The US DOJ seizes 32 domains used in Russian influence campaigns, as part of efforts to tackle Russian efforts to influence the 2024 US presidential election
The Biden administration announced a sweeping set of actions to tackle a major Russian government-backed effort to influence …
Microsoft details Cadet Blizzard, a GRU hacking group behind the WhisperGate data-wiping attacks in Ukraine carried out a month before Russia's 2022 invasion
Hacker group naming schemes, such as Microsoft's new system, are counterproductive for cybersecurity analysis; a government body should set a naming convention
Pumpkin Sandstorm. Spandex Tempest. Charming Kitten. Is this really how we want to name the hackers wreaking havoc worldwide?
Microsoft identifies a destructive malware operation targeting Ukrainian organizations; the malware looks like ransomware but lacks a ransom recovery mechanism
European Union simulated a cyber attack on a fictitious Finnish power company Vilius Petkauskas / cybernews.com : Belarus state hackers suspected behind Ukraine cyberattack Grugq /...
Sources detail Zuckerberg's decisions putting growth over safety, like censoring “anti-state” posts in Vietnam and opposing a US voting info center in Spanish
Late last year, Mark Zuckerberg faced a choice: Comply with demands from Vietnam's ruling Communist Party …
Internal docs detail Facebook's struggles with violence-inciting content in India, including failure to designate some politically-connected groups as dangerous
good and bad. This has risks (as these leaks show) but are the only honest way to tackle the problem. Would love to see the same from https://abc.xyz/ Thomas Baekdal / @baekdal : I...
Internal docs detail Facebook's struggles with violence-inciting content in India, including failure to designate some politically-connected groups as dangerous
Internal documents show a struggle with misinformation, hate speech and celebrations of violence in the country, the company's biggest market.
Investigator says hackers breached Colonial Pipeline through a VPN account whose password has since been discovered inside a batch of leaks on the dark web
🍿 Gangster Coworking CNN : Ransomware attackers used compromised password to access Colonial Pipeline network Kim Lyons / The Verge : Hackers reportedly used a compromised password...
Investigator says hackers breached Colonial Pipeline through a VPN account whose password has since been discovered inside a batch of leaks on the dark web
- Investigators suspect hackers got password from dark web leak — Colonial CEO hopes U.S. goes after criminal hackers abroad
Profile of Ray Holt, who in the 1960s jointly developed the F-14 Tomcat's Central Air Data Computer, considered by some to be the first microprocessor
and a reminder that “Indian Ocean, Present Day” was in fact a very long time ago https://twitter.com/... Clive Thompson / @pomeranian99 : Wonderful piece by @sarahfallon in @WIRED ...
Profile of Ray Holt, who in the 1960s jointly developed the F-14 Tomcat's Central Air Data Computer, considered by some to be the first microprocessor
In a weird way, I've known Ray Holt all my life, but I never knew what he had accomplished—or how his inventions wove their way into my own family. Tweets: @airpir_southern , @sara...
Leaked UN report: North Korea has generated an estimated $2B using widespread and sophisticated cyberattacks to steal from banks and cryptocurrency exchanges
UNITED NATIONS (Reuters) - North Korea has generated an estimated $2 billion for its weapons of mass destruction programs using …
Sources: Iran's attempts to block Telegram drive millions to censorship circumvention tools for PC and mobile like Lantern and Psiphon
Sam Schechner / Wall Street Journal :