The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks

The mass compromise of the VoIP firm’s customers is the first confirmed incident where one software-supply-chain attack enabled another, researchers say. Powered by...

Read More

How ChatGPT—and Bots Like It—Can Spread Malware

Generative AI is a tool, which means it can be used by cybercriminals, too. Here’s how to protect yourself. Powered by WPeMatico

Read More

The Hacker Who Hijacked Matt Walsh’s Twitter Was Just ‘Bored’

The breach of the right-wing provocateur was simply a way of “stirring up some drama,” the attacker tells WIRED. But the damage could have been much worse. Powered by WPeMatico

Read More

Used Routers Often Come Loaded With Corporate Secrets

More than half of the enterprise routers researchers bought secondhand hadn’t been wiped, exposing sensitive info like login credentials and customer data. Powered by WPeMatico

Read More

Chinese Cops Ran Troll Farm and Secret NY Police Station, US Says

Three criminal cases detail China’s alleged attempts to extend its security forces’ influence online—and around the globe. Powered by WPeMatico

Read More

ICE Records Reveal How Agents Abuse Access to Secret Data

Documents obtained by WIRED detail hundreds of investigations by the US agency into alleged database misuse that includes harassment, stalking, and more. Powered by WPeMatico

Read More