Inside a “laptop farm” run by a 50-year-old US woman that let DPRK IT workers pose as US tech staff and illegally earn $17.1M from more than 300 US companies
A LinkedIn message drew a former waitress in Minnesota into a type of intricate scam involving illegal paychecks and stolen data Bluesky: @hatr and @martijnrasser . Forums: Slashdot Bluesky: Hakan / @...
How Geneva-based VPN startup Proton's ~25 engineers are fighting Russian censorship, a back-and-forth battle since the government blocked Proton in March 2022
The cat-and-mouse experience of Proton, a Swiss company, shows what it's like to be targeted by Russian censors — and what it takes to fight back. Tweets: @satariano , @hatr , @protonvpn , @kenroth , ...
Internal docs and court records: FBI made a push in late 2020 and H1 2021 to deploy Pegasus in criminal investigations, before dropping the plans in July 2021
Christopher Wray, the F.B.I.'s director, told Congress last December that the bureau purchased the phone hacking tool Pegasus for research purposes. Tweets: @ronenbergman , @amypeikoff , @hatr , @llch...
In response to Meta's rebuttal of its XCheck report, The Wire shares a video of a source using a subdomain, DKIM signatures, and more, but experts are skeptical
& many mainstream foreign journalists also questioned The Wire's work. Now, @thewire_in says it's verified the email via- its DKIM signature. https://thewire.in/... Matthew Green / @matthew_d_green : ...
The Wire responds, including an alleged recording of an internal Instagram subdomain and DKIM verification, to Meta's statement questioning its XCheck probe
A point-by-point response to Meta's statement questioning The Wire's story on the ease with which the BJP IT Cell head is able to get Instagram to delete posts he reports. Tweets: @thewire_in , @rmnth...
US investigators traced ransomware payments back to companies in Moscow skyscraper Federation Tower East, suggesting Russia tolerates ransomware operators
Cybersecurity experts tracing money paid by American businesses to Russian ransomware gangs found it led to one of Moscow's most prestigious addresses. Tweets: @hatr , @adam_k_levin , @ericgarland , @...
Apple's plan to find CSAM should have centered around scanning images on iCloud servers, not on users' devices, where there is a greater expectation of privacy
including a number of non-obvious but critical ones. It's also why hypos as a threat assessment tool will only get you so far. https://twitter.com/... Greg Howell / @g_howell : @matthew_d_green If @Ap...
Uncertainty about the nature of the list of 50K potential Pegasus targets created confusion and controversy, but doesn't negate the investigation's key findings
which used NSO tech to spy on dissidents— to expand surveillance into the UK.https://www.theguardian.com/ ... Lorenzo Franceschi-Bicchierai / @lorenzofb : NSO Group is now blaming Palestinian activist...
Microsoft says an attacker gained access to one of its customer service agents and launched attacks against customers in a probe of suspected SolarWinds hackers
The Microsoft Threat Intelligence Center is tracking new activity from the NOBELIUM threat actor. Tom Warren / The Verge : Why Windows 11 is forcing everyone to use TPM chips Malcolm Owen / AppleInsid...
Nations are engaging in a cyberweapons arms race, with agencies like the NSA prioritizing offensive capabilities over defense, fueling a lucrative 0-day market
Amid a global gold rush for digital weapons, the infrastructure of our daily lives has never been more vulnerable. Tweets: @hatr , @nicoleperlroth , @newyorker , @hoanssolo , @scottshanenyt , and @hat...