Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
The US’s first national cyber director, Chris Inglis, is planning to step down in the coming months, according to a person familiar with the matter. → Read More
(Bloomberg) -- Twitter Inc. suspended multiple accounts that track the locations of private jets using publicly available flight data, including one that... → Read More
Newly unearthed inspector general’s report is coda to Snowden-era controversy over NSA surveillance methods. → Read More
Cybersecurity researchers investigating a string of hacks against technology companies, including Microsoft Corp. and Nvidia Corp., have traced the attacks to a 16-year-old living at his mother’s house near Oxford, England. → Read More
A flaw found in a popular piece of software illustrates one danger of volunteer-run development projects. → Read More
Anne Neuberger is at the center of a bureaucratic tussle within the White House. → Read More
In the hands of law enforcement and intelligence agencies, spyware can track criminals and terrorists. In the hands of repressive governments, it can be a tool of intimidation and retribution against activists, journalists and business executives. A particularly sophisticated version produced by Israeli software maker NSO Group Ltd., which can surreptitiously bug a target phone without any… → Read More
A weekend cyberattack against Sinclair Broadcast Group Inc. was linked to one of the most infamous Russian cybergangs, called Evil Corp., according to two people familiar with the attack. The Sinclair hackers used malware called Macaw, a variant of ransomware known as WastedLocker. Both Macaw and WastedLocker were created by Evil Corp., according to the two people, who requested anonymity to… → Read More
Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization. → Read More
Spyware is used by law enforcement and intelligence agencies to track criminals and terrorists. In the hands of repressive governments, it can be a tool used against enemies. → Read More
Biden will meet with various agency leaders behind closed doors on Wednesday to discuss ransomware and ways to combat it, the White House said in a statement on Tuesday night that called the risk a “national security and economic security priority for the administration.” → Read More
Russian government hackers breached the computer systems of the Republican National Committee last week, around the time a Russia-linked criminal group unleashed a massive ransomware attack, according to two people familiar with the matter. → Read More
Just weeks after President Joe Biden implored Vladimir Putin to curb cyber crime, a notorious, Russia-linked ransomware gang has been accused of pulling off an audacious attack on the global software supply chain. → Read More
The hack that took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast was the result of a single compromised password, according to a cybersecurity consultant who responded to the attack. → Read More
A notorious Russia-linked hacking group is behind the cyberattack against JBS SA, according to four people familiar with the assault who were not authorized to speak publicly on the matter. The cyber gang goes by the name REvil or Sodinokibi. → Read More
Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers on Friday, contradicting reports earlier this week that the company had no intention of paying an extortion fee to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.The company paid the hefty ransom in untraceable cryptocurrency within hours after the attack,… → Read More
The hackers who caused Colonial Pipeline to shut down the biggest U.S. gasoline pipeline on Friday began their blitz against the company a day earlier, stealing a large amount of data before locking computers with ransomware and demanding payment, according to people familiar with the matter. → Read More
Nick Lim provides tech support to the U.S. networks of White nationalists and conspiracy theorists banned by the likes of Amazon. → Read More
Leaked recordings of meetings detail role of Rebekah Mercer at social-media platform → Read More
A sophisticated attack on Microsoft Corp.’s widely used business email software is morphing into a global cybersecurity crisis, as hackers race to infect as many victims as possible before companies can secure their computer systems.The attack, which Microsoft has said started with a Chinese government-backed hacking group, has so far claimed at least 60,000 known victims globally, according to… → Read More