Russia here, Russia there, Russia everywhere.

Russia here, Russia there, Russia everywhere.

Up next

A subtle flaw, a massive blast radius. [Research Saturday]

Yuval Avrahami from Wiz joins to share their work on "CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild." Wiz Research uncovered “CodeBreach,” a critical supply chain vulnerability caused by a subtle misconfiguration in AWS ...  Show more

Millions of devices still up for grabs.

Feds take down major IoT botnets. The FBI seizes hacktivist infrastructure. A data breach hits Kaplan, while a hacker claims access to millions of law enforcement tips. Fake Zoom calls deliver malware. A crypto “security” tool turns out to be spyware. A critical AI framework flaw ...  Show more

Recommended Episodes

How Are US Chips Ending Up In Russian Weapons?
Big Take

US sanctions against Russia are supposed to cut off Moscow’s access to all kinds of goods, including semiconductors, which are used in missiles and drones. But US officials allege a secret supply chain has illegally funneled these chips, some of them American-made, to Russia, whe ...  Show more

The Cyber Front in the War on Ukraine
CYBER

There are a lot of companies out there willing to sell shady customers the tools they need to spy on just about anyone. All over the world software vendors like Hacking Team and NSO Group will help you break into a cellphone or read an email you’re not supposed to. But that might ...  Show more

The Dark Secrets of a Hacking Hero
Uncanny Valley | WIRED

In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilf ...

  Show more

Cyberguerre: des conflits invisibles aux conséquences bien réelles
Le monde devant soi

Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. ...

  Show more