ReportWire

Tag: Cybersecurity

  • Comcast Business Hosts Social to Increase Awareness on Cybersecurity Threats and Solutions

    [ad_1]

    Comcast Business hosted a cybersecurity social on Tuesday, inviting local residents and business partners to explore the cutting-edge security solutions the corporation offers, and providing an opportunity to network and connect with professionals. The event featured live demos of advanced protection tools, breakout sessions with expert insights, and a Q&A session that broke down the most significant risks people face on their computer networks. 

    Mike Thibodeaux, vice president of Comcast Business for the Big South Region, said events such as the social help them spread knowledge about safe technology practices. 

    The event featured live demos of advanced protection tools, breakout sessions with expert insights, and a Q&A session that broke down the most significant risks people face on their computer networks. Photo byLaura Nwogu/The Atlanta Voice

    “I believe the best way to help people is to give them the knowledge that they need. And whether they decide to do business with us or decide to do business with somebody else, they’re prepared to protect their business,” Thibodeaux said.  “If they’re prepared, they can protect their business and they can grow and continue and contribute to the community.”

    Thibodeaux noted that the landscape of cybersecurity is constantly changing. With the rise of Artificial Intelligence (AI), business owners have had to balance the benefits of the technology with the threats it poses to their operations. An expert insight on Comcast SecurityEdge, a security service for businesses that protects against threats like malware, phishing, and ransomware by blocking malicious websites and filtering content, revealed that companies face exponential threats every day. 

    According to a SecurityEdge Threat Data report, businesses faced 807,3811,202 blocks of malware in a single day and over 30 billion phishing attempts. From 2023 to 2024, the number of AI-powered malicious phishing emails exploded, resulting in a 42% reported loss of revenue and a 32% reported loss of customer trust. Due to a lack of specialized security resources and small budgets, small businesses are especially vulnerable.

    Photo by Laura Nwogu/The Atlanta Voice

    The report revealed that businesses benefiting from SecurityEdge defenses were able to cut down the number of malware, phishing attempts, and bot activity significantly, from over 8 billion malware threats to 155,595, and from nearly 31 billion phishing attempts to only 91,193. Both activities decreased from 231,883,942 to 11,338. 

    “The big thing is understanding that on a day-to-day basis, your cybersecurity posture needs to evolve and make sure that you’re protected so your business can continue to run, and you’re compliant with any type of regulations out there… My best advice is, speak to an expert, have a trusted advisor, have a consultant.”

    Cybersecurity can be a daunting aspect for small businesses, particularly those that are new. However, for those on a tighter budget, Thibodeaux said they offer low-cost products, allowing them to protect their services without breaking the bank and compromising on security. 

    “That lets the business owners focus on doing what they do best — running the business. And so, as part of that, we do most of the cybersecurity work in the cloud. And there are devices that we put on site that actively monitor and protect their business. It is highly resilient, it keeps their business operational, and it outsources a lot of that type of work, and allows them to focus on their business, which is continuing to grow.”

    To learn more about Comcast Business offerings and its cybersecurity solutions, visit https://business.comcast.com/ 

    [ad_2]

    Donnell Suggs and Laura Nwogu

    Source link

  • US Prosecutors Say Cybersecurity Pros Ran Cybercrime Operation

    [ad_1]

    WASHINGTON (Reuters) -Prosecutors said three American cybersecurity professionals secretly ran a ransomware operation aimed at shaking down companies across the United States. 

    The three people, only two of whom – Ryan Goldberg and Kevin Martin – were identified by name, collaborated with the notorious hacking gang ALPHV BlackCat to encrypt companies’ networks in a bid to extort their owners out of millions of dollars’ worth of cryptocurrency, prosecutors alleged in an indictment filed last month in federal court in Miami.

    The news was first reported by the Chicago Sun-Times on Sunday.

    Goldberg has been detained ahead of trial, court records show. Martin pleaded not guilty. A lawyer for Martin declined comment. A lawyer listed for Goldberg did not immediately respond to emails seeking comment.

    Authorities did not identify the affected companies, naming them only as firms devoted to various industries based in California, Florida, Virginia and Maryland.

    Martin was identified in online course descriptions as a former employee of cybersecurity firm DigitalMint, which offers cybercrime and ransomware incident response services. Goldberg was identified by an online course provider as an incident response manager at Sygnia, another cybersecurity firm.

    DigitalMint confirmed in a statement that a former employee had been indicted for participating in ransomware operations, saying he was “acting completely outside the scope of his employment” and noting that the indictment did not allege that the company had any knowledge of activity. It said the third, unnamed coconspirator “may have also been a company employee.”

    It added that DigitalMint “has been and continues to be a cooperating witness in the investigation and not an investigative target.”

    Sygnia did not immediately return emails from Reuters but was quoted by the Chicago Sun-Times as saying that Goldberg no longer worked for the company, that the firm was not the target of the investigation and that it was working with law enforcement.

    (Reporting by Raphael Satter in Washington; Editing by Matthew Lewis)

    Copyright 2025 Thomson Reuters.

    [ad_2]

    Reuters

    Source link

  • DOJ accuses US ransomware negotiators of launching their own ransomware attacks | TechCrunch

    [ad_1]

    U.S. prosecutors have charged two rogue employees of a cybersecurity company that specializes in negotiating ransom payments to hackers on behalf of their victims, with carrying out ransomware attacks of their own.

    Last month, the Department of Justice indicted Kevin Tyler Martin and another unnamed employee, who both worked as ransomware negotiators at DigitalMint, with three counts of computer hacking and extortion related to a series of attempted ransomware attacks against at least five U.S.-based companies.

    Prosecutors also charged a third individual, Ryan Clifford Goldberg, a former incident response manager at cybersecurity giant Sygnia, as part of the scheme.

    The three are accused of hacking into companies, stealing their sensitive data, and deploying ransomware developed by the ALPHV/BlackCat group.

    The ALPHV/BlackCat gang operates as a ransomware-as-a-service model, in which the gang develops the file-encrypting malware used to steal and scramble the victims’ data, while its affiliates — such as the three individuals indicted — carry out the hacks and deploy the gang’s ransomware. The gang then takes a cut of the profits made from any ransom payments.

    According to an FBI affidavit filed in September, the rogue employees received more than $1.2 million in ransom payments from one victim, a medical device maker in Florida. They also targeted several other companies, including a Virginia-based drone maker and a Maryland-headquartered pharmaceutical company. 

