from DDoS-Guard to Cloudflare.

But before it died, the websites disclosed that hackers were exploiting a critical zero-day vulnerability in Oracle’s E-Business Suite software. Oracle has since confirmed that a security flaw tracked as CVE-2025-61882 allows attackers to perform unauthenticated remote code execution, and is urging customers to apply an emergency update to address the weakness.

Mandiant’s Charles Carmakal shared on LinkedIn that CVE-2025-61882 was initially exploited in August 2025 by the Clop ransomware gang to steal data from Oracle E-Business Suite servers. Bleeping Computer writes that news of the Oracle zero-day first surfaced on the Scattered Lapsus$ Hunters blog, which published a pair of scripts that were used to exploit vulnerable Oracle E-Business Suite instances.

On Monday evening, KrebsOnSecurity received a malware-laced message from a reader that threatened physical violence unless their unstated demands were met. The missive, titled “Shiny hunters,” contained the hashtag $LAPSU$$SCATEREDHUNTER, and urged me to visit a page on limewire[.]com to view their demands.

A screenshot of the phishing message linking to a malicious trojan disguised as a Windows screensaver file.

KrebsOnSecurity did not visit this link, but instead forwarded it to Mandiant, which confirmed that similar menacing missives were sent to employees at Mandiant and other security firms around the same time.

The link in the message fetches a malicious trojan disguised as a Windows screensaver file (Virustotal’s analysis on this malware is here). Simply viewing the booby-trapped screensaver on a Windows PC is enough to cause the bundled trojan to launch in the background.

Mandiant’s Austin Larsen said the trojan is a commercially available backdoor known as ASYNCRAT, a .NET-based backdoor that communicates using a custom binary protocol over TCP, and can execute shell commands and download plugins to extend its features.

A scan of the malicious screensaver file at Virustotal.com shows it is detected as bad by nearly a dozen security and antivirus tools.

“Downloaded plugins may be executed directly in memory or stored in the registry,” Larsen wrote in an analysis shared via email. “Capabilities added via plugins include screenshot capture, file transfer, keylogging, video capture, and cryptocurrency mining. ASYNCRAT also supports a plugin that targets credentials stored by Firefox and Chromium-based web browsers.”

Malware-laced targeted emails are not out of character for certain members of the Scattered Lapsus$ Hunters, who have previously harassed and threatened security researchers and even law enforcement officials who are investigating and warning about the extent of their attacks.

With so many big data breaches and ransom attacks now coming from cybercrime groups operating on the Com, law enforcement agencies on both sides of the pond are under increasing pressure to apprehend the criminal hackers involved. In late September, prosecutors in the U.K. charged two alleged Scattered Spider members aged 18 and 19 with extorting at least $115 million in ransom payments from companies victimized by data theft.

U.S. prosecutors heaped their own charges on the 19 year-old in that duo — U.K. resident Thalha Jubair — who is alleged to have been involved in data ransom attacks against Marks & Spencer and Harrods, the British food retailer Co-op Group, and the 2023 intrusions at MGM Resorts and Caesars Entertainment. Jubair also was allegedly a key member of LAPSUS$, a cybercrime group that broke into dozens of technology companies beginning in late 2021.

A Mastodon post by Kevin Beaumont, lamenting the prevalence of major companies paying millions to extortionist teen hackers, refers derisively to Thalha Jubair as a part of an APT threat known as “Advanced Persistent Teenagers.”

In August, convicted Scattered Spider member and 20-year-old Florida man Noah Michael Urban was sentenced to 10 years in federal prison and ordered to pay roughly $13 million in restitution to victims.

In April 2025, a 23-year-old Scottish man thought to be an early Scattered Spider member was extradited from Spain to the U.S., where he is facing charges of wire fraud, conspiracy and identity theft. U.S. prosecutors allege Tyler Robert Buchanan and co-conspirators hacked into dozens of companies in the United States and abroad, and that he personally controlled more than $26 million stolen from victims.

Update, Oct. 8, 8:59 a.m. ET: A previous version of this story incorrectly referred to the malware sent by the reader as a Windows screenshot file. Rather, it is a Windows screensaver file.

