A profile of “Rey”, the admin of cybercriminal group Scattered LAPSUS$ Hunters, a 15-year-old from Amman, Jordan who cooperated with European police since June
A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year …
X's location tool shows revenue sharing incentivizes US political content from international sock puppet and bot accounts, making polarization a side hustle
www.404media.co/americas-pol... @casuallylucid : “The only thing revealed by this transparency is that social media companies do not give a f*ck about this.” — Our attention is t...
X exposing political accounts' location shows why trust and safety teams mattered: to combat coordinated inauthentic behavior, not “censorship” of viewpoints
from the it's-almost-as-if-there-are-some-bad- actors-online dept — For the last few years, Matt Taibbi …
A look at the Crylock ransomware scheme, orchestrated by a Russian couple who targeted as many as 400,000 victims and earned €64M+ in bitcoin over eight years
a knife, bought with the same email address used to rent the suspicious servers discovered by investigators, and a pair of plane tickets he had bought for his parents — on.ft.com...
Investigation: IBM, Dell, HP, Cisco, Oracle, Microsoft, Intel, Nvidia, and other US tech companies helped design and build China's digital surveillance state
BEIJING (AP) — The body camera hung from the top of the IV drip, recording the slightest twitch made by Yang Guoliang as he lay bloody …
The price per token for AI models has fallen, but costs for developers are rising as newer reasoning models require more tokens to complete tasks
With models doing more ‘thinking,’ the small companies that buy AI from the giants to create apps and services are feeling the pinch X: @ericjhonsa , @emollick , @mims , @mims , @m...
Inside a “laptop farm” run by a 50-year-old US woman that let DPRK IT workers pose as US tech staff and illegally earn $17.1M from more than 300 US companies
A LinkedIn message drew a former waitress in Minnesota into a type of intricate scam involving illegal paychecks and stolen data Bluesky: @hatr and @martijnrasser . Forums: Slashdo...
The cybersecurity industry is quiet after Trump canceled SentinelOne's security clearances on April 9 for hiring Chris Krebs; SentinelOne says it will cooperate
The cybersecurity industry has gone mostly quiet after President Donald Trump took action against one of its prominent members.
Sources: Chinese officials acknowledged in a secret December 2024 meeting that China was behind the Volt Typhoon hacks, tying them to the US' support for Taiwan
„The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwan" ...
The FBI is investigating an alleged Trump campaign hack; sources say the agency is probing suspected hacking attempts by Iran targeting Trump, Biden, and Harris
Is Harris pulling ahead of Trump? Martin Matishak / The Record : FBI says it is investigating purported Trump campaign hack Victor Nava / New York Post : FBI investigating alleged ...
Politico, the NYT, the WaPo, and others say they received hacked Trump campaign materials, but gave few details, a marked contrast to Clinton's emails in 2016
At least three news outlets were leaked confidential material from inside the Donald Trump campaign, including its report vetting JD Vance as a vice presidential candidate.
The US says the FBI disrupted a long-running Russian cyberespionage operation by inspecting FSB's Snake malware and decrypting and decoding its communications
AJ Vicens / CyberScoop :
A look at OpenAI's “red team” of 50 academics and experts, hired in 2022 to look for issues such as toxicity, prejudice, and biases in GPT-4 before its release
Microsoft-backed company asked an eclectic mix of people to ‘adversarially test’ GPT-4, its powerful new language model
A look at the impact of 34 US bitcoin mines and their extreme demand for energy, as the cost of electricity for locals increases in Texas and other areas
Bitcoin mines cash in on electricity — by devouring it, selling it, even turning it off — and they cause immense pollution.
Leaked documents from Moscow-based NTC Vulkan reveal the company helps the GRU, FSB, and SVR with hacking operations, national infrastructure attacks, and more
Analysis of the cyber threat landscape one year after Russia invaded Ukraine shows Russia's aggressive multi-pronged plan across five phases with mixed success
One year after the Russian invasion of Ukraine, Google TAG, Mandiant, and Trust & Safety provide insights into changes in the cyber threat landscape triggered by the war.
German researchers bought a US military device, last used in Afghanistan in 2012, with fingerprints, iris scans, and other data on 2,632 people, for $68 on eBay
German security researchers studying biometric capture devices popular with the U.S. military got more than they expected for $68 on eBay.
How Geneva-based VPN startup Proton's ~25 engineers are fighting Russian censorship, a back-and-forth battle since the government blocked Proton in March 2022
The cat-and-mouse experience of Proton, a Swiss company, shows what it's like to be targeted by Russian censors — and what it takes to fight back. Tweets: @satariano , @hatr , @pro...
Twitter alternative Hive temporarily shuts down after researchers found vulnerabilities that would have let hackers access DMs and edit others' Hive posts
In response to Meta's rebuttal of its XCheck report, The Wire shares a video of a source using a subdomain, DKIM signatures, and more, but experts are skeptical
& many mainstream foreign journalists also questioned The Wire's work. Now, @thewire_in says it's verified the email via- its DKIM signature. https://thewire.in/... Matthew Green /...