    The Chicago Sun-Times first reported the indictment on Sunday.

    Sygnia chief executive Guy Segal confirmed to TechCrunch that Goldberg was a Sygnia employee and was terminated after Sygnia learned of his alleged involvement with the ransomware attacks. The company declined to comment further citing the FBI’s ongoing investigation.

    DigitalMint president Marc Grens told TechCrunch that Martin was an employee at the time of the alleged hacks, but said Martin was “acting completely outside the scope of his employment.” 

    Grens also confirmed that the unnamed individual may be a former employee. DigitalMint is also cooperating with the government’s investigation, said Grens. 

    [ad_2]

    Zack Whittaker

    Source link

  • LG Uplus is latest South Korean telco to confirm cybersecurity incident | TechCrunch

    [ad_1]

    LG Uplus, one of the largest telecom operators in South Korea, has confirmed to TechCrunch that it has reported a suspected data breach to Korea’s national cybersecurity watchdog KISA, but did not say when the results of its investigation would be available.

    All three major South Korean telecom providers, SK Telecom, KT Telecom, and now LG Uplus, have reported cybersecurity incidents over the past six months, pending confirmation from the Korean government.

    South Korea’s Ministry of Science and ICT told TechCrunch that its investigation into KT and LG Uplus, launched last month, is still ongoing, amid a report that the companies may have faced cyberattacks similar to the recent breach at SK Telecom.

    Back in July, KISA also reportedly spotted signs of a possible hack and asked LG Uplus to file a formal report. In August, LG’s telecom division initially denied any signs of a breach, even as KT reported that data from users had been exposed following the connection of unauthorized micro base stations to its network. KISA declined to comment.

    The move comes about two months after the hacking magazine Phrack claimed that hackers from China or North Korea had stolen data from close to 9,000 LG Uplus servers.

    LG Uplus’s report comes amid a wave of high-profile hacks in South Korea affecting telecoms, credit card companies, tech startups, and government agencies, highlighting vulnerabilities previously reported by TechCrunch.

    South Korea’s fragmented cybersecurity system and a shortage of experts have hindered the country’s response to the cyber threats.

    [ad_2]

    Kate Park

    Source link

  • Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website

    [ad_1]

    The sensitive personal details of more than 450 people holding “top secret” US government security clearances were left exposed online, new research seen by WIRED shows. The people’s details were included in a database of more than 7,000 individuals who have applied for jobs over the last two years with Democrats in the United States House of Representatives.

    While scanning for unsecured databases at the end of September, an ethical security researcher stumbled upon the exposed cache of data and discovered that it was part of a site called DomeWatch. The service is run by the House Democrats and includes videostreams of House floor sessions, calendars of congressional events, and updates on House votes. It also includes a job board and résumé bank.

    After the researcher attempted to notify the House of Representatives’ Office of the Chief Administrator on September 30, the database was secured within hours, and the researcher received a response that simply said, “Thanks for flagging.” It is unclear how long the data was exposed or if anyone else accessed the information while it was unsecured.

    The independent researcher, who asked to remain anonymous due to the sensitive nature of the findings, likened the exposed database to an internal “index” of people who may have applied for open roles. Résumés were not included, they say, but the database contained details typical of a job application process. The researcher found data including applicants’ short written biographies and fields indicating military service, security clearances, and languages spoken, along with details like names, phone numbers, and email addresses. Each individual was also assigned an internal ID.

    “Some people described in the data have spent 20 years on Capitol Hill,” the researcher tells WIRED, noting that the information went beyond a list of interns or junior staffers. This is what made the finding so concerning, the researcher says, because they fear that if the data had fallen into the wrong hands—perhaps those of a hostile state or malicious hackers—it could have been used to compromise government or military staffers who have access to potentially sensitive information. “From the perspective of a foreign adversary, that is a gold mine of who you want to target,” the security researcher says.

    WIRED reached out to the Office of the Chief Administrator and House Democrats for comment. Some staff members WIRED contacted were unavailable because they have been furloughed as a result of the ongoing US government shutdown.

    “Today, our office was informed that an outside vendor potentially exposed information stored in an internal site,” Joy Lee, spokesperson for House Democratic whip Katherine Clark, told WIRED in a statement on October 22. DomeWatch is under the purview of Clark’s office. “We immediately alerted the Office of the Chief Administration Officer, and a full investigation has been launched to identify and rectify any security vulnerabilities.” Lee added that the outside vendor is “an independent consultant who helps with the backend” of DomeWatch.

    [ad_2]

    Lily Hay Newman, Matt Burgess

    Source link

  • Amazon Explains How Its AWS Outage Took Down the Web

    [ad_1]

    The cloud giant Amazon Web Services experienced DNS resolution issues on Monday leading to cascading outages that took down wide swaths of the web. Monday’s meltdown illustrated the world’s fundamental reliance on so-called hyperscalers like AWS and the challenges for major cloud providers and their customers alike when things go awry. See below for more about how the outage occurred.

    US Justice Department indictments in a mob-fueled gambling scam reverberated through the NBA on Thursday. The case includes allegations that a group backed by the mob was using hacked card shufflers to con victims out of millions of dollars—an approach that WIRED recently demonstrated in an investigation into hacking Deckmate 2 card shufflers used in casinos.

    We broke down the details of the shocking Louvre jewelry heist and found in an investigation that US Immigration and Customs Enforcement likely did not buy guided missile warheads as part of its procurements. The transaction appears to have been an accounting coding error.

    Meanwhile, Anthropic has partnered with the US government to develop mechanisms meant to keep its AI platform, Claude, from guiding someone through building a nuclear weapon. Experts have mixed reactions, though, about whether this project is necessary—and whether it will be successful. And new research this week indicates that a browser seemingly downloaded millions of times—known as the Universe Browser—behaves like malware and has links to Asia’s booming cybercrime and illegal gambling networks.

    And there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    AWS confirmed in a “post-event summary” on Thursday that its major outage on Monday was caused by Domain System Registry failures in its DynamoDB service. The company also explained, though, that these issues tipped off other problems as well, expanding the complexity and impact of the outage. One main component of the meltdown involved issues with the Network Load Balancer service, which is critical for dynamically managing the processing and flow of data across the cloud to prevent choke points. The other was disruptions to launching new “EC2 Instances,” the virtual machine configuration mechanism at the core of AWS. Without being able to bring up new instances, the system was straining under the weight of a backlog of requests. All of these elements combined to make recovery a difficult and time-consuming process. The entire incident—from detection to remediation—took about 15 hours to play out within AWS. “We know this event impacted many customers in significant ways,” the company wrote in its post mortem. “We will do everything we can to learn from this event and use it to improve our availability even further.”

