thumbnail Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic
thumbnail DOGE software engineer’s computer infected by info-stealing malware - Ars Technica
thumbnail Signal clone used by Trump official stops operations after report it was hacked
thumbnail Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.
thumbnail Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs - Ars Technica
thumbnail OpenAI helps spammers plaster 80,000 sites with messages that bypassed filters
thumbnail Large enterprises scramble after supply-chain attack spills their secrets
thumbnail Go Module Mirror served backdoor to devs for 3+ years - Ars Technica
thumbnail Invisible text that AI chatbots understand and humans can’t? Yep, it’s a thing. - Ars Technica
thumbnail Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram
thumbnail CTV industry’s unprecedented “surveillance”
thumbnail NIST proposes barring some of the most nonsensical password rules
thumbnail Hacker plants false memories in ChatGPT to steal user data in perpetuity
thumbnail Europe’s privacy watchdog probes Google over data used for AI training
thumbnail YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
thumbnail Windows 0-day was exploited by North Korea to install advanced rootkit
thumbnail Who are the two major hackers Russia just received in a prisoner swap?
thumbnail Secure Boot is completely broken on 200+ models from 5 big device makers | Ars Technica
thumbnail New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere
thumbnail 3 million iOS and macOS apps were exposed to potent supply-chain attacks
thumbnail Apple’s AI promise: “Your data is never stored or made accessible to Apple”
thumbnail A root-server at the Internet’s core lost touch with its peers. We still don’t know why.
thumbnail Hacker free-for-all fights for control of home and office routers everywhere
thumbnail What we know about the xz Utils backdoor that almost infected the world
thumbnail PyPI halted new users and projects while it fended off supply-chain attack
thumbnail Thousands of servers hacked in ongoing attack targeting Ray AI framework
thumbnail Unpatchable vulnerability in Apple chip leaks secret encryption keys
thumbnail US prescription market hamstrung for 9 days (so far) by ransomware attack | Ars Technica
thumbnail GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
thumbnail How your sensitive data can be sold after a data broker goes bankrupt
thumbnail Air Canada must honor refund policy invented by airline’s chatbot
thumbnail Microsoft network breached through password-spraying by Russian-state hackers
thumbnail Researcher uncovers one of the biggest password dumps in recent history
thumbnail Hackers can infect network-connected wrenches to install ransomware
thumbnail Linux devices are under attack by a never-before-seen worm | Ars Technica
thumbnail SSH protects the world’s most sensitive networks. It just got a lot weaker
thumbnail Xfinity waited to patch critical Citrix Bleed 0-day. Now it’s paying the price
thumbnail Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica
thumbnail Windows 10 gets three more years of security updates, if you can afford them | Ars Technica
thumbnail USB worm unleashed by Russian state hackers spreads worldwide
thumbnail Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica
thumbnail In a first, cryptographic keys protecting SSH connections stolen in new attack | Ars Technica
thumbnail Intel fixes high-severity CPU bug that causes “very strange behavior”
thumbnail Microsoft profiles new threat group with unusual but effective practices
thumbnail Hackers can force iOS and macOS browsers to divulge passwords and much more
thumbnail Vulnerable Arm GPU drivers under active exploitation. Patches may not be available | Ars Technica
thumbnail Critical vulnerabilities in Exim threaten over 250k email servers worldwide | Ars Technica
thumbnail How Google Authenticator made one company’s network breach much, much worse
thumbnail With 0-days hitting Chrome, iOS, and dozens more this month, is no software safe? | Ars Technica
thumbnail North Korea-backed hackers target security researchers with 0-day
thumbnail WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April | Ars Technica
thumbnail Microsoft takes pains to obscure role in 0-days that caused email breach
thumbnail WordPress plugin installed on 1 million+ sites logged plaintext passwords
thumbnail Hackers exploit gaping Windows loophole to give their malware kernel access
thumbnail Mass exploitation of critical MOVEit flaw is ransacking orgs big and small | Ars Technica
thumbnail “Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware | Ars Technica
thumbnail Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
thumbnail Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days
thumbnail Apple uses iOS and macOS Rapid Security Response feature for the first time
thumbnail Android app from China executed 0-day exploit on millions of devices | Ars Technica
thumbnail Darknet markets generate millions in revenue selling stolen personal data
thumbnail LockBit ransomware suspect nabbed in Canada, faces charges in the US
thumbnail How Vice Society got away with a global ransomware spree | Ars Technica
thumbnail How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000
thumbnail Breach of software maker used to backdoor as many as 200,000 servers
thumbnail Phishers who breached Twilio and targeted Cloudflare could easily get you, too
thumbnail Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
thumbnail Google Play hides app permissions in favor of developer-written descriptions
thumbnail Ongoing phishing campaign can hack you even when you’re protected with MFA
thumbnail A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys
thumbnail Researchers devise iPhone malware that runs even when device is turned off
thumbnail Zyxel silently patches command-injection vulnerability with 9.8 severity rating
thumbnail Researcher uses 379-year-old algorithm to crack crypto keys found in the wild
thumbnail Russia’s Sandworm hackers attempted a third blackout in Ukraine
thumbnail Explaining Spring4Shell: The Internet security disaster that wasn’t
thumbnail Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA
thumbnail Behold, a password phishing site that can trick even savvy users
thumbnail Sabotage: Code added to popular NPM package wiped files in Russia and Belarus | Ars Technica
thumbnail New method that amplifies DDoSes by 4 billion-fold. What could go wrong?
thumbnail Cybercriminals who breached Nvidia issue one of the most unusual demands ever
thumbnail VMware Horizon servers are under active exploit by Iranian state hackers
thumbnail Flood of malicious junk traffic makes Ukrainian websites unreachable | Ars Technica
thumbnail Backdoor RAT for Windows, macOS, and Linux went undetected until now | Ars Technica