☐ ☆ ✇ WIRED

Vibe Coding Is the New Open Source—in the Worst Way Possible

By: Lily Hay Newman — October 6th 2025 at 10:00
As developers increasingly lean on AI-generated code to build out their software—as they have with open source in the past—they risk introducing critical security failures along the way.
☐ ☆ ✇ WIRED

Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure

By: Matt Burgess, Andy Greenberg, Andrew Couts — October 4th 2025 at 10:30
Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.
☐ ☆ ✇ WIRED

Google’s Latest AI Ransomware Defense Only Goes So Far

By: Lily Hay Newman — September 30th 2025 at 13:44
Google has launched a new AI-based protection in Drive for desktop that can shut down an attack before it spreads—but its benefits have their limits.
☐ ☆ ✇ WIRED

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

By: Andy Greenberg, Matt Burgess, Lily Hay Newman — September 27th 2025 at 14:25
Plus: A ransomeware gang steals data on 8,000 preschoolers, Microsoft blocks Israel’s military from using its cloud for surveillance, call-recording app Neon hits pause over security holes, and more.
☐ ☆ ✇ WIRED

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

By: Matt Burgess — September 22nd 2025 at 06:00
The UK-based automaker has been forced to stop vehicle production as a result of the attack—costing JLR tens of millions of dollars and forcing its parts suppliers to lay off workers.
☐ ☆ ✇ WIRED

A Dangerous Worm Is Eating Its Way Through Software Packages

By: Lily Hay Newman, Andy Greenberg — September 20th 2025 at 10:30
Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested.
☐ ☆ ✇ WIRED

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic

By: Matt Burgess, Lily Hay Newman — September 18th 2025 at 15:09
A pair of flaws in Microsoft's Entra ID identity and access management system could have allowed an attacker to gain access to virtually all Azure customer accounts.
☐ ☆ ✇ WIRED

Cybercriminals Have a Weird New Way to Target You With Scam Texts

By: Matt Burgess — September 18th 2025 at 11:00
Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them.
☐ ☆ ✇ WIRED

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

By: Andy Greenberg — September 16th 2025 at 17:07
A misconfigured platform used by the Department of Homeland Security left national security information—including some related to the surveillance of Americans—accessible to thousands of people.
☐ ☆ ✇ WIRED

Jeffrey Epstein’s Yahoo Inbox Revealed

By: Lily Hay Newman, Dell Cameron — September 13th 2025 at 10:30
Plus: ICE deploys secretive phone surveillance tech, officials warn of Chinese surveillance tools in US highway infrastructure, and more.
☐ ☆ ✇ WIRED

Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

By: Lily Hay Newman — September 11th 2025 at 13:59
Alongside new iPhones, Apple released a new security architecture on Tuesday: Memory Integrity Enforcement aims to eliminate the most frequently exploited class of iOS bugs.
☐ ☆ ✇ WIRED

US Investment in Spyware Is Skyrocketing

By: Vas Panagiotopoulos — September 10th 2025 at 11:00
A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology.
☐ ☆ ✇ WIRED

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

By: Dell Cameron — September 9th 2025 at 21:00
After 25 years at the Electronic Frontier Foundation, Cindy Cohn is stepping down as executive director. In a WIRED interview, she reflects on encryption, AI, and why she’s not ready to quit the battle.
☐ ☆ ✇ Security – Cisco Blog

Packing More Power Into Cisco XDR’s Integration Toolkit

By: Ben Greenbaum — September 9th 2025 at 12:00
Cisco XDR and the Swiss Army knife share a theme of a versatile, integrated, and unified platform, giving users myriad solutions to take on diverse challenges.
☐ ☆ ✇ WIRED

ICE Has Spyware Now

By: Matt Burgess, Andy Greenberg, Lily Hay Newman — September 6th 2025 at 10:30
Plus: An AI chatbot system is linked to a widespread hack, details emerge of a US plan to plant a spy device in North Korea, your job’s security training isn’t working, and more.
☐ ☆ ✇ WIRED

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

By: Andy Greenberg — September 3rd 2025 at 21:04
A new specimen of “infostealer” malware offers a disturbing feature: It monitors a target's browser for NSFW content, then takes simultaneous screenshots and webcam photos of the victim.
☐ ☆ ✇ Security – Cisco Blog

Conference Hopping: Training Attendee Scanning Def Con

By: Bilal Qamar — September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
❌