    The cyberattack that shut down production at global car giant Jaguar Land Rover (JLR) and its sweeping supply chain for five weeks is likely to be the most financially costly hack in British history, a new analysis said this week. According to the Cyber Monitoring Centre (CMC), the fallout from the attack is likely to be in the region of £1.9 billion ($2.5 billion). Researchers at the CMC estimated that around 5,000 companies may have been impacted by the hack, which saw JLR stop manufacturing, with the knock-on impact of its just-in-time supply chain also forcing firms supplying parts to halt operations as well. JLR restored production in early October and said its yearly production was down around 25 percent after a “challenging quarter.”

    ChatGPT maker OpenAI released its first web browser this week—a direct shot at Google’s dominant Chrome browser. Atlas puts OpenAI’s chatbot at the heart of the browser, with the ability to search using the LLM and have it analyze, summarize, and ask questions of the web pages you’re viewing. However, as with other AI-enabled web browsers, experts and security researchers are concerned about the potential for indirect prompt injection attacks.

    These sneaky, almost unsolvable, attacks involve hiding a set of instructions to an LLM in text or an image that the chatbot will then “read” and act upon; for instance, malicious instructions could appear on a web page that a chatbot is asked to summarize. Security researchers have previously demonstrated how these attacks could leak secret data.

    Almost like clockwork, AI security researchers have demonstrated how Atlas can be tricked via prompt injection attacks. In one instance, independent researcher Johann Rehberger showed how the browser could automatically turn itself from dark mode to light mode by reading instructions in a Google Document. “For this launch, we’ve performed extensive red-teaming, implemented novel model training techniques to reward the model for ignoring malicious instructions, implemented overlapping guardrails and safety measures, and added new systems to detect and block such attacks,” OpenAI CISO Dane Stuckey wrote on X. “However, prompt injection remains a frontier, unsolved security problem, and our adversaries will spend significant time and resources to find ways to make ChatGPT agent[s] fall for these attacks.”

    Researchers from the cloud security firm Edera publicly disclosed findings on Tuesday about a significant vulnerability impacting open source libraries for a file archiving feature often used for distributing software updates or creating backups. Known as “async-tar,” numerous “forks” or adapted versions of the library contain the vulnerability and have released patches as part of a coordinated disclosure process. The researchers emphasize, though, that one widely used library, “tokio-tar,” is no longer maintained—sometimes called “abandonware.” As a result, there is no patch for tokio-tar users to apply. The vulnerability is tracked as CVE-2025-62518.

    “In the worst-case scenario, this vulnerability … can lead to Remote Code Execution (RCE) through file overwriting attacks, such as replacing configuration files or hijacking build backends,” the researchers wrote. “Our suggested remediation is to immediately upgrade to one of the patched versions or remove this dependency. If you depend on tokio-tar, consider migrating to an actively maintained fork like astral-tokio-tar.”

    Over the last decade, hundreds of thousands of people have been trafficked to forced labor compounds in Southeast Asia. In these compounds—mostly in Myanmar, Laos, and Cambodia—these trafficking victims have been compelled to run online scams and steal billions for organized crime groups.

    When law enforcement agencies have shut off internet connections to the compounds, the criminal gangs have often turned to Elon Musk’s Starlink satellite system to stay online. In February, a WIRED investigation found thousands of phones connecting to the Starlink network at eight compounds based around the Myanmar-Thailand border. At the time, the company did not respond to queries about the use of its systems. This week, multiple Starlink devices were seized in a raid at a Myanmar compound.

    [ad_2]

    Matt Burgess, Lily Hay Newman

    Source link

  • UN Cybercrime Treaty to Be Signed in Hanoi to Tackle Global Offences

    [ad_1]

    HANOI (Reuters) -A landmark U.N. cybercrime treaty, aimed at tackling offences that cost the global economy trillions of dollars annually, is set to be signed in Vietnam’s capital Hanoi by around 60 countries over the weekend.

    The convention, which will take effect after it is ratified by 40 nations, is expected to streamline international cooperation against cybercrime, but has been criticised by activists and tech companies over concerns of possible human rights abuses.

    “Cyberspace has become fertile ground for criminals…every day, sophisticated scams defraud families, steal livelihoods, and drain billions of dollars from our economies,” U.N. Secretary-General Antonio Guterres said at the opening ceremony.

    “The U.N. Cybercrime Convention is a powerful, legally binding instrument to strengthen our collective defences against cybercrime.”

    The convention targets a broad spectrum of offences from phishing and ransomware to online trafficking and hate speech, the U.N. has said, citing estimates that cybercrime costs the global economy trillions of dollars each year.

    Vietnam President Luong Cuong said the signing of the convention “not only marks the birth of a global legal instrument, but also affirms the enduring vitality of multilateralism, where countries overcome differences and are willing to shoulder responsibilities together for the common interests of peace, security, stability and development.”

    Critics have warned its vague definition of crime could enable abuse.

    The Cybersecurity Tech Accord, which includes Meta and Microsoft, has dubbed the pact a “surveillance treaty,” saying it may facilitate data sharing among governments and criminalise ethical hackers who test systems for vulnerabilities.

    The U.N. Office on Drugs and Crime (UNODC), which led the treaty negotiations, said the agreement includes provisions to protect human rights and promotes legitimate research activities.

    The European Union, the United States and Canada sent diplomats and officials to sign the treaty in Hanoi.

    Vietnam’s role as host has also stirred controversy. The U.S. State Department recently flagged “significant human rights issues” in the country, including online censorship. Human Rights Watch says at least 40 people have been arrested this year, including for expressing dissent online.

    Vietnam views the treaty as an opportunity to enhance its global standing and cyber defences amid rising attacks on critical infrastructure.

    (Reporting by Francesco Guarascio and Khanh Vu; Editing by Jacqueline Wong)

    Copyright 2025 Thomson Reuters.

    [ad_2]

    Reuters

    Source link

  • How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA

    [ad_1]

    “If there’s a camera that knows the cards, there is always some kind of underlying threat. Customers are gonna be essentially at the mercy of the person setting up the machine,” poker player and card house owner Doug Polk previously told WIRED. “If you’re showing up in a private game and there’s a shuffler, I would say you should run for the hills.”

