The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks
The mass compromise of the VoIP firm’s customers is the first confirmed incident where one software-supply-chain attack enabled another, researchers say. Powered by...
How ChatGPT—and Bots Like It—Can Spread Malware
Generative AI is a tool, which means it can be used by cybercriminals, too. Here’s how to protect yourself. Powered by WPeMatico
The Hacker Who Hijacked Matt Walsh’s Twitter Was Just ‘Bored’
The breach of the right-wing provocateur was simply a way of “stirring up some drama,” the attacker tells WIRED. But the damage could have been much worse. Powered by WPeMatico
Used Routers Often Come Loaded With Corporate Secrets
More than half of the enterprise routers researchers bought secondhand hadn’t been wiped, exposing sensitive info like login credentials and customer data. Powered by WPeMatico
Chinese Cops Ran Troll Farm and Secret NY Police Station, US Says
Three criminal cases detail China’s alleged attempts to extend its security forces’ influence online—and around the globe. Powered by WPeMatico
ICE Records Reveal How Agents Abuse Access to Secret Data
Documents obtained by WIRED detail hundreds of investigations by the US agency into alleged database misuse that includes harassment, stalking, and more. Powered by WPeMatico