    Hacking the Deckmate 2, according to prosecutors, was only one of several cheating techniques the mobsters allegedly used, albeit the one that’s described in the most detail in the indictment. The charging document also claims that they used invisibly marked cards, electronic poker chip trays, phones that could secretly read cards’ markings, and even specially designed glasses and contact lenses.

    While the details of those schemes weren’t spelled out by prosecutors, they’re all well known in the casino security world, says Sal Piacente, a professional cheating consultant and the president of UniverSal Game Protection. Cards can, for instance, have hidden bar codes on their edges—printed invisibly, such as with infrared ink—that can be deciphered by a reader hidden in a chip tray or in a phone case laid on the table. In other cases, cards are similarly marked on their backs with ink that’s only visible with special glasses or contacts.

    “This kind of equipment is being used more than you would think,” Piacente says. “When you go to a private game, there’s no regulation, no commission, no rules. Anything goes.”

    [ad_2]

    Andy Greenberg

    Source link

  • Hackers Dox ICE, DHS, DOJ, and FBI Officials

    [ad_1]

    In a stunning new study, researchers at UC San Diego and the University of Maryland revealed this week that satellites are leaking a wealth of sensitive data completely unencrypted, from calls and text messages on T-Mobile to in-flight Wi-Fi browsing sessions, to military and police communications. And they did this with just $800 in off-the-shelf equipment.

    Face recognition systems are seemingly everywhere. But what happens when this surveillance and identification technology doesn’t recognize your face as a face? WIRED spoke with six people with facial differences who say flaws in these systems are preventing them from accessing essential services.

    Authorities in the United States and United Kingdom announced this week the seizure of nearly 130,000 bitcoins from an alleged Cambodian scam empire. At the time of the seizure, the cryptocurrency fortune was worth $15 billion—the most money of any type ever confiscated in the US.

    Control over a significant portion of US election infrastructure is now in the hands of a single former Republican operative, Scott Leiendecker, who just purchased voting machine company Dominion Voting Systems and owns Knowink, an electronic poll book firm. Election security experts are currently more baffled about the implications than worried about any possibility of foul play.

    While a new type of attack could let hackers steal two-factor authentication codes from Android phones, the biggest cybersecurity development of the week was the breach of security firm F5. The attack, which was carried out by a “sophisticated” threat actor reportedly linked to China, poses an “imminent threat” of breaches against government agencies and Fortune 500 companies. Finally, we sifted through the mess that is VPNs for iPhones and found the only three worth using.

    But that’s not all! Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    In recent years, perhaps no single group of hackers has caused more mayhem than “the Com,” a loose collective of mostly cybercriminal gangs whose subgroups like Lapus$ and Scattered Spider have carried out cyberattacks and ransomware extortion operations targeting victims from MGM Casinos to Marks & Spencer grocery stores. Now they’ve turned their sites to US federal law enforcement.

    On Thursday, one member of the Com’s loose collective began posting to Telegram an array of federal officials’ identifying documents. One spreadsheet, according to 404 Media, contained what appeared to be personal information of 680 Department of Homeland Security officials, while another included personal info on 170 FBI officials, and yet another doxed 190 Department of Justice officials. The data in some cases included names, email addresses and phone numbers, and addresses—in some cases of officials’ homes rather than the location of their work. The user who released the data noted in their messages a statement from the DHS that Mexican cartels have offered thousands of dollars for identifying information on agents, apparently mocking this unverified claim.

    “Mexican Cartels hmu we dropping all the doxes wheres my 1m,” the user who released the files wrote, using the abbreviation for “hit me up” and seemingly demanding a million dollars. “I want my MONEY MEXICO.”

    Over the last year—at least—the FBI has operated a “secret” task force that may have worked to disrupt Russian ransomware gangs, according to reports published this week in France’s Le Monde and Germany’s Die Zeit. The publications allege that at the end of last year, the mysterious Group 78 presented its strategy to two different meetings of European officials, including law enforcement officials and those working in judicial services. Little is known about the group; however, its potentially controversial tactics appeared to spur typically tight-lipped European officials to speak out about Group 78’s existence and tactics.

    At the end of last year, according to the reports, Group 78 was focusing on the Russian-speaking Black Basta ransomware gang and outlined two approaches: running operations inside Russia to disrupt the gang’s members and try to get them to leave the country; and also to “manipulate” Russian authorities into prosecuting Black Basta members. Over the last few years, Western law enforcement officials have taken increasingly disruptive measures against Russian ransomware gangs—including infiltrating their technical infrastructure, trying to ruin their reputations, and issuing a wave of sanctions and arrest warrants—but taking covert action inside Russia against ransomware gangs would be unprecedented (at least in public knowledge). The Black Basta group has in recent months gone dormant after 200,000 of its internal messages were leaked and its alleged leader identified.

    Over the last few years, AI-powered license plate recognition cameras—which are placed at the side of the road or in cop cars—have gathered billions of images of people’s vehicles and their specific locations. The technology is a powerful surveillance tool that, unsurprisingly, has been adopted by law enforcement officials across the United States—raising questions about how access to the cameras and data can be abused by officials.

    This week, a letter by Senator Ron Wyden revealed that one division of ICE, the Secret Service, and criminal investigators at the Navy all had access to data from the cameras of Flock Safety. “I now believe that abuses of your product are not only likely but inevitable, and that Flock is unable and uninterested in preventing them,” Wyden’s letter addressed to Flock says. Wyden’s letter follows increasing reports that government agencies, including the CBP, had access to Flock’s 80,000 cameras. “In my view,” Wyden wrote, “local elected officials can best protect their constituents from the inevitable abuses of Flock cameras by removing Flock from their communities.”

    [ad_2]

    Andy Greenberg, Matt Burgess

    Source link

  • Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

    [ad_1]

    Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached by a nation-state hacking group following the breach of a major maker of software, the federal government warned on Wednesday.

    F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.

    Unprecedented

    During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations. Wednesday’s disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings that some customers used inside their networks.

    Control of the build system and access to the source code, customer configurations, and documentation of unpatched vulnerabilities has the potential to give the hackers unprecedented knowledge of weaknesses and the ability to exploit them in supply-chain attacks on thousands of networks, many of which are sensitive. The theft of customer configurations and other data further raises the risk that sensitive credentials can be abused, F5 and outside security experts said.

    Customers position BIG-IP at the very edge of their networks for use as load balancers and firewalls, and for inspection and encryption of data passing into and out of networks. Given BIG-IP’s network position and its role in managing traffic for web servers, previous compromises have allowed adversaries to expand their access to other parts of an infected network.

    F5 said that investigations by two outside intrusion-response firms have yet to find any evidence of supply-chain attacks. The company attached letters from firms IOActive and NCC Group attesting that analyses of source code and build pipeline uncovered no signs that a “threat actor modified or introduced any vulnerabilities into the in-scope items.” The firms also said they didn’t identify any evidence of critical vulnerabilities in the system. Investigators, which also included Mandiant and CrowdStrike, found no evidence that data from its CRM, financial, support case management, or health systems was accessed.

    The company released updates for its BIG-IP, F5OS, BIG-IQ, and APM products. CVE designations and other details are here. Two days ago, F5 rotated BIG-IP signing certificates, though there was no immediate confirmation that the move is in response to the breach.

    [ad_2]

    Dan Goodin, Ars Technica

    Source link

  • One Republican Now Controls a Huge Chunk of US Election Infrastructure

    [ad_1]

    The news last week that Dominion Voting Systems was purchased by the founder and CEO of Knowink, a Missouri-based maker of electronic poll books, has left election integrity activists confused over what, if anything, this could mean for voters and the integrity of US elections.

    The company, acquired by Scott Leiendecker, a former Republican Party operative and election director in Missouri before founding Knowink, said in a press release that he was rebranding Dominion, which has headquarters in Canada and the United States, under the name Liberty Vote “in a bold and historic move to transform and improve election integrity in America” and to distance the company from false allegations made previously by President Donald Trump and his supporters that the company had rigged the 2020 presidential election to give the win to President Joe Biden.

    The Liberty release said that the rebranded company will be 100 percent American owned, that it will have a “paper ballot focus” that leverages hand-marked paper ballots, will “prioritize facilitating third-party auditing,” and is “committed to domestic staffing and software development.” The press release provided no details, however, to explain what this means in practice.

    Dominion, the second leading provider of voting machines in the US, whose systems are used in 27 states—including the entire state of Georgia—has developed its software in Belgrade, Serbia and Canada for two decades. A search on LinkedIn shows numerous programmers and other workers in Serbia who claim to be employed by the company.

    The Liberty statement does not say whether the company plans to re-write code developed by these foreign workers—which would potentially involve rewriting hundreds of thousands of lines of code—or whether the company will move foreign developers to the US or replace them with American programmers. (Dominion already has a US headquarters in Colorado.) A Liberty official, who agreed to speak on the condition that they not be named, told WIRED only that Leiendecker “is committed to 100 percent … domestic staffing and software development.” An unnamed source told CNN, however, that Liberty will continue to have a presence in Canada, where its machines are used across the country.

    Philip Stark, professor of statistics at UC Berkeley and longtime election-integrity advocate, says that Liberty’s assurance about domestic-only workers is a red herring. “If the claim is that this is somehow a security measure, it isn’t. Because programmers based in the US also … may be interested in undermining or altering election integrity,” he tells WIRED.

    With regard to third-party audits mentioned in the press release, a Liberty official told WIRED this means the company will conduct a “third-party, top-to-bottom, independent review of [Dominion] software and equipment in a timely manner and will work closely with federal and state certification agencies and report any vulnerabilities” to give voters assurance in the machines and the results they produce. The company didn’t say when this review would occur, but a Liberty representative told Axios it would happen ahead of next year’s midterm elections, and the company would “rebuild or retire” machines as needed.

    [ad_2]

    Kim Zetter

    Source link

  • A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    [ad_1]

    Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds.

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

    Like Taking a Screenshot

    Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

    “Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

    The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

    Pixnapping targets the same side channel as GPU.zip, specifically the precise amount of time it takes for a given frame to be rendered on the screen.

    [ad_2]

    Dan Goodin, Ars Technica

    Source link

  • How B2B Tech Vendors Can Succeed in a Fragmented Market

    [ad_1]

    The cybersecurity industry is a microcosm of a larger economic truth: Fragmented markets are always on a path toward consolidation.

    With over 3,000 vendors, the cybersecurity industry is at a pivotal moment. Market shifts indicate that smaller, niche vendors will be acquired by one of the five to seven larger players that offer an end-to-end solution—or they’ll cease to exist altogether.

    The lessons we’re learning about how companies can navigate and succeed in a fragmented market aren’t just for cybersecurity companies; they’re for every B2B tech vendor navigating a landscape that’s changing faster than ever. Here are four lessons I’ve learned from the cybersecurity industry that can help tech providers of all kinds understand how to position their organizations to succeed in a fragmented market.

    1.  From point solutions to unified platforms

    The cybersecurity market has long been defined by its sheer number of point solutions. Does a company need to secure its email? There’s a vendor for that. Its network? Another one. Its cloud presence? A third. This model worked when threats were simpler, but it’s now creating a tangled web of complexity and inefficiency.

    We’re now seeing a massive push toward platform-based solutions. Businesses want a single, integrated platform that handles multiple functions, offering a holistic view of their security posture. This isn’t just a trend; it’s a fundamental shift driven by the need for simplicity, efficiency, and a unified strategy.

    The lesson here is universal: No matter your industry, if you’re selling a single piece of the puzzle, you’re at risk. Your customers are tired of juggling multiple vendors, and they’re looking for partners who can provide comprehensive, end-to-end solutions.

    2.  The AI imperative

    Another major force driving this trend is AI adoption. AI is creating a perfect storm, not just in cybersecurity, but in every industry. It’s making point solutions obsolete in some instances because AI-powered platforms can perform the functions of multiple smaller tools more effectively and in an integrated way. For example, an AI-powered security platform can analyze data from your network, cloud, and endpoints simultaneously, identifying threats that a single-purpose tool would miss. AI isn’t just about automation; it’s about creating new business models that are more intelligent, efficient, and valuable to customers.

    In the next 18 months, the businesses that successfully harness AI to create more valuable, integrated offerings will thrive. This either means offering a comprehensive platform that holds its own alongside the other major players or strategically positioning your offering in the hopes of being acquired by a key industry provider. Those who don’t pursue either of these options are at risk of failing. This applies regardless of which industry your organization serves.

    In your own business, this means looking beyond your current offerings and asking: “How can we help our customers transform their business?” Maybe it’s by streamlining their operations, unlocking new markets, or creating entirely new value propositions. The businesses that will win in the future are those that not only understand market shifts but also actively help their customers navigate them.

    Organizations that fail to adapt will be left behind. However, those that lead with innovation and strategically align their business with their customers’ needs will secure their place among industry leaders.

    [ad_2]

    Alex Mosher

    Source link

  • Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    [ad_1]

    That suggests anyone could set up similar hardware somewhere else in the world and likely obtain their own collection of sensitive information. After all, the researchers restricted their experiment to only off-the-shelf satellite hardware: a $185 satellite dish, a $140 roof mount with a $195 motor, and a $230 tuner card, totaling less than $800.

    “This was not NSA-level resources. This was DirecTV-user-level resources. The barrier to entry for this sort of attack is extremely low,” says Matt Blaze, a computer scientist and cryptographer at Georgetown University and law professor at Georgetown Law. “By the week after next, we will have hundreds or perhaps thousands of people, many of whom won’t tell us what they’re doing, replicating this work and seeing what they can find up there in the sky.”

    One of the only barriers to replicating their work, the researchers say, would likely be the hundreds of hours they spent on the roof adjusting their satellite. As for the in-depth, highly technical analysis of obscure data protocols they obtained, that may now be easier to replicate, too: The researchers are releasing their own open-source software tool for interpreting satellite data, also titled “Don’t Look Up,” on Github.

    The researchers’ work may, they acknowledge, enable others with less benevolent intentions to pull the same highly sensitive data from space. But they argue it will also push more of the owners of that satellite communications data to encrypt that data, to protect themselves and their customers. “As long as we’re on the side of finding things that are insecure and securing them, we feel very good about it,” says Schulman.

    There’s little doubt, they say, that intelligence agencies with vastly superior satellite receiver hardware have been analyzing the same unencrypted data for years. In fact, they point out that the US National Security Agency warned in a 2022 security advisory about the lack of encryption for satellite communications. At the same time, they assume that the NSA—and every other intelligence agency from Russia to China—has set up satellite dishes around the world to exploit that same lack of protection. (The NSA did not respond to WIRED’s request for comment).

    “If they aren’t already doing this,” jokes UCSD cryptography professor Nadia Heninger, who co-led the study, “then where are my tax dollars going?”

    Heninger compares their study’s revelation—the sheer scale of the unprotected satellite data available for the taking—to some of the revelations of Edward Snowden that showed how the NSA and Britain’s GCHQ were obtaining telecom and internet data on an enormous scale, often by secretly tapping directly into communications infrastructure.

    “The threat model that everybody had in mind was that we need to be encrypting everything, because there are governments that are tapping undersea fiber optic cables or coercing telecom companies into letting them have access to the data,” Heninger says. “And now what we’re seeing is, this same kind of data is just being broadcast to a large fraction of the planet.”

    [ad_2]

    Andy Greenberg, Matt Burgess

    Source link

  • The ZoraSafe app wants to protect older people online and will present at TechCrunch Disrupt 2025  | TechCrunch

    [ad_1]

    Apart from antivirus apps, the cybersecurity industry has traditionally been business to business, with regular internet users left on their own to protect themselves. And older people, who did not grow up with the internet and smartphones, are perhaps the most vulnerable. 

    ZoraSafe, a startup founded by sisters Catherine Karow and Ellie King Karow wants to step in and help them out. Their idea is to create an app that not only protects older people against scammers and hackers, but also teaches them how to stay safe through gamified microlearning, as Catherine and Ellie told TechCrunch ahead of the TechCrunch Disrupt conference, where ZoraSafe will be part of Startup Battlefield.

    The app is not out yet, but Catherine and Ellie expect to launch it in a month. They said it will cost $12.99 a month for individual subscribers, and a higher rate for family and group plans.

    The first version of the app, Catherine explained in a phone call, will have several features, such as a mode to scan QR codes for malware or phishing, the ability to send suspicious SMS text messages and emails to ZoraSafe to get them checked out, and a feature to share a known scam or threat with the app so it can be added to a database to help other users.

    “We’re trying to incentivize social sharing of scams, so we can also alert the entire Zora network at once, so one person is alerted by that scam, and then we can make sure everyone in that community is protected immediately,” Catherine said.

    Future releases will also include a feature that will allow users to get ZoraSafe to join a suspicious phone call, so the company’s AI system can detect if it’s a scam or a deepfake call. In that case, however, the app will not be listening to or recording the calls, according to Catherine.  

    Once the app detects a threat, it will spin up a chat that will explain to the user what that threat was and teach them how to spot and deal with similar situations in the future, Ellie said.  

    Techcrunch event

    San Francisco
    |
    October 27-29, 2025

    “The whole purpose of which is to build resilience and hopefully make it so that even if you’re not directly interacting with the app, you’re a little bit more aware when you are interacting online,” she added. 

    Ellie said that the AI engine is designed with privacy in mind, doing 85% of the processing on the device, and only 15% in the cloud, which she claimed will be “sanitized of your personal information before it leaves your device.” 

    Catherine also said they are planning to make an “NFC sticker” that will be incorporated in phone cases so that users can quickly pull up the app if they get a deepfake call, or even if they fall and need to alert their caretakers. That’s one of the ways they plan on getting around iOS’s restrictions on apps monitoring what happens on other apps. Another way is to have a “Share to ZoraSafe” option in the iOS menu that will allow users to send text messages or emails to the company’s systems.  

    Eventually, the sisters said they want to expand ZoraSafe to children, too, partner with schools, and also launch the app in different languages, starting with Spanish.  

    If you want to learn more about ZoraSafe — while also checking out dozens of other companies, hearing their pitches, and listening to guest speakers on four different stages — join us at Disrupt, October 27 to 29, in San Francisco. Learn more here.  

    [ad_2]

    Lorenzo Franceschi-Bicchierai

    Source link

  • ‘Happy Gilmore’ Producer Buys Spyware Maker NSO Group

    [ad_1]

    Research published this week indicates that North Korean scammers are trying to trick US companies into hiring them for architectural design work, using fake profiles, résumés, and Social Security numbers to pose as legitimate workers. The hustle fits into longstanding campaigns by the hermit kingdom to steal billions of dollars from organizations around the world using careful planning and coordination to pose as professionals in all different fields.

    Under pressure from the Department of Justice, Apple removed a series of apps from its iOS App Store this month related to monitoring US Immigration and Customs Enforcement activity and archiving content related to ICE’s actions. As more apps are removed, multiple developers told WIRED this week that they aren’t giving up on fighting Apple over the decisions—and many are still distributing their apps on other platforms in the meantime.

    WIRED examined increasing warnings from software supply chain security researchers that the proliferation of AI-generated software in codebases will create an even more extreme version of the code transparency and accountability issues that have come up with widespread integration of open source software components. And Apple announced expansions of its bug bounty program this week, including a maximum $2 million payout for certain exploit chains that could be abused to distribute spyware, and additional bonuses for exploits found in Apple’s Lockdown Mode or in beta versions of new software.

    But wait, there’s more! Each week, we round up the security and privacy news we didn’t report in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    The notorious spyware vendor NSO Group, known for developing the Pegasus malware, has faced financial issues since losing a long legal battle against the secure messaging platform WhatsApp as well as a lawsuit filed by Apple. Now, the company, which has long had Israeli ownership, has been purchased by a group of US-based investors led by movie producer Robert Simonds, who helped finance Happy Gilmore, Billy Madison, The Pink Panther, Hustlers, and Ferrari, among many other films. The deal is reportedly worth “several tens of millions of dollars” and is close to completion. Israel’s Defense Export Control Agency (DECA) within the Ministry of Defense will need to approve the sale. Use of mercenary spyware has increased within some US federal government agencies since the beginning of the Trump administration.

    Hundreds of national security and cybersecurity specialists who work in the US Department of Homeland Security have faced mandatory reassignment in recent weeks to roles related to President Donald Trump’s mass deportation agenda. Bloomberg reports that affected workers are largely senior staffers who are not union eligible. Workers who refuse to move roles will reportedly be dismissed. Members of DHS’s Cybersecurity and Infrastructure Security Agency (CISA) who have faced reassignment reportedly worked on “issuing alerts about threats against US agencies and critical infrastructure.” For example, CISA’s Capacity Building team has faced a number of reassignments, which could hinder access to emergency recommendations and directives for high-value federal government assets. Workers have been moved to agencies including Immigration and Customs Enforcement, Customs and Border Protection, and the Federal Protective Service.

    A recent breach of a third-party customer service provider used by the communication platform Discord included a trove of data from more than 70,000 Discord users that contained identification documents as well as selfies, email addresses, phone numbers, some home location information, and more. The data was collected as part of age verification checks, a mechanism that has long been criticized for centralizing users’ sensitive information. 404 Media reports that the breach was perpetrated by attackers who are attempting to extort Discord. “This is about to get really ugly,” the hackers wrote in a Telegram channel on Wednesday while posting the stolen data.

    US Immigration and Customs Enforcement inked a $825,000 contract in May with TechOps Specialty Vehicles (TOSV), a Maryland-based company that manufactures equipment and vehicles for law enforcement. The company provides products including rogue cellphone towers that are used for phone surveillance and sometimes called “stingrays” or “cell-site simulators.” Public records reviewed by TechCrunch show that the agreement describes how the company “provides Cell Site Simulator (CSS) Vehicles to support the Homeland Security Technical Operations program” and is a modification for “additional CSS Vehicles.” TOSV also began a similar $818,000 contract with ICE in September 2024, prior to the start of the Trump administration. In an email to TechCrunch, TOSV president Jon Brianas declined to share details about the contracts but confirmed that the company does provide cell-site simulators. The company does not manufacture them itself, he said.

    [ad_2]

    Lily Hay Newman

    Source link

  • Wire fraud prevention: How businesses can protect funds | Long Island Business News

    [ad_1]

    Story Highlights
    • 63% of U.S. companies faced wire in 2024, costing billions
    • Prevention steps: verify wiring instructions and train employees
    • Response plan: contact banks, file IC3 report, secure IT systems
    • Insurance & legal support: notify carriers, assess data exposure

    is one of the fastest growing types of cyber threats – a 2024 ABA Banking Journal survey found 63% of U.S. companies have experienced at least one incident, with billions of dollars in estimated loss.

    Criminals often impersonate a company executive—or a known vendor—to deceive someone into sending money to a fraudulent account. Because wire transfers are fast and may be difficult (if not impossible) to reverse, victims often cannot recover the lost funds.

    Protection starts with prevention. Educate employees about the different types of wire-transfer fraud and require them to verify critical information through a different communication channel, as well as a phone number or email account you know is correct, before sending money or changing any established wiring instructions. But, should your organization fall victim to wire-transfer fraud, it is extremely important to have a response plan in place to act quickly. Here are some recommended steps to include in the plan:

     

    1. Attempt to recover the funds

    Notify your financial institution immediately. Be prepared to provide:

    • Account holder information: Full name, address, account number and contact details.
    • Transaction details: Date, amount, recipient name and account number.
    • Statement of non-authorization: A sworn declaration that the transfer was not authorized.
    • Police report information: Case number, officer name and department (if applicable).
    • Signatures and notarization: The affidavit must be signed and typically notarized.

     

    1. File a export with authorities

    File a report with IC3.gov at the Internet Crime Complaint Center (IC3) to report the incident. Be prepared to provide details about where the wires were sent and received, the date, time and amount transferred and information about the fraudulent email that triggered the transaction.

     

    1. Secure the organization’s IT environment

    Reset all passwords, especially for affected accounts. Revoke all tokens. Preserve system logs for forensic analysis, including authentication logs and email access logs. Enable (MFA) if it is not already in place. Consider having your attorney retain a vendor or forensic investigator to help if you can’t do it with existing resources.

     

    1. Notify your insurance carrier and broker

    Contact your cyber and insurance providers. Your coverage may fall under multiple policies. The incident may not qualify as a , but rather traditional fraud via email. Your broker can help determine coverage.

     

    1. Assess broader risk and potential data exposure

    In addition to accessing and reviewing individual messages, the attacker may have acquired a copy of your mailbox. You may be able to determine this through your logging records, or you may need to research via the connection method used by the attacker. If there is a reason to conclude sensitive information was accessed or acquired, review the exposed data for information that is protected under state laws, including Personally Identifiable Information (PII). If PII was exposed, evaluate whether affected individuals must be notified and consider offering fraud and identity theft protection services.

    As with any type of fraud or breach, it is optimal to hire an outside attorney with experience in these types of . This facilitates attorney-client privilege, protecting confidential communication; provides you with access to additional experienced resources, including those in the attorney’s firm or third parties the attorney can access; and legitimizes the response, providing protective distance with regulators and third parties.

    Wire-transfer fraud can cripple an organization. Don’t be caught unprepared. Review your organization’s plan and make sure these issues are addressed.

    Alan Winchester is the leader of Harris Beach Murtha’s Cybersecurity Protection and Response Practice Group.


    [ad_2]

    LIBN Staff

    Source link

  • Poland Says Cyberattacks on Critical Infrastructure Rising, Blames Russia

    [ad_1]

    WARSAW (Reuters) -Poland’s critical infrastructure has been subject to a growing number of cyberattacks by Russia, whose military intelligence, has trebled its resources for such action against Poland this year, the country’s digital affairs minister told Reuters.

    Of the 170,000 cyber incidents that have been identified in the first three quarters of this year, a significant portion has been attributed to Russian actors, while other cases are financially motivated, involving theft or other forms of cybercrime, Krzysztof  Gawkowski said.

    He said Poland is a subject to between 2,000 and 4,000 incidents a day and that 700 to 1,000 are “taken up by us, meaning they posed a real threat or had the potential to cause serious problems”, he said.

    Foreign adversaries are now expanding their focus beyond water and sewage systems to the energy sector, he said.

    He did not give exact figures for Russian activity and could not comment on Russia’s methods in Poland’s cyberspace. The information on Russia’s increasing involvement had come from intelligence from Poland’s intelligence agencies.

    Russia has consistently denied claims of such activity. The Russian embassy in Warsaw did not immediately return a request for comment.

    Officials in Warsaw have said Poland, a staunch supporter of Ukraine, is Russia’s main target among NATO states and has accused the Kremlin of repeated efforts to undermine national security. 

    “Russian activity is the most severe because it targets critical infrastructure essential to maintaining normal life,” Gawkowski said. 

    Along with the Russian drone attack on September 10, there was a correlated cyberattack on Poland, the largest since 2022, when the war broke out in Ukraine, he said. 

    Although the government saw from the early hours of the night that the drone attack was coming from Russia, false claims that Ukraine sent the drones to start war, flooded Polish cyberspace, Gawkowski said.

    He added that to do this, bots that had remained dormant for months, even years were reactivated.

    (Reporting by Barbara Erling)

    Copyright 2025 Thomson Reuters.

    Photos You Should See – Oct. 2025

    [ad_2]

    Reuters

    Source link

  • Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

    [ad_1]

    Since launching its bug bounty program nearly a decade ago, Apple has always touted notable maximum payouts—$200,000 in 2016 and $1 million in 2019. Now the company is upping the stakes again. At the Hexacon offensive security conference in Paris on Friday, Apple vice president of security engineering and architecture Ivan Krstić announced a new maximum payout of $2 million for a chain of software exploits that could be abused for spyware.

    The move reflects how valuable exploitable vulnerabilities can be within Apple’s highly protected mobile environment—and the lengths the company will go to to keep such discoveries from falling into the wrong hands. In addition to individual payouts, the company’s bug bounty also includes a bonus structure, adding additional awards for exploits that can bypass its extra secure Lockdown Mode as well as those discovered while Apple software is still in its beta testing phase. Taken together, the maximum award for what would otherwise be a potentially catastrophic exploit chain will now be $5 million. The changes take effect next month.

    “We are lining up to pay many millions of dollars here, and there’s a reason,” Krstić tells WIRED. “We want to make sure that for the hardest categories, the hardest problems, the things that most closely mirror the kinds of attacks that we see with mercenary spyware—that the researchers who have those skills and abilities and put in that effort and time can get a tremendous reward.”

    Apple says that there are more than 2.35 billion of its devices active around the world. The company’s bug bounty was originally an invite-only program for prominent researchers, but since opening to the public in 2020, Apple says that it has awarded more than $35 million to more than 800 security researchers. Top-dollar payouts are very rare, but Krstić says that the company has made multiple $500,000 payouts in recent years.

    In addition to higher potential rewards, Apple is also expanding the bug bounty’s categories to include certain types of one-click “WebKit” browser infrastructure exploits as well as wireless proximity exploits carried out with any type of radio. And there is even a new offering known as “Target Flags” that puts the concept of capture the flag hacking competitions into real-world testing of Apple’s software to help researchers demonstrate the capabilities of their exploits quickly and definitively.

    Apple’s bug bounty is just one of many long-term investments aimed at reducing the prevalence of dangerous vulnerabilities or blocking their exploitation. For example, after more than five years of work, the company announced a security protection last month in the new iPhone 17 lineup that aims to nullify the most frequently exploited class of iOS bugs. Known as Memory Integrity Enforcement, the feature is a big swing aimed at protecting a small minority of the most vulnerable and highly targeted groups around the world—including activists, journalists, and politicians—while also adding defense for all users of new devices. To that end, the company announced on Friday that it will donate a thousand iPhone 17s to rights groups that work with people at risk of facing targeted digital attacks.

    “You can say, well, that seems like a very large effort to protect only that very small number of users that are being targeted by mercenary spyware, but there is just this incontrovertible track record described by journalists, tech companies, and civil society organizations that these technologies are constantly being abused,” Krstić says. “And we feel a great moral obligation to defend those users. Despite the fact that the vast majority of our users will never be targeted by anything like this, this work that we did will end up increasing protection for everyone.”

    [ad_2]

    Lily Hay Newman

    Source link

  • UK Police Arrest Two Over London Ransomware of Children’s Data

    [ad_1]

    LONDON (Reuters) -British police said on Tuesday that they had arrested two people on suspicion of computer misuse and blackmail following a cyberattack on a London childcare company in which data on more than 8,000 children was stolen.

    The hackers declined to say how much money they were demanding from Kido International, which operates 18 nurseries in Greater London that typically serve babies up to 5-year-olds.

    The gang, which identifies itself as Radiant, reported on the attack on its dark web portal last month. It evidenced its claim by publishing the names, photos, home addresses and family contact information of 10 children it said attended one of Kido’s centres.

    London’s Metropolitan Police said the two men, aged 17 and 22, were arrested and taken into custody, where they will remain for questioning. The arrests followed an operation at several residential properties in the town of Bishop’s Stortford.

    The hack, which raises serious concerns about child safeguarding and data privacy, was the latest in a string of serious ransomware incidents in Britain that have rocked businesses in Britain this year.

    (Reporting by Catarina Demony; Editing by Cynthia Osterman)

    Copyright 2025 Thomson Reuters.

    Photos You Should See – Sept. 2025

    [ad_2]

    Reuters

    Source link